1
TITLE: Localizing Firewall Security Policies
AUTHORS: Adao, P ; Focardi, R; Guttman, JD; Luccio, FL;
PUBLISHED: 2016, SOURCE: IEEE 29th Computer Security Foundations Symposium (CSF) in 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), VOLUME: 2016-August
INDEXED IN: Scopus WOS DBLP CrossRef: 9
2
TITLE: Bit-string oblivious transfer based on quantum state computational distinguishability
AUTHORS: Souto, A ; Mateus, P ; Adao, P ; Paunkovic, N;
PUBLISHED: 2015, SOURCE: PHYSICAL REVIEW A, VOLUME: 91, ISSUE: 4
INDEXED IN: Scopus WOS DBLP CrossRef: 13
3
TITLE: Reply to "Comment on 'Bit-string oblivious transfer based on quantum state computational distinguishability' "
AUTHORS: Souto, A ; Mateus, P; Adao, P ; Paunkovic, N;
PUBLISHED: 2015, SOURCE: PHYSICAL REVIEW A, VOLUME: 92, ISSUE: 4
INDEXED IN: Scopus WOS CrossRef: 3
IN MY: ORCID
4
TITLE: Hybrid learning of Bayesian multinets for binary classification
AUTHORS: Carvalho, AM ; Adao, P ; Mateus, P;
PUBLISHED: 2014, SOURCE: PATTERN RECOGNITION, VOLUME: 47, ISSUE: 10
INDEXED IN: Scopus WOS DBLP CrossRef: 11
5
TITLE: Mignis: A semantic based tool for firewall configuration
AUTHORS: Adao, P ; Bozzato, C; Rossi, GD; Focardi, R; Luccio, FL;
PUBLISHED: 2014, SOURCE: 27th IEEE Computer Security Foundations Symposium (CSF) in 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), VOLUME: 2014-January
INDEXED IN: Scopus WOS DBLP CrossRef: 18
6
TITLE: Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete
AUTHORS: Adao, P ; Mateus, P ; Viganò, L;
PUBLISHED: 2014, SOURCE: THEORETICAL COMPUTER SCIENCE, VOLUME: 538, ISSUE: C
INDEXED IN: Scopus WOS DBLP CrossRef: 1
8
TITLE: Type-Based Analysis of Generic Key Management APIs
AUTHORS: Adao, P ; Focardi, R; Luccio, FL;
PUBLISHED: 2013, SOURCE: IEEE 26th Computer Security Foundations Symposium in 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF)
INDEXED IN: Scopus WOS DBLP CrossRef: 5
9
TITLE: Type-Based Analysis of Generic Key Management APIs (Long Version)
AUTHORS: Pedro Adão ; Riccardo Focardi; Flaminia L Luccio;
PUBLISHED: 2013, SOURCE: IACR Cryptol. ePrint Arch., VOLUME: 2013
INDEXED IN: DBLP
10
TITLE: Computationally Complete Symbolic Attacker in Action
AUTHORS: Gergei Bana; Pedro Adão ; Hideki Sakurada;
PUBLISHED: 2012, SOURCE: FSTTCS, VOLUME: 18
INDEXED IN: Scopus DBLP
Page 1 of 2. Total results: 17.