Folgen
Pedro Adão
Pedro Adão
Instituto Superior Técnico (IST), University of Lisbon (UL) / Instituto de Telecomunicações
Bestätigte E-Mail-Adresse bei ist.utl.pt
Titel
Zitiert von
Zitiert von
Jahr
Soundness of formal encryption in the presence of key-cycles
P Adao, G Bana, J Herzog, A Scedrov
European Symposium on Research in Computer Security, 374-396, 2005
862005
Computational and information-theoretic soundness and completeness of formal encryption
P Adao, G Bana, A Scedrov
18th IEEE Computer Security Foundations Workshop (CSFW'05), 170-184, 2005
562005
Cryptographically sound implementations for communicating processes
P Adao, C Fournet
International Colloquium on Automata, Languages, and Programming, 83-94, 2006
402006
A process algebra for reasoning about quantum security
P Adao, P Mateus
Electronic Notes in Theoretical Computer Science 170, 3-21, 2007
322007
Mignis: A semantic based tool for firewall configuration
P Adao, C Bozzato, G Dei Rossi, R Focardi, FL Luccio
2014 IEEE 27th Computer Security Foundations Symposium, 351-365, 2014
302014
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage
P Adão, G Bana, J Herzog, A Scedrov
Journal of Computer Security 17 (5), 737-797, 2009
302009
Super modules-based active QR codes for smart trackability and IoT: a responsive-banknotes case study
JFCB Ramalho, SFH Correia, L Fu, LMS Dias, P Adão, P Mateus, ...
npj Flexible Electronics 4 (1), 1-9, 2020
262020
Efficient approximation of the conditional relative entropy with applications to discriminative learning of Bayesian network classifiers
AM Carvalho, P Adao, P Mateus
Entropy 15 (7), 2716-2735, 2013
192013
Computationally Complete Symbolic Attacker in Action
G Bana, P Adão, H Sakurada
32nd Conference on Foundations of Software Technology and Theoretical …, 2012
162012
Computationally Complete Symbolic Attacker in Action (Long Version)
G Bana, P Adão, H Sakurada
IACR Cryptology ePrint Archive 316, 2012
16*2012
Localizing firewall security policies
P Adao, R Focardi, JD Guttman, FL Luccio
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 194-209, 2016
132016
Bit-string oblivious transfer based on quantum state computational distinguishability
A Souto, P Mateus, P Adao, N Paunković
Physical Review A 91 (4), 042306, 2015
132015
Bit-string oblivious transfer based on quantum state computational distinguishability
A Souto, P Mateus, P Adao, N Paunković
Physical Review A 91 (4), 042306, 2015
132015
Hybrid learning of Bayesian multinets for binary classification
AM Carvalho, P Adao, P Mateus
Pattern Recognition 47 (10), 3438-3450, 2014
132014
Securing Electronic Health Records in the Cloud
DR Matos, ML Pardal, P Adao, AR Silva, M Correia
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 1-6, 2018
122018
Towards a quantitative analysis of security protocols
P Adao, P Mateus, T Reis, L Viganò
Electronic Notes in Theoretical Computer Science 164 (3), 3-25, 2006
112006
Type-based analysis of generic key management apis
P Adao, R Focardi, FL Luccio
2013 IEEE 26th Computer Security Foundations Symposium, 97-111, 2013
92013
Reply to “Comment on ‘Bit-string oblivious transfer based on quantum state computational distinguishability’”
A Souto, P Mateus, P Adao, N Paunković
Physical Review A 92 (4), 046302, 2015
62015
A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities
E Pinconschi, R Abreu, P Adão
2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021
52021
Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL
M Ribeiro, P Adão, P Mateus
Logic, Language, and Security, 71-97, 2020
32020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20