Pedro Adão
Orcid: 0000-0002-4049-1954
According to our database1,
Pedro Adão
authored at least 27 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Dagstuhl Artifacts Ser., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 37th European Conference on Object-Oriented Programming, 2023
2022
Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022
2021
A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
2020
Proceedings of the Logic, 2020
2018
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018
2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2014
Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete.
Theor. Comput. Sci., 2014
Pattern Recognit., 2014
CoRR, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Efficient Approximation of the Conditional Relative Entropy with Applications to Discriminative Learning of Bayesian Network Classifiers.
Entropy, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
2012
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2012
2009
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage.
J. Comput. Secur., 2009
2006
Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
2005
Proceedings of the 3rd International Workshop on Quantum Programming Languages, 2005
Proceedings of the Computer Security, 2005
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005