default search action
Riccardo Focardi
Person information
- affiliation: Ca' Foscari Università Venezia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c90]Matteo Busi, Riccardo Focardi, Flaminia L. Luccio:
Bridging the Gap: Automated Analysis of Sancus. CSF 2024: 233-248 - [i7]Matteo Busi, Riccardo Focardi, Flaminia L. Luccio:
Bridging the Gap: Automated Analysis of Sancus. CoRR abs/2404.09518 (2024) - 2023
- [j33]Leonardo Veronese, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio:
Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs. SN Comput. Sci. 4(4): 330 (2023) - [c89]Francesco Palmarini, Leonardo Veronese, Matteo Busi, Riccardo Focardi, Flaminia L. Luccio:
A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case Study. CSR 2023: 99-104 - 2022
- [c88]Alessia Michela Di Campi, Riccardo Focardi, Flaminia L. Luccio:
The Revenge of Password Crackers: Automated Training of Password Cracking Tools. ESORICS (2) 2022: 317-336 - [c87]Leonardo Veronese, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio:
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs. ICISSP 2022: 165-176 - 2021
- [j32]Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia L. Luccio, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. J. Comput. Secur. 29(1): 77-134 (2021) - [c86]Riccardo Focardi, Flaminia L. Luccio:
Secure Key Management Policies in Strand Spaces. Protocols, Strands, and Logic 2021: 175-197 - [c85]Riccardo Focardi, Flaminia L. Luccio:
A Formally Verified Configuration for Hardware Security Modules in the Cloud. CCS 2021: 412-428 - [c84]Francesco Benvenuto, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio:
Firmware Extraction from Real IoT Devices through Power Analysis of AES. ITASEC 2021: 461-474 - [i6]Riccardo Focardi, Flaminia L. Luccio:
A Formally Verified Configuration for Hardware Security Modules in the Cloud. CoRR abs/2109.13631 (2021) - 2020
- [j31]Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei:
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery. IEEE Secur. Priv. 18(3): 8-16 (2020) - [c83]Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta:
Language-Based Web Session Integrity. CSF 2020: 107-122 - [c82]Riccardo Focardi, Flaminia L. Luccio:
Automated Analysis of PUF-based Protocols. CSF 2020: 304-317 - [c81]Stefano Calzavara, Riccardo Focardi, Alvise Rabitti, Lorenzo Soligo:
A Hard Lesson: Assessing the HTTPS Deployment of Italian University Websites. ITASEC 2020: 93-104 - [i5]Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta:
Language-Based Web Session Integrity. CoRR abs/2001.10405 (2020)
2010 – 2019
- 2019
- [j30]Riccardo Focardi, Flaminia L. Luccio, Heider A. M. Wahsheh:
Usable security for QR code. J. Inf. Secur. Appl. 48 (2019) - [j29]Claudio Bozzato, Riccardo Focardi, Francesco Palmarini:
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 199-224 (2019) - [j28]Shantanu Das, Riccardo Focardi, Flaminia L. Luccio, Euripides Markou, Marco Squarcina:
Gathering of robots in a ring with mobile faults. Theor. Comput. Sci. 764: 42-60 (2019) - [c80]Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei:
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities. EuroS&P 2019: 528-543 - [c79]Stefano Calzavara, Riccardo Focardi, Matús Nemec, Alvise Rabitti, Marco Squarcina:
Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem. IEEE Symposium on Security and Privacy 2019: 281-298 - 2018
- [c78]Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese:
Language-Independent Synthesis of Firewall Policies. EuroS&P 2018: 92-106 - [c77]Riccardo Focardi, Flaminia L. Luccio, Heider A. M. Wahsheh:
Usable cryptographic QR codes. ICIT 2018: 1664-1669 - [c76]Riccardo Focardi, Flaminia L. Luccio:
Neural Cryptanalysis of Classical Ciphers. ICTCS 2018: 104-115 - [c75]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta, Lorenzo Veronese:
Firewall Management With FireWall Synthesizer. ITASEC 2018 - [c74]Riccardo Focardi, Francesco Palmarini, Marco Squarcina, Graham Steel, Mauro Tempesta:
