Riccardo Focardi
TitleCited byYear
A Classification of Security Properties for Process Algebras 1
R Focardi, R Gorrieri
Journal of Computer security 3 (1), 5-33, 1995
4271995
Classification of security properties
R Focardi, R Gorrieri
International School on Foundations of Security Analysis and Design, 331-396, 2000
3002000
Classification of security properties
R Focardi, R Gorrieri
International School on Foundations of Security Analysis and Design, 331-396, 2000
2992000
The compositional security checker: A tool for the verification of information flow security properties
R Focardi, R Gorrieri
IEEE Transactions on Software Engineering 23 (9), 550-571, 1997
2521997
Non interference for the analysis of cryptographic protocols
R Focardi, R Gorrieri, F Martinelli
International Colloquium on Automata, Languages, and Programming, 354-372, 2000
1552000
A uniform approach for the definition of security properties
R Focardi, F Martinelli
International Symposium on Formal Methods, 794-813, 1999
1251999
Information flow analysis in a discrete-time process algebra
R Focardi, R Gorrieri, F Martinelli
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 170-184, 2000
1122000
Attacking and fixing PKCS# 11 security tokens
M Bortolozzo, M Centenaro, R Focardi, G Steel
Proceedings of the 17th ACM conference on Computer and communicationsá…, 2010
1052010
Efficient padding oracle attacks on cryptographic hardware
R Bardou, R Focardi, Y Kawamoto, L Simionato, G Steel, JK Tsay
Annual Cryptology Conference, 608-625, 2012
982012
Information Flow Security in Dynamic Contexts.
R Focardi, S Rossi
CSFW 1, 307-319, 2002
892002
Real-time information flow analysis
R Focardi, R Gorrieri, F Martinelli
IEEE Journal on Selected Areas in Communications 21 (1), 20-35, 2003
782003
Feedback vertex set in hypercubes
R Focardi, FL Luccio, D Peleg
Information Processing Letters 76 (1-2), 1-5, 2000
722000
A compiler for analyzing cryptographic protocols using noninterference
A Durante, R Focardi, R Gorrieri
ACM Transactions on Software Engineering and Methodology (TOSEM) 9 (4), 488-528, 2000
722000
Using non interference for the analysis of security protocols
R Focardi, A Ghelli, R Gorrieri
Proceedings of DIMACS Workshop on Design and Formal Verification of Securityá…, 1997
701997
Classification of security properties (Part II: Network security)
R Focardi, R Gorrieri, F Martinelli
552004
Verifying persistent security properties
A Bossi, R Focardi, C Piazza, S Rossi
Computer Languages, Systems & Structures 30 (3-4), 231-258, 2004
522004
CVS: A compiler for the analysis of cryptographic protocols
A Durante, R Focardi, R Gorrieri
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 203-212, 1999
521999
A taxonomy of trace-based security properties for CCS
R Focardi, R Gorrieri
Proceedings The Computer Security Foundations Workshop VII, 126-136, 1994
471994
Security boundaries in mobile ambients
C Braghin, A Cortesi, R Focardi
Computer Languages, Systems & Structures 28 (1), 101-127, 2002
442002
Bridging language-based and process calculi security
R Focardi, S Rossi, A Sabelfeld
International Conference on Foundations of Software Science and Computationá…, 2005
392005
The system can't perform the operation now. Try again later.
Articles 1–20