The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chiara Bodei: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pierpaolo Degano, Francesca Levi, Chiara Bodei
    Safe Ambients: Control Flow Analysis and Security. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2000, pp:199-214 [Conf]
  2. Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Control Flow Analysis for the pi-calculus. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1998, pp:84-98 [Conf]
  3. Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Automatic Validation of Protocol Narration. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:126-140 [Conf]
  4. Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
    Authentication via Localized Names. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:98-110 [Conf]
  5. Francesca Levi, Chiara Bodei
    A Control Flow Analysis for Safe and Boxed Ambients. [Citation Graph (0, 0)][DBLP]
    ESOP, 2004, pp:188-203 [Conf]
  6. Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Static Analysis of Processes for No and Read-Up nad No Write-Down. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 1999, pp:120-134 [Conf]
  7. Chiara Bodei, Pierpaolo Degano, Corrado Priami
    Mobile Processes with a Distributed Environment. [Citation Graph (0, 0)][DBLP]
    ICALP, 1996, pp:490-501 [Conf]
  8. Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
    On Evaluating the Performance of Security Protocols. [Citation Graph (0, 0)][DBLP]
    PaCT, 2005, pp:1-15 [Conf]
  9. Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
    Authentication Primitives for Protocol Specifications. [Citation Graph (0, 0)][DBLP]
    PaCT, 2003, pp:49-65 [Conf]
  10. Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Static Analysis for Secrecy and Non-interference in Networks of Processes. [Citation Graph (0, 0)][DBLP]
    PaCT, 2001, pp:27-41 [Conf]
  11. Chiara Bodei, Pierpaolo Degano, Corrado Priami
    Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation. [Citation Graph (0, 0)][DBLP]
    SAS, 1998, pp:168-183 [Conf]
  12. Chiara Bodei, Corrado Priami
    True Concurrency via Abstract Interpretation. [Citation Graph (0, 0)][DBLP]
    SAS, 1997, pp:202-216 [Conf]
  13. Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Security Analysis using Flow Logics. [Citation Graph (0, 0)][DBLP]
    Bulletin of the EATCS, 2000, v:70, n:, pp:112-130 [Journal]
  14. Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
    Performance Evaluation of Security Protocols Specified in LySa. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:112, n:, pp:167-189 [Journal]
  15. Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami
    A Quantitative Study of Two Attacks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:65-85 [Journal]
  16. Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    Techniques for Security Checking: Non-Interference vs Control Flow Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
  17. Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
    Authentication primitives for secure protocol specifications. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2005, v:21, n:4, pp:645-653 [Journal]
  18. Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Flow logic for Dolev-Yao secrecy in cryptographic processes. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2002, v:18, n:6, pp:747-756 [Journal]
  19. Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Static Analysis for the pi-Calculus with Applications to Security. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:168, n:1, pp:68-92 [Journal]
  20. Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Static validation of security protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:3, pp:347-390 [Journal]
  21. Chiara Bodei, Pierpaolo Degano, Corrado Priami
    Checking security policies through an enhanced Control Flow Analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:1, pp:49-85 [Journal]
  22. Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
    Primitives for authentication in process algebras. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:283, n:2, pp:271-304 [Journal]
  23. Chiara Bodei, Pierpaolo Degano, Corrado Priami
    Names of the -calculus agents handled locally. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:253, n:2, pp:155-184 [Journal]
  24. Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson
    A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:150-165 [Conf]
  25. Anna Bernasconi, Chiara Bodei, Linda Pagli
    Knitting for Fun: A Recursive Sweater. [Citation Graph (0, 0)][DBLP]
    FUN, 2007, pp:53-65 [Conf]

  26. A Formal Analysis of Complex Type Flaw Attacks on Security Protocols. [Citation Graph (, )][DBLP]


  27. Static Detection of Logic Flaws in Service-Oriented Applications. [Citation Graph (, )][DBLP]


  28. Choreography Rehearsal. [Citation Graph (, )][DBLP]


  29. On deducing causality in metabolic networks. [Citation Graph (, )][DBLP]


  30. A Taxonomy of Causality-Based Biological Properties [Citation Graph (, )][DBLP]


  31. Detecting and Preventing Type flaws: a Control Flow Analysis with Tags. [Citation Graph (, )][DBLP]


  32. A Static Analysis for Beta-Binders. [Citation Graph (, )][DBLP]


  33. Control Flow Analysis for Brane Calculi. [Citation Graph (, )][DBLP]


Search in 0.167secs, Finished in 0.169secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002