You are here

Publications

  1. A. Armando; R. Carbone; L. Zanetti,
    Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols,
    2013
    , (7th International Conference on Network and System Security (NSS 2013),
    Madrid, Spain,
    06/03/2013 a 06/04/2013)
  2. Armando A.; Grasso M.; Oudkerk S.; Ranise S.; Wrona K.,
    Content- based information protection and release in NATO operations,
    Symposium on Access Control Models and Technologies (SACMAT),
    2013
  3. Bertolissi C.; Ranise S.,
    Verification of Composed Array-based Systems with Applications to Security-Aware Workflows,
    Symposium on Frontiers of Combining Systems (FroCoS),
    2013
  4. Armando A.; Costa G.; Merlo A.; Verderame L.,
    Bring Your Own Device, Securely,
    Proceedings of the 28th ACM Symposium on Applied Computing,
    2013
    , (28th ACM Symposium on Applied Computing, Computer Security track (SEC@SAC 2013),
    Coimbra, Portugal,
    March 18 - 22, 2013)
  5. Armando A.; Merlo A.; Verderame L.,
    An Empirical Evaluation of the Android Security Framework,
    Proceedings of the 28th IFIP International Information Security and Privacy Conference (SEC 2013),
    2013
    , (28th IFIP International Information Security and Privacy Conference (SEC 2013),
    Auckland, New Zeland,
    July 8-10, 2013)
  6. Delzanno G.; Traverso R.,
    Decidability and Complexity Results for Verification of Asynchronous Broadcast Networks,
    7th International Conference on Language and Automata Theory and Applications (LATA),
    Springer,
    vol.7810,
    2013
    , pp. 238-
    249
    2013)
  7. Delzanno G.; Sangnier A.; Traverso R.,
    Parameterized Verification of Broadcast Networks of Register Automata,
    Reachability Problems,
    Springer,
    vol.8169,
    2013
    , pp. 109-
    121
    2013)
  8. Delzanno G.; Traverso R.,
    Specification and Validation of Link Reversal Routing via Graph Transformations,
    20th International SPIN Symposium on Model Checking of Software,
    Springer,
    vol.7976,
    2013
    , pp. 160-
    177
    2013)
  9. Armando A.; Castiglione A.; Costa G.; Fiore U.; Merlo A.; Verderame L.; You I.,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication Technology,
    Springer Berlin Heidelberg,
    2013
    , pp. 469-
    478
    , (ICT-EurAsia'13,
    Yogyakarta, Indonesia,
    March 25-29, 2013)
  10. dos Santos D. R.; Westphall C. M.; Westphall C. B.,
    Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation,
    SECURWARE 2013. The Seventh International Conference on Emerging Security Information, Systems.,
    2013
    , pp. 8-
    13
    , (SECURWARE 2013,
    Barcelona, Spain,
    August 25-31, 2013)

Pages