Mind Your Keys? A Security Evaluation of Java Keystores. NDSS 2018 - [c73]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta:
Transcompiling Firewalls. POST 2018: 303-324 - [c72]Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta:
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring. USENIX Security Symposium 2018: 1493-1510 - [c71]Stefano Calzavara, Riccardo Focardi, Marco Squarcina, Mauro Tempesta:
Surviving the Web: A Journey into Web Session Security. WWW (Companion Volume) 2018: 451-455 - [p2]Riccardo Focardi, Flaminia L. Luccio, Heider A. M. Wahsheh:
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study. Computer and Network Security Essentials 2018: 207-219 - [i4]Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta:
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring. CoRR abs/1806.09111 (2018) - 2017
- [j27]Stefano Calzavara, Riccardo Focardi, Marco Squarcina, Mauro Tempesta:
Surviving the Web: A Journey into Web Session Security. ACM Comput. Surv. 50(1): 13:1-13:34 (2017) - [j26]Michele Bugliesi, Stefano Calzavara, Riccardo Focardi:
Formal methods for web security. J. Log. Algebraic Methods Program. 87: 110-126 (2017) - [c70]Riccardo Focardi, Marco Squarcina:
Run-Time Attack Detection in Cryptographic APIs. CSF 2017: 176-188 - [e7]Alessandro Armando, Roberto Baldoni, Riccardo Focardi:
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017. CEUR Workshop Proceedings 1816, CEUR-WS.org 2017 [contents] - 2016
- [c69]Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei:
Micro-policies for Web Session Security. CSF 2016: 179-193 - [c68]Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio:
Localizing Firewall Security Policies. CSF 2016: 194-209 - [c67]Shantanu Das, Riccardo Focardi, Flaminia L. Luccio, Euripides Markou, Davide Moro, Marco Squarcina:
Gathering of Robots in a Ring with Mobile Faults. ICTCS 2016: 122-135 - [c66]Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel:
APDU-Level Attacks in PKCS#11 Devices. RAID 2016: 97-117 - 2015
- [j25]Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan:
CookiExt: Patching the browser against session hijacking attacks. J. Comput. Secur. 23(4): 509-537 (2015) - [c65]Andriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato:
Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit. ACSAC 2015: 441-450 - [c64]Chiara Bodei, Linda Brodo, Riccardo Focardi:
Static Evidences for Attack Reconstruction. Programming Languages with Applications to Biology and Security 2015: 162-182 - [e6]Riccardo Focardi, Andrew C. Myers:
Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. Lecture Notes in Computer Science 9036, Springer 2015, ISBN 978-3-662-46665-0 [contents] - 2014
- [c63]Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio:
Mignis: A Semantic Based Tool for Firewall Configuration. CSF 2014: 351-365 - [c62]Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro Tempesta:
Provably Sound Browser-Based Enforcement of Web Session Integrity. CSF 2014: 366-380 - [c61]Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan:
Automatic and Robust Client-Side Protection for Cookie-Based Sessions. ESSoS 2014: 161-178 - 2013
- [j24]Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio:
Type-based analysis of key management in PKCS#11 cryptographic devices. J. Comput. Secur. 21(6): 971-1007 (2013) - [c60]Pedro Adão, Riccardo Focardi, Flaminia L. Luccio:
Type-Based Analysis of Generic Key Management APIs. CSF 2013: 97-111 - [i3]Pedro Adão, Riccardo Focardi, Flaminia L. Luccio:
Type-Based Analysis of Generic Key Management APIs (Long Version). IACR Cryptol. ePrint Arch. 2013: 237 (2013) - 2012
- [j23]Riccardo Focardi, Flaminia L. Luccio:
Guessing Bank PINs by Winning a Mastermind Game. Theory Comput. Syst. 50(1): 52-71 (2012) - [c59]Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay:
Efficient Padding Oracle Attacks on Cryptographic Hardware. CRYPTO 2012: 608-625 - [c58]Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina:
Gran: Model Checking Grsecurity RBAC Policies. CSF 2012: 126-138 - [c57]Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio:
