|
Search the dblp DataBase
Paolo Maggi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Paolo Maggi, Riccardo Sisto
A configurable mobile agent data protection protocol. [Citation Graph (0, 0)][DBLP] AAMAS, 2003, pp:851-858 [Conf]
- Xavier Hannotin, Paolo Maggi, Riccardo Sisto
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. [Citation Graph (0, 0)][DBLP] Mobile Agents, 2001, pp:42-53 [Conf]
- Paolo Maggi, Riccardo Sisto
Using Data Flow Analysis to Infer Type Information in Java Bytecode. [Citation Graph (0, 0)][DBLP] SCAM, 2001, pp:213-0 [Conf]
- Paolo Maggi, Riccardo Sisto
Using SPIN to Verify Security Properties of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] SPIN, 2002, pp:187-204 [Conf]
- Xavier Hannotin, Paolo Maggi, Riccardo Sisto
Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study. [Citation Graph (0, 0)][DBLP] WOA, 2001, pp:36-41 [Conf]
- Paolo Maggi, Riccardo Sisto
Experiments on Formal Verification of Mobile Agent Data Integrity Properties. [Citation Graph (0, 0)][DBLP] WOA, 2002, pp:131-136 [Conf]
- Luigi Ciminiera, Paolo Maggi, Riccardo Sisto
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2004, v:72, n:3, pp:367-376 [Journal]
- Luigi Ciminiera, Paolo Maggi, Riccardo Sisto
SCARAB: Innovative Services Supporting User and Terminal Mobility. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2001, pp:487-493 [Conf]
Vulnerability Modelling for the Analysis of Network Attacks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|