| 2009 |
| 30 | EE | Chiara Bodei,
Andrea Bracciali,
Davide Chiarugi:
Control Flow Analysis for Brane Calculi.
Electr. Notes Theor. Comput. Sci. 227: 59-75 (2009) |
| 2008 |
| 29 | EE | Han Gao,
Chiara Bodei,
Pierpaolo Degano:
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols.
AMAST 2008: 167-183 |
| 28 | EE | Chiara Bodei:
A Static Analysis for Beta-Binders.
Electr. Notes Theor. Comput. Sci. 194(3): 69-85 (2008) |
| 2007 |
| 27 | EE | Han Gao,
Chiara Bodei,
Pierpaolo Degano,
Hanne Riis Nielson:
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols.
ASIAN 2007: 150-165 |
| 26 | EE | Anna Bernasconi,
Chiara Bodei,
Linda Pagli:
Knitting for Fun: A Recursive Sweater.
FUN 2007: 53-65 |
| 25 | EE | Chiara Bodei,
Pierpaolo Degano,
Han Gao,
Linda Brodo:
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags.
Electr. Notes Theor. Comput. Sci. 194(1): 3-22 (2007) |
| 2005 |
| 24 | EE | Chiara Bodei,
Mikael Buchholtz,
Michele Curti,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson,
Corrado Priami:
On Evaluating the Performance of Security Protocols.
PaCT 2005: 1-15 |
| 23 | EE | Chiara Bodei,
Michele Curti,
Pierpaolo Degano,
Mikael Buchholtz,
Flemming Nielson,
Hanne Riis Nielson,
Corrado Priami:
Performance Evaluation of Security Protocols Specified in LySa.
Electr. Notes Theor. Comput. Sci. 112: 167-189 (2005) |
| 22 | EE | Chiara Bodei,
Michele Curti,
Pierpaolo Degano,
Corrado Priami:
A Quantitative Study of Two Attacks.
Electr. Notes Theor. Comput. Sci. 121: 65-85 (2005) |
| 21 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Corrado Priami:
Authentication primitives for secure protocol specifications.
Future Generation Comp. Syst. 21(4): 645-653 (2005) |
| 20 | | Chiara Bodei,
Pierpaolo Degano,
Corrado Priami:
Checking security policies through an enhanced Control Flow Analysis.
Journal of Computer Security 13(1): 49-85 (2005) |
| 19 | EE | Chiara Bodei,
Mikael Buchholtz,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Static validation of security protocols.
Journal of Computer Security 13(3): 347-390 (2005) |
| 2004 |
| 18 | EE | Francesca Levi,
Chiara Bodei:
A Control Flow Analysis for Safe and Boxed Ambients.
ESOP 2004: 188-203 |
| 2003 |
| 17 | EE | Chiara Bodei,
Mikael Buchholtz,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Automatic Validation of Protocol Narration.
CSFW 2003: 126-140 |
| 16 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Corrado Priami:
Authentication Primitives for Protocol Specifications.
PaCT 2003: 49-65 |
| 2002 |
| 15 | EE | Chiara Bodei,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Flow logic for Dolev-Yao secrecy in cryptographic processes.
Future Generation Comp. Syst. 18(6): 747-756 (2002) |
| 14 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Corrado Priami:
Primitives for authentication in process algebras.
Theor. Comput. Sci. 283(2): 271-304 (2002) |
| 2001 |
| 13 | EE | Chiara Bodei,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Static Analysis for Secrecy and Non-interference in Networks of Processes.
PaCT 2001: 27-41 |
| 12 | | Chiara Bodei,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Security Analysis Using Flow Logics.
Current Trends in Theoretical Computer Science 2001: 525-542 |
| 11 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Roberto Gorrieri,
Fabio Martinelli:
Techniques for Security Checking: Non-Interference vs Control Flow Analysis.
Electr. Notes Theor. Comput. Sci. 62: (2001) |
| 10 | | Chiara Bodei,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Static Analysis for the pi-Calculus with Applications to Security.
Inf. Comput. 168(1): 68-92 (2001) |
| 9 | EE | Chiara Bodei,
Pierpaolo Degano,
Corrado Priami:
Names of the -calculus agents handled locally.
Theor. Comput. Sci. 253(2): 155-184 (2001) |
| 2000 |
| 8 | EE | Pierpaolo Degano,
Francesca Levi,
Chiara Bodei:
Safe Ambients: Control Flow Analysis and Security.
ASIAN 2000: 199-214 |
| 7 | | Chiara Bodei,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Security Analysis using Flow Logics.
Bulletin of the EATCS 70: 112-130 (2000) |
| 1999 |
| 6 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Corrado Priami:
Authentication via Localized Names.
CSFW 1999: 98-110 |
| 5 | | Chiara Bodei,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Static Analysis of Processes for No and Read-Up nad No Write-Down.
FoSSaCS 1999: 120-134 |
| 1998 |
| 4 | EE | Chiara Bodei,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Control Flow Analysis for the pi-calculus.
CONCUR 1998: 84-98 |
| 3 | EE | Chiara Bodei,
Pierpaolo Degano,
Corrado Priami:
Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation.
SAS 1998: 168-183 |
| 1997 |
| 2 | | Chiara Bodei,
Corrado Priami:
True Concurrency via Abstract Interpretation.
SAS 1997: 202-216 |
| 1996 |
| 1 | | Chiara Bodei,
Pierpaolo Degano,
Corrado Priami:
Mobile Processes with a Distributed Environment.
ICALP 1996: 490-501 |