Type-Based Analysis of PKCS#11 Key Management. POST 2012: 349-368 - [i2]Mike Bond, Riccardo Focardi, Sibylle B. Fröschle, Graham Steel:
Analysis of Security APIs (Dagstuhl Seminar 12482). Dagstuhl Reports 2(11): 155-168 (2012) - [i1]Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay:
Efficient Padding Oracle Attacks on Cryptographic Hardware. IACR Cryptol. ePrint Arch. 2012: 417 (2012) - 2011
- [c56]Riccardo Focardi, Flaminia L. Luccio, Graham Steel:
An Introduction to Security API Analysis. FOSAD 2011: 35-65 - [c55]Riccardo Focardi, Flaminia L. Luccio:
Secure Recharge of Disposable RFID Tickets. Formal Aspects in Security and Trust 2011: 85-99 - [p1]Riccardo Focardi, Matteo Maffei:
Types for Security Protocols. Formal Models and Techniques for Analyzing Security Protocols 2011: 143-181 - 2010
- [j22]Riccardo Focardi:
Editorial. J. Comput. Secur. 18(6): 969 (2010) - [j21]Michele Bugliesi, Riccardo Focardi:
Channel abstractions for network security. Math. Struct. Comput. Sci. 20(1): 3-44 (2010) - [c54]Matteo Bortolozzo, Matteo Centenaro, Riccardo Focardi, Graham Steel:
Attacking and fixing PKCS#11 security tokens. CCS 2010: 260-269 - [c53]Riccardo Focardi, Flaminia L. Luccio:
Cracking Bank PINs by Playing Mastermind. FUN 2010: 202-213 - [c52]Andrea Falcone, Riccardo Focardi:
Formal Analysis of Key Integrity in PKCS#11. ARSPA-WITS 2010: 77-94 - [c51]Riccardo Focardi, Flaminia L. Luccio:
Secure Upgrade of Hardware Security Modules in Bank Networks. ARSPA-WITS 2010: 95-110 - [c50]Matteo Centenaro, Riccardo Focardi:
Match It or Die: Proving Integrity by Equality. ARSPA-WITS 2010: 130-145
2000 – 2009
- 2009
- [c49]Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel:
Type-Based Analysis of PIN Processing APIs. ESORICS 2009: 53-68 - [c48]Riccardo Focardi, Flaminia L. Luccio, Graham Steel:
Blunting Differential Attacks on PIN Processing APIs. NordSec 2009: 88-103 - 2008
- [j20]Chiara Braghin, Agostino Cortesi, Riccardo Focardi:
Information flow security in Boundary Ambients. Inf. Comput. 206(2-4): 460-489 (2008) - [c47]Michele Bugliesi, Riccardo Focardi:
Language Based Secure Communication. CSF 2008: 3-16 - [c46]Riccardo Focardi, Matteo Centenaro:
Information flow security of multi-threaded distributed programs. PLAS 2008: 113-124 - [c45]Michele Bugliesi, Riccardo Focardi:
Security Abstractions and Intruder Models (Extended Abstract). EXPRESS 2008: 99-112 - 2007
- [j19]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Dynamic types for authentication. J. Comput. Secur. 15(6): 563-617 (2007) - [c44]Michael Backes, Agostino Cortesi, Riccardo Focardi, Matteo Maffei:
A calculus of challenges and responses. FMSE 2007: 51-60 - 2006
- [j18]Riccardo Focardi, Sabina Rossi:
Information flow security in dynamic contexts. J. Comput. Secur. 14(1): 65-110 (2006) - [j17]Riccardo Focardi:
Preface. J. Comput. Secur. 14(2): 111 (2006) - [j16]Riccardo Focardi, Gianluigi Zavattaro:
Guest editor's introduction: Special issue on security issues in coordination models, languages, and systems. Sci. Comput. Program. 63(1): 1-2 (2006) - [j15]Riccardo Focardi, Roberto Lucchi, Gianluigi Zavattaro:
Secure shared data-space coordination languages: A process algebraic survey. Sci. Comput. Program. 63(1): 3-15 (2006) - 2005
- [j14]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication primitives for secure protocol specifications. Future Gener. Comput. Syst. 21(4): 645-653 (2005) - [j13]Riccardo Focardi:
Guest editor's preface. J. Comput. Secur. 13(3): 345- (2005) - [c43]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Analysis of Typed Analyses of Authentication Protocols. CSFW 2005: 112-125 - [c42]Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld:
Bridging Language-Based and Process Calculi Security. FoSSaCS 2005: 299-315 - [c41]Riccardo Focardi, Matteo Maffei, Francesco Placella:
Inferring authentication tags. WITS 2005: 41-49 - [e5]Riccardo Focardi, Gianluigi Zavattaro:
