Giampaolo Bella
Giampaolo Bella
Okänd anknytning
Verifierad e-postadress på dmi.unict.it
TitelCiteras avÅr
Kerberos version IV: Inductive analysis of the secrecy goals
G Bella, LC Paulson
European Symposium on Research in Computer Security, 361-375, 1998
1801998
Search for a new resonance decaying to a W or Z boson and a Higgs boson in the final states with the ATLAS detector
G Aad, B Abbott, J Abdallah, O Abdinov, R Aben, M Abolins, OS AbouZeid, ...
The European Physical Journal C 75 (6), 263, 2015
151*2015
Verifying the SET registration protocols
G Bella, F Massacci, LC Paulson
IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003
972003
Formal analysis of the Kerberos authentication system
G Bella, E Riccobene
Journal of Universal Computer Science 3 (12), 1337-1381, 1997
841997
Mechanical proofs about a non-repudiation protocol
G Bella, LC Paulson
International Conference on Theorem Proving in Higher Order Logics, 91-104, 2001
812001
The verification of an industrial payment protocol: The SET purchase phase
G Bella, LC Paulson, F Massacci
Proceedings of the 9th ACM conference on Computer and communications …, 2002
772002
Formal correctness of security protocols
G Bella
Springer Science & Business Media, 2007
762007
Formal verification of cardholder registration in SET
G Bella, F Massacci, LC Paulson, P Tramontano
European Symposium on Research in Computer Security, 159-174, 2000
722000
Inductive verification of cryptographic protocols
G Bella
University of Cambridge, Computer Laboratory, 2000
712000
Using Isabelle to prove properties of the Kerberos authentication system
G Bella, LC Paulson
In DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997
661997
Verifying the SET purchase protocols
G Bella, F Massacci, LC Paulson
Journal of Automated Reasoning 36 (1-2), 5-37, 2006
652006
Accountability protocols: Formalized and verified
G Bella, LC Paulson
ACM Transactions on Information and System Security (TISSEC) 9 (2), 138-161, 2006
512006
An overview of the verification of SET
G Bella, F Massacci, LC Paulson
International Journal of Information Security 4 (1-2), 17-28, 2005
512005
Mechanising BAN Kerberos by the inductive method
G Bella, LC Paulson
International Conference on Computer Aided Verification, 416-427, 1998
481998
Determination of spin and parity of the Higgs boson in the WW∗→ eνμν decay channel with the ATLAS detector
A Clark, D Cinca, A Milic, FJ Wickens, V Croft, AM Nairz, R Abreu, ...
EPJC 75, 231, 2015
452015
Inductive verification of smart card protocols
G Bella
Journal of Computer Security 11 (1), 87-132, 2003
402003
Verifying second-level security protocols
G Bella, C Longo, LC Paulson
International Conference on Theorem Proving in Higher Order Logics, 352-366, 2003
362003
Layered analysis of security ceremonies
G Bella, L Coles-Kemp
IFIP International Information Security Conference, 273-286, 2012
352012
Soft constraints for security protocol analysis: Confidentiality
G Bella, S Bistarelli
International Symposium on Practical Aspects of Declarative Languages, 108-122, 2001
342001
Enforcing privacy in e-commerce by balancing anonymity and trust
G Bella, R Giustolisi, S Riccobene
Computers & Security 30 (8), 705-718, 2011
272011
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20