|
Search the dblp DataBase
Giampaolo Bella:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Giampaolo Bella, Elvinia Riccobene
A Realistic Environment for Crypto-Protocol Analyses by ASMs. [Citation Graph (0, 0)][DBLP] Workshop on Abstract State Machines, 1998, pp:127-138 [Conf]
- Giampaolo Bella, Lawrence C. Paulson
Mechanising BAN Kerberos by the Inductive Method. [Citation Graph (0, 0)][DBLP] CAV, 1998, pp:416-427 [Conf]
- Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci
The verification of an industrial payment protocol: the SET purchase phase. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:12-20 [Conf]
- Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene
Locating Mobile Nodes Within Logical Networks. [Citation Graph (0, 0)][DBLP] PSC, 2005, pp:54-62 [Conf]
- Sebastiano Battiato, Giampaolo Bella, Salvatore Riccobene
Should We Prove Security Policies Correct? [Citation Graph (0, 0)][DBLP] EGCDMAS, 2004, pp:56-65 [Conf]
- Giampaolo Bella
Mechanising a Protocol for Smart Cards. [Citation Graph (0, 0)][DBLP] E-smart, 2001, pp:19-33 [Conf]
- Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
Formal Verification of Cardholder Registration in SET. [Citation Graph (0, 0)][DBLP] ESORICS, 2000, pp:159-174 [Conf]
- Giampaolo Bella, Lawrence C. Paulson
Kerberos Version 4: Inductive Analysis of the Secrecy Goals. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:361-375 [Conf]
- Giampaolo Bella, Stefano Bistarelli
Soft Constraints for Security Protocol Analysis: Confidentiality. [Citation Graph (0, 0)][DBLP] PADL, 2001, pp:108-122 [Conf]
- Giampaolo Bella
Interactive simulation of security policies. [Citation Graph (0, 0)][DBLP] SAC, 2002, pp:247-252 [Conf]
- Giampaolo Bella
Availability of Protocol Goals. [Citation Graph (0, 0)][DBLP] SAC, 2003, pp:312-317 [Conf]
- Giampaolo Bella, Ronaldo Menezes
Computer Security Track Editorial. [Citation Graph (0, 0)][DBLP] SAC, 2003, pp:280-281 [Conf]
- Giampaolo Bella, Ronaldo Menezes, James A. Whittaker
Editorial Message: special track on computer security. [Citation Graph (0, 0)][DBLP] SAC, 2002, pp:194-195 [Conf]
- Giampaolo Bella, Peter Ryan
Editoral message: special track on computer security. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:373-374 [Conf]
- Giampaolo Bella, Peter Y. A. Ryan
Special track on computer security. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:304-305 [Conf]
- Giampaolo Bella, Peter Y. A. Ryan
Editorial message: special track on computer security. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:321-322 [Conf]
- Giampaolo Bella
Lack of Explicitness Strikes Back. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:87-93 [Conf]
- Giampaolo Bella
Lack of Explicitness Strikes Back (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:94-99 [Conf]
- Giampaolo Bella
A Protocol's Life After Attacks... (Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:11-18 [Conf]
- Giampaolo Bella
Modelling Agents' Knowledge Inductively. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:85-94 [Conf]
- Giampaolo Bella, Stefano Bistarelli
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:104-119 [Conf]
- Giampaolo Bella, Stefano Bistarelli, Fabio Massacci
A Protocol's Life After Attacks.... [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:3-10 [Conf]
- Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli
Biometrics to Enhance Smartcard Security. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:324-332 [Conf]
- Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson
Is the Verification Problem for Cryptographic Protocols Solved?. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:183-189 [Conf]
- Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
Making Sense of Specifications: The Formalization of SET. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:74-81 [Conf]
- Giampaolo Bella, Lawrence C. Paulson
A Proof of Non-repudiation. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:119-125 [Conf]
- Giampaolo Bella, Lawrence C. Paulson
Analyzing Delegation Properties. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:120-127 [Conf]
- Giampaolo Bella, Lawrence C. Paulson
Mechanical Proofs about a Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP] TPHOLs, 2001, pp:91-104 [Conf]
- Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson
Verifying Second-Level Security Protocols. [Citation Graph (0, 0)][DBLP] TPHOLs, 2003, pp:352-366 [Conf]
- Giampaolo Bella, Stefano Bistarelli
Information Assurance for security protocols. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:4, pp:322-333 [Journal]
- Giampaolo Bella, Ronaldo Menezes
Special Issue: Computer Security. [Citation Graph (0, 0)][DBLP] Concurrency - Practice and Experience, 2004, v:16, n:11, pp:1061- [Journal]
- Giampaolo Bella, Stefano Bistarelli
Soft Constraint Programming to Analysing Security Protocols [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- Giampaolo Bella, Stefano Bistarelli, Simon N. Foley
Soft Constraints for Security. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:11-29 [Journal]
- Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene
Distributed Backup through Information Dispersal. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:63-77 [Journal]
- Giampaolo Bella, Stefano Bistarelli, Pamela Peretti, Salvatore Riccobene
Augmented Risk Analysis. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:207-220 [Journal]
- Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson
An overview of the verification of SET. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:17-28 [Journal]
- Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson
Verifying the SET Purchase Protocols. [Citation Graph (0, 0)][DBLP] J. Autom. Reasoning, 2006, v:36, n:1-2, pp:5-37 [Journal]
- Giampaolo Bella
Inductive Verification of Smart Card Protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:1, pp:87-132 [Journal]
- Giampaolo Bella, Peter Y. A. Ryan
Guest Editors' preface. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:5, pp:697-0 [Journal]
- Giampaolo Bella, Elvinia Riccobene
Formal Analysis of the Kerberos Authentication System. [Citation Graph (0, 0)][DBLP] J. UCS, 1997, v:3, n:12, pp:1337-1381 [Journal]
- Giampaolo Bella, Lawrence C. Paulson
Accountability protocols: Formalized and verified. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:138-161 [Journal]
- Giampaolo Bella, Stefano Bistarelli
Soft Constraint Programming to Analysing Security Protocols. [Citation Graph (0, 0)][DBLP] TPLP, 2004, v:4, n:5-6, pp:545-572 [Journal]
Formal Analysis of the Genetic Toggle. [Citation Graph (, )][DBLP]
Validating Security Protocols under the General Attacker. [Citation Graph (, )][DBLP]
Special track on Computer Security: editorial message. [Citation Graph (, )][DBLP]
Managing Reputation over MANETs. [Citation Graph (, )][DBLP]
Realistic Threats to Self-Enforcing Privacy. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|