The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matteo Maffei: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Authenticity by tagging and typing. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:1-12 [Conf]
  2. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Analysis of Typed Analyses of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:112-125 [Conf]
  3. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Principles for Entity Authentication. [Citation Graph (0, 0)][DBLP]
    Ershov Memorial Conference, 2003, pp:294-306 [Conf]
  4. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Compositional Analysis of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ESOP, 2004, pp:140-154 [Conf]
  5. Riccardo Focardi, Matteo Maffei
    The rho-spi Calculus at Work: Authentication Case Studies. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:267-293 [Journal]
  6. Matteo Maffei
    Tags for Multi-Protocol Authentication. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:128, n:5, pp:55-63 [Journal]

  7. The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. [Citation Graph (, )][DBLP]


  8. A calculus of challenges and responses. [Citation Graph (, )][DBLP]


  9. Type-checking zero-knowledge. [Citation Graph (, )][DBLP]


  10. Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. [Citation Graph (, )][DBLP]


  11. Causality-based Abstraction of Multiplicity in Security Protocols. [Citation Graph (, )][DBLP]


  12. Achieving Security Despite Compromise Using Zero-knowledge. [Citation Graph (, )][DBLP]


  13. Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. [Citation Graph (, )][DBLP]


  14. Anonymity and Censorship Resistance in Unstructured Overlay Networks. [Citation Graph (, )][DBLP]


  15. Anonymous Webs of Trust. [Citation Graph (, )][DBLP]


  16. Anonymous and censorship resistant content sharing in unstructured overlays. [Citation Graph (, )][DBLP]


  17. Brief announcement: anonymity and trust in distributed systems. [Citation Graph (, )][DBLP]


  18. Inferring authentication tags. [Citation Graph (, )][DBLP]


  19. Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002