Suivre
Pedro Adão
Pedro Adão
Instituto Superior Técnico (IST), University of Lisbon (UL) / Instituto de Telecomunicações
Adresse e-mail validée de ist.utl.pt
Titre
Citée par
Citée par
Année
Soundness of formal encryption in the presence of key-cycles
P Adao, G Bana, J Herzog, A Scedrov
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
892005
Computational and information-theoretic soundness and completeness of formal encryption
P Adao, G Bana, A Scedrov
18th IEEE Computer Security Foundations Workshop (CSFW'05), 170-184, 2005
582005
Cryptographically sound implementations for communicating processes
P Adao, C Fournet
Automata, Languages and Programming: 33rd International Colloquium, ICALP …, 2006
402006
Super modules-based active QR codes for smart trackability and IoT: a responsive-banknotes case study
JFCB Ramalho, SFH Correia, L Fu, LMS Dias, P Adão, P Mateus, ...
npj Flexible Electronics 4 (1), 11, 2020
352020
Mignis: A semantic based tool for firewall configuration
P Adao, C Bozzato, G Dei Rossi, R Focardi, FL Luccio
2014 IEEE 27th Computer Security Foundations Symposium, 351-365, 2014
332014
A process algebra for reasoning about quantum security
P Adao, P Mateus
Electronic Notes in Theoretical Computer Science 170, 3-21, 2007
312007
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage
P Adão, G Bana, J Herzog, A Scedrov
Journal of Computer Security 17 (5), 737-797, 2009
302009
Efficient approximation of the conditional relative entropy with applications to discriminative learning of Bayesian network classifiers
AM Carvalho, P Adao, P Mateus
Entropy 15 (7), 2716-2735, 2013
222013
Securing Electronic Health Records in the Cloud
DR Matos, ML Pardal, P Adao, AR Silva, M Correia
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 1-6, 2018
182018
Computationally Complete Symbolic Attacker in Action
G Bana, P Adão, H Sakurada
32nd Conference on Foundations of Software Technology and Theoretical …, 2012
162012
Computationally Complete Symbolic Attacker in Action (Long Version)
G Bana, P Adão, H Sakurada
IACR Cryptology ePrint Archive 316, 2012
16*2012
Localizing firewall security policies
P Adao, R Focardi, JD Guttman, FL Luccio
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 194-209, 2016
142016
Bit-string oblivious transfer based on quantum state computational distinguishability
A Souto, P Mateus, P Adao, N Paunković
Physical Review A 91 (4), 042306, 2015
142015
Bit-string oblivious transfer based on quantum state computational distinguishability
A Souto, P Mateus, P Adao, N Paunković
Physical Review A 91 (4), 042306, 2015
142015
Hybrid learning of Bayesian multinets for binary classification
AM Carvalho, P Adao, P Mateus
Pattern Recognition 47 (10), 3438-3450, 2014
142014
Towards a quantitative analysis of security protocols
P Adao, P Mateus, T Reis, L Viganò
Electronic Notes in Theoretical Computer Science 164 (3), 3-25, 2006
112006
A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities
E Pinconschi, R Abreu, P Adão
2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021
102021
Concolic Execution for WebAssembly
F Marques, J Fragoso Santos, N Santos, P Adão
36th European Conference on Object-Oriented Programming (ECOOP 2022), 2022
92022
Type-based analysis of generic key management apis
P Adao, R Focardi, FL Luccio
2013 IEEE 26th Computer Security Foundations Symposium, 97-111, 2013
92013
Reply to “Comment on ‘Bit-string oblivious transfer based on quantum state computational distinguishability’”
A Souto, P Mateus, P Adao, N Paunković
Physical Review A 92 (4), 046302, 2015
82015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20