Sfoglia per Autore
Temporal Logic Properties of Java Objects
2001 Iosif, Radu; Sisto, Riccardo
SCARAB: Innovative Services Supporting User and Terminal Mobility
2001 Ciminiera, Luigi; Maggi, P.; Sisto, Riccardo
Using Data Flow Analysis to Infer Type Information in Java Bytecode
2001 Maggi, Paolo; Sisto, Riccardo
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study
2001 Hannotin, X.; Maggi, P.; Sisto, Riccardo
Using SPIN to Verify Security Properties of Cryptographic Protocols
2002 Maggi, Paolo; Sisto, Riccardo
A Configurable Mobile Agent Data Protection Protocol
2003 Maggi, Paolo; Sisto, Riccardo
A new knowledge representation strategy for cryptographic protocol analysis
2003 CIBRARIO BERTOLOTTI, I; Durante, L; Sisto, Riccardo; Valenzano, A.
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis
2003 CIBRARIO BERTOLOTTI, I; Durante, L; Sisto, Riccardo; Valenzano, A.
Automatic testing equivalence verification of spi calculus specifications
2003 Durante, L; Sisto, Riccardo; Valenzano, A.
Temporal Logic Properties of Java Objects
2003 Iosif, R; Sisto, Riccardo
Exploiting Symmetries for Testing Equivalence in the Spi Calculus
2004 CIBRARIO BERTOLOTTI, I.; Durante, L.; Sisto, Riccardo; Valenzano, A.
Spi2Java: automatic cryptographic protocol java code generation from spi calculus
2004 Pozza, Davide; Sisto, Riccardo; Durante, L.
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture
2004 Ciminiera, Luigi; Maggi, P; Sisto, Riccardo
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study
2005 CIBRARIO BERTOLOTTI, I.; Durante, L.; Sisto, Riccardo; Valenzano, A.
SRB Data Grid and Compute Grid integration via the EnginFrame Grid Portal
2006 Beltrame, F; Maggi, Paolo; Melato, M; Molinari, E; Sisto, Riccardo; Torterolo, L.
On the use of automatic tools for the formal analysis of IEEE 802.11 key-exchange protocols
2006 Cheminod, Manuel; CIBRARIO BERTOLOTTI, Ivan; Durante, Luca; Sisto, Riccardo; Valenzano, Adriano
Exploiting symmetries for testing equivalence verification in the SPI calculus
2006 CIBRARIO BERTOLOTTI, I; Durante, L; Sisto, Riccardo; Valenzano, A.
Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software
2006 Pozza, Davide; Sisto, Riccardo; Durante, L; Valenzano, A.
A Grid-Powered Framework to Support Courses on Distributed Programming
2007 Maggi, P; Sisto, Riccardo
Improving the Security of Industrial Networks by means of Formal Verification
2007 CIBRARIO BERTOLOTTI, I; Durante, L; Maggi, P; Sisto, Riccardo; Valenzano, A.
Citazione | Data di pubblicazione | Autori | File |
---|---|---|---|
Temporal Logic Properties of Java Objects / Iosif, Radu; Sisto, Riccardo. - STAMPA. - (2001), pp. 120-127. (Intervento presentato al convegno SEKE 2001 - 13th Int. Conf. on Software Engineering and Knowledge Engineering tenutosi a Buenos Aires, Argentina nel June 2001). | 1-gen-2001 | IOSIF, RaduSISTO, Riccardo | - |
SCARAB: Innovative Services Supporting User and Terminal Mobility / Ciminiera, Luigi; Maggi, P.; Sisto, Riccardo. - STAMPA. - (2001), pp. 487-493. (Intervento presentato al convegno IEEE ICDCS 2001 Workshop tenutosi a Phoenix, AZ nel 16-19 April 2001) [10.1109/CDCS.2001.918749]. | 1-gen-2001 | CIMINIERA, LuigiSISTO, Riccardo + | - |
