Author of the publication

Complexity of Nesting Analysis in Mobile Ambients.

, , , , and . VMCAI, volume 2575 of Lecture Notes in Computer Science, page 86-101. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Blockchain-Based E-Voting Systems., , , , and . BIS (Workshops), volume 373 of Lecture Notes in Business Information Processing, page 274-286. Springer, (2019)Automated Verification of Security Policies in Mobile Code., , and . IFM, volume 4591 of Lecture Notes in Computer Science, page 37-53. Springer, (2007)Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges., , , , , and . MSTEC, volume 12512 of Lecture Notes in Computer Science, page 79-91. Springer, (2020)A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study., , and . Comput. Secur., (April 2023)A model checking-based approach for security policy verification of mobile systems., , and . Formal Aspects Comput., 23 (5): 627-648 (2011)Static analysis of security properties in mobile ambients.. Ca' Foscari University of Venice, Italy, (2005)Towards ASM-Based Automated Formal Verification of Security Protocols., , and . ABZ, volume 12709 of Lecture Notes in Computer Science, page 17-33. Springer, (2021)The binary perfect phylogeny with persistent characters., , , and . Theor. Comput. Sci., (2012)Complexity of Nesting Analysis in Mobile Ambients., , , , and . VMCAI, volume 2575 of Lecture Notes in Computer Science, page 86-101. Springer, (2003)Dynamic and Scalable Enforcement of Access Control Policies for Big Data., , , , , and . MEDES, page 71-78. ACM, (2021)