2008 |
44 | EE | Giampaolo Bella:
Special track on Computer Security: editorial message.
SAC 2008: 2095-2096 |
43 | | Giampaolo Bella:
What is Correctness of Security Protocols?
J. UCS 14(12): 2083-2106 (2008) |
2007 |
42 | EE | Giampaolo Bella,
Stefano Bistarelli,
Pamela Peretti,
Salvatore Riccobene:
Augmented Risk Analysis.
Electr. Notes Theor. Comput. Sci. 168: 207-220 (2007) |
2006 |
41 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Editorial message: special track on computer security.
SAC 2006: 321-322 |
40 | EE | Giampaolo Bella,
Lawrence C. Paulson:
Accountability protocols: Formalized and verified.
ACM Trans. Inf. Syst. Secur. 9(2): 138-161 (2006) |
39 | EE | Giampaolo Bella,
Stefano Bistarelli,
Simon N. Foley:
Soft Constraints for Security.
Electr. Notes Theor. Comput. Sci. 142: 11-29 (2006) |
38 | EE | Giampaolo Bella,
Costantino Pistagna,
Salvatore Riccobene:
Distributed Backup through Information Dispersal.
Electr. Notes Theor. Comput. Sci. 142: 63-77 (2006) |
37 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson:
Verifying the SET Purchase Protocols.
J. Autom. Reasoning 36(1-2): 5-37 (2006) |
2005 |
36 | | Giampaolo Bella,
Costantino Pistagna,
Salvatore Riccobene:
Locating Mobile Nodes Within Logical Networks.
PSC 2005: 54-62 |
35 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Special track on computer security.
SAC 2005: 304-305 |
34 | EE | Giampaolo Bella,
Stefano Bistarelli:
Information Assurance for security protocols.
Computers & Security 24(4): 322-333 (2005) |
33 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson:
An overview of the verification of SET.
Int. J. Inf. Sec. 4(1-2): 17-28 (2005) |
32 | EE | Giampaolo Bella,
Peter Y. A. Ryan:
Guest Editors' preface.
Journal of Computer Security 13(5): 697- (2005) |
2004 |
31 | | Sebastiano Battiato,
Giampaolo Bella,
Salvatore Riccobene:
Should We Prove Security Policies Correct?
EGCDMAS 2004: 56-65 |
30 | EE | Giampaolo Bella,
Peter Ryan:
Editoral message: special track on computer security.
SAC 2004: 373-374 |
29 | EE | Giampaolo Bella,
Ronaldo Menezes:
Special Issue: Computer Security.
Concurrency - Practice and Experience 16(11): 1061 (2004) |
28 | | Giampaolo Bella,
Stefano Bistarelli:
Soft Constraint Programming to Analysing Security Protocols.
TPLP 4(5-6): 545-572 (2004) |
2003 |
27 | | Giampaolo Bella,
Ronaldo Menezes:
Computer Security Track Editorial.
SAC 2003: 280-281 |
26 | | Giampaolo Bella:
Availability of Protocol Goals.
SAC 2003: 312-317 |
25 | EE | Giampaolo Bella:
A Protocol's Life After Attacks... (Discussion).
Security Protocols Workshop 2003: 11-18 |
24 | EE | Giampaolo Bella,
Cristiano Longo,
Lawrence C. Paulson:
Is the Verification Problem for Cryptographic Protocols Solved?.
Security Protocols Workshop 2003: 183-189 |
23 | EE | Giampaolo Bella,
Stefano Bistarelli,
Fabio Massacci:
A Protocol's Life After Attacks....
Security Protocols Workshop 2003: 3-10 |
22 | EE | Giampaolo Bella,
Stefano Bistarelli,
Fabio Martinelli:
Biometrics to Enhance Smartcard Security.
Security Protocols Workshop 2003: 324-332 |
21 | EE | Giampaolo Bella,
Cristiano Longo,
Lawrence C. Paulson:
Verifying Second-Level Security Protocols.
TPHOLs 2003: 352-366 |
20 | EE | Giampaolo Bella,
Stefano Bistarelli:
Soft Constraint Programming to Analysing Security Protocols
CoRR cs.CR/0312025: (2003) |
19 | | Giampaolo Bella:
Inductive Verification of Smart Card Protocols.
Journal of Computer Security 11(1): 87-132 (2003) |
2002 |
18 | EE | Giampaolo Bella,
Lawrence C. Paulson,
Fabio Massacci:
The verification of an industrial payment protocol: the SET purchase phase.
ACM Conference on Computer and Communications Security 2002: 12-20 |
17 | EE | Giampaolo Bella,
Ronaldo Menezes,
James A. Whittaker:
Editorial Message: special track on computer security.
SAC 2002: 194-195 |
16 | EE | Giampaolo Bella:
Interactive simulation of security policies.
SAC 2002: 247-252 |
15 | EE | Giampaolo Bella,
Stefano Bistarelli:
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks.
Security Protocols Workshop 2002: 104-119 |
14 | EE | Giampaolo Bella,
Lawrence C. Paulson:
Analyzing Delegation Properties.
Security Protocols Workshop 2002: 120-127 |
2001 |
13 | EE | Giampaolo Bella:
Mechanising a Protocol for Smart Cards.
E-smart 2001: 19-33 |
12 | EE | Giampaolo Bella,
Stefano Bistarelli:
Soft Constraints for Security Protocol Analysis: Confidentiality.
PADL 2001: 108-122 |
11 | EE | Giampaolo Bella,
Lawrence C. Paulson:
A Proof of Non-repudiation.
Security Protocols Workshop 2001: 119-125 |
10 | EE | Giampaolo Bella,
Lawrence C. Paulson:
Mechanical Proofs about a Non-repudiation Protocol.
TPHOLs 2001: 91-104 |
2000 |
9 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson,
Piero Tramontano:
Formal Verification of Cardholder Registration in SET.
ESORICS 2000: 159-174 |
8 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson,
Piero Tramontano:
Making Sense of Specifications: The Formalization of SET.
Security Protocols Workshop 2000: 74-81 |
7 | EE | Giampaolo Bella:
Lack of Explicitness Strikes Back.
Security Protocols Workshop 2000: 87-93 |
6 | EE | Giampaolo Bella:
Lack of Explicitness Strikes Back (Transcript of Discussion).
Security Protocols Workshop 2000: 94-99 |
1999 |
5 | | Giampaolo Bella:
Modelling Agents' Knowledge Inductively.
Security Protocols Workshop 1999: 85-94 |
1998 |
4 | | Giampaolo Bella,
Lawrence C. Paulson:
Mechanising BAN Kerberos by the Inductive Method.
CAV 1998: 416-427 |
3 | EE | Giampaolo Bella,
Lawrence C. Paulson:
Kerberos Version 4: Inductive Analysis of the Secrecy Goals.
ESORICS 1998: 361-375 |
2 | | Giampaolo Bella,
Elvinia Riccobene:
A Realistic Environment for Crypto-Protocol Analyses by ASMs.
Workshop on Abstract State Machines 1998: 127-138 |
1997 |
1 | EE | Giampaolo Bella,
Elvinia Riccobene:
Formal Analysis of the Kerberos Authentication System.
J. UCS 3(12): 1337-1381 (1997) |