| 2008 |
| 67 | EE | Michele Bugliesi,
Riccardo Focardi:
Language Based Secure Communication.
CSF 2008: 3-16 |
| 66 | EE | Riccardo Focardi,
Matteo Centenaro:
Information flow security of multi-threaded distributed programs.
PLAS 2008: 113-124 |
| 65 | EE | Chiara Braghin,
Agostino Cortesi,
Riccardo Focardi:
Information flow security in Boundary Ambients.
Inf. Comput. 206(2-4): 460-489 (2008) |
| 2007 |
| 64 | EE | Michael Backes,
Agostino Cortesi,
Riccardo Focardi,
Matteo Maffei:
A calculus of challenges and responses.
FMSE 2007: 51-60 |
| 63 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Dynamic types for authentication.
Journal of Computer Security 15(6): 563-617 (2007) |
| 2006 |
| 62 | EE | Riccardo Focardi,
Sabina Rossi:
Information flow security in dynamic contexts.
Journal of Computer Security 14(1): 65-110 (2006) |
| 61 | EE | Riccardo Focardi:
Preface.
Journal of Computer Security 14(2): 111 (2006) |
| 60 | EE | Riccardo Focardi,
Gianluigi Zavattaro:
Guest editor's introduction: Special issue on security issues in coordination models, languages, and systems.
Sci. Comput. Program. 63(1): 1-2 (2006) |
| 59 | EE | Riccardo Focardi,
Roberto Lucchi,
Gianluigi Zavattaro:
Secure shared data-space coordination languages: A process algebraic survey.
Sci. Comput. Program. 63(1): 3-15 (2006) |
| 2005 |
| 58 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Analysis of Typed Analyses of Authentication Protocols.
CSFW 2005: 112-125 |
| 57 | EE | Riccardo Focardi,
Sabina Rossi,
Andrei Sabelfeld:
Bridging Language-Based and Process Calculi Security.
FoSSaCS 2005: 299-315 |
| 56 | EE | Riccardo Focardi,
Matteo Maffei,
Francesco Placella:
Inferring authentication tags.
WITS 2005: 41-49 |
| 55 | EE | Riccardo Focardi,
Gianluigi Zavattaro:
Preface.
Electr. Notes Theor. Comput. Sci. 128(5): 1-2 (2005) |
| 54 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Corrado Priami:
Authentication primitives for secure protocol specifications.
Future Generation Comp. Syst. 21(4): 645-653 (2005) |
| 53 | EE | Riccardo Focardi:
Guest editor's preface.
Journal of Computer Security 13(3): 345- (2005) |
| 2004 |
| 52 | | Riccardo Focardi,
Roberto Gorrieri:
Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures
Springer 2004 |
| 51 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Compositional Analysis of Authentication Protocols.
ESOP 2004: 140-154 |
| 50 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Authenticity by tagging and typing.
FMSE 2004: 1-12 |
| 49 | EE | Riccardo Focardi:
Static Analysis of Authentication.
FOSAD 2004: 109-132 |
| 48 | EE | Chiara Braghin,
Agostino Cortesi,
Riccardo Focardi,
Flaminia L. Luccio,
Carla Piazza:
Nesting analysis of mobile ambients.
Computer Languages, Systems & Structures 30(3-4): 207-230 (2004) |
| 47 | EE | Annalisa Bossi,
Riccardo Focardi,
Carla Piazza,
Sabina Rossi:
Verifying persistent security properties.
Computer Languages, Systems & Structures 30(3-4): 231-258 (2004) |
| 46 | EE | Riccardo Focardi,
Flaminia L. Luccio:
A modular approach to Sprouts.
Discrete Applied Mathematics 144(3): 303-319 (2004) |
| 45 | EE | Annalisa Bossi,
Riccardo Focardi,
Damiano Macedonio,
Carla Piazza,
Sabina Rossi:
Unwinding in Information Flow Security.
Electr. Notes Theor. Comput. Sci. 99: 127-154 (2004) |
| 44 | EE | Riccardo Focardi,
Matteo Maffei:
The rho-spi Calculus at Work: Authentication Case Studies.
Electr. Notes Theor. Comput. Sci. 99: 267-293 (2004) |
| 43 | EE | Chiara Braghin,
Agostino Cortesi,
Riccardo Focardi,
Flaminia L. Luccio,
Carla Piazza:
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients.
Electr. Notes Theor. Comput. Sci. 99: 319-337 (2004) |
| 2003 |
| 42 | EE | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Principles for Entity Authentication.
Ershov Memorial Conference 2003: 294-306 |
| 41 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Corrado Priami:
Authentication Primitives for Protocol Specifications.
PaCT 2003: 49-65 |
| 40 | EE | Annalisa Bossi,
Riccardo Focardi,
Carla Piazza,
Sabina Rossi:
Refinement Operators and Information Flow Security.
SEFM 2003: 44-53 |
| 39 | EE | Chiara Braghin,
Agostino Cortesi,
Stefano Filippone,
Riccardo Focardi,
Flaminia L. Luccio,
Carla Piazza:
BANANA - A Tool for Boundary Ambients Nesting ANAlysis.
TACAS 2003: 437-441 |
| 38 | EE | Annalisa Bossi,
Riccardo Focardi,
Carla Piazza,
Sabina Rossi:
Bisimulation and Unwinding for Verifying Possibilistic Security Properties.
VMCAI 2003: 223-237 |
| 37 | EE | Chiara Braghin,
Agostino Cortesi,
Riccardo Focardi,
Flaminia L. Luccio,
Carla Piazza:
Complexity of Nesting Analysis in Mobile Ambients.
VMCAI 2003: 86-101 |
| 36 | EE | Chiara Braghin,
Agostino Cortesi,
Riccardo Focardi:
Information Leakage Detection in Boundary Ambients.
Electr. Notes Theor. Comput. Sci. 78: (2003) |
| 35 | EE | Riccardo Focardi,
Gianluigi Zavattaro:
Preface.
Electr. Notes Theor. Comput. Sci. 85(3): (2003) |
| 34 | | Riccardo Focardi,
Roberto Gorrieri,
Fabio Martinelli:
A comparison of three authentication properties.
Theor. Comput. Sci. 291(3): 285-327 (2003) |
| 2002 |
| 33 | EE | Annalisa Bossi,
Riccardo Focardi,
Carla Piazza,
Sabina Rossi:
Transforming Processes to Check and Ensure Information Flow Security.
AMAST 2002: 271-286 |
| 32 | EE | Riccardo Focardi,
Sabina Rossi:
Information Flow Security in Dynamic Contexts.
CSFW 2002: 307-319 |
| 31 | | Chiara Braghin,
Agostino Cortesi,
Riccardo Focardi:
Control Flow Analysis of Mobile Ambients with Security Boundaries.
FMOODS 2002: 197-212 |
| 30 | EE | Riccardo Focardi,
Roberto Gorrieri,
Fabio Martinelli:
Classification of Security Properties - Part II: Network Security.
FOSAD 2002: 139-185 |
| 29 | EE | Michele Bugliesi,
Giuseppe Castagna,
Silvia Crafa,
Riccardo Focardi,
Vladimiro Sassone:
A Survey of Name-Passing Calculi and Crypto-Primitives.
FOSAD 2002: 91-138 |
| 28 | | Chiara Braghin,
Agostino Cortesi,
Riccardo Focardi,
Steffen van Bakel:
Boundary Inference for Enforcing Security Policies in Mobile Ambients.
IFIP TCS 2002: 383-395 |
| 27 | EE | Annalisa Bossi,
Riccardo Focardi,
Carla Piazza,
Sabina Rossi:
A Proof System for Information Flow Security.
LOPSTR 2002: 199-218 |
| 26 | EE | Riccardo Focardi,
Carla Piazza,
Sabina Rossi:
Proofs Methods for Bisimulation Based Information Flow Security.
VMCAI 2002: 16-31 |
| 25 | | Agostino Cortesi,
Riccardo Focardi:
Computer languages and security.
Comput. Lang. 28(1): 1-2 (2002) |
| 24 | | Chiara Braghin,
Agostino Cortesi,
Riccardo Focardi:
Security boundaries in mobile ambients.
Comput. Lang. 28(1): 101-127 (2002) |
| 23 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Corrado Priami:
Primitives for authentication in process algebras.
Theor. Comput. Sci. 283(2): 271-304 (2002) |
| 2001 |
| 22 | | Riccardo Focardi,
Roberto Gorrieri:
Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000]
Springer 2001 |
| 21 | EE | Antonio Durante,
Riccardo Focardi,
Roberto Gorrieri:
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols.
MMM-ACNS 2001: 287-299 |
| 20 | EE | Agostino Cortesi,
Riccardo Focardi:
Information Flow Security in Mobile Ambients.
Electr. Notes Theor. Comput. Sci. 54: (2001) |
| 19 | EE | Riccardo Focardi,
Roberto Gorrieri,
Ruggero Lanotte,
Andrea Maggiolo-Schettini,
Fabio Martinelli,
Simone Tini,
Enrico Tronci:
Formal Models of Timing Attacks on Web Privacy.
Electr. Notes Theor. Comput. Sci. 62: (2001) |
| 18 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Roberto Gorrieri,
Fabio Martinelli:
Techniques for Security Checking: Non-Interference vs Control Flow Analysis.
Electr. Notes Theor. Comput. Sci. 62: (2001) |
| 2000 |
| 17 | EE | Riccardo Focardi,
Roberto Gorrieri,
Fabio Martinelli:
Message Authentication through Non Interference.
AMAST 2000: 258-272 |
| 16 | EE | Riccardo Focardi,
Roberto Gorrieri,
Fabio Martinelli:
Information Flow Analysis in a Discrete-Time Process Algebra.
CSFW 2000: 170-184 |
| 15 | EE | Riccardo Focardi,
Roberto Gorrieri:
Classification of Security Properties (Part I: Information Flow).
FOSAD 2000: 331-396 |
| 14 | EE | Riccardo Focardi,
Roberto Gorrieri,
Fabio Martinelli:
Non Interference for the Analysis of Cryptographic Protocols.
ICALP 2000: 354-372 |
| 13 | EE | Antonio Durante,
Riccardo Focardi,
Roberto Gorrieri:
A compiler for analyzing cryptographic protocols using noninterference.
ACM Trans. Softw. Eng. Methodol. 9(4): 488-528 (2000) |
| 12 | EE | Riccardo Focardi,
Roberto Gorrieri,
Fabio Martinelli:
Secrecy in Security Protocols as Non Interference.
Electr. Notes Theor. Comput. Sci. 32: (2000) |
| 11 | EE | Riccardo Focardi,
Flaminia L. Luccio,
David Peleg:
Feedback vertex set in hypercubes.
Inf. Process. Lett. 76(1-2): 1-5 (2000) |
| 1999 |
| 10 | EE | Antonio Durante,
Riccardo Focardi,
Roberto Gorrieri:
CVS: A Compiler for the Analysis of Cryptographic Protocols.
CSFW 1999: 203-212 |
| 9 | EE | Chiara Bodei,
Pierpaolo Degano,
Riccardo Focardi,
Corrado Priami:
Authentication via Localized Names.
CSFW 1999: 98-110 |
| 8 | EE | Riccardo Focardi,
Fabio Martinelli:
A Uniform Approach for the Definition of Security Properties.
World Congress on Formal Methods 1999: 794-813 |
| 1998 |
| 7 | EE | Roberto Gorrieri,
Paul F. Syverson,
Martín Abadi,
Riccardo Focardi,
Dieter Gollmann,
Gavin Lowe,
Catherine Meadows:
Panel Introduction: Varieties of Authentication.
CSFW 1998: 79-82 |
| 1997 |
| 6 | EE | Riccardo Focardi,
Roberto Gorrieri:
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties.
IEEE Trans. Software Eng. 23(9): 550-571 (1997) |
| 1996 |
| 5 | EE | Riccardo Focardi:
Comparing Two Information Flow Security Properties.
CSFW 1996: 116-122 |
| 4 | | Riccardo Focardi,
Roberto Gorrieri:
Automatic Compositional Verification of Some Security Properties.
TACAS 1996: 167-186 |
| 1995 |
| 3 | EE | Riccardo Focardi,
Roberto Gorrieri,
V. Panini:
The security checker: a semantics-based tool for the verification of security properties.
CSFW 1995: 60-69 |
| 2 | | Riccardo Focardi,
Roberto Gorrieri:
A Taxonomy of Security Properties for Process Algebras.
Journal of Computer Security 3(1): 5-34 (1995) |
| 1994 |
| 1 | | Riccardo Focardi,
Roberto Gorrieri:
A Taxonomy of Security Properties for CCS.
CSFW 1994: 126-136 |