Sfoglia per Autore
Authentication Primitives for Protocol Specifications
2003-01-01 Bodei, Chiara; Degano, Pierpaolo; Focardi, R.; Priami, C.
Control Flow Analysis Can Find New Flaws Too
2004-01-01 Bodei, Chiara; M., Buchholtz; Degano, Pierpaolo; F., Nielson; H., RIIS NIELSON
A control flow analysis for safe and boxed ambients
2004-01-01 Levi, Francesca; Bodei, Chiara
Performance Evaluation of Security Protocols Specified in LySa
2004-01-01 Bodei, Chiara; Buchholtz, M; Curti, M; Degano, Pierpaolo; Nielson, F; RIIS NIELSON, H; Priami, Corrado
On Evaluating the Performance of Security Protocols
2005-01-01 Bodei, Chiara; Buchholtz, M.; Curti, M.; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H.; Priami, Corrado
Authentication Primitives for Secure Protocol Specifications
2005-01-01 Bodei, Chiara; Degano, Pierpaolo; Focardi, R; Priami, C.
Checking Security Policies through an Enhanced Control Flow Analysis
2005-01-01 Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado
A Quantitative Study of Two Attacks
2005-01-01 Bodei, Chiara; Curti, M.; Degano, Pierpaolo; Priami, C.
Static Validation of Security Protocols
2005-01-01 Bodei, Chiara; Buchholtz, M.; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H.
A Toolkit Supporting Formal Reasoning about Causality in Metabolic Networks
2007-01-01 Bodei, Chiara; Bracciali, A; Chiarugi, D.
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
2007-01-01 H., Gao; Bodei, Chiara; Degano, Pierpaolo; H., RIIS NIELSON
Knitting for Fun: A Recursive Sweater
2007-01-01 Bernasconi, Anna; Bodei, Chiara; Pagli, Linda
Detecting and Preventing Type Flaws: a Control Flow Analysis with tags
2007-01-01 Bodei, Chiara; Degano, Pierpaolo; H., Gao; L., Brodo
Detecting Replay Attacks by Freshness Annotations
2007-01-01 Han, Gao; Degano, Pierpaolo; Bodei, Chiara; H., RIIS NIELSON
Statically Detecting Message Confusions in a Multi-Protocol Setting
2008-01-01 Bodei, Chiara; Brodo, L; Degano, Pierpaolo; Gao, H.
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
2008-01-01 Han, Gao; Bodei, Chiara; Degano, Pierpaolo
A Static Analysis for Beta-Binders
2008-01-01 Bodei, Chiara
La danza dei bit
2008-01-01 Bodei, Chiara; Giannetti, A; Laganà, M. R.
On Formal Descriptions for Knitting Recursive Patterns
2008-01-01 Bernasconi, Anna; Bodei, Chiara; Pagli, Linda
On Deducing Causality in Metabolic Networks
2008-01-01 Bodei, Chiara; Bracciali, A; Chiarugi, D.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Authentication Primitives for Protocol Specifications | 1-gen-2003 | Bodei, Chiara; Degano, Pierpaolo; Focardi, R.; Priami, C. | |
Control Flow Analysis Can Find New Flaws Too | 1-gen-2004 | Bodei, Chiara; M., Buchholtz; Degano, Pierpaolo; F., Nielson; H., RIIS NIELSON | |
A control flow analysis for safe and boxed ambients | 1-gen-2004 | Levi, Francesca; Bodei, Chiara | |
Performance Evaluation of Security Protocols Specified in LySa | 1-gen-2004 | Bodei, Chiara; Buchholtz, M; Curti, M; Degano, Pierpaolo; Nielson, F; RIIS NIELSON, H; Priami, Corrado | |
On Evaluating the Performance of Security Protocols | 1-gen-2005 | Bodei, Chiara; Buchholtz, M.; Curti, M.; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H.; Priami, Corrado | |
Authentication Primitives for Secure Protocol Specifications | 1-gen-2005 | Bodei, Chiara; Degano, Pierpaolo; Focardi, R; Priami, C. | |
Checking Security Policies through an Enhanced Control Flow Analysis | 1-gen-2005 | Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado | |
A Quantitative Study of Two Attacks | 1-gen-2005 | Bodei, Chiara; Curti, M.; Degano, Pierpaolo; Priami, C. | |
Static Validation of Security Protocols | 1-gen-2005 | Bodei, Chiara; Buchholtz, M.; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H. | |
A Toolkit Supporting Formal Reasoning about Causality in Metabolic Networks | 1-gen-2007 | Bodei, Chiara; Bracciali, A; Chiarugi, D. | |
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols | 1-gen-2007 | H., Gao; Bodei, Chiara; Degano, Pierpaolo; H., RIIS NIELSON | |
Knitting for Fun: A Recursive Sweater | 1-gen-2007 | Bernasconi, Anna; Bodei, Chiara; Pagli, Linda | |
Detecting and Preventing Type Flaws: a Control Flow Analysis with tags | 1-gen-2007 | Bodei, Chiara; Degano, Pierpaolo; H., Gao; L., Brodo | |
Detecting Replay Attacks by Freshness Annotations | 1-gen-2007 | Han, Gao; Degano, Pierpaolo; Bodei, Chiara; H., RIIS NIELSON | |
Statically Detecting Message Confusions in a Multi-Protocol Setting | 1-gen-2008 | Bodei, Chiara; Brodo, L; Degano, Pierpaolo; Gao, H. | |
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols | 1-gen-2008 | Han, Gao; Bodei, Chiara; Degano, Pierpaolo | |
A Static Analysis for Beta-Binders | 1-gen-2008 | Bodei, Chiara | |
La danza dei bit | 1-gen-2008 | Bodei, Chiara; Giannetti, A; Laganà, M. R. | |
On Formal Descriptions for Knitting Recursive Patterns | 1-gen-2008 | Bernasconi, Anna; Bodei, Chiara; Pagli, Linda | |
On Deducing Causality in Metabolic Networks | 1-gen-2008 | Bodei, Chiara; Bracciali, A; Chiarugi, D. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile