Soundness of formal encryption in the presence of key-cycles P Adao, G Bana, J Herzog, A Scedrov Computer SecurityESORICS 2005: 10th European Symposium on Research in
, 2005 | 88 | 2005 |
Computational and information-theoretic soundness and completeness of formal encryption P Adao, G Bana, A Scedrov 18th IEEE Computer Security Foundations Workshop (CSFW'05), 170-184, 2005 | 60 | 2005 |
Super modules-based active QR codes for smart trackability and IoT: a responsive-banknotes case study JFCB Ramalho, SFH Correia, L Fu, LMS Dias, P Adão, P Mateus, ... npj Flexible Electronics 4 (1), 11, 2020 | 41 | 2020 |
Cryptographically sound implementations for communicating processes P Adao, C Fournet Automata, Languages and Programming: 33rd International Colloquium, ICALP
, 2006 | 40 | 2006 |
Mignis: A semantic based tool for firewall configuration P Adão, C Bozzato, G Dei Rossi, R Focardi, FL Luccio 2014 IEEE 27th Computer Security Foundations Symposium, 351-365, 2014 | 33 | 2014 |
A process algebra for reasoning about quantum security P Adao, P Mateus Electronic Notes in Theoretical Computer Science 170, 3-21, 2007 | 33 | 2007 |
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage P Adão, G Bana, J Herzog, A Scedrov Journal of Computer Security 17 (5), 737-797, 2009 | 32 | 2009 |
Efficient approximation of the conditional relative entropy with applications to discriminative learning of Bayesian network classifiers AM Carvalho, P Adao, P Mateus Entropy 15 (7), 2716-2735, 2013 | 22 | 2013 |
Securing Electronic Health Records in the Cloud DR Matos, ML Pardal, P Adao, AR Silva, M Correia Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 1-6, 2018 | 20 | 2018 |
A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities E Pinconschi, R Abreu, P Adão 2021 IEEE 32nd International Symposium on Software Reliability Engineering
, 2021 | 18 | 2021 |
Concolic Execution for WebAssembly F Marques, J Fragoso Santos, N Santos, P Adão 36th European Conference on Object-Oriented Programming (ECOOP 2022), 2022 | 17 | 2022 |
Computationally Complete Symbolic Attacker in Action G Bana, P Adão, H Sakurada 32nd Conference on Foundations of Software Technology and Theoretical
, 2012 | 16 | 2012 |
Computationally Complete Symbolic Attacker in Action (Long Version) G Bana, P Adão, H Sakurada IACR Cryptology ePrint Archive 316, 2012 | 16* | 2012 |
Localizing firewall security policies P Adao, R Focardi, JD Guttman, FL Luccio 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 194-209, 2016 | 15 | 2016 |
Hybrid learning of Bayesian multinets for binary classification AM Carvalho, P Adao, P Mateus Pattern Recognition 47 (10), 3438-3450, 2014 | 15 | 2014 |
Bit-string oblivious transfer based on quantum state computational distinguishability A Souto, P Mateus, P Adao, N Paunković Physical Review A 91 (4), 042306, 2015 | 14 | 2015 |
Bit-string oblivious transfer based on quantum state computational distinguishability A Souto, P Mateus, P Adao, N Paunković Physical Review A 91 (4), 042306, 2015 | 14 | 2015 |
Type-based analysis of generic key management apis P Adao, R Focardi, FL Luccio 2013 IEEE 26th Computer Security Foundations Symposium, 97-111, 2013 | 11 | 2013 |
Towards a quantitative analysis of security protocols P Adao, P Mateus, T Reis, L Viganò Electronic Notes in Theoretical Computer Science 164 (3), 3-25, 2006 | 11 | 2006 |
Formal verification of ethereum smart contracts using isabelle/hol M Ribeiro, P Adão, P Mateus Logic, Language, and Security: Essays Dedicated to Andre Scedrov on the
, 2020 | 8 | 2020 |