Search results for: Riccardo Focardi
Journal of Logical and Algebraic Methods in Programming > 2017 > 87 > C > 110-126
Lecture Notes in Computer Science > Algebraic Methodology and Software Technology > Regular Papers > 271-286
Lecture Notes in Computer Science > Perspectives of System Informatics > Concurrent and Reactive Systems > 294-306
Lecture Notes in Computer Science > Tools and Algorithms for the Construction and Analysis of Systems > Performance and Mobility > 437-441
Lecture Notes in Computer Science > Identity and Privacy in the Internet Age > Session 2: Modelling and Design > 88-103
Lecture Notes in Computer Science > Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security > 77-94
Lecture Notes in Computer Science > Information Assurance in Computer Networks > Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods > 287-299
Lecture Notes in Computer Science > Foundations of Software Science and Computational Structures > Language Analysis > 299-315
Lecture Notes in Computer Science > FM’99 — Formal Methods > Security > 794-813
Lecture Notes in Computer Science > Verification, Model Checking, and Abstract Interpretation > Security and Protocols > 16-31
Lecture Notes in Computer Science > Foundations of Security Analysis and Design III > FOSAD 2004 (6-11 September 2004) > 109-132
Lecture Notes in Computer Science > Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security > 130-145
Lecture Notes in Computer Science > Verification, Model Checking, and Abstract Interpretation > Dynamic Systems > 86-101
Lecture Notes in Computer Science > Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security > 95-110