dblp.uni-trier.dewww.uni-trier.de

Riccardo Focardi Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
70EEMatteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel: Type-Based Analysis of PIN Processing APIs. ESORICS 2009: 53-68
69EERiccardo Focardi, Flaminia L. Luccio, Graham Steel: Blunting Differential Attacks on PIN Processing APIs. NordSec 2009: 88-103
68EEMichele Bugliesi, Riccardo Focardi: Security Abstractions and Intruder Models (Extended Abstract). Electr. Notes Theor. Comput. Sci. 242(1): 99-112 (2009)
2008
67EEMichele Bugliesi, Riccardo Focardi: Language Based Secure Communication. CSF 2008: 3-16
66EERiccardo Focardi, Matteo Centenaro: Information flow security of multi-threaded distributed programs. PLAS 2008: 113-124
65EEChiara Braghin, Agostino Cortesi, Riccardo Focardi: Information flow security in Boundary Ambients. Inf. Comput. 206(2-4): 460-489 (2008)
2007
64EEMichael Backes, Agostino Cortesi, Riccardo Focardi, Matteo Maffei: A calculus of challenges and responses. FMSE 2007: 51-60
63EEMichele Bugliesi, Riccardo Focardi, Matteo Maffei: Dynamic types for authentication. Journal of Computer Security 15(6): 563-617 (2007)
2006
62EERiccardo Focardi, Sabina Rossi: Information flow security in dynamic contexts. Journal of Computer Security 14(1): 65-110 (2006)
61EERiccardo Focardi: Preface. Journal of Computer Security 14(2): 111 (2006)
60EERiccardo Focardi, Gianluigi Zavattaro: Guest editor's introduction: Special issue on security issues in coordination models, languages, and systems. Sci. Comput. Program. 63(1): 1-2 (2006)
59EERiccardo Focardi, Roberto Lucchi, Gianluigi Zavattaro: Secure shared data-space coordination languages: A process algebraic survey. Sci. Comput. Program. 63(1): 3-15 (2006)
2005
58EEMichele Bugliesi, Riccardo Focardi, Matteo Maffei: Analysis of Typed Analyses of Authentication Protocols. CSFW 2005: 112-125
57EERiccardo Focardi, Sabina Rossi, Andrei Sabelfeld: Bridging Language-Based and Process Calculi Security. FoSSaCS 2005: 299-315
56EERiccardo Focardi, Matteo Maffei, Francesco Placella: Inferring authentication tags. WITS 2005: 41-49
55EERiccardo Focardi, Gianluigi Zavattaro: Preface. Electr. Notes Theor. Comput. Sci. 128(5): 1-2 (2005)
54EEChiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami: Authentication primitives for secure protocol specifications. Future Generation Comp. Syst. 21(4): 645-653 (2005)
53EERiccardo Focardi: Guest editor's preface. Journal of Computer Security 13(3): 345- (2005)
2004
52 Riccardo Focardi, Roberto Gorrieri: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures Springer 2004
51EEMichele Bugliesi, Riccardo Focardi, Matteo Maffei: Compositional Analysis of Authentication Protocols. ESOP 2004: 140-154
50EEMichele Bugliesi, Riccardo Focardi, Matteo Maffei: Authenticity by tagging and typing. FMSE 2004: 1-12
49EERiccardo Focardi: Static Analysis of Authentication. FOSAD 2004: 109-132
48EEChiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza: Nesting analysis of mobile ambients. Computer Languages, Systems & Structures 30(3-4): 207-230 (2004)
47EEAnnalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: Verifying persistent security properties. Computer Languages, Systems & Structures 30(3-4): 231-258 (2004)
46EERiccardo Focardi, Flaminia L. Luccio: A modular approach to Sprouts. Discrete Applied Mathematics 144(3): 303-319 (2004)
45EEAnnalisa Bossi, Riccardo Focardi, Damiano Macedonio, Carla Piazza, Sabina Rossi: Unwinding in Information Flow Security. Electr. Notes Theor. Comput. Sci. 99: 127-154 (2004)
44EERiccardo Focardi, Matteo Maffei: The rho-spi Calculus at Work: Authentication Case Studies. Electr. Notes Theor. Comput. Sci. 99: 267-293 (2004)
43EEChiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza: Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients. Electr. Notes Theor. Comput. Sci. 99: 319-337 (2004)
2003
42EEMichele Bugliesi, Riccardo Focardi, Matteo Maffei: Principles for Entity Authentication. Ershov Memorial Conference 2003: 294-306
41EEChiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami: Authentication Primitives for Protocol Specifications. PaCT 2003: 49-65
40EEAnnalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: Refinement Operators and Information Flow Security. SEFM 2003: 44-53
39EEChiara Braghin, Agostino Cortesi, Stefano Filippone, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza: BANANA - A Tool for Boundary Ambients Nesting ANAlysis. TACAS 2003: 437-441
38EEAnnalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: Bisimulation and Unwinding for Verifying Possibilistic Security Properties. VMCAI 2003: 223-237
37EEChiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza: Complexity of Nesting Analysis in Mobile Ambients. VMCAI 2003: 86-101
36EEChiara Braghin, Agostino Cortesi, Riccardo Focardi: Information Leakage Detection in Boundary Ambients. Electr. Notes Theor. Comput. Sci. 78: (2003)
35EERiccardo Focardi, Gianluigi Zavattaro: Preface. Electr. Notes Theor. Comput. Sci. 85(3): (2003)
34 Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: A comparison of three authentication properties. Theor. Comput. Sci. 291(3): 285-327 (2003)
2002
33EEAnnalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: Transforming Processes to Check and Ensure Information Flow Security. AMAST 2002: 271-286
32EERiccardo Focardi, Sabina Rossi: Information Flow Security in Dynamic Contexts. CSFW 2002: 307-319
31 Chiara Braghin, Agostino Cortesi, Riccardo Focardi: Control Flow Analysis of Mobile Ambients with Security Boundaries. FMOODS 2002: 197-212
30EERiccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Classification of Security Properties - Part II: Network Security. FOSAD 2002: 139-185
29EEMichele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi, Vladimiro Sassone: A Survey of Name-Passing Calculi and Crypto-Primitives. FOSAD 2002: 91-138
28 Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Steffen van Bakel: Boundary Inference for Enforcing Security Policies in Mobile Ambients. IFIP TCS 2002: 383-395
27EEAnnalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi: A Proof System for Information Flow Security. LOPSTR 2002: 199-218
26EERiccardo Focardi, Carla Piazza, Sabina Rossi: Proofs Methods for Bisimulation Based Information Flow Security. VMCAI 2002: 16-31
25 Agostino Cortesi, Riccardo Focardi: Computer languages and security. Comput. Lang. 28(1): 1-2 (2002)
24 Chiara Braghin, Agostino Cortesi, Riccardo Focardi: Security boundaries in mobile ambients. Comput. Lang. 28(1): 101-127 (2002)
23EEChiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami: Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2): 271-304 (2002)
2001
22 Riccardo Focardi, Roberto Gorrieri: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000] Springer 2001
21EEAntonio Durante, Riccardo Focardi, Roberto Gorrieri: CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. MMM-ACNS 2001: 287-299
20EEAgostino Cortesi, Riccardo Focardi: Information Flow Security in Mobile Ambients. Electr. Notes Theor. Comput. Sci. 54: (2001)
19EERiccardo Focardi, Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci: Formal Models of Timing Attacks on Web Privacy. Electr. Notes Theor. Comput. Sci. 62: (2001)
18EEChiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Techniques for Security Checking: Non-Interference vs Control Flow Analysis. Electr. Notes Theor. Comput. Sci. 62: (2001)
2000
17EERiccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Message Authentication through Non Interference. AMAST 2000: 258-272
16EERiccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Information Flow Analysis in a Discrete-Time Process Algebra. CSFW 2000: 170-184
15EERiccardo Focardi, Roberto Gorrieri: Classification of Security Properties (Part I: Information Flow). FOSAD 2000: 331-396
14EERiccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Non Interference for the Analysis of Cryptographic Protocols. ICALP 2000: 354-372
13EEAntonio Durante, Riccardo Focardi, Roberto Gorrieri: A compiler for analyzing cryptographic protocols using noninterference. ACM Trans. Softw. Eng. Methodol. 9(4): 488-528 (2000)
12EERiccardo Focardi, Roberto Gorrieri, Fabio Martinelli: Secrecy in Security Protocols as Non Interference. Electr. Notes Theor. Comput. Sci. 32: (2000)
11EERiccardo Focardi, Flaminia L. Luccio, David Peleg: Feedback vertex set in hypercubes. Inf. Process. Lett. 76(1-2): 1-5 (2000)
1999
10EEAntonio Durante, Riccardo Focardi, Roberto Gorrieri: CVS: A Compiler for the Analysis of Cryptographic Protocols. CSFW 1999: 203-212
9EEChiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami: Authentication via Localized Names. CSFW 1999: 98-110
8EERiccardo Focardi, Fabio Martinelli: A Uniform Approach for the Definition of Security Properties. World Congress on Formal Methods 1999: 794-813
1998
7EERoberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82
1997
6EERiccardo Focardi, Roberto Gorrieri: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Trans. Software Eng. 23(9): 550-571 (1997)
1996
5EERiccardo Focardi: Comparing Two Information Flow Security Properties. CSFW 1996: 116-122
4 Riccardo Focardi, Roberto Gorrieri: Automatic Compositional Verification of Some Security Properties. TACAS 1996: 167-186
1995
3EERiccardo Focardi, Roberto Gorrieri, V. Panini: The security checker: a semantics-based tool for the verification of security properties. CSFW 1995: 60-69
2 Riccardo Focardi, Roberto Gorrieri: A Taxonomy of Security Properties for Process Algebras. Journal of Computer Security 3(1): 5-34 (1995)
1994
1 Riccardo Focardi, Roberto Gorrieri: A Taxonomy of Security Properties for CCS. CSFW 1994: 126-136

Coauthor Index

1Martín Abadi [7]
2Michael Backes [64]
3Steffen van Bakel [28]
4Chiara Bodei [9] [18] [23] [41] [54]
5Annalisa Bossi [27] [33] [38] [40] [45] [47]
6Chiara Braghin [24] [28] [31] [36] [37] [39] [43] [48] [65]
7Michele Bugliesi [29] [42] [50] [51] [58] [63] [67] [68]
8Giuseppe Castagna [29]
9Matteo Centenaro [66] [70]
10Agostino Cortesi [20] [24] [25] [28] [31] [36] [37] [39] [43] [48] [64] [65]
11Silvia Crafa [29]
12Pierpaolo Degano [9] [18] [23] [41] [54]
13Antonio Durante [10] [13] [21]
14Stefano Filippone [39]
15Dieter Gollmann [7]
16Roberto Gorrieri [1] [2] [3] [4] [6] [7] [10] [12] [13] [14] [15] [16] [17] [18] [19] [21] [22] [30] [34] [52]
17Ruggero Lanotte [19]
18Gavin Lowe [7]
19Roberto Lucchi [59]
20Flaminia L. Luccio [11] [37] [39] [43] [46] [48] [69] [70]
21Damiano Macedonio [45]
22Matteo Maffei [42] [44] [50] [51] [56] [58] [63] [64]
23Andrea Maggiolo-Schettini [19]
24Fabio Martinelli [8] [12] [14] [16] [17] [18] [19] [30] [34]
25Catherine Meadows [7]
26V. Panini [3]
27David Peleg [11]
28Carla Piazza [26] [27] [33] [37] [38] [39] [40] [43] [45] [47] [48]
29Francesco Placella [56]
30Corrado Priami [9] [23] [41] [54]
31Sabina Rossi [26] [27] [32] [33] [38] [40] [45] [47] [57] [62]
32Andrei Sabelfeld [57]
33Vladimiro Sassone [29]
34Graham Steel [69] [70]
35Paul F. Syverson [7]
36Simone Tini [19]
37Enrico Tronci [19]
38Gianluigi Zavattaro [35] [55] [59] [60]

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)