Sfoglia per Autore
Distributed Backup through Information Dispersal
file da validare2004-01-01 Bella, Giampaolo; Pistagna, C; Riccobene, Salvatore Antonio
Should We Prove Security Policies Correct?
file da validare2004-01-01 Battiato, Sebastiano; Bella, Giampaolo; Riccobene, Salvatore Antonio
Special Issue: Computer Security
file da validare2004-01-01 Bella, Giampaolo; R., Menezes
Analyzing Delegation Properties
file da validare2004-01-01 Bella, Giampaolo; L. C., Paulson
Editorial of the Special Track in Computer Security (2004)
file da validare2004-01-01 Bella, Giampaolo; P. Y., Ryan
Soft Constraint Programming to Analysing Security Protocols
2004-01-01 Bella, Giampaolo; S., Bistarelli
Soft Constraints for Security
file da validare2004-01-01 Bella, Giampaolo; S., Bistarelli; S., Foley
Advancing Assurance for Secure Distributed Communications
file da validare2004-01-01 Bella, Giampaolo; S., Bistarelli
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks
file da validare2004-01-01 Bella, Giampaolo; S., Bistarelli
Guest Editors’ preface
file da validare2005-01-01 Bella, Giampaolo; P. Y., Ryan
Information Assurance for Security Protocols
2005-01-01 Bella, Giampaolo; S., Bistarelli
Locating Mobile Nodes Within Logical Networks
file da validare2005-01-01 Bella, Giampaolo; C., PISTAGNA C; Riccobene, Salvatore Antonio
A Protocol's Life after Attacks
file da validare2005-01-01 Bella, Giampaolo; S., Bistarelli; F., Massacci
Journal of Computer Security: Guest Editors' preface
file da validare2005-01-01 Bella, G.; Ryan, P.
Biometrics to Enhance Smartcard Security: Simulating MOC using TOC
file da validare2005-01-01 Bella, Giampaolo; S., Bistarelli; F., Martinelli
Is The Verification Problem For Cryptographic Protocols Solved?
file da validare2005-01-01 Bella, Giampaolo; C., Longo; L. C., Paulson
Editorial Message: Special track on computer security
file da validare2005-01-01 Bella, G; Ryan, Pya; Ahn, G-J; Brömme, A; Chadwick, Dw; Christianson, B; Durgin, N; Foley, S; Fournet, C; Gollmann, D; Gritzalis, S; Honeyman, P; Katsikas, Sk; Kuhn, M; Mantel, H; Mitchell, C; Von Oheimb, D; Samarati, P; Shmatikov, V; Tan, K.
An Overview of the Verification of SET
2005-01-01 Bella, Giampaolo; F., Massacci; L. C., Paulson
Retaliation: Can We Live with Flaws?
file da validare2006-01-01 Bella, Giampaolo; S., Bistarelli; F., Massacci
Verifying the SET Purchase Protocols
2006-01-01 Bella, Giampaolo; F., Massacci; L. C., Paulson
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Distributed Backup through Information Dispersal | 1-gen-2004 | Bella, Giampaolo; Pistagna, C; Riccobene, Salvatore Antonio | file da validare |
Should We Prove Security Policies Correct? | 1-gen-2004 | Battiato, Sebastiano; Bella, Giampaolo; Riccobene, Salvatore Antonio | file da validare |
Special Issue: Computer Security | 1-gen-2004 | Bella, Giampaolo; R., Menezes | file da validare |
Analyzing Delegation Properties | 1-gen-2004 | Bella, Giampaolo; L. C., Paulson | file da validare |
Editorial of the Special Track in Computer Security (2004) | 1-gen-2004 | Bella, Giampaolo; P. Y., Ryan | file da validare |
Soft Constraint Programming to Analysing Security Protocols | 1-gen-2004 | Bella, Giampaolo; S., Bistarelli | |
Soft Constraints for Security | 1-gen-2004 | Bella, Giampaolo; S., Bistarelli; S., Foley | file da validare |
Advancing Assurance for Secure Distributed Communications | 1-gen-2004 | Bella, Giampaolo; S., Bistarelli | file da validare |
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks | 1-gen-2004 | Bella, Giampaolo; S., Bistarelli | file da validare |
Guest Editors’ preface | 1-gen-2005 | Bella, Giampaolo; P. Y., Ryan | file da validare |
Information Assurance for Security Protocols | 1-gen-2005 | Bella, Giampaolo; S., Bistarelli | |
Locating Mobile Nodes Within Logical Networks | 1-gen-2005 | Bella, Giampaolo; C., PISTAGNA C; Riccobene, Salvatore Antonio | file da validare |
A Protocol's Life after Attacks | 1-gen-2005 | Bella, Giampaolo; S., Bistarelli; F., Massacci | file da validare |
Journal of Computer Security: Guest Editors' preface | 1-gen-2005 | Bella, G.; Ryan, P. | file da validare |
Biometrics to Enhance Smartcard Security: Simulating MOC using TOC | 1-gen-2005 | Bella, Giampaolo; S., Bistarelli; F., Martinelli | file da validare |
Is The Verification Problem For Cryptographic Protocols Solved? | 1-gen-2005 | Bella, Giampaolo; C., Longo; L. C., Paulson | file da validare |
Editorial Message: Special track on computer security | 1-gen-2005 | Bella, G; Ryan, Pya; Ahn, G-J; Brömme, A; Chadwick, Dw; Christianson, B; Durgin, N; Foley, S; Fournet, C; Gollmann, D; Gritzalis, S; Honeyman, P; Katsikas, Sk; Kuhn, M; Mantel, H; Mitchell, C; Von Oheimb, D; Samarati, P; Shmatikov, V; Tan, K. | file da validare |
An Overview of the Verification of SET | 1-gen-2005 | Bella, Giampaolo; F., Massacci; L. C., Paulson | |
Retaliation: Can We Live with Flaws? | 1-gen-2006 | Bella, Giampaolo; S., Bistarelli; F., Massacci | file da validare |
Verifying the SET Purchase Protocols | 1-gen-2006 | Bella, Giampaolo; F., Massacci; L. C., Paulson |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile