11
TITLE: Computationally Complete Symbolic Attacker in Action
AUTHORS: Gergei Bana; Pedro Adão ; Hideki Sakurada;
PUBLISHED: 2012, SOURCE: 32nd International Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2012 in IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2012, December 15-17, 2012, Hyderabad, India, VOLUME: 18
INDEXED IN: Scopus DBLP
IN MY: ORCID | DBLP
12
TITLE: Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
AUTHORS: Gergei Bana; Pedro Adão ; Hideki Sakurada;
PUBLISHED: 2012, SOURCE: IACR Cryptology ePrint Archive, VOLUME: 2012
INDEXED IN: DBLP
IN MY: DBLP
13
TITLE: Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage  Full Text
AUTHORS: Pedro Adão ; Gergei Bana; Jonathan Herzog; Andre Scedrov;
PUBLISHED: 2009, SOURCE: Journal of Computer Security, VOLUME: 17, ISSUE: 5
INDEXED IN: Scopus DBLP CrossRef
IN MY: ORCID | DBLP
14
TITLE: A Process Algebra for Reasoning About Quantum Security
AUTHORS: Pedro Adão ; Paulo Mateus ;
PUBLISHED: 2007, SOURCE: Electr. Notes Theor. Comput. Sci., VOLUME: 170
INDEXED IN: Scopus DBLP CrossRef
IN MY: ORCID | DBLP
15
TITLE: Cryptographically sound implementations for communicating processes
AUTHORS: Pedro Adao ; Cedric Fournet;
PUBLISHED: 2006, SOURCE: 33rd International Colloquium on Automata, Languages and Programming in AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, VOLUME: 4052
INDEXED IN: Scopus WOS DBLP
16
TITLE: Towards a Quantitative Analysis of Security Protocols
AUTHORS: Pedro Adão ; Paulo Mateus ; Tiago Reis; Luca Viganò;
PUBLISHED: 2006, SOURCE: Electr. Notes Theor. Comput. Sci., VOLUME: 164, ISSUE: 3
INDEXED IN: Scopus DBLP CrossRef
IN MY: ORCID | DBLP
17
TITLE: Computational and information-theoretic soundness and completeness of formal encryption
AUTHORS: Adao, P ; Bana, G; Scedrov, A;
PUBLISHED: 2005, SOURCE: 18th IEEE Computer Security Foundations Workshop in 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS
INDEXED IN: Scopus WOS DBLP CrossRef
18
TITLE: Soundness of formal encryption in the presence of key-cycles
AUTHORS: Adao, P ; Bana, G; Herzog, J; Scedrov, A;
PUBLISHED: 2005, SOURCE: 10th European Symposium on Research in Computer Security in COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, VOLUME: 3679
INDEXED IN: Scopus WOS DBLP
Page 2 of 2. Total results: 18.