|
Search the dblp DataBase
Chiara Bodei:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Pierpaolo Degano, Francesca Levi, Chiara Bodei
Safe Ambients: Control Flow Analysis and Security. [Citation Graph (0, 0)][DBLP] ASIAN, 2000, pp:199-214 [Conf]
- Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Control Flow Analysis for the pi-calculus. [Citation Graph (0, 0)][DBLP] CONCUR, 1998, pp:84-98 [Conf]
- Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Automatic Validation of Protocol Narration. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:126-140 [Conf]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
Authentication via Localized Names. [Citation Graph (0, 0)][DBLP] CSFW, 1999, pp:98-110 [Conf]
- Francesca Levi, Chiara Bodei
A Control Flow Analysis for Safe and Boxed Ambients. [Citation Graph (0, 0)][DBLP] ESOP, 2004, pp:188-203 [Conf]
- Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Static Analysis of Processes for No and Read-Up nad No Write-Down. [Citation Graph (0, 0)][DBLP] FoSSaCS, 1999, pp:120-134 [Conf]
- Chiara Bodei, Pierpaolo Degano, Corrado Priami
Mobile Processes with a Distributed Environment. [Citation Graph (0, 0)][DBLP] ICALP, 1996, pp:490-501 [Conf]
- Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
On Evaluating the Performance of Security Protocols. [Citation Graph (0, 0)][DBLP] PaCT, 2005, pp:1-15 [Conf]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
Authentication Primitives for Protocol Specifications. [Citation Graph (0, 0)][DBLP] PaCT, 2003, pp:49-65 [Conf]
- Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Static Analysis for Secrecy and Non-interference in Networks of Processes. [Citation Graph (0, 0)][DBLP] PaCT, 2001, pp:27-41 [Conf]
- Chiara Bodei, Pierpaolo Degano, Corrado Priami
Constructing Specific SOS Semantics for Concurrency via Abstract Interpretation. [Citation Graph (0, 0)][DBLP] SAS, 1998, pp:168-183 [Conf]
- Chiara Bodei, Corrado Priami
True Concurrency via Abstract Interpretation. [Citation Graph (0, 0)][DBLP] SAS, 1997, pp:202-216 [Conf]
- Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Security Analysis using Flow Logics. [Citation Graph (0, 0)][DBLP] Bulletin of the EATCS, 2000, v:70, n:, pp:112-130 [Journal]
- Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
Performance Evaluation of Security Protocols Specified in LySa. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:112, n:, pp:167-189 [Journal]
- Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami
A Quantitative Study of Two Attacks. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:65-85 [Journal]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Techniques for Security Checking: Non-Interference vs Control Flow Analysis. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
Authentication primitives for secure protocol specifications. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2005, v:21, n:4, pp:645-653 [Journal]
- Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Flow logic for Dolev-Yao secrecy in cryptographic processes. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2002, v:18, n:6, pp:747-756 [Journal]
- Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Static Analysis for the pi-Calculus with Applications to Security. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2001, v:168, n:1, pp:68-92 [Journal]
- Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Static validation of security protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:347-390 [Journal]
- Chiara Bodei, Pierpaolo Degano, Corrado Priami
Checking security policies through an enhanced Control Flow Analysis. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:49-85 [Journal]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
Primitives for authentication in process algebras. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2002, v:283, n:2, pp:271-304 [Journal]
- Chiara Bodei, Pierpaolo Degano, Corrado Priami
Names of the -calculus agents handled locally. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2001, v:253, n:2, pp:155-184 [Journal]
- Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:150-165 [Conf]
- Anna Bernasconi, Chiara Bodei, Linda Pagli
Knitting for Fun: A Recursive Sweater. [Citation Graph (0, 0)][DBLP] FUN, 2007, pp:53-65 [Conf]
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols. [Citation Graph (, )][DBLP]
Static Detection of Logic Flaws in Service-Oriented Applications. [Citation Graph (, )][DBLP]
Choreography Rehearsal. [Citation Graph (, )][DBLP]
On deducing causality in metabolic networks. [Citation Graph (, )][DBLP]
A Taxonomy of Causality-Based Biological Properties [Citation Graph (, )][DBLP]
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags. [Citation Graph (, )][DBLP]
A Static Analysis for Beta-Binders. [Citation Graph (, )][DBLP]
Control Flow Analysis for Brane Calculi. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.005secs
|