default search action
Juan Diego Campo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Nicolás Serrano, Gustavo Betarte, Juan Diego Campo:
COVID-19 Mobile Applications: A Study of Trackers and Data Leaks. J. Internet Serv. Appl. 15(1): 139-159 (2024) - [c11]Guillermo Guerrero, Gustavo Betarte, Juan Diego Campo:
Process Mining-Based Assessment of Cyber Range Trainings. CLEI 2024: 1-10 - 2023
- [c10]Nicolás Serrano, Gustavo Betarte, Juan Diego Campo:
Third-Party Trackers in COVID-19 Mobile Applications Can Enable Privacy Leaks. LADC 2023: 80-89 - 2022
- [j5]Gustavo Betarte, Juan Diego Campo, Andrea Delgado, Laura González, Álvaro Martín, Rodrigo Martínez, Bárbara Muracciole:
Contact tracing solutions for COVID-19: applications, data privacy and security. CLEI Electron. J. 25(2) (2022) - 2021
- [c9]Gustavo Betarte, Juan Diego Campo, Andrea Delgado, Pablo Ezzatti, Laura González, Álvaro Martín, Rodrigo Martínez, Bárbara Muracciole:
Proximity tracing applications for COVID-19: data privacy and security. CLEI 2021: 1-10 - 2020
- [j4]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie:
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory. J. Autom. Reason. 64(8): 1685-1729 (2020)
2010 – 2019
- 2019
- [j3]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna:
System-Level Non-interference of Constant-Time Cryptography. Part I: Model. J. Autom. Reason. 63(1): 1-51 (2019) - 2018
- [j2]Carlos Luna, Gustavo Betarte, Juan Diego Campo, Camila Sanz, Maximiliano Cristiá, Felipe Gorostiaga:
A formal approach for the verification of the permission-based security model of Android. CLEI Electron. J. 21(2) (2018) - [c8]Joaquín Márquez, Gabriel Rodríguez, Gustavo Betarte, Juan Diego Campo, Eduardo Grampín:
Security Analysis of Smart Grids. SSN 2018: 50-52 - 2017
- [c7]Gustavo Betarte, Juan Diego Campo, Maximiliano Cristiá, Felipe Gorostiaga, Carlos Luna, Camila Sanz:
Towards formal model-based analysis and testing of Android's security mechanisms. CLEI 2017: 1-10 - [c6]Gustavo Betarte, Juan Diego Campo, Felipe Gorostiaga, Carlos Luna:
A Certified Reference Validation Mechanism for the Permission Model of Android. LOPSTR 2017: 271-288 - [i2]Gustavo Betarte, Juan Diego Campo, Felipe Gorostiaga, Carlos Luna:
A certified reference validation mechanism for the permission model of Android. CoRR abs/1709.03652 (2017) - 2016
- [j1]Gustavo Betarte, Juan Diego Campo, Carlos Luna, Agustín Romano:
Formal Analysis of Android's Permission-Based Security Model, . Sci. Ann. Comput. Sci. 26(1): 27-68 (2016) - 2015
- [c5]Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, Agustín Romano:
Verifying Android's Permission Model. ICTAC 2015: 485-504 - 2014
- [c4]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie:
System-level Non-interference for Constant-time Cryptography. CCS 2014: 1267-1279 - [i1]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie:
System-level non-interference for constant-time cryptography. IACR Cryptol. ePrint Arch. 2014: 422 (2014) - 2013
- [c3]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Jesús Mauricio Chimento, Carlos Luna:
Formally Verified Implementation of an Idealized Model of Virtualization. TYPES 2013: 45-63 - 2012
- [c2]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna:
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization. CSF 2012: 186-197 - 2011
- [c1]Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna:
Formally Verifying Isolation and Availability in an Idealized Model of Virtualization. FM 2011: 231-245
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint