Segui
Giampaolo Bella
Titolo
Citata da
Citata da
Anno
Kerberos version IV: Inductive analysis of the secrecy goals
G Bella, LC Paulson
Computer Security—ESORICS 98: 5th European Symposium on Research in …, 1998
1921998
Verifying the SET registration protocols
G Bella, F Massacci, LC Paulson
IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003
1102003
Formal Analysis of the Kerberos Authentication System.
G Bella, E Riccobene
J. Univers. Comput. Sci. 3 (12), 1337-1381, 1997
981997
The verification of an industrial payment protocol: The SET purchase phase
G Bella, LC Paulson, F Massacci
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
932002
Formal Correctness of Security Protocols
G Bella
882007
Mechanical proofs about a non-repudiation protocol
G Bella, LC Paulson
Theorem Proving in Higher Order Logics: 14th International Conference …, 2001
852001
Verifying the SET purchase protocols
G Bella, F Massacci, LC Paulson
Journal of Automated Reasoning 36, 5-37, 2006
782006
Formal verification of cardholder registration in SET
G Bella, F Massacci, LC Paulson, P Tramontano
Computer Security-ESORICS 2000: 6th European Symposium on Research in …, 2000
782000
Inductive verification of cryptographic protocols
G Bella
University of Cambridge, Computer Laboratory, 2000
772000
Using Isabelle to prove properties of the Kerberos authentication system
G Bella, LC Paulson
DIMACS Workshop on Design and Formal Verification of Security Protocols 504, 1997
751997
Layered analysis of security ceremonies
G Bella, L Coles-Kemp
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
672012
Accountability protocols: Formalized and verified
G Bella, LC Paulson
ACM Transactions on Information and System Security (TISSEC) 9 (2), 138-161, 2006
632006
An overview of the verification of SET
G Bella, F Massacci, LC Paulson
International Journal of Information Security 4, 17-28, 2005
582005
Mechanising BAN Kerberos by the inductive method
G Bella, LC Paulson
Computer Aided Verification: 10th International Conference, CAV'98 Vancouver …, 1998
521998
Toucan: A protocol to secure controller area network
G Bella, P Biondi, G Costantino, I Matteucci
Proceedings of the ACM Workshop on Automotive Cybersecurity, 3-8, 2019
512019
Inductive verification of smart card protocols
G Bella
Journal of Computer Security 11 (1), 87-132, 2003
442003
Enforcing privacy in e-commerce by balancing anonymity and trust
G Bella, R Giustolisi, S Riccobene
Computers & Security 30 (8), 705-718, 2011
392011
Verifying second-level security protocols
G Bella, C Longo, LC Paulson
International Conference on Theorem Proving in Higher Order Logics, 352-366, 2003
362003
Soft constraints for security protocol analysis: Confidentiality
G Bella, S Bistarelli
International Symposium on Practical Aspects of Declarative Languages, 108-122, 2001
322001
Multi-attacker protocol validation
W Arsac, G Bella, X Chantry, L Compagna
Journal of Automated Reasoning 46 (3), 353-388, 2011
302011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20