The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Giampaolo Bella: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Giampaolo Bella, Elvinia Riccobene
    A Realistic Environment for Crypto-Protocol Analyses by ASMs. [Citation Graph (0, 0)][DBLP]
    Workshop on Abstract State Machines, 1998, pp:127-138 [Conf]
  2. Giampaolo Bella, Lawrence C. Paulson
    Mechanising BAN Kerberos by the Inductive Method. [Citation Graph (0, 0)][DBLP]
    CAV, 1998, pp:416-427 [Conf]
  3. Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci
    The verification of an industrial payment protocol: the SET purchase phase. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:12-20 [Conf]
  4. Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene
    Locating Mobile Nodes Within Logical Networks. [Citation Graph (0, 0)][DBLP]
    PSC, 2005, pp:54-62 [Conf]
  5. Sebastiano Battiato, Giampaolo Bella, Salvatore Riccobene
    Should We Prove Security Policies Correct? [Citation Graph (0, 0)][DBLP]
    EGCDMAS, 2004, pp:56-65 [Conf]
  6. Giampaolo Bella
    Mechanising a Protocol for Smart Cards. [Citation Graph (0, 0)][DBLP]
    E-smart, 2001, pp:19-33 [Conf]
  7. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
    Formal Verification of Cardholder Registration in SET. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:159-174 [Conf]
  8. Giampaolo Bella, Lawrence C. Paulson
    Kerberos Version 4: Inductive Analysis of the Secrecy Goals. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:361-375 [Conf]
  9. Giampaolo Bella, Stefano Bistarelli
    Soft Constraints for Security Protocol Analysis: Confidentiality. [Citation Graph (0, 0)][DBLP]
    PADL, 2001, pp:108-122 [Conf]
  10. Giampaolo Bella
    Interactive simulation of security policies. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:247-252 [Conf]
  11. Giampaolo Bella
    Availability of Protocol Goals. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:312-317 [Conf]
  12. Giampaolo Bella, Ronaldo Menezes
    Computer Security Track Editorial. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:280-281 [Conf]
  13. Giampaolo Bella, Ronaldo Menezes, James A. Whittaker
    Editorial Message: special track on computer security. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:194-195 [Conf]
  14. Giampaolo Bella, Peter Ryan
    Editoral message: special track on computer security. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:373-374 [Conf]
  15. Giampaolo Bella, Peter Y. A. Ryan
    Special track on computer security. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:304-305 [Conf]
  16. Giampaolo Bella, Peter Y. A. Ryan
    Editorial message: special track on computer security. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:321-322 [Conf]
  17. Giampaolo Bella
    Lack of Explicitness Strikes Back. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:87-93 [Conf]
  18. Giampaolo Bella
    Lack of Explicitness Strikes Back (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:94-99 [Conf]
  19. Giampaolo Bella
    A Protocol's Life After Attacks... (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:11-18 [Conf]
  20. Giampaolo Bella
    Modelling Agents' Knowledge Inductively. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:85-94 [Conf]
  21. Giampaolo Bella, Stefano Bistarelli
    Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:104-119 [Conf]
  22. Giampaolo Bella, Stefano Bistarelli, Fabio Massacci
    A Protocol's Life After Attacks.... [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:3-10 [Conf]
  23. Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli
    Biometrics to Enhance Smartcard Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:324-332 [Conf]
  24. Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson
    Is the Verification Problem for Cryptographic Protocols Solved?. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:183-189 [Conf]
  25. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
    Making Sense of Specifications: The Formalization of SET. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:74-81 [Conf]
  26. Giampaolo Bella, Lawrence C. Paulson
    A Proof of Non-repudiation. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:119-125 [Conf]
  27. Giampaolo Bella, Lawrence C. Paulson
    Analyzing Delegation Properties. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:120-127 [Conf]
  28. Giampaolo Bella, Lawrence C. Paulson
    Mechanical Proofs about a Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2001, pp:91-104 [Conf]
  29. Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson
    Verifying Second-Level Security Protocols. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2003, pp:352-366 [Conf]
  30. Giampaolo Bella, Stefano Bistarelli
    Information Assurance for security protocols. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:4, pp:322-333 [Journal]
  31. Giampaolo Bella, Ronaldo Menezes
    Special Issue: Computer Security. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 2004, v:16, n:11, pp:1061- [Journal]
  32. Giampaolo Bella, Stefano Bistarelli
    Soft Constraint Programming to Analysing Security Protocols [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  33. Giampaolo Bella, Stefano Bistarelli, Simon N. Foley
    Soft Constraints for Security. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:11-29 [Journal]
  34. Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene
    Distributed Backup through Information Dispersal. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:63-77 [Journal]
  35. Giampaolo Bella, Stefano Bistarelli, Pamela Peretti, Salvatore Riccobene
    Augmented Risk Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:207-220 [Journal]
  36. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson
    An overview of the verification of SET. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:17-28 [Journal]
  37. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson
    Verifying the SET Purchase Protocols. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2006, v:36, n:1-2, pp:5-37 [Journal]
  38. Giampaolo Bella
    Inductive Verification of Smart Card Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:1, pp:87-132 [Journal]
  39. Giampaolo Bella, Peter Y. A. Ryan
    Guest Editors' preface. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:5, pp:697-0 [Journal]
  40. Giampaolo Bella, Elvinia Riccobene
    Formal Analysis of the Kerberos Authentication System. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1997, v:3, n:12, pp:1337-1381 [Journal]
  41. Giampaolo Bella, Lawrence C. Paulson
    Accountability protocols: Formalized and verified. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:2, pp:138-161 [Journal]
  42. Giampaolo Bella, Stefano Bistarelli
    Soft Constraint Programming to Analysing Security Protocols. [Citation Graph (0, 0)][DBLP]
    TPLP, 2004, v:4, n:5-6, pp:545-572 [Journal]

  43. Formal Analysis of the Genetic Toggle. [Citation Graph (, )][DBLP]


  44. Validating Security Protocols under the General Attacker. [Citation Graph (, )][DBLP]


  45. Special track on Computer Security: editorial message. [Citation Graph (, )][DBLP]


  46. Managing Reputation over MANETs. [Citation Graph (, )][DBLP]


  47. Realistic Threats to Self-Enforcing Privacy. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002