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004. Electronic Notes in Theoretical Computer Science 128(5), Elsevier 2005 [contents] - 2004
- [j12]Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
Nesting analysis of mobile ambients. Comput. Lang. Syst. Struct. 30(3-4): 207-230 (2004) - [j11]Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi:
Verifying persistent security properties. Comput. Lang. Syst. Struct. 30(3-4): 231-258 (2004) - [j10]Riccardo Focardi, Flaminia L. Luccio:
A modular approach to Sprouts. Discret. Appl. Math. 144(3): 303-319 (2004) - [c40]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Authenticity by tagging and typing. FMSE 2004: 1-12 - [c39]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Compositional Analysis of Authentication Protocols. ESOP 2004: 140-154 - [c38]Riccardo Focardi:
Static Analysis of Authentication. FOSAD 2004: 109-132 - [c37]Riccardo Focardi, Gianluigi Zavattaro:
Preface. SecCo 2004: 1-2 - [e4]Riccardo Focardi, Roberto Gorrieri:
Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures. Lecture Notes in Computer Science 2946, Springer 2004, ISBN 3-540-20955-7 [contents] - 2003
- [j9]Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Real-time information flow analysis. IEEE J. Sel. Areas Commun. 21(1): 20-35 (2003) - [j8]Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
A comparison of three authentication properties. Theor. Comput. Sci. 291(3): 285-327 (2003) - [c36]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Principles for Entity Authentication. Ershov Memorial Conference 2003: 294-306 - [c35]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication Primitives for Protocol Specifications. PaCT 2003: 49-65 - [c34]Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi:
Refinement Operators and Information Flow Security. SEFM 2003: 44-53 - [c33]Chiara Braghin, Agostino Cortesi, Stefano Filippone, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
BANANA - A Tool for Boundary Ambients Nesting ANAlysis. TACAS 2003: 437-441 - [c32]Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
Complexity of Nesting Analysis in Mobile Ambients. VMCAI 2003: 86-101 - [c31]Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi:
Bisimulation and Unwinding for Verifying Possibilistic Security Properties. VMCAI 2003: 223-237 - [c30]Chiara Braghin, Agostino Cortesi, Riccardo Focardi:
Information Leakage Detection in Boundary Ambients. CATS 2003: 123-143 - [c29]Annalisa Bossi, Riccardo Focardi, Damiano Macedonio, Carla Piazza, Sabina Rossi:
Unwinding in Information Flow Security. MEFISTO 2003: 127-154 - [c28]Riccardo Focardi, Gianluigi Zavattaro:
Preface. SecCo 2003: 142 - [c27]Riccardo Focardi, Matteo Maffei:
The rho-spi Calculus at Work: Authentication Case Studies. MEFISTO 2003: 267-293 - [c26]Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients. MEFISTO 2003: 319-337 - [e3]Riccardo Focardi, Gianluigi Zavattaro:
2nd EATCS Workshop on Foundations of Global Computing, FGC 2003, Satellite Event of ICALP 2003, Eindhoven, The Netherlands, June 28-29, 2003. Electronic Notes in Theoretical Computer Science 85(1), Elsevier 2003 [contents] - [e2]Riccardo Focardi, Gianluigi Zavattaro:
First International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2003, Satellite Event for ICALP 2003, Eindhoven, The Netherlands, June 28-29, 2003. Electronic Notes in Theoretical Computer Science 85(3), Elsevier 2003 [contents] - 2002
- [j7]Agostino Cortesi, Riccardo Focardi:
Computer languages and security. Comput. Lang. Syst. Struct. 28(1): 1-2 (2002) - [j6]Chiara Braghin, Agostino Cortesi, Riccardo Focardi:
Security boundaries in mobile ambients. Comput. Lang. Syst. Struct. 28(1): 101-127 (2002) - [j5]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Primitives for authentication in process algebras. Theor. Comput. Sci. 283(2): 271-304 (2002) - [c25]Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi:
Transforming Processes to Check and Ensure Information Flow Security. AMAST 2002: 271-286 - [c24]Riccardo Focardi, Sabina Rossi:
Information Flow Security in Dynamic Contexts. CSFW 2002: 307-319 - [c23]Chiara Braghin, Agostino Cortesi, Riccardo Focardi:
Control Flow Analysis of Mobile Ambients with Security Boundaries. FMOODS 2002: 197-212 - [c22]Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi, Vladimiro Sassone:
A Survey of Name-Passing Calculi and Crypto-Primitives. FOSAD 2002: 91-138 - [c21]Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Classification of Security Properties - Part II: Network Security. FOSAD 2002: 139-185 - [c20]Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Steffen van Bakel:
Boundary Inference for Enforcing Security Policies in Mobile Ambients. IFIP TCS 2002: 383-395 - [c19]Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi:
A Proof System for Information Flow Security. LOPSTR 2002: 199-218 - [c18]Riccardo Focardi, Carla Piazza, Sabina Rossi:
Proofs Methods for Bisimulation Based Information Flow Security. VMCAI 2002: 16-31 - 2001
- [c17]Antonio Durante, Riccardo Focardi, Roberto Gorrieri:
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. MMM-ACNS 2001: 287-299 - [c16]Agostino Cortesi, Riccardo Focardi:
Information Flow Security in Mobile Ambients. ConCoord 2001: 58-68 - [c15]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Techniques for Security Checking: Non-Interference vs Control Flow Analysis. TOSCA 2001: 211-228 - [c14]Riccardo Focardi, Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci:
Formal Models of Timing Attacks on Web Privacy. TOSCA 2001: 229-243 - [e1]Riccardo Focardi, Roberto Gorrieri:
Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000]. Lecture Notes in Computer Science 2171, Springer 2001, ISBN 3-540-42896-8 [contents] - 2000
- [j4]Riccardo Focardi, Flaminia L. Luccio, David Peleg:
Feedback vertex set in hypercubes. Inf. Process. Lett. 76(1-2): 1-5 (2000) - [j3]Antonio Durante, Riccardo Focardi, Roberto Gorrieri:
A compiler for analyzing cryptographic protocols using noninterference. ACM Trans. Softw. Eng. Methodol. 9(4): 488-528 (2000) - [c13]Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Message Authentication through Non Interference. AMAST 2000: 258-272 - [c12]Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Information Flow Analysis in a Discrete-Time Process Algebra. CSFW 2000: 170-184 - [c11]Riccardo Focardi, Roberto Gorrieri:
Classification of Security Properties (Part I: Information Flow). FOSAD 2000: 331-396 - [c10]Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Non Interference for the Analysis of Cryptographic Protocols. ICALP 2000: 354-372
1990 – 1999
- 1999
- [c9]Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami:
Authentication via Localized Names. CSFW 1999: 98-110 - [c8]Antonio Durante, Riccardo Focardi, Roberto Gorrieri:
CVS: A Compiler for the Analysis of Cryptographic Protocols. CSFW 1999: 203-212 - [c7]Riccardo Focardi, Fabio Martinelli:
A Uniform Approach for the Definition of Security Properties. World Congress on Formal Methods 1999: 794-813 - [c6]Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Secrecy in Security Protocols as Non Interference. Workshop on Secure Architectures and Information Flow 1999: 101-112 - 1998
- [c5]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - 1997
- [j2]Riccardo Focardi, Roberto Gorrieri:
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Trans. Software Eng. 23(9): 550-571 (1997) - 1996
- [c4]Riccardo Focardi:
Comparing Two Information Flow Security Properties. CSFW 1996: 116-122 - [c3]Riccardo Focardi, Roberto Gorrieri:
Automatic Compositional Verification of Some Security Properties. TACAS 1996: 167-186 - 1995
- [j1]Riccardo Focardi, Roberto Gorrieri:
A Taxonomy of Security Properties for Process Algebras. J. Comput. Secur. 3(1): 5-34 (1995) - [c2]Riccardo Focardi, Roberto Gorrieri, V. Panini:
The security checker: a semantics-based tool for the verification of security properties. CSFW 1995: 60-69 - 1994
- [c1]Riccardo Focardi, Roberto Gorrieri:
A Taxonomy of Security Properties for CCS. CSFW 1994: 126-136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint