Search the dblp DataBase
Riccardo Sisto :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Claudio Demartini , Riccardo Sisto A Java-based Formal Development Environment for Factory Communication Systems. [Citation Graph (0, 0)][DBLP ] ACSD, 1998, pp:273-281 [Conf ] Davide Pozza , Riccardo Sisto , Luca Durante Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:400-405 [Conf ] Paolo Maggi , Riccardo Sisto A configurable mobile agent data protection protocol. [Citation Graph (0, 0)][DBLP ] AAMAS, 2003, pp:851-858 [Conf ] Ivan Cibrario Bertolotti , Luca Durante , Riccardo Sisto , Adriano Valenzano Exploiting Symmetries for Testing Equivalence in the Spi Calculus. [Citation Graph (0, 0)][DBLP ] ATVA, 2004, pp:135-149 [Conf ] Davide Pozza , Riccardo Sisto , Luca Durante , Adriano Valenzano Comparing lexical analysis tools for buffer overflow detection in network software. [Citation Graph (0, 0)][DBLP ] COMSWARE, 2006, pp:- [Conf ] Ivan Cibrario Bertolotti , Luca Durante , Riccardo Sisto , Adriano Valenzano Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. [Citation Graph (0, 0)][DBLP ] DIMVA, 2005, pp:69-84 [Conf ] Ivan Cibrario Bertolotti , Luca Durante , Riccardo Sisto , Adriano Valenzano Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] FORTE, 2003, pp:224-239 [Conf ] Luca Durante , Riccardo Sisto , Adriano Valenzano A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification. [Citation Graph (0, 0)][DBLP ] FORTE, 2000, pp:155-170 [Conf ] Riccardo Sisto , Luigi Ciminiera , Adriano Valenzano Probabilistic Characterization of Algebraic Protocol Specifications. [Citation Graph (0, 0)][DBLP ] ICDCS, 1992, pp:260-268 [Conf ] Xavier Hannotin , Paolo Maggi , Riccardo Sisto Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. [Citation Graph (0, 0)][DBLP ] Mobile Agents, 2001, pp:42-53 [Conf ] Marco Ajmone Marsan , Andrea Bianco , Luigi Ciminiera , Riccardo Sisto , Adriano Valenzano Integrating Peforamnce Analysis in the Context of LOTOS-Based Design. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1994, pp:292-298 [Conf ] Claudio Demartini , Riccardo Sisto Static Analysis of Java Multithreaded and Distributed Applications. [Citation Graph (0, 0)][DBLP ] PDSE, 1998, pp:215-222 [Conf ] Riccardo Sisto A method to build symbolic representations of LOTOS specifications. [Citation Graph (0, 0)][DBLP ] PSTV, 1995, pp:331-346 [Conf ] Paolo Maggi , Riccardo Sisto Using Data Flow Analysis to Infer Type Information in Java Bytecode. [Citation Graph (0, 0)][DBLP ] SCAM, 2001, pp:213-0 [Conf ] Radu Iosif , Riccardo Sisto Temporal Logic Properties of Java Objects. [Citation Graph (0, 0)][DBLP ] SEKE, 2001, pp:120-127 [Conf ] Luca Durante , Riccardo Sisto , Adriano Valenzano A LOTOS specification of the SERCOS field-bus protocol. [Citation Graph (0, 0)][DBLP ] SEKE, 1994, pp:139-147 [Conf ] Adriano Valenzano , Riccardo Sisto , Luigi Ciminiera Modeling the execution of LOTOS specifications by cooperating extended finite state machines. [Citation Graph (0, 0)][DBLP ] SPDP, 1990, pp:780-785 [Conf ] Radu Iosif , Riccardo Sisto Using Garbage Collection in Model Checking. [Citation Graph (0, 0)][DBLP ] SPIN, 2000, pp:20-33 [Conf ] Flavio Lerda , Riccardo Sisto Distributed-Memory Model Checking with SPIN. [Citation Graph (0, 0)][DBLP ] SPIN, 1999, pp:22-39 [Conf ] Claudio Demartini , Radu Iosif , Riccardo Sisto dSPIN: A Dynamic Extension of SPIN. [Citation Graph (0, 0)][DBLP ] SPIN, 1999, pp:261-276 [Conf ] Paolo Maggi , Riccardo Sisto Using SPIN to Verify Security Properties of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] SPIN, 2002, pp:187-204 [Conf ] Ivan Cibrario Bertolotti , Luca Durante , Riccardo Sisto , Adriano Valenzano A New Knowledge Representation Strategy for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] TACAS, 2003, pp:284-298 [Conf ] Xavier Hannotin , Paolo Maggi , Riccardo Sisto Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study. [Citation Graph (0, 0)][DBLP ] WOA, 2001, pp:36-41 [Conf ] Paolo Maggi , Riccardo Sisto Experiments on Formal Verification of Mobile Agent Data Integrity Properties. [Citation Graph (0, 0)][DBLP ] WOA, 2002, pp:131-136 [Conf ] Riccardo Sisto Using binary decision diagrams for representation and analysis of communication protocols. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:32, n:1, pp:81-98 [Journal ] Gianluca Cena , Luca Durante , Riccardo Sisto , Adriano Valenzano Adaptive bandwidth balancing mechanisms for DQDB networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:9, pp:804-819 [Journal ] Ivan Cibrario Bertolotti , Luca Durante , Riccardo Sisto , Adriano Valenzano Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2006, v:17, n:4, pp:815-832 [Journal ] Luigi Ciminiera , Paolo Maggi , Riccardo Sisto Implementing innovative services supporting user and terminal mobility: the SCARAB architecture. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:72, n:3, pp:367-376 [Journal ] Radu Iosif , Riccardo Sisto Temporal logic properties of Java objects. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2003, v:68, n:3, pp:243-251 [Journal ] Claudio Demartini , Radu Iosif , Riccardo Sisto A Deadlock Detection Tool for Concurrent Java Programs. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1999, v:29, n:7, pp:577-603 [Journal ] Adriano Valenzano , Riccardo Sisto , Luigi Ciminiera Rapid Prototyping of Protocols from LOTOS Specifications. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1993, v:23, n:1, pp:31-54 [Journal ] Riccardo Sisto , Luigi Ciminiera , Adriano Valenzano A Protocol for Multirendezvous of LOTOS Processes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1991, v:40, n:4, pp:437-447 [Journal ] Riccardo Sisto , Adriano Valenzano Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behavior Expressions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:12, pp:1361-1370 [Journal ] Marco Ajmone Marsan , Andrea Bianco , Luigi Ciminiera , Riccardo Sisto , Adriano Valenzano A LOTOS extension for the performance analysis of distributed systems. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1994, v:2, n:2, pp:151-165 [Journal ] Luca Durante , Riccardo Sisto , Adriano Valenzano Automatic testing equivalence verification of spi calculus specifications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 2003, v:12, n:2, pp:222-284 [Journal ] M. Cheminod , Ivan Cibrario Bertolotti , Luca Durante , Riccardo Sisto , Adriano Valenzano Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems. [Citation Graph (0, 0)][DBLP ] DepCoS-RELCOMEX, 2007, pp:11-18 [Conf ] M. Cheminod , Ivan Cibrario Bertolotti , Luca Durante , Riccardo Sisto , Adriano Valenzano Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] DepCoS-RELCOMEX, 2007, pp:153-160 [Conf ] Luigi Ciminiera , Paolo Maggi , Riccardo Sisto SCARAB: Innovative Services Supporting User and Terminal Mobility. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2001, pp:487-493 [Conf ] A Lightweight Security Analyzer inside GCC. [Citation Graph (, )][DBLP ] Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. [Citation Graph (, )][DBLP ] Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models. [Citation Graph (, )][DBLP ] Vulnerability Modelling for the Analysis of Network Attacks. [Citation Graph (, )][DBLP ] Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code. [Citation Graph (, )][DBLP ] An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation. [Citation Graph (, )][DBLP ] Provably correct Java implementations of Spi Calculus security protocols specifications. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.010secs