dblp.uni-trier.dewww.uni-trier.de

Giampaolo Bella

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
44EEGiampaolo Bella: Special track on Computer Security: editorial message. SAC 2008: 2095-2096
43 Giampaolo Bella: What is Correctness of Security Protocols? J. UCS 14(12): 2083-2106 (2008)
2007
42EEGiampaolo Bella, Stefano Bistarelli, Pamela Peretti, Salvatore Riccobene: Augmented Risk Analysis. Electr. Notes Theor. Comput. Sci. 168: 207-220 (2007)
2006
41EEGiampaolo Bella, Peter Y. A. Ryan: Editorial message: special track on computer security. SAC 2006: 321-322
40EEGiampaolo Bella, Lawrence C. Paulson: Accountability protocols: Formalized and verified. ACM Trans. Inf. Syst. Secur. 9(2): 138-161 (2006)
39EEGiampaolo Bella, Stefano Bistarelli, Simon N. Foley: Soft Constraints for Security. Electr. Notes Theor. Comput. Sci. 142: 11-29 (2006)
38EEGiampaolo Bella, Costantino Pistagna, Salvatore Riccobene: Distributed Backup through Information Dispersal. Electr. Notes Theor. Comput. Sci. 142: 63-77 (2006)
37EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson: Verifying the SET Purchase Protocols. J. Autom. Reasoning 36(1-2): 5-37 (2006)
2005
36 Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene: Locating Mobile Nodes Within Logical Networks. PSC 2005: 54-62
35EEGiampaolo Bella, Peter Y. A. Ryan: Special track on computer security. SAC 2005: 304-305
34EEGiampaolo Bella, Stefano Bistarelli: Information Assurance for security protocols. Computers & Security 24(4): 322-333 (2005)
33EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson: An overview of the verification of SET. Int. J. Inf. Sec. 4(1-2): 17-28 (2005)
32EEGiampaolo Bella, Peter Y. A. Ryan: Guest Editors' preface. Journal of Computer Security 13(5): 697- (2005)
2004
31 Sebastiano Battiato, Giampaolo Bella, Salvatore Riccobene: Should We Prove Security Policies Correct? EGCDMAS 2004: 56-65
30EEGiampaolo Bella, Peter Ryan: Editoral message: special track on computer security. SAC 2004: 373-374
29EEGiampaolo Bella, Ronaldo Menezes: Special Issue: Computer Security. Concurrency - Practice and Experience 16(11): 1061 (2004)
28 Giampaolo Bella, Stefano Bistarelli: Soft Constraint Programming to Analysing Security Protocols. TPLP 4(5-6): 545-572 (2004)
2003
27 Giampaolo Bella, Ronaldo Menezes: Computer Security Track Editorial. SAC 2003: 280-281
26 Giampaolo Bella: Availability of Protocol Goals. SAC 2003: 312-317
25EEGiampaolo Bella: A Protocol's Life After Attacks... (Discussion). Security Protocols Workshop 2003: 11-18
24EEGiampaolo Bella, Cristiano Longo, Lawrence C. Paulson: Is the Verification Problem for Cryptographic Protocols Solved?. Security Protocols Workshop 2003: 183-189
23EEGiampaolo Bella, Stefano Bistarelli, Fabio Massacci: A Protocol's Life After Attacks.... Security Protocols Workshop 2003: 3-10
22EEGiampaolo Bella, Stefano Bistarelli, Fabio Martinelli: Biometrics to Enhance Smartcard Security. Security Protocols Workshop 2003: 324-332
21EEGiampaolo Bella, Cristiano Longo, Lawrence C. Paulson: Verifying Second-Level Security Protocols. TPHOLs 2003: 352-366
20EEGiampaolo Bella, Stefano Bistarelli: Soft Constraint Programming to Analysing Security Protocols CoRR cs.CR/0312025: (2003)
19 Giampaolo Bella: Inductive Verification of Smart Card Protocols. Journal of Computer Security 11(1): 87-132 (2003)
2002
18EEGiampaolo Bella, Lawrence C. Paulson, Fabio Massacci: The verification of an industrial payment protocol: the SET purchase phase. ACM Conference on Computer and Communications Security 2002: 12-20
17EEGiampaolo Bella, Ronaldo Menezes, James A. Whittaker: Editorial Message: special track on computer security. SAC 2002: 194-195
16EEGiampaolo Bella: Interactive simulation of security policies. SAC 2002: 247-252
15EEGiampaolo Bella, Stefano Bistarelli: Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. Security Protocols Workshop 2002: 104-119
14EEGiampaolo Bella, Lawrence C. Paulson: Analyzing Delegation Properties. Security Protocols Workshop 2002: 120-127
2001
13EEGiampaolo Bella: Mechanising a Protocol for Smart Cards. E-smart 2001: 19-33
12EEGiampaolo Bella, Stefano Bistarelli: Soft Constraints for Security Protocol Analysis: Confidentiality. PADL 2001: 108-122
11EEGiampaolo Bella, Lawrence C. Paulson: A Proof of Non-repudiation. Security Protocols Workshop 2001: 119-125
10EEGiampaolo Bella, Lawrence C. Paulson: Mechanical Proofs about a Non-repudiation Protocol. TPHOLs 2001: 91-104
2000
9EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Formal Verification of Cardholder Registration in SET. ESORICS 2000: 159-174
8EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Making Sense of Specifications: The Formalization of SET. Security Protocols Workshop 2000: 74-81
7EEGiampaolo Bella: Lack of Explicitness Strikes Back. Security Protocols Workshop 2000: 87-93
6EEGiampaolo Bella: Lack of Explicitness Strikes Back (Transcript of Discussion). Security Protocols Workshop 2000: 94-99
1999
5 Giampaolo Bella: Modelling Agents' Knowledge Inductively. Security Protocols Workshop 1999: 85-94
1998
4 Giampaolo Bella, Lawrence C. Paulson: Mechanising BAN Kerberos by the Inductive Method. CAV 1998: 416-427
3EEGiampaolo Bella, Lawrence C. Paulson: Kerberos Version 4: Inductive Analysis of the Secrecy Goals. ESORICS 1998: 361-375
2 Giampaolo Bella, Elvinia Riccobene: A Realistic Environment for Crypto-Protocol Analyses by ASMs. Workshop on Abstract State Machines 1998: 127-138
1997
1EEGiampaolo Bella, Elvinia Riccobene: Formal Analysis of the Kerberos Authentication System. J. UCS 3(12): 1337-1381 (1997)

Coauthor Index

1Sebastiano Battiato [31]
2Stefano Bistarelli [12] [15] [20] [22] [23] [28] [34] [39] [42]
3Simon N. Foley [39]
4Cristiano Longo [21] [24]
5Fabio Martinelli [22]
6Fabio Massacci [8] [9] [18] [23] [33] [37]
7Ronaldo Menezes [17] [27] [29]
8Lawrence C. Paulson [3] [4] [8] [9] [10] [11] [14] [18] [21] [24] [33] [37] [40]
9Pamela Peretti [42]
10Costantino Pistagna [36] [38]
11Elvinia Riccobene [1] [2]
12Salvatore Riccobene [31] [36] [38] [42]
13Peter Y. A. Ryan (Peter Ryan) [30] [32] [35] [41]
14Piero Tramontano [8] [9]
15James A. Whittaker [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)