2008 | ||
---|---|---|
67 | EE | Michele Bugliesi, Riccardo Focardi: Language Based Secure Communication. CSF 2008: 3-16 |
66 | EE | Riccardo Focardi, Matteo Centenaro: Information flow security of multi-threaded distributed programs. PLAS 2008: 113-124 |
65 | EE | Chiara Braghin, Agostino Cortesi, Riccardo Focardi: Information flow security in Boundary Ambients. Inf. Comput. 206(2-4): 460-489 (2008) |
2007 | ||
64 | EE | Michael Backes, Agostino Cortesi, Riccardo Focardi, Matteo Maffei: A calculus of challenges and responses. FMSE 2007: 51-60 |
63 | EE | Michele Bugliesi, Riccardo Focardi, Matteo Maffei: Dynamic types for authentication. Journal of Computer Security 15(6): 563-617 (2007) |
2006 | ||
62 | EE | Riccardo Focardi, Sabina Rossi: Information flow security in dynamic contexts. Journal of Computer Security 14(1): 65-110 (2006) |
61 | EE | Riccardo Focardi: Preface. Journal of Computer Security 14(2): 111 (2006) |
60 | EE | Riccardo Focardi, Gianluigi Zavattaro: Guest editor's introduction: Special issue on security issues in coordination models, languages, and systems. Sci. Comput. Program. 63(1): 1-2 (2006) |
59 | EE | Riccardo Focardi, Roberto Lucchi, Gianluigi Zavattaro: Secure shared data-space coordination languages: A process algebraic survey. Sci. Comput. Program. 63(1): 3-15 (2006) |
2005 | ||
58 | EE | Michele Bugliesi, Riccardo Focardi, Matteo Maffei: Analysis of Typed Analyses of Authentication Protocols. CSFW 2005: 112-125 |
57 | EE | Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld: Bridging Language-Based and Process Calculi Security. FoSSaCS 2005: 299-315 |
56 | EE | Riccardo Focardi, Matteo Maffei, Francesco Placella: Inferring authentication tags. WITS 2005: 41-49 |
55 | EE | Riccardo Focardi, Gianluigi Zavattaro: Preface. Electr. Notes Theor. Comput. Sci. 128(5): 1-2 (2005) |
54 | EE | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami: Authentication primitives for secure protocol specifications. Future Generation Comp. Syst. 21(4): 645-653 (2005) |
53 | EE | Riccardo Focardi: Guest editor's preface. Journal of Computer Security 13(3): 345- (2005) |
2004 | ||
52 | Riccardo Focardi, Roberto Gorrieri: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures Springer 2004 | |
51 | EE | Michele Bugliesi, Riccardo Focardi, Matteo Maffei: Compositional Analysis of Authentication Protocols. ESOP 2004: 140-154 |
50 | EE | Michele Bugliesi, Riccardo Focardi, Matteo Maffei: Authenticity by tagging and typing. FMSE 2004: 1-12 |
49 | EE | Riccardo Focardi: Static Analysis of Authentication. FOSAD 2004: 109-132 |
48 | EE | Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza: Nesting analysis of mobile ambients. Computer Languages, Systems & Structures 30(3-4): 207-230 (2004) |
47 | EE | Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: Verifying persistent security properties. Computer Languages, Systems & Structures 30(3-4): 231-258 (2004) |
46 | EE | Riccardo Focardi, Flaminia L. Luccio: A modular approach to Sprouts. Discrete Applied Mathematics 144(3): 303-319 (2004) |
45 | EE | Annalisa Bossi, Riccardo Focardi, Damiano Macedonio, Carla Piazza, Sabina Rossi: Unwinding in Information Flow Security. Electr. Notes Theor. Comput. Sci. 99: 127-154 (2004) |
44 | EE | Riccardo Focardi, Matteo Maffei: The rho-spi Calculus at Work: Authentication Case Studies. Electr. Notes Theor. Comput. Sci. 99: 267-293 (2004) |
43 | EE | Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza: Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients. Electr. Notes Theor. Comput. Sci. 99: 319-337 (2004) |
2003 | ||
42 | EE | Michele Bugliesi, Riccardo Focardi, Matteo Maffei: Principles for Entity Authentication. Ershov Memorial Conference 2003: 294-306 |
41 | EE | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami: Authentication Primitives for Protocol Specifications. PaCT 2003: 49-65 |
40 | EE | Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: Refinement Operators and Information Flow Security. SEFM 2003: 44-53 |
39 | EE | Chiara Braghin, Agostino Cortesi, Stefano Filippone, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza: BANANA - A Tool for Boundary Ambients Nesting ANAlysis. TACAS 2003: 437-441 |
38 | EE | Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: Bisimulation and Unwinding for Verifying Possibilistic Security Properties. VMCAI 2003: 223-237 |
37 | EE | Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza: Complexity of Nesting Analysis in Mobile Ambients. VMCAI 2003: 86-101 |
36 | EE | Chiara Braghin, Agostino Cortesi, Riccardo Focardi: Information Leakage Detection in Boundary Ambients. Electr. Notes Theor. Comput. Sci. 78: (2003) |
35 | EE | Riccardo Focardi, Gianluigi Zavattaro: Preface. Electr. Notes Theor. Comput. Sci. 85(3): (2003) |
