Static validation of security protocols C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson Journal of Computer Security 13 (3), 347-390, 2005 | 174 | 2005 |
Automatic validation of protocol narration C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 126-140, 2003 | 144 | 2003 |
Control flow analysis for the π-calculus C Bodei, P Degano, F Nielson, HR Nielson CONCUR'98 Concurrency Theory: 9th International Conference Nice, France …, 1998 | 132 | 1998 |
Static analysis for the π-calculus with applications to security C Bodei, P Degano, F Nielson, HR Nielson Information and Computation 168 (1), 68-92, 2001 | 127 | 2001 |
Static analysis of processes for no read-up and no write-down C Bodei, P Degano, F Nielson, HR Nielson Foundations of Software Science and Computation Structures: Second …, 1999 | 76 | 1999 |
Safe ambients: Control flow analysis and security P Degano, F Levi, C Bodei Advances in Computing Science—ASIAN 2000: 6th Asian Computing Science …, 2000 | 69 | 2000 |
Static analysis for secrecy and non-interference in networks of processes C Bodei, P Degano, F Nielson, HR Nielson International Conference on Parallel Computing Technologies, 27-41, 2001 | 57 | 2001 |
Measuring security in IoT communications C Bodei, S Chessa, L Galletta Theoretical Computer Science 764, 100-124, 2019 | 36 | 2019 |
Language-independent synthesis of firewall policies C Bodei, P Degano, L Galletta, R Focardi, M Tempesta, L Veronese 2018 ieee european symposium on security and privacy (euros&p), 92-106, 2018 | 34 | 2018 |
Security issues in process calculi C Bodei Servizio editoriale universitario, 2000 | 34 | 2000 |
Flow logic for Dolev–Yao secrecy in cryptographic processes C Bodei, P Degano, F Nielson, HR Nielson Future Generation Computer Systems 18 (6), 747-756, 2002 | 33 | 2002 |
Tracing where IoT data are collected and aggregated C Bodei, P Degano, GL Ferrari, L Galletta Logical Methods in Computer Science 13, 2017 | 31 | 2017 |
Where do your IoT ingredients come from? C Bodei, P Degano, GL Ferrari, L Galletta Coordination Models and Languages: 18th IFIP WG 6.1 International Conference …, 2016 | 30 | 2016 |
Control flow analysis can find new flaws too C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson Proceedings of the Workshop on Issues on the Theory of Security (WITS’04), 2004 | 26 | 2004 |
A formal analysis for capturing replay attacks in cryptographic protocols H Gao, C Bodei, P Degano, H Riis Nielson Advances in Computer Science–ASIAN 2007. Computer and Network Security: 12th …, 2007 | 23 | 2007 |
Authentication via localized names C Bodei, P Degano, R Focardi, C Priami Proceedings of the 12th IEEE Computer Security Foundations Workshop, 98-110, 1999 | 23 | 1999 |
Primitives for authentication in process algebras C Bodei, P Degano, R Focardi, C Priami Theoretical Computer Science 283 (2), 271-304, 2002 | 22 | 2002 |
Open multiparty interaction C Bodei, L Brodo, R Bruni Recent Trends in Algebraic Development Techniques: 21st International …, 2013 | 20 | 2013 |
On deducing causality in metabolic networks C Bodei, A Bracciali, D Chiarugi BMC bioinformatics 9, 1-10, 2008 | 20 | 2008 |
A control flow analysis for beta-binders with and without static compartments C Bodei Theoretical Computer Science 410 (33-34), 3110-3127, 2009 | 19 | 2009 |