The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Luca Martini: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nicoletta De Francesco, Luca Martini
    Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:63-80 [Conf]
  2. Cinzia Bernardeschi, Nicoletta De Francesco, Luca Martini
    Efficient Bytecode Verification Using Immediate Postdominators in Control Flow Graphs: Extended Abstract. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:425-436 [Conf]
  3. Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci
    Using Control Dependencies for Space-Aware Bytecode Verification. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2006, v:49, n:2, pp:234-248 [Journal]
  4. Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci
    A Space-Aware Bytecode Verifier for Java Cards. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:237-254 [Journal]
  5. Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci
    Using postdomination to reduce space requirements of data flow analysis. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:98, n:1, pp:11-18 [Journal]
  6. Cinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini
    Checking secure information flow in Java bytecode by code transformation and standard bytecode verification. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2004, v:34, n:13, pp:1225-1255 [Journal]
  7. Cinzia Bernardeschi, Luca Martini
    Enforcement of applet boundaries in Java card systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:96-101 [Conf]
  8. Cinzia Bernardeschi, Luca Martini, Paolo Masci
    Java bytecode verification with dynamic structures. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:559-564 [Conf]
  9. Nicoletta De Francesco, Luca Martini
    Instruction-level security analysis for information flow in stack-based assembly languages. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2007, v:205, n:9, pp:1334-1370 [Journal]
  10. Nicoletta De Francesco, Luca Martini
    Instruction-level security typing by abstract interpretation. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:85-106 [Journal]

  11. Celer: an Efficient Program for Genotype Elimination [Citation Graph (, )][DBLP]


Search in 0.214secs, Finished in 0.215secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002