Using Data Flow Analysis to Infer Type Information in Java Bytecode / Maggi, Paolo; Sisto, Riccardo. - STAMPA. - (2001), pp. 211-222. (Intervento presentato al convegno SCAM 2001 - 1st Int. Workshop on Source Code Analysis and Manipulation tenutosi a Florence, Italy nel NOV 10, 2001) [10.1109/SCAM.2001.972683]. | 1-gen-2001 | MAGGI, PAOLOSISTO, Riccardo | - |
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study / Hannotin, X.; Maggi, P.; Sisto, Riccardo. - 2240:(2001), pp. 42-53. (Intervento presentato al convegno Mobile Agents 5th International Conference, MA 2001 tenutosi a Atlanta, GA (USA) nel December 2–4, 2001) [10.1007/3-540-45647-3_4]. | 1-gen-2001 | SISTO, Riccardo + | - |
Using SPIN to Verify Security Properties of Cryptographic Protocols / Maggi, Paolo; Sisto, Riccardo. - STAMPA. - 2318:(2002), pp. 187-204. (Intervento presentato al convegno 9th International SPIN Workshop tenutosi a Grenoble (FR) nel April 11–13, 2002) [10.1007/3-540-46017-9_14]. | 1-gen-2002 | MAGGI, PAOLOSISTO, Riccardo | - |
A Configurable Mobile Agent Data Protection Protocol / Maggi, Paolo; Sisto, Riccardo. - STAMPA. - (2003), pp. 851-858. (Intervento presentato al convegno AAMAS'03 - 2nd ACM Int. Joint Conf. on Autonomous Agents and Multiagent Systems tenutosi a Melbourne, Australia nel July 2003) [10.1145/860575.860712]. | 1-gen-2003 | MAGGI, PAOLOSISTO, Riccardo | 860575.860712.pdf |
A new knowledge representation strategy for cryptographic protocol analysis / CIBRARIO BERTOLOTTI, I; Durante, L; Sisto, Riccardo; Valenzano, A.. - STAMPA. - 2619:(2003), pp. 284-298. (Intervento presentato al convegno 9th International Conference, TACAS 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 tenutosi a Warsaw (PL) nel April 7–11, 2003) [10.1007/3-540-36577-X_21]. | 1-gen-2003 | CIBRARIO BERTOLOTTI IDURANTE LSISTO, RiccardoVALENZANO A. | 3-540-36577-X_21.pdf |
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis / CIBRARIO BERTOLOTTI, I; Durante, L; Sisto, Riccardo; Valenzano, A.. - STAMPA. - 2767:(2003), pp. 224-239. (Intervento presentato al convegno 23rd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2003) tenutosi a Berlin (DE) nel September 29 – October 2 2003) [10.1007/978-3-540-39979-7_15]. | 1-gen-2003 | CIBRARIO BERTOLOTTI IDURANTE LSISTO, RiccardoVALENZANO A. | 978-3-540-39979-7_15.pdf |
Automatic testing equivalence verification of spi calculus specifications / Durante, L; Sisto, Riccardo; Valenzano, A.. - In: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY. - ISSN 1049-331X. - 12:(2003), pp. 222-284. | 1-gen-2003 | DURANTE LSISTO, Riccardo + | - |
Temporal Logic Properties of Java Objects / Iosif, R; Sisto, Riccardo. - In: THE JOURNAL OF SYSTEMS AND SOFTWARE. - ISSN 0164-1212. - 68:(2003), pp. 243-251. | 1-gen-2003 | SISTO, Riccardo + | - |
Exploiting Symmetries for Testing Equivalence in the Spi Calculus / CIBRARIO BERTOLOTTI, I.; Durante, L.; Sisto, Riccardo; Valenzano, A.. - STAMPA. - 3299:(2004), pp. 135-149. (Intervento presentato al convegno Second International Conference, ATVA 2004, Taipei, Taiwan, ROC tenutosi a Taipei (TW) nel October 31-November 3, 2004) [10.1007/978-3-540-30476-0_15]. | 1-gen-2004 | CIBRARIO BERTOLOTTI I.DURANTE L.SISTO, RiccardoVALENZANO A. | 978-3-540-30476-0_15.pdf |
