| The politics of the developing areas GA Almond, JS Coleman Princeton University Press, 2015 | 3011* | 2015 |
| Kerberos version IV: Inductive analysis of the secrecy goals G Bella, LC Paulson European Symposium on Research in Computer Security, 361-375, 1998 | 172 | 1998 |
| Verifying the SET registration protocols G Bella, F Massacci, LC Paulson IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003 | 94 | 2003 |
| Formal analysis of the Kerberos authentication system G Bella, E Riccobene Journal of Universal Computer Science 3 (12), 1337-1381, 1997 | 82 | 1997 |
| The verification of an industrial payment protocol: The SET purchase phase G Bella, LC Paulson, F Massacci Proceedings of the 9th ACM conference on Computer and communications …, 2002 | 78 | 2002 |
| Mechanical proofs about a non-repudiation protocol G Bella, LC Paulson International Conference on Theorem Proving in Higher Order Logics, 91-104, 2001 | 78 | 2001 |
| Formal verification of cardholder registration in SET G Bella, F Massacci, LC Paulson, P Tramontano European Symposium on Research in Computer Security, 159-174, 2000 | 73 | 2000 |
| Inductive verification of cryptographic protocols G Bella University of Cambridge, Computer Laboratory, 2000 | 70 | 2000 |
| Formal correctness of security protocols G Bella Springer Science & Business Media, 2007 | 68 | 2007 |
| Using Isabelle to prove properties of the Kerberos authentication system G Bella, LC Paulson In DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997 | 64 | 1997 |
| Verifying the SET purchase protocols G Bella, F Massacci, LC Paulson Journal of Automated Reasoning 36 (1-2), 5-37, 2006 | 57 | 2006 |
| Accountability protocols: Formalized and verified G Bella, LC Paulson ACM Transactions on Information and System Security (TISSEC) 9 (2), 138-161, 2006 | 48 | 2006 |
| An overview of the verification of SET G Bella, F Massacci, LC Paulson International Journal of Information Security 4 (1-2), 17-28, 2005 | 46 | 2005 |
| Mechanising BAN Kerberos by the inductive method G Bella, LC Paulson International Conference on Computer Aided Verification, 416-427, 1998 | 46 | 1998 |
| Inductive verification of smart card protocols G Bella Journal of Computer Security 11 (1), 87-132, 2003 | 39 | 2003 |
| Verifying second-level security protocols G Bella, C Longo, LC Paulson International Conference on Theorem Proving in Higher Order Logics, 352-366, 2003 | 36 | 2003 |
| Soft constraints for security protocol analysis: Confidentiality G Bella, S Bistarelli International Symposium on Practical Aspects of Declarative Languages, 108-122, 2001 | 35 | 2001 |
| Layered analysis of security ceremonies G Bella, L Coles-Kemp IFIP International Information Security Conference, 273-286, 2012 | 27 | 2012 |
| Managing reputation over manets G Bella, G Costantino, S Riccobene Information Assurance and Security, 2008. ISIAS'08. Fourth International …, 2008 | 24 | 2008 |
| Retaliation: Can we live with flaws? G Bella, S Bistarelli, F Massacci NATO Security Through Science Series D-Information and Communication …, 2006 | 22 | 2006 |