The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Danilo Bruschi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Arianna Arona, Danilo Bruschi, Emilia Rosti
    Adding Availability to Log Services of Untrusted Machines. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:199-0 [Conf]
  2. Roberto Barbieri, Danilo Bruschi, Emilia Rosti
    Voice over IPsec: Analysis and Solutions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:261-270 [Conf]
  3. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga
    Replay Attack in TCG Specification and Solution. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:127-137 [Conf]
  4. Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
    Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:188-195 [Conf]
  5. Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
    How to unwittingly sign non-repudiable documents with Java applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:192-196 [Conf]
  6. Danilo Bruschi, A. Ornaghi, Emilia Rosti
    S-ARP: a Secure Address Resolution Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:66-75 [Conf]
  7. Danilo Bruschi, Fiorella de Cindio, D. Ferrazzi, G. Poletti, Emilia Rosti
    Internet Voting: Do people accept it? Do they trust it? [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:437-440 [Conf]
  8. Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
    Detecting Self-mutating Malware Using Control-Flow Graph Matching. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:129-143 [Conf]
  9. Danilo Bruschi, Emilia Rosti, R. Banfi
    A Tool for Pro-active Defense Against the Buffer Overrun Attack. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:17-31 [Conf]
  10. Alberto Bertoni, Danilo Bruschi, Deborah Joseph, Meera Sitharam, Paul Young
    Generalized Boolean Hierarchies and Boolean Hierarchies Over RP (Conference Abstract). [Citation Graph (0, 0)][DBLP]
    FCT, 1989, pp:35-46 [Conf]
  11. Danilo Bruschi, Giovanni Pighizzini
    The Complexity of Computing Maximal Word Functions. [Citation Graph (0, 0)][DBLP]
    FCT, 1991, pp:157-167 [Conf]
  12. Danilo Bruschi, Bart De Win, Mattia Monga
    Software engineering for secure systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2005, pp:681- [Conf]
  13. Danilo Bruschi, Bart De Win, Mattia Monga
    Software engineering for secure systems. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:1007-1008 [Conf]
  14. Stefano Basagni, Kris Herrin, Danilo Bruschi, Emilia Rosti
    Secure pebblenets. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:156-163 [Conf]
  15. Danilo Bruschi, Emilia Rosti
    AngeL: a tool to disarm computer systems. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:63-69 [Conf]
  16. Danilo Bruschi, Deborah Joseph, Paul Young
    A Structural Overview of NP Optimization Problems. [Citation Graph (0, 0)][DBLP]
    Optimal Algorithms, 1989, pp:205-231 [Conf]
  17. Danilo Bruschi, Giovanni Pighizzini, Nicoletta Sabadini
    On the Existence of the Minimum Asynchronous Automaton and on Decision Problems for Unambiguous Regular Trace Languages. [Citation Graph (0, 0)][DBLP]
    STACS, 1988, pp:334-345 [Conf]
  18. Danilo Bruschi, Igor Nai Fovino, Andrea Lanzi
    A Protocol for Anonymous and Accurate E-Polling. [Citation Graph (0, 0)][DBLP]
    TCGOV, 2005, pp:112-121 [Conf]
  19. Danilo Bruschi, F. Ravasio
    Random Parallel Algorithms for Finding Exact Branchings, Perfect Matchings, and Cycles. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1995, v:13, n:4, pp:346-356 [Journal]
  20. Eric Allender, Danilo Bruschi, Giovanni Pighizzini
    The Complexity of Computing Maximal Word Functions. [Citation Graph (0, 0)][DBLP]
    Computational Complexity, 1993, v:3, n:, pp:368-391 [Journal]
  21. Danilo Bruschi, A. Curti, Emilia Rosti
    A quantitative study of Public Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:1, pp:56-67 [Journal]
  22. Danilo Bruschi, Massimiliano Del Pinto
    Lower Bounds for the Broadcast Problem in Mobile Radio Networks. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1997, v:10, n:3, pp:129-135 [Journal]
  23. Danilo Bruschi, Giovanni Pighizzini, Nicoletta Sabadini
    On the Existence of Minimum Asynchronous Automata and on the Equivalence Problem for Unambiguous Regular Trace Languages [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1994, v:108, n:2, pp:262-285 [Journal]
  24. Danilo Bruschi, Deborah Joseph, Paul Young
    Strong Separations for the Boolean Hierarchy over RP. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 1990, v:1, n:3, pp:201-218 [Journal]
  25. Stefano Basagni, Danilo Bruschi, F. Ravasio
    On the Difficulty of Finding Walks of Length k. [Citation Graph (0, 0)][DBLP]
    ITA, 1997, v:31, n:5, pp:429-435 [Journal]
  26. Danilo Bruschi, Emilia Rosti
    Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues. [Citation Graph (0, 0)][DBLP]
    MONET, 2002, v:7, n:6, pp:503-511 [Journal]
  27. Alberto Bertoni, Danilo Bruschi, Massimiliano Goldwurm
    Ranking and Formal Power Series. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1991, v:79, n:1, pp:25-35 [Journal]
  28. Danilo Bruschi
    Strong Separations of the Polynomial Hierarchy with Oracles: Constructive Separations by Immune and Simple Sets. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1992, v:102, n:2, pp:215-252 [Journal]
  29. Stefano Basagni, Imrich Chlamtac, Danilo Bruschi
    A mobility-transparent deterministic broadcast mechanism for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1999, v:7, n:6, pp:799-807 [Journal]
  30. Stefano Basagni, Danilo Bruschi
    A logarithmic lower bound for time-spread multiple-access (TSMA) protocols. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2000, v:6, n:2, pp:161-163 [Journal]
  31. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi
    Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:213-230 [Conf]
  32. Danilo Bruschi, Bart De Win, Seok-Won Lee, Mattia Monga
    The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure. [Citation Graph (0, 0)][DBLP]
    ICSE Companion, 2007, pp:111-112 [Conf]

  33. Surgically Returning to Randomized lib(c). [Citation Graph (, )][DBLP]


  34. FluXOR: Detecting and Monitoring Fast-Flux Service Networks. [Citation Graph (, )][DBLP]


  35. On Race Vulnerabilities in Web Applications. [Citation Graph (, )][DBLP]


  36. Conqueror: Tamper-Proof Code Execution on Legacy Systems. [Citation Graph (, )][DBLP]


  37. A Framework for Behavior-Based Malware Analysis in the Cloud. [Citation Graph (, )][DBLP]


  38. N-version disassembly: differential testing of x86 disassemblers. [Citation Graph (, )][DBLP]


  39. Testing system virtual machines. [Citation Graph (, )][DBLP]


  40. Testing CPU emulators. [Citation Graph (, )][DBLP]


  41. An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. [Citation Graph (, )][DBLP]


  42. Diversified Process Replicæ for Defeating Memory Error Exploits. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002