|
Search the dblp DataBase
Danilo Bruschi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Arianna Arona, Danilo Bruschi, Emilia Rosti
Adding Availability to Log Services of Untrusted Machines. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:199-0 [Conf]
- Roberto Barbieri, Danilo Bruschi, Emilia Rosti
Voice over IPsec: Analysis and Solutions. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:261-270 [Conf]
- Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga
Replay Attack in TCG Specification and Solution. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:127-137 [Conf]
- Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:188-195 [Conf]
- Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
How to unwittingly sign non-repudiable documents with Java applications. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:192-196 [Conf]
- Danilo Bruschi, A. Ornaghi, Emilia Rosti
S-ARP: a Secure Address Resolution Protocol. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:66-75 [Conf]
- Danilo Bruschi, Fiorella de Cindio, D. Ferrazzi, G. Poletti, Emilia Rosti
Internet Voting: Do people accept it? Do they trust it? [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:437-440 [Conf]
- Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
Detecting Self-mutating Malware Using Control-Flow Graph Matching. [Citation Graph (0, 0)][DBLP] DIMVA, 2006, pp:129-143 [Conf]
- Danilo Bruschi, Emilia Rosti, R. Banfi
A Tool for Pro-active Defense Against the Buffer Overrun Attack. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:17-31 [Conf]
- Alberto Bertoni, Danilo Bruschi, Deborah Joseph, Meera Sitharam, Paul Young
Generalized Boolean Hierarchies and Boolean Hierarchies Over RP (Conference Abstract). [Citation Graph (0, 0)][DBLP] FCT, 1989, pp:35-46 [Conf]
- Danilo Bruschi, Giovanni Pighizzini
The Complexity of Computing Maximal Word Functions. [Citation Graph (0, 0)][DBLP] FCT, 1991, pp:157-167 [Conf]
- Danilo Bruschi, Bart De Win, Mattia Monga
Software engineering for secure systems. [Citation Graph (0, 0)][DBLP] ICSE, 2005, pp:681- [Conf]
- Danilo Bruschi, Bart De Win, Mattia Monga
Software engineering for secure systems. [Citation Graph (0, 0)][DBLP] ICSE, 2006, pp:1007-1008 [Conf]
- Stefano Basagni, Kris Herrin, Danilo Bruschi, Emilia Rosti
Secure pebblenets. [Citation Graph (0, 0)][DBLP] MobiHoc, 2001, pp:156-163 [Conf]
- Danilo Bruschi, Emilia Rosti
AngeL: a tool to disarm computer systems. [Citation Graph (0, 0)][DBLP] NSPW, 2001, pp:63-69 [Conf]
- Danilo Bruschi, Deborah Joseph, Paul Young
A Structural Overview of NP Optimization Problems. [Citation Graph (0, 0)][DBLP] Optimal Algorithms, 1989, pp:205-231 [Conf]
- Danilo Bruschi, Giovanni Pighizzini, Nicoletta Sabadini
On the Existence of the Minimum Asynchronous Automaton and on Decision Problems for Unambiguous Regular Trace Languages. [Citation Graph (0, 0)][DBLP] STACS, 1988, pp:334-345 [Conf]
- Danilo Bruschi, Igor Nai Fovino, Andrea Lanzi
A Protocol for Anonymous and Accurate E-Polling. [Citation Graph (0, 0)][DBLP] TCGOV, 2005, pp:112-121 [Conf]
- Danilo Bruschi, F. Ravasio
Random Parallel Algorithms for Finding Exact Branchings, Perfect Matchings, and Cycles. [Citation Graph (0, 0)][DBLP] Algorithmica, 1995, v:13, n:4, pp:346-356 [Journal]
- Eric Allender, Danilo Bruschi, Giovanni Pighizzini
The Complexity of Computing Maximal Word Functions. [Citation Graph (0, 0)][DBLP] Computational Complexity, 1993, v:3, n:, pp:368-391 [Journal]
- Danilo Bruschi, A. Curti, Emilia Rosti
A quantitative study of Public Key Infrastructures. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:1, pp:56-67 [Journal]
- Danilo Bruschi, Massimiliano Del Pinto
Lower Bounds for the Broadcast Problem in Mobile Radio Networks. [Citation Graph (0, 0)][DBLP] Distributed Computing, 1997, v:10, n:3, pp:129-135 [Journal]
- Danilo Bruschi, Giovanni Pighizzini, Nicoletta Sabadini
On the Existence of Minimum Asynchronous Automata and on the Equivalence Problem for Unambiguous Regular Trace Languages [Citation Graph (0, 0)][DBLP] Inf. Comput., 1994, v:108, n:2, pp:262-285 [Journal]
- Danilo Bruschi, Deborah Joseph, Paul Young
Strong Separations for the Boolean Hierarchy over RP. [Citation Graph (0, 0)][DBLP] Int. J. Found. Comput. Sci., 1990, v:1, n:3, pp:201-218 [Journal]
- Stefano Basagni, Danilo Bruschi, F. Ravasio
On the Difficulty of Finding Walks of Length k. [Citation Graph (0, 0)][DBLP] ITA, 1997, v:31, n:5, pp:429-435 [Journal]
- Danilo Bruschi, Emilia Rosti
Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues. [Citation Graph (0, 0)][DBLP] MONET, 2002, v:7, n:6, pp:503-511 [Journal]
- Alberto Bertoni, Danilo Bruschi, Massimiliano Goldwurm
Ranking and Formal Power Series. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1991, v:79, n:1, pp:25-35 [Journal]
- Danilo Bruschi
Strong Separations of the Polynomial Hierarchy with Oracles: Constructive Separations by Immune and Simple Sets. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1992, v:102, n:2, pp:215-252 [Journal]
- Stefano Basagni, Imrich Chlamtac, Danilo Bruschi
A mobility-transparent deterministic broadcast mechanism for ad hoc networks. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 1999, v:7, n:6, pp:799-807 [Journal]
- Stefano Basagni, Danilo Bruschi
A logarithmic lower bound for time-spread multiple-access (TSMA) protocols. [Citation Graph (0, 0)][DBLP] Wireless Networks, 2000, v:6, n:2, pp:161-163 [Journal]
- Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:213-230 [Conf]
- Danilo Bruschi, Bart De Win, Seok-Won Lee, Mattia Monga
The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure. [Citation Graph (0, 0)][DBLP] ICSE Companion, 2007, pp:111-112 [Conf]
Surgically Returning to Randomized lib(c). [Citation Graph (, )][DBLP]
FluXOR: Detecting and Monitoring Fast-Flux Service Networks. [Citation Graph (, )][DBLP]
On Race Vulnerabilities in Web Applications. [Citation Graph (, )][DBLP]
Conqueror: Tamper-Proof Code Execution on Legacy Systems. [Citation Graph (, )][DBLP]
A Framework for Behavior-Based Malware Analysis in the Cloud. [Citation Graph (, )][DBLP]
N-version disassembly: differential testing of x86 disassemblers. [Citation Graph (, )][DBLP]
Testing system virtual machines. [Citation Graph (, )][DBLP]
Testing CPU emulators. [Citation Graph (, )][DBLP]
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. [Citation Graph (, )][DBLP]
Diversified Process Replicæ for Defeating Memory Error Exploits. [Citation Graph (, )][DBLP]
Search in 0.020secs, Finished in 0.022secs
|