Follow
Riccardo Focardi
Title
Cited by
Cited by
Year
A classification of security properties for process algebras
R Focardi, R Gorrieri
Journal of Computer security 3 (1), 5-33, 1995
4561995
Classification of Security Properties: (Part I: Information Flow)
R Focardi, R Gorrieri
Foundations of Security Analysis and Design: Tutorial Lectures, 331-396, 2001
3302001
The compositional security checker: A tool for the verification of information flow security properties
R Focardi, R Gorrieri
IEEE Transactions on Software Engineering 23 (9), 550-571, 1997
2711997
Non interference for the analysis of cryptographic protocols
R Focardi, R Gorrieri, F Martinelli
Automata, Languages and Programming: 27th International Colloquium, ICALP …, 2002
1602002
A uniform approach for the definition of security properties
R Focardi, F Martinelli
FM’99—Formal Methods: World Congress on Formal Methods in the Development …, 1999
1381999
Attacking and fixing PKCS# 11 security tokens
M Bortolozzo, M Centenaro, R Focardi, G Steel
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1322010
Efficient padding oracle attacks on cryptographic hardware
R Bardou, R Focardi, Y Kawamoto, L Simionato, G Steel, JK Tsay
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
1282012
Information flow security in dynamic contexts
R Focardi, S Rossi
Journal of Computer Security 14 (1), 65-110, 2006
1202006
Information flow analysis in a discrete-time process algebra
R Focardi, R Gorrieri, F Martinelli
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 170-184, 2000
1152000
Real-time information flow analysis
R Focardi, R Gorrieri, F Martinelli
IEEE Journal on Selected Areas in Communications 21 (1), 20-35, 2003
842003
A compiler for analyzing cryptographic protocols using noninterference
A Durante, R Focardi, R Gorrieri
ACM Transactions on Software Engineering and Methodology (TOSEM) 9 (4), 488-528, 2000
782000
Feedback vertex set in hypercubes
R Focardi, FL Luccio, D Peleg
Information Processing Letters 76 (1-2), 1-5, 2000
772000
Using non interference for the analysis of security protocols
R Focardi, A Ghelli, R Gorrieri
Proceedings of DIMACS Workshop on Design and Formal Verification of Security …, 1997
751997
Shaping the glitch: optimizing voltage fault injection attacks
C Bozzato, R Focardi, F Palmarini
IACR transactions on cryptographic hardware and embedded systems, 199-224, 2019
692019
A taxonomy of trace-based security properties for CCS
R Focardi, R Gorrieri
Proceedings The Computer Security Foundations Workshop VII, 126-136, 1994
671994
Surviving the web: A journey into web session security
S Calzavara, R Focardi, M Squarcina, M Tempesta
ACM Computing Surveys (CSUR) 50 (1), 1-34, 2017
662017
Usable security for QR code
R Focardi, FL Luccio, HAM Wahsheh
Journal of Information Security and Applications 48, 102369, 2019
562019
Verifying persistent security properties
A Bossi, R Focardi, C Piazza, S Rossi
Computer Languages, Systems & Structures 30 (3-4), 231-258, 2004
562004
Classification of Security Properties: (Part II: Network Security)
R Focardi, R Gorrieri, F Martinelli
Foundations of Security Analysis and Design II: FOSAD 2001/2002 Tutorial …, 2004
562004
CookiExt: Patching the browser against session hijacking attacks
M Bugliesi, S Calzavara, R Focardi, W Khan
Journal of Computer Security 23 (4), 509-537, 2015
502015
The system can't perform the operation now. Try again later.
Articles 1–20