34 | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: A comparison of three authentication properties. Theor. Comput. Sci. 291(3): 285-327 (2003) | |
2002 | ||
33 | EE | Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: Transforming Processes to Check and Ensure Information Flow Security. AMAST 2002: 271-286 |
32 | EE | Riccardo Focardi, Sabina Rossi: Information Flow Security in Dynamic Contexts. CSFW 2002: 307-319 |
31 | Chiara Braghin, Agostino Cortesi, Riccardo Focardi: Control Flow Analysis of Mobile Ambients with Security Boundaries. FMOODS 2002: 197-212 | |
30 | EE | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Classification of Security Properties - Part II: Network Security. FOSAD 2002: 139-185 |
29 | EE | Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi, Vladimiro Sassone: A Survey of Name-Passing Calculi and Crypto-Primitives. FOSAD 2002: 91-138 |
28 | Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Steffen van Bakel: Boundary Inference for Enforcing Security Policies in Mobile Ambients. IFIP TCS 2002: 383-395 | |
27 | EE | Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: A Proof System for Information Flow Security. LOPSTR 2002: 199-218 |
26 | EE | Riccardo Focardi, Carla Piazza, Sabina Rossi: Proofs Methods for Bisimulation Based Information Flow Security. VMCAI 2002: 16-31 |
25 | Agostino Cortesi, Riccardo Focardi: Computer languages and security. Comput. Lang. 28(1): 1-2 (2002) | |
24 | Chiara Braghin, Agostino Cortesi, Riccardo Focardi: Security boundaries in mobile ambients. Comput. Lang. 28(1): 101-127 (2002) | |
23 | EE | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami: Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2): 271-304 (2002) |
2001 | ||
22 | Riccardo Focardi, Roberto Gorrieri: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000] Springer 2001 | |
21 | EE | Antonio Durante, Riccardo Focardi, Roberto Gorrieri: CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. MMM-ACNS 2001: 287-299 |
20 | EE | Agostino Cortesi, Riccardo Focardi: Information Flow Security in Mobile Ambients. Electr. Notes Theor. Comput. Sci. 54: (2001) |
19 | EE | Riccardo Focardi, Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci: Formal Models of Timing Attacks on Web Privacy. Electr. Notes Theor. Comput. Sci. 62: (2001) |
18 | EE | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Techniques for Security Checking: Non-Interference vs Control Flow Analysis. Electr. Notes Theor. Comput. Sci. 62: (2001) |
2000 | ||
17 | EE | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Message Authentication through Non Interference. AMAST 2000: 258-272 |
16 | EE | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Information Flow Analysis in a Discrete-Time Process Algebra. CSFW 2000: 170-184 |
15 | EE | Riccardo Focardi, Roberto Gorrieri: Classification of Security Properties (Part I: Information Flow). FOSAD 2000: 331-396 |
14 | EE | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Non Interference for the Analysis of Cryptographic Protocols. ICALP 2000: 354-372 |
13 | EE | Antonio Durante, Riccardo Focardi, Roberto Gorrieri: A compiler for analyzing cryptographic protocols using noninterference. ACM Trans. Softw. Eng. Methodol. 9(4): 488-528 (2000) |
12 | EE | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Secrecy in Security Protocols as Non Interference. Electr. Notes Theor. Comput. Sci. 32: (2000) |
11 | EE | Riccardo Focardi, Flaminia L. Luccio, David Peleg: Feedback vertex set in hypercubes. Inf. Process. Lett. 76(1-2): 1-5 (2000) |
1999 | ||
10 | EE | Antonio Durante, Riccardo Focardi, Roberto Gorrieri: CVS: A Compiler for the Analysis of Cryptographic Protocols. CSFW 1999: 203-212 |
9 | EE | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami: Authentication via Localized Names. CSFW 1999: 98-110 |
8 | EE | Riccardo Focardi, Fabio Martinelli: A Uniform Approach for the Definition of Security Properties. World Congress on Formal Methods 1999: 794-813 |
1998 | ||
7 | EE | Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 |
1997 | ||
6 | EE | Riccardo Focardi, Roberto Gorrieri: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Trans. Software Eng. 23(9): 550-571 (1997) |
1996 | ||
5 | EE | Riccardo Focardi: Comparing Two Information Flow Security Properties. CSFW 1996: 116-122 |
4 | Riccardo Focardi, Roberto Gorrieri: Automatic Compositional Verification of Some Security Properties. TACAS 1996: 167-186 | |
1995 | ||
3 | EE | Riccardo Focardi, Roberto Gorrieri, V. Panini: The security checker: a semantics-based tool for the verification of security properties. CSFW 1995: 60-69 |
2 | Riccardo Focardi, Roberto Gorrieri: A Taxonomy of Security Properties for Process Algebras. Journal of Computer Security 3(1): 5-34 (1995) | |
1994 | ||
1 | Riccardo Focardi, Roberto Gorrieri: A Taxonomy of Security Properties for CCS. CSFW 1994: 126-136 |