Efficient unfolding of contextual Petri nets P Baldan, A Bruni, A Corradini, B König, C Rodríguez, S Schwoon Theoretical Computer Science 449, 2-22, 2012 | 60 | 2012 |
Formal security analysis of the MaCAN protocol A Bruni, M Sojka, F Nielson, H Riis Nielson Integrated Formal Methods: 11th International Conference, IFM 2014 …, 2014 | 31 | 2014 |
Towards a mechanized proof of selene receipt-freeness and vote-privacy A Bruni, E Drewsen, C Schürmann Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017 | 29 | 2017 |
Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC) A Bruni, T Sahl Jørgensen, T Grønbech Petersen, C Schürmann Security Standardisation Research: 4th International Conference, SSR 2018 …, 2018 | 26 | 2018 |
Set-Pi: Set Membership Pi-Calculus A Bruni, S Mödersheim, F Nielson, H Riis Nielson Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 185-198, 2015 | 24 | 2015 |
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices K Norrman, V Sundararajan, A Bruni Proceedings of the 18th International Conference on Security and …, 2021 | 20 | 2021 |
Security games for cyber-physical systems R Vigo, A Bruni, E Yüksel Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013 | 16 | 2013 |
AIF-ω: Set-Based Protocol Abstraction with Countable Families S Mödersheim, A Bruni Principles of Security and Trust, 233-253, 2016 | 13 | 2016 |
Automated analysis of accountability A Bruni, R Giustolisi, C Schuermann Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017 | 12 | 2017 |
On the computation of McMillan’s prefix for contextual nets and graph grammars P Baldan, A Bruni, A Corradini, B König, S Schwoon International Conference on Graph Transformation, 91-106, 2010 | 9 | 2010 |
Security protocols as choreographies A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021 | 5 | 2021 |
Smart-Guard: Defending User Input from Malware M Denzel, A Bruni, MD Ryan The 13th IEEE International Conference on Advanced and Trusted Computing …, 2016 | 5 | 2016 |
Privacy-preserving dispute resolution in the improved bingo voting R Giustolisi, A Bruni Electronic Voting: 5th International Joint Conference, E-Vote-ID 2020 …, 2020 | 2 | 2020 |
Representing session types PB Bock, A Murawska, A Bruni, C Schürmann | 2 | 2016 |
Analysis of security protocols in embedded systems A Bruni Technical University of Denmark, 2016 | 2 | 2016 |
Technical and socio-technical attacks on the danish party endorsement system C Schürmann, A Bruni Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019 | 1 | 2019 |
Skolemisation of Intuitionistic Linear Logic E Ritter, A Bruni, C Schürmann 12th International Joint Conference on Automated Reasoning, IJCAR 2024, 2024 | | 2024 |
Taming Differentiable Logics with Coq Formalisation R Affeldt, A Bruni, E Komendantskaya, N Ślusarz, K Stark arXiv preprint arXiv:2403.13700, 2024 | | 2024 |
Extended Formal Analysis of the EDHOC Protocol in Tamarin K Norrman, V Sundararajan, A Bruni International Conference on E-Business and Telecommunications, 224-248, 2023 | | 2023 |
tvalv: No-Cost Mitigation of Network Timing Channels N Hedam, A Bruni, W Rafnsson -, 2023 | | 2023 |