Sfoglia per Autore
Control Flow Analysis for the Applied Pi-calculus
2003-01-01 Zunino, Roberto
Control Flow Analysis for the Applied Pi-calculus
2003-01-01 Zunino, Roberto
A Note on the Perfect Encryption Assumption in a Process Calculus
2004-01-01 Zunino, Roberto; P., Degano
Weakening the perfect encryption assumption in Dolev-Yao adversaries.
2005-01-01 Zunino, Roberto; P., Degano
Handling exp, * (and Timestamps) in Protocol Analysis
2006-01-01 Zunino, Roberto; P., Degano
Handling exp, * (and Timestamps) in Protocol Analysis. FoSSaCS 2006:
2006-01-01 Zunino, Roberto; Pierpaolo, Degano
Secure Service Orchestration.
2007-01-01 M., Bartoletti; P., Degano; G. L., Ferrari; Zunino, Roberto
Types and Effects for Resource Usage Analysis
2007-01-01 Zunino, Roberto; P., Degano; M., Bartoletti; G., Ferrari
Model checking usage policies
2008-01-01 M., Bartoletti; P., Degano; G., Ferrari; Zunino, Roberto
Semantics-Based Design for Secure Web Services
2008-01-01 M., Bartoletti; P., Degano; G. L., Ferrari; Zunino, Roberto
Hard life with weak binders
2008-01-01 M., Bartoletti; P., Degano; G., Ferrari; Zunino, Roberto
LocUsT: a tool for checking usage policies
2008-01-01 M., Bartoletti; Zunino, Roberto
Securing Java with Local Policies
2009-01-01 M., Bartoletti; G., Costa; P., Degano; F., Martinelli; Zunino, Roberto
Jalapa: Securing Java with Local Policies
2009-01-01 M., Bartoletti; G., Costa; Zunino, Roberto
A Calculus of Contracting Processes
2009-01-01 Bartoletti, Massimo; Zunino, Roberto
ν-types for Effects and Freshness Analysis
2009-01-01 Bartoletti, Massimo; Degano, Pierpaolo; Zunino, Roberto; Ferrari, Gian Luigi
A Logic for Contracts
2009-01-01 Bartoletti, Massimo; Zunino, Roberto
Hard life with weak binders
2009-01-01 M., Bartoletti; P., Degano; G., Ferrari; Zunino, Roberto
Local policies for resource usage analysis
2009-01-01 M., Bartoletti; P., Degano; G. L., Ferrari; Zunino, Roberto
nu-Types for Effects and Freshness Analysis
2009-01-01 M., Bartoletti; P., Degano; G. L., Ferrari; Zunino, Roberto
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile