Follow
Pedro Adão
Pedro Adão
Instituto Superior Técnico (IST), University of Lisbon (UL) / Instituto de Telecomunicações
Verified email at ist.utl.pt
Title
Cited by
Cited by
Year
Soundness of formal encryption in the presence of key-cycles
P Adao, G Bana, J Herzog, A Scedrov
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
882005
Computational and information-theoretic soundness and completeness of formal encryption
P Adao, G Bana, A Scedrov
18th IEEE Computer Security Foundations Workshop (CSFW'05), 170-184, 2005
602005
Cryptographically sound implementations for communicating processes
P Adao, C Fournet
Automata, Languages and Programming: 33rd International Colloquium, ICALP …, 2006
402006
Super modules-based active QR codes for smart trackability and IoT: a responsive-banknotes case study
JFCB Ramalho, SFH Correia, L Fu, LMS Dias, P Adão, P Mateus, ...
npj Flexible Electronics 4 (1), 11, 2020
392020
Mignis: A semantic based tool for firewall configuration
P Adão, C Bozzato, G Dei Rossi, R Focardi, FL Luccio
2014 IEEE 27th Computer Security Foundations Symposium, 351-365, 2014
332014
A process algebra for reasoning about quantum security
P Adao, P Mateus
Electronic Notes in Theoretical Computer Science 170, 3-21, 2007
332007
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage
P Adão, G Bana, J Herzog, A Scedrov
Journal of Computer Security 17 (5), 737-797, 2009
322009
Efficient approximation of the conditional relative entropy with applications to discriminative learning of Bayesian network classifiers
AM Carvalho, P Adao, P Mateus
Entropy 15 (7), 2716-2735, 2013
222013
Securing Electronic Health Records in the Cloud
DR Matos, ML Pardal, P Adao, AR Silva, M Correia
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 1-6, 2018
192018
A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities
E Pinconschi, R Abreu, P Adão
2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021
182021
Concolic Execution for WebAssembly
F Marques, J Fragoso Santos, N Santos, P Adão
36th European Conference on Object-Oriented Programming (ECOOP 2022), 2022
162022
Computationally Complete Symbolic Attacker in Action
G Bana, P Adão, H Sakurada
32nd Conference on Foundations of Software Technology and Theoretical …, 2012
162012
Computationally Complete Symbolic Attacker in Action (Long Version)
G Bana, P Adão, H Sakurada
IACR Cryptology ePrint Archive 316, 2012
16*2012
Localizing firewall security policies
P Adao, R Focardi, JD Guttman, FL Luccio
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 194-209, 2016
152016
Hybrid learning of Bayesian multinets for binary classification
AM Carvalho, P Adao, P Mateus
Pattern Recognition 47 (10), 3438-3450, 2014
152014
Bit-string oblivious transfer based on quantum state computational distinguishability
A Souto, P Mateus, P Adao, N Paunković
Physical Review A 91 (4), 042306, 2015
142015
Bit-string oblivious transfer based on quantum state computational distinguishability
A Souto, P Mateus, P Adao, N Paunković
Physical Review A 91 (4), 042306, 2015
142015
Towards a quantitative analysis of security protocols
P Adao, P Mateus, T Reis, L Viganò
Electronic Notes in Theoretical Computer Science 164 (3), 3-25, 2006
112006
Type-based analysis of generic key management apis
P Adao, R Focardi, FL Luccio
2013 IEEE 26th Computer Security Foundations Symposium, 97-111, 2013
102013
Formal verification of ethereum smart contracts using isabelle/hol
M Ribeiro, P Adão, P Mateus
Logic, Language, and Security: Essays Dedicated to Andre Scedrov on the …, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20