dblp.uni-trier.dewww.uni-trier.de

Luca Compagna

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
15EEAlessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, M. Llanos Tobarra: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. FMSE 2008: 1-10
14EELuca Compagna, Volkmar Lotz, Fabio Massacci: Preface. Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008)
13EEAlessandro Armando, Luca Compagna: SAT-based model-checking for security protocols analysis. Int. J. Inf. Sec. 7(1): 3-32 (2008)
2007
12EEAlessandro Armando, Roberto Carbone, Luca Compagna: LTL Model Checking for Security Protocols. CSF 2007: 385-396
11EELuca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153
2005
10EEAlessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285
9EEAlessandro Armando, Luca Compagna, Silvio Ranise: Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation. Mechanizing Mathematical Reasoning 2005: 30-45
8EEAlessandro Armando, Luca Compagna: An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. Electr. Notes Theor. Comput. Sci. 125(1): 91-108 (2005)
2004
7EEAlessandro Armando, Luca Compagna, Yuliya Lierler: Automatic Compilation of Protocol Insecurity Problems into Logic Programming. JELIA 2004: 617-627
6EEAlessandro Armando, Luca Compagna: SATMC: A SAT-Based Model Checker for Security Protocols. JELIA 2004: 730-733
2003
5EEAlessandro Armando, Luca Compagna, Pierre Ganty: SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis. FME 2003: 875-893
4EEAlessandro Armando, Luca Compagna: Abstraction-Driven SAT-based Analysis of Security Protocols. SAT 2003: 257-271
2002
3EEAlessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron: The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353
2EEAlessandro Armando, Luca Compagna: Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. FORTE 2002: 210-225
2001
1EEAlessandro Armando, Luca Compagna, Silvio Ranise: System Description: RDL : Rewrite and Decision Procedure Laboratory. IJCAR 2001: 663-669

Coauthor Index

1Alessandro Armando [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12] [13] [15]
2David A. Basin [3] [10]
3Yohan Boichut [10]
4Mehdi Bouallagui [3]
5Roberto Carbone [12] [15]
6Yannick Chevalier [3] [10]
7Jorge Cuéllar [10] [15]
8Paul Hankes Drielsma [10]
9Pierre Ganty [5]
10Pierre-Cyrille Héam [10]
11Paul El Khoury [11]
12Olga Kouchnarenko [10]
13Yuliya Lierler (Yuliya Babovich-Lierler, Yuliya Babovich) [7]
14Volkmar Lotz [14]
15Jacopo Mantovani [10]
16Fabio Massacci [11] [14]
17Sebastian Mödersheim [3] [10]
18David von Oheimb [10]
19Silvio Ranise [1] [9]
20Michaël Rusinowitch [3] [10]
21Judson Santiago [10]
22Reshma Thomas [11]
23M. Llanos Tobarra [15]
24Mathieu Turuani [3] [10]
25Luca Viganò [3] [10]
26Laurent Vigneron [3] [10]
27Nicola Zannone [11]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)