BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Australia
1 × France
1 × Germany
1 × Italy
1 × Poland
1 × Switzerland
1 × USA
1 × United Kingdom
2 × Spain
Collaborated with:
C.Piazza S.Rossi R.Gorrieri F.Martinelli A.Bossi C.Braghin A.Cortesi F.L.Luccio A.Sabelfeld M.Bugliesi M.Maffei S.Filippone
Talks about:
secur (7) properti (3) analysi (3) inform (3) flow (3) protocol (2) composit (2) bisimul (2) ambient (2) proof (2)

Person: Riccardo Focardi

DBLP DBLP: Focardi:Riccardo

Contributed to:

FoSSaCS 20052005
ESOP 20042004
SEFM 20032003
TACAS 20032003
VMCAI 20032003
LOPSTR 20022002
VMCAI 20022002
ICALP 20002000
World Congress on Formal Methods 19991999
TACAS 19961996

Wrote 11 papers:

FoSSaCS-2005-FocardiRS #calculus #process #security
Bridging Language-Based and Process Calculi Security (RF, SR, AS), pp. 299–315.
ESOP-2004-BugliesiFM #analysis #authentication #composition #protocol
Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
SEFM-2003-BossiFPR #data flow #refinement #security
Refinement Operators and Information Flow Security (AB, RF, CP, SR), pp. 44–53.
TACAS-2003-BraghinCFFLP #analysis #bound #named
BANANA — A Tool for Boundary Ambients Nesting ANAlysis (CB, AC, SF, RF, FLL, CP), pp. 437–441.
VMCAI-2003-BossiFPR #bisimulation #security #verification
Bisimulation and Unwinding for Verifying Possibilistic Security Properties (AB, RF, CP, SR), pp. 223–237.
VMCAI-2003-BraghinCFLP #analysis #complexity #mobile
Complexity of Nesting Analysis in Mobile Ambients (CB, AC, RF, FLL, CP), pp. 86–101.
LOPSTR-2002-BossiFPR #data flow #proving #security
A Proof System for Information Flow Security (AB, RF, CP, SR), pp. 199–218.
VMCAI-2002-FocardiPR #bisimulation #data flow #proving #security
Proofs Methods for Bisimulation Based Information Flow Security (RF, CP, SR), pp. 16–31.
ICALP-2000-FocardiGM #analysis #encryption #protocol
Non Interference for the Analysis of Cryptographic Protocols (RF, RG, FM), pp. 354–372.
FM-v1-1999-FocardiM #approach #security
A Uniform Approach for the Definition of Security Properties (RF, FM), pp. 794–813.
TACAS-1996-FocardiG #automation #composition #security #verification
Automatic Compositional Verification of Some Security Properties (RF, RG), pp. 167–186.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.