Sfoglia per Autore
Distributed Backup through Information Dispersal
2006-01-01 Bella, Giampaolo; Riccobene, Salvatore Antonio; Pistagna, C.
Editorial of the Special Track on Computer Security (2006)
file da validare2006-01-01 Bella, Giampaolo; P. Y., Ryan
Verifying the SET Purchase Protocols
2006-01-01 Bella, Giampaolo; F., Massacci; L. C., Paulson
Editorial of the Special Track on Computer Security (2007)
file da validare2007-01-01 Bella, Giampaolo; P. Y., Ryan
Augmented Risk Analysis
2007-01-01 Bella, G.; Bistarelli, S.; Peretti, P.; Riccobene, Salvatore Antonio
Formal Correctness of Security Protocols
2007-01-01 Bella, Giampaolo
Spreading of Reputation values in a Mobile Network
file da validare2008-01-01 Bella, Giampaolo; Costantino, G; Riccobene, Salvatore Antonio
Retaliation Against Protocol Attacks
2008-01-01 Bella, Giampaolo; Stefano, Bistarelli; Fabio, Massacci
Managing Reputation over MANETs
file da validare2008-01-01 Bella, Giampaolo; Costantino, G; Riccobene, Salvatore Antonio
Security Protocol Deployment Risk
file da validare2008-01-01 Foley, S; Bella, Giampaolo; Bistarelli, S.
Editorial of the Special Track in Computer Security (2008)
file da validare2008-01-01 Bella, Giampaolo
Special track on computer security
file da validare2008-01-01 Bella, G.
What is Correctness of Security Protocols?
2008-01-01 Bella, Giampaolo
Realistic Threats to Self-Enforcing Privacy
file da validare2008-01-01 Bella, Giampaolo; Librizzi, F; Riccobene, Salvatore Antonio
A Privacy Paradigm that Tradeoffs Anonymity and Trust
file da validare2008-01-01 Bella, Giampaolo; Librizzi, F; Riccobene, Salvatore Antonio
Analysing the microRNA-17-92/Myc/E2F/RB Compound Toggle Switch by Theorem Proving
file da validare2009-01-01 Bella, Giampaolo; Pietro, Liò
Validating Security Protocols under the General Attacker
file da validare2009-01-01 Wihem, Arsac; Bella, Giampaolo; Xavier, Chantry; Luca, Compagna
Editorial of the Special Track on Computer Security (2009)
file da validare2009-01-01 Bella, Giampaolo; L., Compagna
Editorial of Special Issue
file da validare2009-01-01 Bella, Giampaolo; P. Y., Ryan
Special track on computer security
file da validare2009-01-01 Bella, G.; Compagna, L.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Distributed Backup through Information Dispersal | 1-gen-2006 | Bella, Giampaolo; Riccobene, Salvatore Antonio; Pistagna, C. | |
Editorial of the Special Track on Computer Security (2006) | 1-gen-2006 | Bella, Giampaolo; P. Y., Ryan | file da validare |
Verifying the SET Purchase Protocols | 1-gen-2006 | Bella, Giampaolo; F., Massacci; L. C., Paulson | |
Editorial of the Special Track on Computer Security (2007) | 1-gen-2007 | Bella, Giampaolo; P. Y., Ryan | file da validare |
Augmented Risk Analysis | 1-gen-2007 | Bella, G.; Bistarelli, S.; Peretti, P.; Riccobene, Salvatore Antonio | |
Formal Correctness of Security Protocols | 1-gen-2007 | Bella, Giampaolo | |
Spreading of Reputation values in a Mobile Network | 1-gen-2008 | Bella, Giampaolo; Costantino, G; Riccobene, Salvatore Antonio | file da validare |
Retaliation Against Protocol Attacks | 1-gen-2008 | Bella, Giampaolo; Stefano, Bistarelli; Fabio, Massacci | |
Managing Reputation over MANETs | 1-gen-2008 | Bella, Giampaolo; Costantino, G; Riccobene, Salvatore Antonio | file da validare |
Security Protocol Deployment Risk | 1-gen-2008 | Foley, S; Bella, Giampaolo; Bistarelli, S. | file da validare |
Editorial of the Special Track in Computer Security (2008) | 1-gen-2008 | Bella, Giampaolo | file da validare |
Special track on computer security | 1-gen-2008 | Bella, G. | file da validare |
What is Correctness of Security Protocols? | 1-gen-2008 | Bella, Giampaolo | |
Realistic Threats to Self-Enforcing Privacy | 1-gen-2008 | Bella, Giampaolo; Librizzi, F; Riccobene, Salvatore Antonio | file da validare |
A Privacy Paradigm that Tradeoffs Anonymity and Trust | 1-gen-2008 | Bella, Giampaolo; Librizzi, F; Riccobene, Salvatore Antonio | file da validare |
Analysing the microRNA-17-92/Myc/E2F/RB Compound Toggle Switch by Theorem Proving | 1-gen-2009 | Bella, Giampaolo; Pietro, Liò | file da validare |
Validating Security Protocols under the General Attacker | 1-gen-2009 | Wihem, Arsac; Bella, Giampaolo; Xavier, Chantry; Luca, Compagna | file da validare |
Editorial of the Special Track on Computer Security (2009) | 1-gen-2009 | Bella, Giampaolo; L., Compagna | file da validare |
Editorial of Special Issue | 1-gen-2009 | Bella, Giampaolo; P. Y., Ryan | file da validare |
Special track on computer security | 1-gen-2009 | Bella, G.; Compagna, L. | file da validare |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile