|
Search the dblp DataBase
Ivan Cibrario Bertolotti:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Exploiting Symmetries for Testing Equivalence in the Spi Calculus. [Citation Graph (0, 0)][DBLP] ATVA, 2004, pp:135-149 [Conf]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:69-84 [Conf]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] FORTE, 2003, pp:224-239 [Conf]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] TACAS, 2003, pp:284-298 [Conf]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus. [Citation Graph (0, 0)][DBLP] Int. J. Found. Comput. Sci., 2006, v:17, n:4, pp:815-832 [Journal]
- M. Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems. [Citation Graph (0, 0)][DBLP] DepCoS-RELCOMEX, 2007, pp:11-18 [Conf]
- M. Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] DepCoS-RELCOMEX, 2007, pp:153-160 [Conf]
- Gianluca Cena, Ivan Cibrario Bertolotti, Adriano Valenzano
Modelling CANopen communications according to the socket paradigm. [Citation Graph (0, 0)][DBLP] ETFA, 2005, pp:- [Conf]
Search in 0.001secs, Finished in 0.002secs
|