Sfoglia per Autore
Formal analysis of the kerberos authentication system
file da validare1997-01-01 Bella, G.; Riccobene, E.
Mechanising BAN kerberos by the inductive method
file da validare1998-01-01 Bella, G.; Paulson, L. C.
Kerberos version IV: Inductive analysis of the secrecy goals
file da validare1998-01-01 Bella, G.; Paulson, L. C.
Lack of explicitness strikes back
file da validare2000-01-01 Bella, Giampaolo
Modelling agents’ knowledge inductively (Transcript of discussion)
file da validare2000-01-01 Bella, G.
Formal Verification of Cardholder Registration in SET
file da validare2000-01-01 Bella, Giampaolo; F., Massacci; L. C., Paulson; P., Tramontano
Mechanising a protocol for smart cards
file da validare2001-01-01 Bella, Giampaolo
A proof of non-repudiation
file da validare2001-01-01 Bella, Giampaolo
Soft Constraints for Security Protocol Analysis: Confidentiality
file da validare2001-01-01 Bella, Giampaolo; S., Bistarelli
Making sense of specifications: The formalization of SET (Extended abstract)
file da validare2001-01-01 Bella, G.; Massacci, F.; Paulson, L. C.; Tramontano, P.
Mechanical Proofs about a Non-Repudiation Protocols
file da validare2001-01-01 Bella, Giampaolo; L. C., Paulson
Lack of explicitness strikes back (Transcript of discussion)
file da validare2001-01-01 Bella, G.
The Verification of an Industrial Payment Protocol: the SET Purchase Phase
file da validare2002-01-01 Bella, Giampaolo; F., Massacci; L. C., Paulson
Interactive Simulation of Security Policies
file da validare2002-01-01 Bella, Giampaolo
Editorial of the Special Track in Computer Security (2002)
file da validare2002-01-01 Bella, Giampaolo; R., Menezes; J., Whittaker
Editorial of the Special Track in Computer Security (2003)
file da validare2003-01-01 Bella, Giampaolo; R., Menezes
Availability of protocol goals
file da validare2003-01-01 Bella, Giampaolo
Inductive Verification of Smartcard Protocols
2003-01-01 Bella, Giampaolo
Verifying the SET Registration Protocols
2003-01-01 Bella, Giampaolo; F., Massacci; L. C., Paulson
Verifying Second-Level Security Protocols
file da validare2003-01-01 Bella, Giampaolo; C., Longo; L. C., Paulson
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Formal analysis of the kerberos authentication system | 1-gen-1997 | Bella, G.; Riccobene, E. | file da validare |
Mechanising BAN kerberos by the inductive method | 1-gen-1998 | Bella, G.; Paulson, L. C. | file da validare |
Kerberos version IV: Inductive analysis of the secrecy goals | 1-gen-1998 | Bella, G.; Paulson, L. C. | file da validare |
Lack of explicitness strikes back | 1-gen-2000 | Bella, Giampaolo | file da validare |
Modelling agents’ knowledge inductively (Transcript of discussion) | 1-gen-2000 | Bella, G. | file da validare |
Formal Verification of Cardholder Registration in SET | 1-gen-2000 | Bella, Giampaolo; F., Massacci; L. C., Paulson; P., Tramontano | file da validare |
Mechanising a protocol for smart cards | 1-gen-2001 | Bella, Giampaolo | file da validare |
A proof of non-repudiation | 1-gen-2001 | Bella, Giampaolo | file da validare |
Soft Constraints for Security Protocol Analysis: Confidentiality | 1-gen-2001 | Bella, Giampaolo; S., Bistarelli | file da validare |
Making sense of specifications: The formalization of SET (Extended abstract) | 1-gen-2001 | Bella, G.; Massacci, F.; Paulson, L. C.; Tramontano, P. | file da validare |
Mechanical Proofs about a Non-Repudiation Protocols | 1-gen-2001 | Bella, Giampaolo; L. C., Paulson | file da validare |
Lack of explicitness strikes back (Transcript of discussion) | 1-gen-2001 | Bella, G. | file da validare |
The Verification of an Industrial Payment Protocol: the SET Purchase Phase | 1-gen-2002 | Bella, Giampaolo; F., Massacci; L. C., Paulson | file da validare |
Interactive Simulation of Security Policies | 1-gen-2002 | Bella, Giampaolo | file da validare |
Editorial of the Special Track in Computer Security (2002) | 1-gen-2002 | Bella, Giampaolo; R., Menezes; J., Whittaker | file da validare |
Editorial of the Special Track in Computer Security (2003) | 1-gen-2003 | Bella, Giampaolo; R., Menezes | file da validare |
Availability of protocol goals | 1-gen-2003 | Bella, Giampaolo | file da validare |
Inductive Verification of Smartcard Protocols | 1-gen-2003 | Bella, Giampaolo | |
Verifying the SET Registration Protocols | 1-gen-2003 | Bella, Giampaolo; F., Massacci; L. C., Paulson | |
Verifying Second-Level Security Protocols | 1-gen-2003 | Bella, Giampaolo; C., Longo; L. C., Paulson | file da validare |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile