BELLA, Giampaolo
BELLA, Giampaolo
SCIENZE POLITICHE E SOCIALI
2017 Special Track on Computer Security
file da validare2017-01-01 Bella, Giampaolo; Desmet, Lieven
2019 Special track on computer security
file da validare2019-01-01 Bella, G.; Giustolisi, R.
A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology
2023-01-01 Bella, G.; Castiglione, G.; Santamaria, D. F.
A behaviouristic semantic approach to blockchain-based e-commerce
file da validare2024-01-01 Bella, Giampaolo; Cantone, Domenico; Castiglione, Gianpietro; Nicolosi Asmundo, Marianna; Santamaria, Daniele Francesco
A Double Assessment of Privacy Risks Aboard Top-Selling Cars
2023-01-01 Bella, Giampaolo; Biondi, Pietro; Tudisco, Giuseppe
A Privacy Paradigm that Tradeoffs Anonymity and Trust
file da validare2008-01-01 Bella, Giampaolo; Librizzi, F; Riccobene, Salvatore Antonio
A proof of non-repudiation
file da validare2001-01-01 Bella, Giampaolo
A Protocol's Life after Attacks
file da validare2005-01-01 Bella, Giampaolo; S., Bistarelli; F., Massacci
A Secure Exam Protocol Without Trusted Parties
2015-01-01 Bella, Giampaolo; R., Giustolisi; G., Lenzini; P., Ryan
A socio-technical methodology for the security and privacy analysis of services
file da validare2014-01-01 Bella, Giampaolo; P., Curzon; R., Giustolisi; G., Lenzini
A Socio-Technical Understanding of TLS Certificate Validation
file da validare2013-01-01 Bella, Giampaolo; R., Giustolisi; G., Lenzini
Accountability Protocols: Formalized and Verified
2006-01-01 Bella, Giampaolo; Paulson, L. C.
Advancing Assurance for Secure Distributed Communications
file da validare2004-01-01 Bella, Giampaolo; S., Bistarelli
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
2022-01-01 Esposito, Sergio; Sgandurra, Daniele; Bella, Giampaolo
An Automated Method for the Ontological Representation of Security Directives
2023-01-01 Bella, G.; Castiglione, G.; Santamaria, D. F.
An Investigation into the Beautification of Security Ceremonies
2019-01-01 Bella, Giampaolo; Renaud, Karen; Sempreboni, Diego; Viganò, Luca
An Ontological Approach to Compliance Verification of the NIS 2 Directive
2023-01-01 Bella, G.; Castiglione, G.; Santamaria, D. F.
An Overview of the Verification of SET
2005-01-01 Bella, Giampaolo; F., Massacci; L. C., Paulson
Analysing privacy analyses
2017-01-01 Bella, Giampaolo; Butin, D; Jonker, H.
Analysing the microRNA-17-92/Myc/E2F/RB Compound Toggle Switch by Theorem Proving
file da validare2009-01-01 Bella, Giampaolo; Pietro, Liò
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
2017 Special Track on Computer Security | 1-gen-2017 | Bella, Giampaolo; Desmet, Lieven | file da validare |
2019 Special track on computer security | 1-gen-2019 | Bella, G.; Giustolisi, R. | file da validare |
A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology | 1-gen-2023 | Bella, G.; Castiglione, G.; Santamaria, D. F. | |
A behaviouristic semantic approach to blockchain-based e-commerce | 1-gen-2024 | Bella, Giampaolo; Cantone, Domenico; Castiglione, Gianpietro; Nicolosi Asmundo, Marianna; Santamaria, Daniele Francesco | file da validare |
A Double Assessment of Privacy Risks Aboard Top-Selling Cars | 1-gen-2023 | Bella, Giampaolo; Biondi, Pietro; Tudisco, Giuseppe | |
A Privacy Paradigm that Tradeoffs Anonymity and Trust | 1-gen-2008 | Bella, Giampaolo; Librizzi, F; Riccobene, Salvatore Antonio | file da validare |
A proof of non-repudiation | 1-gen-2001 | Bella, Giampaolo | file da validare |
A Protocol's Life after Attacks | 1-gen-2005 | Bella, Giampaolo; S., Bistarelli; F., Massacci | file da validare |
A Secure Exam Protocol Without Trusted Parties | 1-gen-2015 | Bella, Giampaolo; R., Giustolisi; G., Lenzini; P., Ryan | |
A socio-technical methodology for the security and privacy analysis of services | 1-gen-2014 | Bella, Giampaolo; P., Curzon; R., Giustolisi; G., Lenzini | file da validare |
A Socio-Technical Understanding of TLS Certificate Validation | 1-gen-2013 | Bella, Giampaolo; R., Giustolisi; G., Lenzini | file da validare |
Accountability Protocols: Formalized and Verified | 1-gen-2006 | Bella, Giampaolo; Paulson, L. C. | |
Advancing Assurance for Secure Distributed Communications | 1-gen-2004 | Bella, Giampaolo; S., Bistarelli | file da validare |
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands | 1-gen-2022 | Esposito, Sergio; Sgandurra, Daniele; Bella, Giampaolo | |
An Automated Method for the Ontological Representation of Security Directives | 1-gen-2023 | Bella, G.; Castiglione, G.; Santamaria, D. F. | |
An Investigation into the Beautification of Security Ceremonies | 1-gen-2019 | Bella, Giampaolo; Renaud, Karen; Sempreboni, Diego; Viganò, Luca | |
An Ontological Approach to Compliance Verification of the NIS 2 Directive | 1-gen-2023 | Bella, G.; Castiglione, G.; Santamaria, D. F. | |
An Overview of the Verification of SET | 1-gen-2005 | Bella, Giampaolo; F., Massacci; L. C., Paulson | |
Analysing privacy analyses | 1-gen-2017 | Bella, Giampaolo; Butin, D; Jonker, H. | |
Analysing the microRNA-17-92/Myc/E2F/RB Compound Toggle Switch by Theorem Proving | 1-gen-2009 | Bella, Giampaolo; Pietro, Liò | file da validare |