The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Riccardo Sisto: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Claudio Demartini, Riccardo Sisto
    A Java-based Formal Development Environment for Factory Communication Systems. [Citation Graph (0, 0)][DBLP]
    ACSD, 1998, pp:273-281 [Conf]
  2. Davide Pozza, Riccardo Sisto, Luca Durante
    Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:400-405 [Conf]
  3. Paolo Maggi, Riccardo Sisto
    A configurable mobile agent data protection protocol. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2003, pp:851-858 [Conf]
  4. Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
    Exploiting Symmetries for Testing Equivalence in the Spi Calculus. [Citation Graph (0, 0)][DBLP]
    ATVA, 2004, pp:135-149 [Conf]
  5. Davide Pozza, Riccardo Sisto, Luca Durante, Adriano Valenzano
    Comparing lexical analysis tools for buffer overflow detection in network software. [Citation Graph (0, 0)][DBLP]
    COMSWARE, 2006, pp:- [Conf]
  6. Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
    Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:69-84 [Conf]
  7. Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
    Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    FORTE, 2003, pp:224-239 [Conf]
  8. Luca Durante, Riccardo Sisto, Adriano Valenzano
    A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification. [Citation Graph (0, 0)][DBLP]
    FORTE, 2000, pp:155-170 [Conf]
  9. Riccardo Sisto, Luigi Ciminiera, Adriano Valenzano
    Probabilistic Characterization of Algebraic Protocol Specifications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1992, pp:260-268 [Conf]
  10. Xavier Hannotin, Paolo Maggi, Riccardo Sisto
    Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 2001, pp:42-53 [Conf]
  11. Marco Ajmone Marsan, Andrea Bianco, Luigi Ciminiera, Riccardo Sisto, Adriano Valenzano
    Integrating Peforamnce Analysis in the Context of LOTOS-Based Design. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1994, pp:292-298 [Conf]
  12. Claudio Demartini, Riccardo Sisto
    Static Analysis of Java Multithreaded and Distributed Applications. [Citation Graph (0, 0)][DBLP]
    PDSE, 1998, pp:215-222 [Conf]
  13. Riccardo Sisto
    A method to build symbolic representations of LOTOS specifications. [Citation Graph (0, 0)][DBLP]
    PSTV, 1995, pp:331-346 [Conf]
  14. Paolo Maggi, Riccardo Sisto
    Using Data Flow Analysis to Infer Type Information in Java Bytecode. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:213-0 [Conf]
  15. Radu Iosif, Riccardo Sisto
    Temporal Logic Properties of Java Objects. [Citation Graph (0, 0)][DBLP]
    SEKE, 2001, pp:120-127 [Conf]
  16. Luca Durante, Riccardo Sisto, Adriano Valenzano
    A LOTOS specification of the SERCOS field-bus protocol. [Citation Graph (0, 0)][DBLP]
    SEKE, 1994, pp:139-147 [Conf]
  17. Adriano Valenzano, Riccardo Sisto, Luigi Ciminiera
    Modeling the execution of LOTOS specifications by cooperating extended finite state machines. [Citation Graph (0, 0)][DBLP]
    SPDP, 1990, pp:780-785 [Conf]
  18. Radu Iosif, Riccardo Sisto
    Using Garbage Collection in Model Checking. [Citation Graph (0, 0)][DBLP]
    SPIN, 2000, pp:20-33 [Conf]
  19. Flavio Lerda, Riccardo Sisto
    Distributed-Memory Model Checking with SPIN. [Citation Graph (0, 0)][DBLP]
    SPIN, 1999, pp:22-39 [Conf]
  20. Claudio Demartini, Radu Iosif, Riccardo Sisto
    dSPIN: A Dynamic Extension of SPIN. [Citation Graph (0, 0)][DBLP]
    SPIN, 1999, pp:261-276 [Conf]
  21. Paolo Maggi, Riccardo Sisto
    Using SPIN to Verify Security Properties of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    SPIN, 2002, pp:187-204 [Conf]
  22. Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
    A New Knowledge Representation Strategy for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    TACAS, 2003, pp:284-298 [Conf]
  23. Xavier Hannotin, Paolo Maggi, Riccardo Sisto
    Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study. [Citation Graph (0, 0)][DBLP]
    WOA, 2001, pp:36-41 [Conf]
  24. Paolo Maggi, Riccardo Sisto
    Experiments on Formal Verification of Mobile Agent Data Integrity Properties. [Citation Graph (0, 0)][DBLP]
    WOA, 2002, pp:131-136 [Conf]
  25. Riccardo Sisto
    Using binary decision diagrams for representation and analysis of communication protocols. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:32, n:1, pp:81-98 [Journal]
  26. Gianluca Cena, Luca Durante, Riccardo Sisto, Adriano Valenzano
    Adaptive bandwidth balancing mechanisms for DQDB networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:9, pp:804-819 [Journal]
  27. Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
    Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:4, pp:815-832 [Journal]
  28. Luigi Ciminiera, Paolo Maggi, Riccardo Sisto
    Implementing innovative services supporting user and terminal mobility: the SCARAB architecture. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:72, n:3, pp:367-376 [Journal]
  29. Radu Iosif, Riccardo Sisto
    Temporal logic properties of Java objects. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:68, n:3, pp:243-251 [Journal]
  30. Claudio Demartini, Radu Iosif, Riccardo Sisto
    A Deadlock Detection Tool for Concurrent Java Programs. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1999, v:29, n:7, pp:577-603 [Journal]
  31. Adriano Valenzano, Riccardo Sisto, Luigi Ciminiera
    Rapid Prototyping of Protocols from LOTOS Specifications. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1993, v:23, n:1, pp:31-54 [Journal]
  32. Riccardo Sisto, Luigi Ciminiera, Adriano Valenzano
    A Protocol for Multirendezvous of LOTOS Processes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1991, v:40, n:4, pp:437-447 [Journal]
  33. Riccardo Sisto, Adriano Valenzano
    Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behavior Expressions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:12, pp:1361-1370 [Journal]
  34. Marco Ajmone Marsan, Andrea Bianco, Luigi Ciminiera, Riccardo Sisto, Adriano Valenzano
    A LOTOS extension for the performance analysis of distributed systems. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1994, v:2, n:2, pp:151-165 [Journal]
  35. Luca Durante, Riccardo Sisto, Adriano Valenzano
    Automatic testing equivalence verification of spi calculus specifications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2003, v:12, n:2, pp:222-284 [Journal]
  36. M. Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
    Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2007, pp:11-18 [Conf]
  37. M. Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
    Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2007, pp:153-160 [Conf]
  38. Luigi Ciminiera, Paolo Maggi, Riccardo Sisto
    SCARAB: Innovative Services Supporting User and Terminal Mobility. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2001, pp:487-493 [Conf]

  39. A Lightweight Security Analyzer inside GCC. [Citation Graph (, )][DBLP]


  40. Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. [Citation Graph (, )][DBLP]


  41. Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models. [Citation Graph (, )][DBLP]


  42. Vulnerability Modelling for the Analysis of Network Attacks. [Citation Graph (, )][DBLP]


  43. Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code. [Citation Graph (, )][DBLP]


  44. An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation. [Citation Graph (, )][DBLP]


  45. Provably correct Java implementations of Spi Calculus security protocols specifications. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002