| 2008 |
| 44 | EE | Giampaolo Bella:
Special track on Computer Security: editorial message.
SAC 2008: 2095-2096 |
| 43 | | Giampaolo Bella:
What is Correctness of Security Protocols?
J. UCS 14(12): 2083-2106 (2008) |
| 2007 |
| 42 | EE | Giampaolo Bella,
Stefano Bistarelli,
Pamela Peretti,
Salvatore Riccobene:
Augmented Risk Analysis.
Electr. Notes Theor. Comput. Sci. 168: 207-220 (2007) |
| 2006 |
| 41 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Editorial message: special track on computer security.
SAC 2006: 321-322 |
| 40 | EE | Giampaolo Bella,
Lawrence C. Paulson:
Accountability protocols: Formalized and verified.
ACM Trans. Inf. Syst. Secur. 9(2): 138-161 (2006) |
| 39 | EE | Giampaolo Bella,
Stefano Bistarelli,
Simon N. Foley:
Soft Constraints for Security.
Electr. Notes Theor. Comput. Sci. 142: 11-29 (2006) |
| 38 | EE | Giampaolo Bella,
Costantino Pistagna,
Salvatore Riccobene:
Distributed Backup through Information Dispersal.
Electr. Notes Theor. Comput. Sci. 142: 63-77 (2006) |
| 37 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson:
Verifying the SET Purchase Protocols.
J. Autom. Reasoning 36(1-2): 5-37 (2006) |
| 2005 |
| 36 | | Giampaolo Bella,
Costantino Pistagna,
Salvatore Riccobene:
Locating Mobile Nodes Within Logical Networks.
PSC 2005: 54-62 |
| 35 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Special track on computer security.
SAC 2005: 304-305 |
| 34 | EE | Giampaolo Bella,
Stefano Bistarelli:
Information Assurance for security protocols.
Computers & Security 24(4): 322-333 (2005) |
| 33 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson:
An overview of the verification of SET.
Int. J. Inf. Sec. 4(1-2): 17-28 (2005) |
| 32 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Guest Editors' preface.
Journal of Computer Security 13(5): 697- (2005) |
| 2004 |
| 31 | | Sebastiano Battiato,
Giampaolo Bella,
Salvatore Riccobene:
Should We Prove Security Policies Correct?
EGCDMAS 2004: 56-65 |
| 30 | EE | Giampaolo Bella,
Peter Ryan:
Editoral message: special track on computer security.
SAC 2004: 373-374 |
| 29 | EE | Giampaolo Bella,
Ronaldo Menezes:
Special Issue: Computer Security.
Concurrency - Practice and Experience 16(11): 1061 (2004) |
| 28 | | Giampaolo Bella,
Stefano Bistarelli:
Soft Constraint Programming to Analysing Security Protocols.
TPLP 4(5-6): 545-572 (2004) |
| 2003 |
| 27 | | Giampaolo Bella,
Ronaldo Menezes:
Computer Security Track Editorial.
SAC 2003: 280-281 |
| 26 | | Giampaolo Bella:
Availability of Protocol Goals.
SAC 2003: 312-317 |
| 25 | EE | Giampaolo Bella:
A Protocol's Life After Attacks... (Discussion).
Security Protocols Workshop 2003: 11-18 |
| 24 | EE | Giampaolo Bella,
Cristiano Longo,
Lawrence C. Paulson:
Is the Verification Problem for Cryptographic Protocols Solved?.
Security Protocols Workshop 2003: 183-189 |
| 23 | EE | Giampaolo Bella,
Stefano Bistarelli,
Fabio Massacci:
A Protocol's Life After Attacks....
Security Protocols Workshop 2003: 3-10 |
| 22 | EE | Giampaolo Bella,
Stefano Bistarelli,
Fabio Martinelli:
Biometrics to Enhance Smartcard Security.
Security Protocols Workshop 2003: 324-332 |
| 21 | EE | Giampaolo Bella,
Cristiano Longo,
Lawrence C. Paulson:
Verifying Second-Level Security Protocols.
TPHOLs 2003: 352-366 |
| 20 | EE | Giampaolo Bella,
Stefano Bistarelli:
Soft Constraint Programming to Analysing Security Protocols
CoRR cs.CR/0312025: (2003) |
| 19 | | Giampaolo Bella:
Inductive Verification of Smart Card Protocols.
Journal of Computer Security 11(1): 87-132 (2003) |
| 2002 |
| 18 | EE | Giampaolo Bella,
Lawrence C. Paulson,
Fabio Massacci:
The verification of an industrial payment protocol: the SET purchase phase.
ACM Conference on Computer and Communications Security 2002: 12-20 |
| 17 | EE | Giampaolo Bella,
Ronaldo Menezes,
James A. Whittaker:
Editorial Message: special track on computer security.
SAC 2002: 194-195 |
| 16 | EE | Giampaolo Bella:
Interactive simulation of security policies.
SAC 2002: 247-252 |
| 15 | EE | Giampaolo Bella,
Stefano Bistarelli:
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks.
Security Protocols Workshop 2002: 104-119 |
| 14 | EE | Giampaolo Bella,
Lawrence C. Paulson:
Analyzing Delegation Properties.
Security Protocols Workshop 2002: 120-127 |
| 2001 |
| 13 | EE | Giampaolo Bella:
Mechanising a Protocol for Smart Cards.
E-smart 2001: 19-33 |
| 12 | EE | Giampaolo Bella,
Stefano Bistarelli:
Soft Constraints for Security Protocol Analysis: Confidentiality.
PADL 2001: 108-122 |
| 11 | EE | Giampaolo Bella,
Lawrence C. Paulson:
A Proof of Non-repudiation.
Security Protocols Workshop 2001: 119-125 |
| 10 | EE | Giampaolo Bella,
Lawrence C. Paulson:
Mechanical Proofs about a Non-repudiation Protocol.
TPHOLs 2001: 91-104 |
| 2000 |
| 9 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson,
Piero Tramontano:
Formal Verification of Cardholder Registration in SET.
ESORICS 2000: 159-174 |
| 8 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson,
Piero Tramontano:
Making Sense of Specifications: The Formalization of SET.
Security Protocols Workshop 2000: 74-81 |
| 7 | EE | Giampaolo Bella:
Lack of Explicitness Strikes Back.
Security Protocols Workshop 2000: 87-93 |
| 6 | EE | Giampaolo Bella:
Lack of Explicitness Strikes Back (Transcript of Discussion).
Security Protocols Workshop 2000: 94-99 |
| 1999 |
| 5 | | Giampaolo Bella:
Modelling Agents' Knowledge Inductively.
Security Protocols Workshop 1999: 85-94 |
| 1998 |
| 4 | | Giampaolo Bella,
Lawrence C. Paulson:
Mechanising BAN Kerberos by the Inductive Method.
CAV 1998: 416-427 |
| 3 | EE | Giampaolo Bella,
Lawrence C. Paulson:
Kerberos Version 4: Inductive Analysis of the Secrecy Goals.
ESORICS 1998: 361-375 |
| 2 | | Giampaolo Bella,
Elvinia Riccobene:
A Realistic Environment for Crypto-Protocol Analyses by ASMs.
Workshop on Abstract State Machines 1998: 127-138 |
| 1997 |
| 1 | EE | Giampaolo Bella,
Elvinia Riccobene:
Formal Analysis of the Kerberos Authentication System.
J. UCS 3(12): 1337-1381 (1997) |