Spi2Java: automatic cryptographic protocol java code generation from spi calculus / Pozza, Davide; Sisto, Riccardo; Durante, L.. - STAMPA. - 1:(2004), pp. 400-405. (Intervento presentato al convegno 18th International Conference on Advanced Information, Networking and Applications tenutosi a Fukuoka, Japan nel March 2004) [10.1109/AINA.2004.1283943]. | 1-gen-2004 | POZZA, DAVIDESISTO, RiccardoDURANTE L. | AINA2004_author_postprint.pdf; Spi2Java_automatic_cryptographic_protocol_Java_code_generation_from_spi_calculus.pdf |
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture / Ciminiera, Luigi; Maggi, P; Sisto, Riccardo. - In: THE JOURNAL OF SYSTEMS AND SOFTWARE. - ISSN 0164-1212. - 72:(2004), pp. 367-376. | 1-gen-2004 | CIMINIERA, LuigiSISTO, Riccardo + | - |
Automatic Detection of Attacks on Cryptographic Protocols: a Case Study / CIBRARIO BERTOLOTTI, I.; Durante, L.; Sisto, Riccardo; Valenzano, A.. - STAMPA. - 3548:(2005), pp. 69-84. (Intervento presentato al convegno Second International Conference, DIMVA 2005 tenutosi a Vienna (AT) nel July 7-8, 2005) [10.1007/11506881_5]. | 1-gen-2005 | CIBRARIO BERTOLOTTI I.DURANTE L.SISTO, RiccardoVALENZANO A. | document.pdf |
SRB Data Grid and Compute Grid integration via the EnginFrame Grid Portal / Beltrame, F; Maggi, Paolo; Melato, M; Molinari, E; Sisto, Riccardo; Torterolo, L.. - (2006), pp. 15-20. (Intervento presentato al convegno SRB Workshop). | 1-gen-2006 | MAGGI, PAOLOSISTO, Riccardo + | - |
On the use of automatic tools for the formal analysis of IEEE 802.11 key-exchange protocols / Cheminod, Manuel; CIBRARIO BERTOLOTTI, Ivan; Durante, Luca; Sisto, Riccardo; Valenzano, Adriano. - STAMPA. - (2006), pp. 273-282. (Intervento presentato al convegno Factory Communication Systems, 2006 IEEE International Workshop on tenutosi a Torino nel 28-30 June, 2006) [10.1109/WFCS.2006.1704167]. | 1-gen-2006 | CHEMINOD, MANUELCIBRARIO BERTOLOTTI, IVANDURANTE, LUCASISTO, RiccardoVALENZANO, ADRIANO | On_the_use_of_automatic_tools_for_the_formal_analysis_of_IEEE_802.11_key-exchange_protocols.pdf |
Exploiting symmetries for testing equivalence verification in the SPI calculus / CIBRARIO BERTOLOTTI, I; Durante, L; Sisto, Riccardo; Valenzano, A.. - In: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE. - ISSN 0129-0541. - 4:(2006), pp. 815-832. [10.1142/S0129054106004121] | 1-gen-2006 | DURANTE LSISTO, Riccardo + | - |
Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software / Pozza, Davide; Sisto, Riccardo; Durante, L; Valenzano, A.. - (2006). (Intervento presentato al convegno COMSWARE 2006 - 1st Int. Conf. on Comunication System Software and Middleware tenutosi a New Delhi, India nel 08-12 January 2006) [10.1109/COMSWA.2006.1665217]. | 1-gen-2006 | POZZA, DAVIDESISTO, RiccardoDURANTE L + | Comparing_Lexical_Analysis_Tools_for_Buffer_Overflow_Detection_in_Network_Software.pdf |
A Grid-Powered Framework to Support Courses on Distributed Programming / Maggi, P; Sisto, Riccardo. - In: IEEE TRANSACTIONS ON EDUCATION. - ISSN 0018-9359. - 50:(2007), pp. 27-33. [10.1109/TE.2006.879806] | 1-gen-2007 | SISTO, Riccardo + | - |
Improving the Security of Industrial Networks by means of Formal Verification / CIBRARIO BERTOLOTTI, I; Durante, L; Maggi, P; Sisto, Riccardo; Valenzano, A.. - In: COMPUTER STANDARDS & INTERFACES. - ISSN 0920-5489. - 29:(2007), pp. 387-397. [10.1016/j.csi.2006.06.002] | 1-gen-2007 | DURANTE LSISTO, Riccardo + | - |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile