|
Search the dblp DataBase
Riccardo Focardi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi
Transforming Processes to Check and Ensure Information Flow Security. [Citation Graph (0, 0)][DBLP] AMAST, 2002, pp:271-286 [Conf]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Message Authentication through Non Interference. [Citation Graph (0, 0)][DBLP] AMAST, 2000, pp:258-272 [Conf]
- Michele Bugliesi, Riccardo Focardi, Matteo Maffei
Authenticity by tagging and typing. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:1-12 [Conf]
- Antonio Durante, Riccardo Focardi, Roberto Gorrieri
CVS: A Compiler for the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 1999, pp:203-212 [Conf]
- Riccardo Focardi
Comparing Two Information Flow Security Properties. [Citation Graph (0, 0)][DBLP] CSFW, 1996, pp:116-122 [Conf]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Information Flow Analysis in a Discrete-Time Process Algebra. [Citation Graph (0, 0)][DBLP] CSFW, 2000, pp:170-184 [Conf]
- Riccardo Focardi, Roberto Gorrieri, V. Panini
The security checker: a semantics-based tool for the verification of security properties. [Citation Graph (0, 0)][DBLP] CSFW, 1995, pp:60-69 [Conf]
- Riccardo Focardi, Sabina Rossi
Information Flow Security in Dynamic Contexts. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:307-319 [Conf]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
Authentication via Localized Names. [Citation Graph (0, 0)][DBLP] CSFW, 1999, pp:98-110 [Conf]
- Michele Bugliesi, Riccardo Focardi, Matteo Maffei
Analysis of Typed Analyses of Authentication Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:112-125 [Conf]
- Riccardo Focardi, Roberto Gorrieri
A Taxonomy of Security Properties for CCS. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:126-136 [Conf]
- Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows
Panel Introduction: Varieties of Authentication. [Citation Graph (0, 0)][DBLP] CSFW, 1998, pp:79-82 [Conf]
- Michele Bugliesi, Riccardo Focardi, Matteo Maffei
Principles for Entity Authentication. [Citation Graph (0, 0)][DBLP] Ershov Memorial Conference, 2003, pp:294-306 [Conf]
- Michele Bugliesi, Riccardo Focardi, Matteo Maffei
Compositional Analysis of Authentication Protocols. [Citation Graph (0, 0)][DBLP] ESOP, 2004, pp:140-154 [Conf]
- Riccardo Focardi, Fabio Martinelli
A Uniform Approach for the Definition of Security Properties. [Citation Graph (0, 0)][DBLP] World Congress on Formal Methods, 1999, pp:794-813 [Conf]
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi
Control Flow Analysis of Mobile Ambients with Security Boundaries. [Citation Graph (0, 0)][DBLP] FMOODS, 2002, pp:197-212 [Conf]
- Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi, Vladimiro Sassone
A Survey of Name-Passing Calculi and Crypto-Primitives. [Citation Graph (0, 0)][DBLP] FOSAD, 2002, pp:91-138 [Conf]
- Riccardo Focardi
Static Analysis of Authentication. [Citation Graph (0, 0)][DBLP] FOSAD, 2004, pp:109-132 [Conf]
- Riccardo Focardi, Roberto Gorrieri
Classification of Security Properties (Part I: Information Flow). [Citation Graph (0, 0)][DBLP] FOSAD, 2000, pp:331-396 [Conf]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Classification of Security Properties - Part II: Network Security. [Citation Graph (0, 0)][DBLP] FOSAD, 2002, pp:139-185 [Conf]
- Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
Bridging Language-Based and Process Calculi Security. [Citation Graph (0, 0)][DBLP] FoSSaCS, 2005, pp:299-315 [Conf]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Non Interference for the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] ICALP, 2000, pp:354-372 [Conf]
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Steffen van Bakel
Boundary Inference for Enforcing Security Policies in Mobile Ambients. [Citation Graph (0, 0)][DBLP] IFIP TCS, 2002, pp:383-395 [Conf]
- Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi
A Proof System for Information Flow Security. [Citation Graph (0, 0)][DBLP] LOPSTR, 2002, pp:199-218 [Conf]
- Antonio Durante, Riccardo Focardi, Roberto Gorrieri
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2001, pp:287-299 [Conf]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
Authentication Primitives for Protocol Specifications. [Citation Graph (0, 0)][DBLP] PaCT, 2003, pp:49-65 [Conf]
- Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi
Refinement Operators and Information Flow Security. [Citation Graph (0, 0)][DBLP] SEFM, 2003, pp:44-53 [Conf]
- Chiara Braghin, Agostino Cortesi, Stefano Filippone, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza
BANANA - A Tool for Boundary Ambients Nesting ANAlysis. [Citation Graph (0, 0)][DBLP] TACAS, 2003, pp:437-441 [Conf]
- Riccardo Focardi, Roberto Gorrieri
Automatic Compositional Verification of Some Security Properties. [Citation Graph (0, 0)][DBLP] TACAS, 1996, pp:167-186 [Conf]
- Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi
Bisimulation and Unwinding for Verifying Possibilistic Security Properties. [Citation Graph (0, 0)][DBLP] VMCAI, 2003, pp:223-237 [Conf]
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza
Complexity of Nesting Analysis in Mobile Ambients. [Citation Graph (0, 0)][DBLP] VMCAI, 2003, pp:86-101 [Conf]
- Riccardo Focardi, Carla Piazza, Sabina Rossi
Proofs Methods for Bisimulation Based Information Flow Security. [Citation Graph (0, 0)][DBLP] VMCAI, 2002, pp:16-31 [Conf]
- Agostino Cortesi, Riccardo Focardi
Computer languages and security. [Citation Graph (0, 0)][DBLP] Comput. Lang., 2002, v:28, n:1, pp:1-2 [Journal]
- Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi
Verifying persistent security properties. [Citation Graph (0, 0)][DBLP] Computer Languages, Systems & Structures, 2004, v:30, n:3-4, pp:231-258 [Journal]
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi
Security boundaries in mobile ambients. [Citation Graph (0, 0)][DBLP] Comput. Lang., 2002, v:28, n:1, pp:101-127 [Journal]
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza
Nesting analysis of mobile ambients. [Citation Graph (0, 0)][DBLP] Computer Languages, Systems & Structures, 2004, v:30, n:3-4, pp:207-230 [Journal]
- Riccardo Focardi, Flaminia L. Luccio
A modular approach to Sprouts. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2004, v:144, n:3, pp:303-319 [Journal]
- Annalisa Bossi, Riccardo Focardi, Damiano Macedonio, Carla Piazza, Sabina Rossi
Unwinding in Information Flow Security. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:127-154 [Journal]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Techniques for Security Checking: Non-Interference vs Control Flow Analysis. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi
Information Leakage Detection in Boundary Ambients. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2003, v:78, n:, pp:- [Journal]
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:319-337 [Journal]
- Agostino Cortesi, Riccardo Focardi
Information Flow Security in Mobile Ambients. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:54, n:, pp:- [Journal]
- Riccardo Focardi, Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci
Formal Models of Timing Attacks on Web Privacy. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Secrecy in Security Protocols as Non Interference. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
- Riccardo Focardi, Matteo Maffei
The rho-spi Calculus at Work: Authentication Case Studies. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:267-293 [Journal]
- Riccardo Focardi, Gianluigi Zavattaro
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2003, v:85, n:3, pp:- [Journal]
- Riccardo Focardi, Gianluigi Zavattaro
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:128, n:5, pp:1-2 [Journal]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
Authentication primitives for secure protocol specifications. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2005, v:21, n:4, pp:645-653 [Journal]
- Riccardo Focardi, Flaminia L. Luccio, David Peleg
Feedback vertex set in hypercubes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2000, v:76, n:1-2, pp:1-5 [Journal]
- Riccardo Focardi
Guest editor's preface. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:345-0 [Journal]
- Riccardo Focardi, Roberto Gorrieri
A Taxonomy of Security Properties for Process Algebras. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1995, v:3, n:1, pp:5-34 [Journal]
- Riccardo Focardi, Sabina Rossi
Information flow security in dynamic contexts. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2006, v:14, n:1, pp:65-110 [Journal]
- Riccardo Focardi
Preface. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2006, v:14, n:2, pp:111- [Journal]
- Riccardo Focardi, Roberto Lucchi, Gianluigi Zavattaro
Secure shared data-space coordination languages: A process algebraic survey. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2006, v:63, n:1, pp:3-15 [Journal]
- Riccardo Focardi, Gianluigi Zavattaro
Guest editor's introduction: Special issue on security issues in coordination models, languages, and systems. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2006, v:63, n:1, pp:1-2 [Journal]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
Primitives for authentication in process algebras. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2002, v:283, n:2, pp:271-304 [Journal]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
A comparison of three authentication properties. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:291, n:3, pp:285-327 [Journal]
- Antonio Durante, Riccardo Focardi, Roberto Gorrieri
A compiler for analyzing cryptographic protocols using noninterference. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:488-528 [Journal]
- Riccardo Focardi, Roberto Gorrieri
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1997, v:23, n:9, pp:550-571 [Journal]
A calculus of challenges and responses. [Citation Graph (, )][DBLP]
Language Based Secure Communication. [Citation Graph (, )][DBLP]
Type-Based Analysis of PIN Processing APIs. [Citation Graph (, )][DBLP]
Information flow security of multi-threaded distributed programs. [Citation Graph (, )][DBLP]
Inferring authentication tags. [Citation Graph (, )][DBLP]
Cracking Bank PINs by Playing Mastermind. [Citation Graph (, )][DBLP]
Blunting Differential Attacks on PIN Processing APIs. [Citation Graph (, )][DBLP]
Security Abstractions and Intruder Models (Extended Abstract). [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.646secs
|