|
Search the dblp DataBase
Roberto Zunino:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Roberto Zunino, Pierpaolo Degano
A Note on the Perfect Encryption Assumption in a Process Calculus. [Citation Graph (0, 0)][DBLP] FoSSaCS, 2004, pp:514-528 [Conf]
- Roberto Zunino, Pierpaolo Degano
Handling exp, × (and Timestamps) in Protocol Analysis. [Citation Graph (0, 0)][DBLP] FoSSaCS, 2006, pp:413-427 [Conf]
- Roberto Zunino
Control Flow Analysis for the Applied Pi-calculus. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:87-110 [Journal]
- Roberto Zunino, Pierpaolo Degano
Weakening the perfect encryption assumption in Dolev-Yao adversaries. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2005, v:340, n:1, pp:154-178 [Journal]
- Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino
Secure Service Orchestration. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:24-74 [Conf]
- Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino
Types and Effects for Resource Usage Analysis. [Citation Graph (0, 0)][DBLP] FoSSaCS, 2007, pp:32-47 [Conf]
nu-Types for Effects and Freshness Analysis. [Citation Graph (, )][DBLP]
A Calculus of Contracting Processes. [Citation Graph (, )][DBLP]
Model Checking Usage Policies. [Citation Graph (, )][DBLP]
Hard Life with Weak Binders. [Citation Graph (, )][DBLP]
Jalapa: Securing Java with Local Policies: Tool Demonstration. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|