ResearcherID Thomson Reuters  

Adão, Pedro
Create a ResearcherID badge for this researcher View publications analytics for this researcher
Close
ResearcherID: B-8422-2008
Other Names: Pedro Adão; P. Adão; Adão, Pedro; Adão, P.; Pedro Adao; P. Adao
URL: http://www.researcherid.com/rid/B-8422-2008
Subject: Computer Science; Mathematics
Keywords: security; cryptography; cryptographic protocols
ORCID: http://orcid.org/0000-0002-4049-1954
My Institutions (more details)
Primary Institution:
Sub-org/Dept: Dept. Computer Science and Engineering
Role:
Joint Affiliation:
Sub-org/Dept: SQIG
Role:
My URLs: http://www.math.ist.utl.pt/~padao/
 
 

This list contains papers that I have authored.

publication(s)  
First Page Previous Page Page   of  2  Go Next Page Last Page
  Sort by:    Results per page: 
1.  Title: Hybrid learning of Bayesian multinets for binary classification
 Author(s): Carvalho, Alexandra M.; Adao, Pedro; Mateus, Paulo
 Source: Pattern Recognition Volume: 47 Issue: 10 Pages: 3438-3450 Published: OCT 2014
 Times Cited: 2
 DOI: 10.1016/j.patcog.2014.03.019
added
17-Sep-14
2.  Title: Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete
 Author(s): Adao, Pedro; Mateus, Paulo; Vigano, Luca
 Source: Theoretical Computer Science Volume: 538 Pages: 2-15 Published: JUN 12 2014
 Times Cited: 0
 DOI: 10.1016/j.tcs.2013.09.015
added
17-Sep-14
3.  Title: Efficient approximation of the conditional relative entropy with applications to discriminative learning of bayesian Network classifiers
 Author(s): Carvalho, A.M.; Adão, P.; Mateus, P.
 Source: Entropy Volume: 15 Issue: 7 Pages: 2716-2735 Published: 2013
 Times Cited: 2
 DOI: 10.3390/e15072716 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84881244845&partnerID=MN8TOAR ...
added
03-Dec-13
4.  Title: Type-Based Analysis of Generic Key Management APIs
 Author(s): Adao, Pedro; Focardi, Riccardo; Luccio, Flaminia L.; et al.
 Source: 2013 Ieee 26th Computer Security Foundations Symposium (Csf) Pages: 97-111 Published: 2013
 Times Cited: 2
 DOI: 10.1109/CSF.2013.14
added
17-Sep-14
5.  Title: Computationally complete symbolic attacker in action
 Author(s): Bana, G.; Adão, P.; Sakurada, H.
 Source: Leibniz International Proceedings in Informatics, LIPIcs Volume: 18 Pages: 546-560 Published: 2012
 DOI: 10.4230/LIPIcs.FSTTCS.2012.546 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-84880205581&partnerID=MN8TOAR ...
added
03-Dec-13
6.  Title: Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage
 Author(s): Adão, P.; Bana, G.; Herzog, J.; et al.
 Source: Journal of Computer Security Volume: 17 Issue: 5 Pages: 737-797 Published: 2009
 DOI: 10.3233/JCS-2009-0358 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-70449399608&partnerID=MN8TOAR ...
added
03-Dec-13
7.  Title: A Process Algebra for Reasoning About Quantum Security
 Author(s): Adão, P.; Mateus, P.
 Source: Electronic Notes in Theoretical Computer Science Volume: 170 Pages: 3-21 Published: 2007
 DOI: 10.1016/j.entcs.2006.12.009 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-33847280243&partnerID=MN8TOAR ...
added
03-Dec-13
8.  Title: Cryptographically sound implementations for communicating processes
 Author(s): ADAO, P; FOURNET, C
 Source: AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2 Volume: 4052 Pages: 83-94 Published: 2006
 Times Cited: 14
added
30-Jun-08
9.  Title: Towards a Quantitative Analysis of Security Protocols
 Author(s): Adão, P.; Mateus, P.; Reis, T.; et al.
 Source: Electronic Notes in Theoretical Computer Science Volume: 164 Issue: 3 SPEC. ISS. Pages: 3-25 Published: 2006
 DOI: 10.1016/j.entcs.2006.07.009 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-33750091331&partnerID=MN8TOAR ...
added
03-Dec-13
10.  Title: Computational and information-theoretic soundness and completeness of formal encryption
 Author(s): Adäo, P.; Bana, G.; Scedrov, A.
 Source: Proceedings of the Computer Security Foundations Workshop Pages: 170-184 Published: 2005
 Times Cited: 17
 DOI: 10.1109/CSFW.2005.13 /  Author-provided URL : http://www.scopus.com/inward/record.url?eid=2-s2.0-28144460109&partnerID=MN8TOAR ...
added
03-Dec-13
publication(s)  
First Page Previous Page Page   of  2  Go Next Page Last Page
  Sort by:    Results per page: