Riccardo FOCARDI

Position
Full Professor
Telephone
041 234 8438
E-mail
focardi@unive.it
Scientific sector (SSD)
Informatica [INFO-01/A]
Website
www.unive.it/people/focardi (personal record)
 http://www.dsi.unive.it/~focardi
Office
Department of Environmental Sciences, Informatics and Statistics
Website: https://www.unive.it/dep.dais
Where: Campus scientifico via Torino
Room: office Z.B06 (Zeta B building)

Publications

Year Type Publication
Year Type Publication
2024 Article in Conference Proceedings M. Busi, R. Focardi, F. Luccio Bridging the Gap: Automated Analysis of Sancus , 37th IEEE Computer Security Foundations Symposium, IEEE, pp. 233-248, Convegno: 37th IEEE Computer Security Foundations Symposium, July 8-12, 2024 (ISBN 979-8-3503-6203-9)
- URL correlato - ARCA card: 10278/5044629
2023 Journal Article Veronese L.; Palmarini F.; Focardi R.; Luccio F.L. Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs in SN COMPUTER SCIENCE, vol. 4 (ISSN 2661-8907)
DOI - ARCA card: 10278/5021267
2023 Article in Conference Proceedings Francesco Palmarini, Leonardo Veronese, Matteo Busi, Riccardo Focardi, Flaminia Luccio A Recipe for Cost-Effective Secure IoT: the SAFE PLACE Project Case Study , 2023 IEEE International Conference on Cyber Security and Resilience, IEEE, pp. 99-104, Convegno: 2023 IEEE International Conference on Cyber Security and Resilience (IEEE CSR 23), July 31 - August 2, 2023
DOI - ARCA card: 10278/5021702
2023 Abstract in Atti di convegno Matteo Busi, Riccardo Focardi, Flaminia Luccio Automated Learning and Verification of Embedded Security Architectures , Workshop on Principles of Secure Compilation, No editor, Convegno: Workshop on Principles of Secure Compilation (PRISC'23), colocated with the 50th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL 2023)., Sun 15 - Sat 21 January 2023
- ARCA card: 10278/5021701
2023 Abstract in Atti di convegno Busi Matteo; Focardi Riccardo; Luccio Flaminia Don't Get Stranded: Secure and Dynamic Key Management Policies with Strand Spaces in Marco Patrignani, Ethan Cecchetti, Workshop on Foundations of Computer Security (FCS23), None, Convegno: Workshop on Foundations of Computer Security (FCS23), 9th July 2023
- ARCA card: 10278/5024840
2022 Article in Conference Proceedings Veronese Leonardo;Palmarini Francesco;Focardi Riccardo;Luccio Flaminia A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs , The International Conference on Information Systems Security and Privacy, SCITEPRESS, pp. 165-176, Convegno: Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP 2022), 9-11 February 2022 (ISBN 978-989-758-553-1)
DOI - URL correlato - ARCA card: 10278/3751162
2022 Article in Conference Proceedings Alessia Michela Di Campi, Riccardo Focardi, Flaminia Luccio The Revenge of Password Crackers: Automated Training of Password Cracking Tools in Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng, Computer Security, ESORICS 2022, Springer, Cham, vol. 13554, 13555, 13556, pp. 317-336, Convegno: 27th European Symposium on Research in Computer Security, ESORICS 2022, September 26–30, 2022 (ISBN 978-3-031-17145-1)
DOI - URL correlato - ARCA card: 10278/5004097
2021 Journal Article Bodei, Chiara; Ceragioli, Lorenzo; Degano, Pierpaolo; Focardi, Riccardo; Galletta, Letterio; Luccio, Flaminia; Tempesta, Mauro; Veronese, Lorenzo FWS: Analyzing, maintaining and transcompiling firewalls in JOURNAL OF COMPUTER SECURITY, vol. 29, pp. 77-134 (ISSN 0926-227X)
DOI - ARCA card: 10278/3735647
2021 Article in Conference Proceedings Riccardo Focardi; Flaminia Luccio A formally verified configuration for Hardware Security Modules in the cloud in Giovanni Vigna, Elaine Shi, Proceedings of the ACM Conference on Computer and Communications Security (ACM CCS), ACM, pp. 412-428, Convegno: Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 15-19, 2021 (ISBN 978-1-4503-8454-4)
DOI - ARCA card: 10278/3744159
2021 Article in Conference Proceedings Francesco Benvenuto, Francesco Palmarini, Riccardo Focardi, Flaminia L. Luccio Firmware Extraction from Real IoT Devices through Power Analysis of AES , Proceedings of the Italian Conference on Cybersecurity (ITASEC 2021), CEUR, vol. 2940, pp. 461-474, Convegno: Italian Conference on Cybersecurity (ITASEC 2021), April 7-9, 2021
- URL correlato - ARCA card: 10278/3742798
2021 Article in Conference Proceedings Focardi, Riccardo; Luccio, Flaminia L. Secure Key Management Policies in Strand Spaces in Dougherty D., Meseguer J., Mödersheim S.A., Rowe P., Protocols, Strands, and Logic, Springer, Cham, vol. 13066, pp. 175-197, Convegno: Protocols, Strands, and Logic (ISBN 978-3-030-91630-5; 978-3-030-91631-2)
DOI - ARCA card: 10278/3746587
2020 Journal Article Calzavara S.; Conti M.; Focardi R.; Rabitti A.; Tolomei G. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery in IEEE SECURITY & PRIVACY, vol. 18, pp. 8-16 (ISSN 1540-7993)
DOI - ARCA card: 10278/3729046
2020 Article in Conference Proceedings Calzavara S.; Focardi R.; Rabitti A.; Soligo L. A hard lesson: Assessing the HTTPS deployment of Italian university websites , CEUR Workshop Proceedings, CEUR-WS, vol. 2597, pp. 93-104, Convegno: 4th Italian Conference on Cyber Security, ITASEC 2020, 2020 (ISSN 1613-0073)
- URL correlato - ARCA card: 10278/3729045
2020 Article in Conference Proceedings Riccardo Focardi; Flaminia Luccio Automated Analysis of PUF-based Protocols , IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), IEEE, pp. 304-317, Convegno: IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), June 22-25, 2020
DOI - ARCA card: 10278/3727912
2020 Article in Conference Proceedings Calzavara S.; Focardi R.; Grimm N.; Maffei M.; Tempesta M. Language-Based Web Session Integrity , Proceedings - IEEE Computer Security Foundations Symposium, IEEE Computer Society, vol. 2020-, pp. 107-122, Convegno: 33rd IEEE Computer Security Foundations Symposium, CSF 2020, 2020 (ISBN 978-1-7281-6572-1) (ISSN 1940-1434)
DOI - ARCA card: 10278/3731394
2019 Journal Article Das, Shantanu; Focardi, Riccardo; Luccio, Flaminia L.*; Markou, Euripides; Squarcina, Marco Gathering of robots in a ring with mobile faults in THEORETICAL COMPUTER SCIENCE, vol. 764, pp. 42-60 (ISSN 0304-3975)
DOI - URL correlato - ARCA card: 10278/3704730
2019 Journal Article Claudio Bozzato, Riccardo Focardi, Francesco Palmarini Shaping the Glitch: Optimizing Voltage Fault Injection Attacks in IACR TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, vol. 2019, pp. 199-224 (ISSN 2569-2925)
DOI - URL correlato - ARCA card: 10278/3724485
2019 Journal Article Focardi R.; Luccio F.L.; Wahsheh H.A.M. Usable security for QR code in JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, vol. 48 (ISSN 2214-2126)
DOI - ARCA card: 10278/3717033
2019 Article in Conference Proceedings Stefano Calzavara; Mauro Conti; Riccardo Focardi; Alvise Rabitti; Gabriele Tolomei Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities , Proceedings - 2019 IEEE European Symposium on Security and Privacy, Institute of Electrical and Electronics Engineers Inc., pp. 528-543, Convegno: 4th IEEE European Symposium on Security and Privacy
DOI - ARCA card: 10278/3713410
2019 Article in Conference Proceedings Stefano Calzavara; Riccardo Focardi; Matus Nemec; Alvise Rabitti; Marco Squarcina Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem , Proceedings - 2019 IEEE Symposium on Security and Privacy, Institute of Electrical and Electronics Engineers Inc., vol. 1, pp. 948-965, Convegno: 40th IEEE Symposium on Security and Privacy
DOI - ARCA card: 10278/3713409
2018 Article in Conference Proceedings Bodei, Chiara; Degano, Pierpaolo; Focardi, Riccardo; Galletta, Letterio; Tempesta, Mauro; Veronese, Lorenzo Firewall management with FireWall synthesizer , CEUR Workshop Proceedings, CEUR-WS, vol. 2058, pp. 1-7, Convegno: 2nd Italian Conference on Cyber Security, ITASEC 2018, 2018
- URL correlato - ARCA card: 10278/3704759
2018 Article in Conference Proceedings Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese Language-Independent Synthesis of Firewall Policies , Proceedings of 3rd IEEE European Symposium on Security and Privacy, IEEE Press, pp. 92-106, Convegno: IEEE Euro S&P (ISBN 978-153864227-6)
DOI - ARCA card: 10278/3697742
2018 Article in Conference Proceedings R. Focardi, F. Palmarini, G. Steel, M. Squarcina, M. Tempesta Mind Your Keys? A Security Evaluation of Java Keystores , Proceedings of the Network and Distributed System Security Symposium, The Internet Society, pp. 1-15, Convegno: NDSS 2018
DOI - ARCA card: 10278/3697741
2018 Article in Conference Proceedings Riccardo Focardi ; Flaminia Luccio Neural-Cryptanalysis of Classical Ciphers , Proceedings of the 19th Italian Conference on Theoretical Computer Science (ICTCS 2018), CEUR, pp. 104-115, Convegno: 19th Italian Conference on Theoretical Computer Science (ICTCS 2018), 18-20 September 2018
- URL correlato - ARCA card: 10278/3704724
2018 Article in Conference Proceedings Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta Transcompiling Firewalls , Proceedings of 7th International Conference on Principles of Security and Trust, Springer, pp. 303-324, Convegno: POST 2018 (ISBN 978-331989721-9) (ISSN 0302-9743)
DOI - ARCA card: 10278/3697744
2018 Article in Conference Proceedings Focardi, Riccardo; Luccio, Flaminia; Wahsheh, Heider Usable Cryptographic QR Codes , Proceedings of the IEEE International Conference on Industrial Technology (ICIT - IEEE 2018), IEEE, pp. 1664-1669, Convegno: IEEE International Conference on Industrial Technology (IEEE - ICIT 2018), February 20-22, 2018 (ISBN 978-1-5090-5948-5)
DOI - ARCA card: 10278/3696274
2018 Article in Conference Proceedings Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring , Proceedings of the 27th USENIX Security Symposium, USENIX Association, pp. 1493-1510, Convegno: USENIX Security (ISBN 978-1-931971-46-1)
- ARCA card: 10278/3704779
2018 Abstract in Atti di convegno Calzavara S.; Focardi R.; Squarcina M.; Tempesta M. Surviving the Web: A Journey into Web Session Security , The Web Conference 2018 - Companion of the World Wide Web Conference, WWW 2018, Association for Computing Machinery, Inc, pp. 451-455, Convegno: 27th International World Wide Web, WWW 2018, 2018 (ISBN 9781450356404)
DOI - ARCA card: 10278/3729048
2017 Journal Article Bugliesi, Michele; Calzavara, Stefano; Focardi, Riccardo Formal methods for web security in THE JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, vol. 87, pp. 110-126 (ISSN 2352-2216)
DOI - URL correlato - ARCA card: 10278/3685125
2017 Journal Article Calzavara, Stefano; Focardi, Riccardo; Squarcina, Marco; Tempesta, Mauro Surviving the Web: A Journey into Web Session Security in ACM COMPUTING SURVEYS, vol. 50 (ISSN 0360-0300)
DOI - ARCA card: 10278/3685081
2017 Book Article Focardi, Riccardo; Luccio, Flaminia; Wahsheh, Heider Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study in Kevin Daimi, Computer and Network Security Essentials, Springer, pp. 207-219 (ISBN 978-3-319-58424-9)
DOI - ARCA card: 10278/3687449
2017 Article in Conference Proceedings Focardi, Riccardo; Squarcina, Marco Run-Time Attack Detection in Cryptographic APIs , 2017 IEEE 30th Computer Security Foundations Symposium (CSF), IEEE Computer Society, pp. 176-188, Convegno: CSF 2017, 21-25 Aug. 2017 (ISBN 978-1-5386-3217-8)
DOI - ARCA card: 10278/3693459
2017 Curatorship (a cura di) Armando, Alessandro; Baldoni, Roberto; Focardi, Riccardo First Italian Conference on Cybersecurity in CEUR WORKSHOP PROCEEDINGS, CEUR-WS, vol. 1816 (ISSN 1613-0073)
- URL correlato - ARCA card: 10278/3685918
2016 Article in Conference Proceedings Bozzato, Claudio; Focardi, Riccardo; Palmarini, Francesco; Steel, Graham APDU-Level Attacks in PKCS#11 Devices , 19th International Symposium on Research in Attacks, Intrusions, and Defenses, GEWERBESTRASSE 11, CHAM, CH-6330, SWITZERLAND, SPRINGER INT PUBLISHING AG, vol. 9854, pp. 97-117, Convegno: RAID 2016, 2016 (ISBN 9783319457185; 9783319457185) (ISSN 0302-9743)
DOI - URL correlato - ARCA card: 10278/3680380
2016 Article in Conference Proceedings Shantanu Das; Riccardo Focardi; Flaminia Luccio; Euripides Markou; Davide Moro; Marco Squarcina Gathering of robots in a ring with mobile faults , ICTCS 2016, CEUR-WS, vol. 1720, pp. 122-135, Convegno: 17th Italian Conference on Theoretical Computer Science, ICTCS 2016, September 7-9 2016 (ISSN 1613-0073)
DOI - URL correlato - ARCA card: 10278/3680255
2016 Article in Conference Proceedings Adão, Pedro; Focardi, Riccardo; Guttman, Joshua D.; Luccio, Flaminia Localizing Firewall Security Policies , IEEE CSF, 345 E 47TH ST, NEW YORK, NY 10017 USA, IEEE, pp. 194-209, Convegno: IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2016 (ISBN 9781509026074) (ISSN 1940-1434)
DOI - ARCA card: 10278/3680246
2016 Article in Conference Proceedings Calzavara, Stefano; Focardi, Riccardo; Grimm, Niklas; Maffei, Matteo Micro-Policies for Web Session Security , IEEE 29th Computer Security Foundations Symposium, CSF 2016, 345 E 47TH ST, NEW YORK, NY 10017 USA, IEEE, pp. 179-193, Convegno: IEEE 29th Computer Security Foundations Symposium (ISBN 978-1-5090-2607-4)
DOI - URL correlato - ARCA card: 10278/3684380
2016 Abstract in Atti di convegno Pedro, Adao; Riccardo, Focardi; Joshua, Guttman; Flaminia, Luccio Localizing Security for Distributed Firewalls , 4th Workshop on Hot Issues in Security Principles and Trust, Pubblicazione informale, Convegno: 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016), April, 2016
- ARCA card: 10278/3671317
2015 Journal Article Bugliesi, Michele; Calzavara, Stefano; Focardi, Riccardo; Khan, Wilayat CookiExt: Patching the browser against session hijacking attacks in JOURNAL OF COMPUTER SECURITY, vol. 23, pp. 509-537 (ISSN 0926-227X)
DOI - URL correlato - ARCA card: 10278/3663357
2015 Book Article Chiara, Bodei; Linda, Brodo; Riccardo, Focardi Static Evidences for Attack Reconstruction in Chiara Bodei, Linda Brodo, Riccardo Focardi:, Programming Languages with Applications to Biology and Security 2015, Springer, vol. 9465, pp. 162-182 (ISBN 978-3-319-25526-2)
DOI - ARCA card: 10278/3671311
2015 Article in Conference Proceedings Gkaniatsou, Andriana; Mcneill, Fiona; Bundy, Alan; Steel, Graham; Focardi, Riccardo; Bozzato, Claudio Getting to know your card: Reverse-engineering the smart-card application protocol data unit in Andriana Gkaniatsou; Fiona McNeill; Alan Bundy; Graham Steel; Riccardo Focardi; Claudio Bozzato, ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 441-450, Convegno: 31st Annual Computer Security Applications Conference, ACSAC 2015, 2015 (ISBN 9781450336826; 9781450336826)
DOI - URL correlato - ARCA card: 10278/3671310
2015 Abstract in Atti di convegno Focardi, Riccardo; Tempesta, Mauro Development of security extensions based on Chrome APIs , 8th International Workshop on Analysis of Security APIs (ASA-8), no formal editor, Convegno: 8th International Workshop on Analysis of Security APIs (ASA-8), 13/07/2015
- ARCA card: 10278/3662277
2015 Abstract in Atti di convegno Caiazza, Gianluca; Focardi, Riccardo; Squarcina, Marco Run-time analysis of PKCS#11 attacks , 8th International Workshop on Analysis of Security APIs (ASA-8), no formal editor, Convegno: 8th International Workshop on Analysis of Security APIs (ASA-8), 13/07/2015
- ARCA card: 10278/3660277
2015 Curatorship (a cura di) Riccardo, Focardi; Andrew, C. Myers Principles of Security and Trust - 4th International Conference, POST 2015 , Springer, vol. 9036 (ISBN 978-3-662-46665-0) (ISSN 1611-3349)
DOI - ARCA card: 10278/3671312
2014 Article in Conference Proceedings M. Bugliesi; S. Calzavara; R. Focardi; W. Khan Automatic and robust client-side protection for cookie-based sessions , Engineering Secure Software and Systems, Springer, Convegno: 6th International Symposium, ESSoS 2014 (ISBN 9783319048963) (ISSN 0302-9743)
DOI - ARCA card: 10278/42442
2014 Article in Conference Proceedings Pedro, Adão; Claudio, Bozzato; Gian-Luca, Dei Rossi; Focardi, Riccardo; Luccio, Flaminia Mignis: A semantic based tool for firewall configuration , IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), IEEE, pp. 351-365, Convegno: IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 19-22 July, 2014 (ISBN 9781479942909)
DOI - ARCA card: 10278/43839
2014 Article in Conference Proceedings Michele Bugliesi; Stefano Calzavara; Riccardo Focardi; Wilayat Khan; Mauro Tempesta Provably Sound Browser-Based Enforcement of Web Session Integrity , Proceedings of the 27th Computer Security Foundations Symposium, IEEE, Convegno: Computer Security Foundations Symposium, 19-22 July 2014 (ISBN 9781479942909)
DOI - ARCA card: 10278/42652
2014 Abstract in Atti di convegno Pedro Adão; Claudio Bozzato; Gian-Luca Dei Rossi; Riccardo Focardi; Flaminia Luccio A semantic based tool for firewall configuration , HotSpot 2014, no formal editor, Convegno: 2nd Workshop on Hot Issues in Security Principles and Trust (HotSpot 2014), 5th April 2014
- ARCA card: 10278/43846
2013 Journal Article Matteo Centenaro; Riccardo Focardi; Flaminia L. Luccio Type-based Analysis of Key Management in PKCS#11 cryptographic devices in JOURNAL OF COMPUTER SECURITY, vol. 21, pp. 971-1007 (ISSN 0926-227X)
DOI - ARCA card: 10278/35967
2013 Article in Conference Proceedings Pedro Adão; Riccardo Focardi; Flaminia L. Luccio Type-Based Analysis of Generic Key Management APIs , IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), IEEE Computer Society, pp. 97-111, Convegno: IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), Giugno 26–28, 2013 (ISBN 9780769550312)
DOI - ARCA card: 10278/37474
2012 Journal Article R. Focardi; Flaminia Luccio Guessing Bank PINs by Winning a Mastermind Game in THEORY OF COMPUTING SYSTEMS, vol. 50 (1), pp. 52-71 (ISSN 1432-4350)
DOI - ARCA card: 10278/28347
2012 Book Article Riccardo Focardi Practical Padding Oracle Attacks on RSA , Defend Yourself! Hands-on Cryptography, Hackin9, IT Security Magazine, pp. 6-23
- ARCA card: 10278/35298
2012 Article in Conference Proceedings R. Bardou; R. Focardi; Y. Kawamoto; L. Simionato; G. Steel; J. Tsay Efficient Padding Oracle Attacks on Cryptographic Hardware , 32nd Annual Cryptology Conference, Germany: Springer Verlag Germany, pp. 608-625, Convegno: CRYPTO 2012, August 19-23, 2012 (ISBN 9783642320088) (ISSN 0302-9743)
DOI - ARCA card: 10278/35030
2012 Article in Conference Proceedings R. Focardi; F. Luccio; M. Squarcina Fast SQL Blind Injections in High Latency Networks. , IEEE-AESS Estel Conference - ESTEL 2012, IEEE COMPUTER SOCIETY, pp. 1-6, Convegno: Security and Privacy Special Track, IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL'12), 2-5/10/2012 (ISBN 9781467346870)
DOI - ARCA card: 10278/38619
2012 Article in Conference Proceedings BUGLIESI M.; CALZAVARA S.; FOCARDI R.; SQUARCINA M; Gran: model checking grsecurity RBAC policies , Proceedings 2012 IEEE 25th Computer Security Foundations Symposium CSF 2012, IEEE Computer Society, pp. 126-138, Convegno: CSF 2012, 25-27 June 2012 (ISBN 9780769547183)
DOI - ARCA card: 10278/39019
2012 Article in Conference Proceedings R. Focardi; F. Luccio Secure recharge of disposable RFID tickets , The 8th International Workshop on Formal Aspects of Security & Trust, Germany: Springer Verlag Germany, vol. 7140, pp. 85-99, Convegno: FAST 2011 (ISBN 9783642294198) (ISSN 0302-9743)
DOI - ARCA card: 10278/28096
2012 Article in Conference Proceedings M. Centenaro; R. Focardi; Flaminia Luccio Type-Based Analysis of PKCS#11 Key Management , Principles of Security and Trust, Springer Berlin Heidelberg, vol. 7215, pp. 349-368, Convegno: First International Conference, POST 2012, March 24 - April 1, 2012 (ISBN 9783642286407) (ISSN 0302-9743)
DOI - ARCA card: 10278/36662
2012 Abstract in Atti di convegno R. Focardi; F. Luccio Towards a type-based analysis of real PKCS#11 devices , ASA 2012, non definito, Convegno: Proceedings of the 6th International Workshop on Analysis of Security APIs (ASA 2012), June 28 2012
- URL correlato - ARCA card: 10278/38723
2011 Book Article Riccardo Focardi; Flaminia L. Luccio; Graham Steel An Introduction to Security API Analysis in Alessandro Aldini, Roberto Gorrieri, Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, Springer, vol. 6858, pp. 35-65 (ISBN 9783642230813) (ISSN 0302-9743)
DOI - ARCA card: 10278/36856
2011 Book Article Focardi, Riccardo; Maffei, Matteo Types for security protocols in Riccardo Focardi; Matteo Maffei, Formal Models and Techniques for Analyzing Security Protocols - Cryptology and Information Security Series, IOS Press, vol. 5, pp. 143-181 (ISBN 9781607507130; 978-1-60750-714-7)
DOI - ARCA card: 10278/3662552
2011 Article in Conference Proceedings FALCONE A.; FOCARDI R Formal Analysis of Key Integrity in PKCS#11 , Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, Germany: Springer Verlag Germany, vol. 6186, pp. 77-94, Convegno: ARSPA-WITS 2010 (ISBN 9783642160738) (ISSN 0302-9743)
DOI - ARCA card: 10278/29133
2011 Article in Conference Proceedings M. CENTENARO; R. FOCARDI Match It or Die: Proving Integrity by Equality , Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, Germany: Springer Verlag Germany, vol. 6186, pp. 130-145, Convegno: ARSPA-WITS 2010 (ISBN 9783642160738) (ISSN 0302-9743)
DOI - ARCA card: 10278/4326
2011 Article in Conference Proceedings R. FOCARDI; F. LUCCIO Secure upgrade of hardware security modules in bank networks , ARSPA-WITS'10, Springer Verlag Germany, vol. 6186, pp. 95-110, Convegno: Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security (ISBN 9783642160738) (ISSN 0302-9743)
DOI - ARCA card: 10278/33037
2011 Abstract in Atti di convegno R. Focardi; F. Luccio Analysis and development of Security APIs for disposable RFID tickets , Proceedings of 5th International Workshop on Analysis of Security APIs, not specified, Convegno: 5th International Workshop on Analysis of Security APIs, April 8th, 2011
- URL correlato - ARCA card: 10278/24681
2011 Abstract in Atti di convegno R. Focardi; M. Centenaro Fixing PKCS#11 by key-diversification , Proceedings of 5th International Workshop on Analysis of Security APIs, Convegno: 5th International Workshop on Analysis of Security APIs
- ARCA card: 10278/28095
2010 Journal Article BUGLIESI M.; FOCARDI R Channel Abstractions for Network Security in MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, vol. 20(1), pp. 3-44 (ISSN 0960-1295)
DOI - ARCA card: 10278/29326
2010 Article in Conference Proceedings M. BORTOLOZZO; M. CENTENARO; R. FOCARDI; G. STEEL Attacking and Fixing PKCS#11 Security Tokens. in Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov, Proceedings of the 17th ACM Conference on Computer and Communications Security (ACM CCS 2010), ACM press, pp. 260-269, Convegno: 17th ACM Conference on Computer and Communications Security (ACM CCS 2010), October 2010 (ISBN 9781450302449)
- ARCA card: 10278/31401
2010 Article in Conference Proceedings R. FOCARDI; F. LUCCIO Cracking Bank PINs by Playing Mastermind , Fun with algorithms, Springer Verlag Germany, vol. 6099, pp. 202-213, Convegno: 5th International Conference on FUN with Algorithms, FUN 2010 (ISBN 9783642131219) (ISSN 0302-9743)
- ARCA card: 10278/3724
2009 Article in Conference Proceedings FOCARDI R.; LUCCIO F. L.; STEEL G. Blunting Differential Attacks on PIN Processing APIs , 14th Nordic Conference on Secure IT Systems, BERLIN, SPRINGER-VERLAG, vol. 5838, pp. 88-103, Convegno: NordSec 2009, 14 October 2009 through 16 October 2009 (ISBN 9783642047657) (ISSN 0302-9743)
DOI - ARCA card: 10278/39633
2009 Article in Conference Proceedings BUGLIESI M.; FOCARDI R Security Abstractions and Intruder Models , Proceedings of the 15th Workshop on Expressiveness in Concurrency (EXPRESS 2008), Toronto, Canada, vol. 242(1), pp. 99-112 (ISSN 1571-0661)
- ARCA card: 10278/29325
2009 Article in Conference Proceedings M. CENTENARO; FOCARDI R.; F. L. LUCCIO; G. STEEL Type-Based Analysis of PIN Processing APIs , 14th European Symposium on Research in Computer Security (ESORICS), BERLIN, SPRINGER-VERLAG, vol. 5789, pp. 53-68, Convegno: ESORICS 2009, SEP 21-23, 2009 (ISBN 9783642044434) (ISSN 0302-9743)
DOI - ARCA card: 10278/32641
2009 Article in Conference Proceedings M. CENTENARO; FOCARDI R.; F. L. LUCCIO; G. STEEL Type-based Analysis of Financial APIs (extended abstract) , Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, non specificato, Convegno: ARSPA-WITS'09, March 2009
- ARCA card: 10278/19328
2009 Abstract in Atti di convegno FOCARDI R.; LUCCIO F.L.; STEEL G. Improving PIN Processing API Security , 3rd International Workshop on Analysis of Security APIs (ASA-3), non specificato, Convegno: 3rd International Workshop on Analysis of Security APIs (ASA-3), July 10-11, 2009
- ARCA card: 10278/39253
2009 Abstract in Atti di convegno M. BORTOLOZZO; G. MARCHETTO; FOCARDI R.; G. STEEL Secure your PKCS#11 token against API attacks! , 3rd International Workshop on Analysis of Security APIs (ASA-3), Convegno: 3rd International Workshop on Analysis of Security APIs (ASA-3), July 2009
- ARCA card: 10278/19327
2009 Rapporto di ricerca M. CENTENARO; R. FOCARDI; F.L. LUCCIO; G. STEEL Type-based Analysis of Financial APIs , Dipartimento di Informatica dell’Universita` Ca’ Foscari Venezia, vol. CS-2009-2
- ARCA card: 10278/18838
2008 Journal Article BRAGHIN C; CORTESI A.; FOCARDI R Information flow security in Boundary Ambients in INFORMATION AND COMPUTATION, vol. 206, pp. 460-489 (ISSN 0890-5401)
DOI - ARCA card: 10278/22285
2008 Article in Conference Proceedings M. CENTENARO; FOCARDI R. Information flow security of multi-threaded distributed programs , Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security (PLAS'08), ACM Press, pp. 113-124, Convegno: third ACM SIGPLAN workshop on Programming languages and analysis for security (PLAS'08) (ISBN 9781595939364)
- ARCA card: 10278/19599
2008 Article in Conference Proceedings BUGLIESI M.; FOCARDI; R Language Based Secure Communication , CSF 2008 - 21st IEEE Symposium on Computer Security Foundations, IEEE Computer Society, pp. 3-16, Convegno: 21st IEEE Symposium on Computer Security Foundations, 23 - 25 June 2008 (ISBN 9780769531823)
- ARCA card: 10278/19905
2007 Journal Article M. BUGLIESI; FOCARDI R.; M. MAFFEI Dynamic Types for Authentication in JOURNAL OF COMPUTER SECURITY, vol. 15 (6), pp. 563-617 (ISSN 0926-227X)
- ARCA card: 10278/30434
2007 Article in Conference Proceedings M.BACKES; CORTESI A.; R.FOCARDI; M.MAFFEI A calculus of challenges and responses in V.GLIGO; H.MANTEL EDS., Proceedings of the 2007 ACM workshop on Formal methods in security engineering, NEW YORK, ACM, The Association for Computing Machinery, pp. 51-60, Convegno: FMSE07 - ACM workshop on Formal methods in security engineering, November 2nd, 2007 (ISBN 9781595938879)
DOI - ARCA card: 10278/22301
2006 Journal Article FOCARDI R; ROSSI S. Information Flow Security in Dynamic Contexts in JOURNAL OF COMPUTER SECURITY, vol. 14, pp. 65-110 (ISSN 0926-227X)
- ARCA card: 10278/29828
2006 Journal Article FOCARDI R.; R. LUCCHI; G. ZAVATTARO Secure shared data-space Coordination Languages: a Process Algebraic survey in SCIENCE OF COMPUTER PROGRAMMING, vol. 63(1), pp. 3-15 (ISSN 0167-6423)
- ARCA card: 10278/29467
2006 Curatorship (a cura di) FOCARDI R. Special Issue on CSFW17 in JOURNAL OF COMPUTER SECURITY, IOS Press, vol. 14(2) (ISSN 0926-227X)
- ARCA card: 10278/4697
2005 Journal Article C. BODEI; P. DEGANO; FOCARDI R.; C. PRIAMI Authentication primitives for secure protocol specifications in FUTURE GENERATION COMPUTER SYSTEMS, vol. 21(4), pp. 645-653 (ISSN 0167-739X)
- ARCA card: 10278/11521
2005 Book Article FOCARDI R. Static Analysis of Authentication , Foundations of Security Analysis and Design III, SPRINGER VERLAG, vol. 3655, pp. 109-132 (ISBN 9783540289555) (ISSN 0302-9743)
- ARCA card: 10278/36855
2005 Article in Conference Proceedings BUGLIESI M.; FOCARDI R; MAFFEI M Analysis of Typed Analyses of Authentication Protocols , CSFW 2005 - Computer Security Foundation Workshop, IEEE, pp. 112-125, Convegno: CSFW 2005 - Computer Security Foundation Workshop, 20-22 June 2005 (ISBN 0769523404)
- ARCA card: 10278/5637
2005 Article in Conference Proceedings FOCARDI R.; ROSSI S; SABELFELD A Bridging Language-Based and Process Calculi Security , Foundations of Software Science and Computational Structures, vol. 3441, pp. 299-315, Convegno: 8th International Conference, FOSSACS 2005 (ISBN 3540253882) (ISSN 0302-9743)
- ARCA card: 10278/34383
2005 Article in Conference Proceedings FOCARDI R.; MAFFEI M.; PLACELLA F. Inferring Authentication Tags , Proceedings of 2005 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS'05), Convegno: 2005 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS'05)
- ARCA card: 10278/6024
2005 Curatorship (a cura di) FOCARDI R. Special Issue on CSFW16 in JOURNAL OF COMPUTER SECURITY, IOS press, vol. 13(3) (ISSN 0926-227X)
- ARCA card: 10278/4696
2004 Journal Article FOCARDI R.; LUCCIO F.L. A modular approach to Sprouts in DISCRETE APPLIED MATHEMATICS, vol. 144 (3), pp. 303-319 (ISSN 0166-218X)
- ARCA card: 10278/31292
2004 Journal Article CHIARA BRAGHIN; CORTESI A.; RICCARDO FOCARDI; FLAMINIA L. LUCCIO; CARLA PIAZZA Nesting analysis of mobile ambients in COMPUTER LANGUAGES, SYSTEMS & STRUCTURES, vol. 30 (3-4), pp. 207-230 (ISSN 1477-8424)
DOI - ARCA card: 10278/29447
2004 Journal Article BOSSI A; FOCARDI R; MACEDONIO D; PIAZZA C; ROSSI S. Unwinding in Information Flow Security in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, vol. 99, pp. 127-154 (ISSN 1571-0661)
DOI - URL correlato - ARCA card: 10278/38887
2004 Journal Article BOSSI A.; FOCARDI R.; PIAZZA C.; ROSSI S. Verifying Persistent Security Properties. in COMPUTER LANGUAGES, SYSTEMS & STRUCTURES, vol. 30, pp. 231-258 (ISSN 1477-8424)
DOI - URL correlato - ARCA card: 10278/39178
2004 Book Article FOCARDI R.; ROBERTO GORRIERI; FABIO MARTINELLI Classification of Security Properties (Part II: Network Security) , Foundations of Security Analysis and Design II, SPRINGER VERLAG, vol. 2946, pp. 331-396 (ISBN 9783540209553) (ISSN 0302-9743)
- ARCA card: 10278/36661
2004 Article in Conference Proceedings BUGLIESI M.; FOCARDI R.; MAFFEI M. Authenticity by tagging and typing , FMSE, ACM, pp. 1-12, Convegno: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering FMSE 2004, October 2004 (ISBN 9781581139716)
- ARCA card: 10278/5638
2004 Article in Conference Proceedings C. BRAGHIN; A. CORTESI; FOCARDI R.; F.L. LUCCIO; C. PIAZZA Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients , Formal Methods for Security and Time, Amsterdam, Elsevier, vol. 99, pp. 319-337, Convegno: Mefisto, November 3-5, 2003 (ISSN 1571-0661)
DOI - ARCA card: 10278/24983
2004 Article in Conference Proceedings BUGLIESI M.; RICCARDO FOCARDI; MATTEO MAFFEI Compositional Analysis of Authentication Protocols , Programming Languages and Systems, 13th European Symposium on Programming, ESOP 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings., vol. 2986, pp. 140-154 (ISBN 3540213139) (ISSN 0302-9743)
- ARCA card: 10278/23344
2004 Article in Conference Proceedings R. FOCARDI; F.L. LUCCIO How tasty is a cannibal? A strategy for the mesh cannibal game , Fun 2004, Pisa, Edizioni Plus Universita' di Pisa, pp. 171-183, Convegno: Third International Conference on Fun with Algorithms, MAY 26-28 2004 (ISBN 9788884921505)
- ARCA card: 10278/15760
2004 Article in Conference Proceedings FOCARDI R.; M. MAFFEI The ro-spi Calculus at Work: Authentication Case Studies , Formal Methods for Security and Time, vol. 99, pp. 267-293, Convegno: MEFISTO (ISSN 1571-0661)
- ARCA card: 10278/11797
2004 Curatorship (a cura di) FOCARDI R.; R. GORRIERI Foundations of Security Analysis and Design II - Tutorial Lectures in LECTURE NOTES IN COMPUTER SCIENCE, SPRINGER VERLAG, vol. 2946 (ISBN 3540209557) (ISSN 0302-9743)
- ARCA card: 10278/4693
2004 Curatorship (a cura di) FOCARDI R. Proceedings of 17th IEEE Computer Security Foundations Workshop (CSFW17) , IEEE COMPUTER SOCIETY (ISBN 076952169X)
- ARCA card: 10278/4647
2004 Curatorship (a cura di) FOCARDI R.; G. ZAVATTARO Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo 2004) in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, Amsterdam Netherlands: Elsevier -link esterno , Fax: 011 31 20 4853598, vol. ENTCS 128(5) (ISSN 1571-0661)
- ARCA card: 10278/4649
2003 Journal Article FOCARDI R.; R. GORRIERI; F. MARTINELLI A Comparison of Three Authentication Properties in THEORETICAL COMPUTER SCIENCE, vol. 291(3), pp. 219-388 (ISSN 0304-3975)
- ARCA card: 10278/36683
2003 Journal Article FOCARDI R.; GORRIERI R.; MARTINELLI F. Real-Time Information Flow Analysis in IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, vol. 21(1), pp. 20-35 (ISSN 0733-8716)
- ARCA card: 10278/35103
2003 Article in Conference Proceedings BOSSI A.; FOCARDI R; PIAZZA C; ROSSI S A Proof System for Information Flow Security , Logic Based Program Synthesis and Transformation, vol. 2664, pp. 199-218, Convegno: LOPSTR '02 (ISBN 3540404384)
DOI - ARCA card: 10278/32533
2003 Article in Conference Proceedings C.BODEI; P.DEGANO; FOCARDI R.; C.PRIAMI Authentication Primitives for Protocol Specifications , Parallel Computing Technologies, vol. 2763, pp. 49-65, Convegno: 7th International Conference, PaCT 2003 (ISBN 9783540406730) (ISSN 0302-9743)
- ARCA card: 10278/11522
2003 Article in Conference Proceedings C. BRAGHIN; A. CORTESI; S. FILIPPONE; R. FOCARDI; F.L. LUCCIO; C. PIAZZA BANANA: A tool for Boundary Ambients Nesting ANAlysis in Hubert Garavel, John Hatcliff, Tools and Algorithms for the Construction and Analysis of Systems, Heidelberg, Springer Verlag, vol. 2619, pp. 437-441, Convegno: Tools and Algorithms for the Construction and Analysis of Systems, 9th International Conference, TACAS 2003, April 7-11, 2003 (ISBN 3540008985) (ISSN 0302-9743)
DOI - ARCA card: 10278/30387
2003 Article in Conference Proceedings BOSSI A.; FOCARDI R; PIAZZA C; ROSSI S Bisimulation and Unwinding for Verifying Possibilistic Security Properties , Verification, Model Checking, and Abstract Interpretation, vol. 2575 of LNCS, pp. 223-237, Convegno: VMCAI'03 (ISBN 3540003487) (ISSN 0302-9743)
- ARCA card: 10278/12642
2003 Article in Conference Proceedings C. BRAGHIN; A. CORTESI; R. FOCARDI; F.L. LUCCIO; C. PIAZZA Complexity of Nesting Analysis in Mobile Ambients in Lenore D. Zuck et al., Verification, Model Checking, and Abstract Interpretation, Heidelberg, Springer Verlag, vol. 2575, pp. 86-101, Convegno: Verification, Model Checking, and Abstract Interpretation, 4th International Conference, VMCAI 2003, January 9-11, 2002 (ISBN 3540003487) (ISSN 0302-9743)
DOI - ARCA card: 10278/15803
2003 Article in Conference Proceedings CHIARA BRAGHIN; CORTESI A.; RICCARDO FOCARDI Information Leakage Detection in Boundary Ambients , Proc. Computing: The Australasian Theory Symposium, Elsevier, vol. 78, pp. 127-147, Convegno: Computing: The Australasian Theory Symposium (CATS'03), 4th to 7th February, 2003 (ISSN 1571-0661)
DOI - ARCA card: 10278/25033
2003 Article in Conference Proceedings BUGLIESI M.; RICCARDO FOCARDI; MATTEO MAFFEI Principles for Entity Authentication , Perspectives of Systems Informatics, 5th International Andrei Ershov Memorial Conference, PSI 2003, Akademgorodok, Novosibirsk, Russia, July 9-12, 2003, Revised Papers, vol. 2890, pp. 294-306 (ISBN 3540208135) (ISSN 0302-9743)
- ARCA card: 10278/13496
2003 Article in Conference Proceedings BOSSI A; FOCARDI R; PIAZZA C; ROSSI S. Refinement Operators and Information Flow Security , 1st International Conference on Software Engineering and Formal Methods, IEEE Computer Society, pp. 44-53, Convegno: SEFM'03, 22-27 September (ISBN 9780769519494)
- ARCA card: 10278/16047
2003 Curatorship (a cura di) FOCARDI R. Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16) , IEEE Computer Society (ISBN 076951927X)
- ARCA card: 10278/4648
2003 Curatorship (a cura di) FOCARDI R.; G. ZAVATTARO Proceedings of 1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo'03) in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, Amsterdam Netherlands: Elsevier -link esterno , Fax: 011 31 20 4853598, vol. ENTCS 85(3) (ISSN 1571-0661)
- ARCA card: 10278/4650
2002 Journal Article CORTESI A.; FOCARDI R. Computer Languages and Security in COMPUTER LANGUAGES, vol. 28(1), pp. 1-2 (ISSN 0096-0551)
DOI - ARCA card: 10278/12126
2002 Journal Article BODEI C.; DEGANO P.; FOCARDI R.; PRIAMI C. Primitives for Authentication in Process Algebras in THEORETICAL COMPUTER SCIENCE, vol. 283(2), pp. 271-304 (ISSN 0304-3975)
- ARCA card: 10278/31293
2002 Journal Article BRAGHIN C.; CORTESI A.; FOCARDI R. Security Boundaries in Mobile Ambient in COMPUTER LANGUAGES, vol. 28(1), pp. 101-127 (ISSN 0096-0551)
DOI - ARCA card: 10278/26404
2002 Book Article BUGLIESI M.; GIUSEPPE CASTAGNA; SILVIA CRAFA; RICCARDO FOCARDI; VLADIMIRO SASSONE A Survey of Name-Passing Calculi and Crypto-Primitives , Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, Germany:Springer Verlag Germany, vol. 2946, pp. 91-138 (ISBN 3540209557) (ISSN 0302-9743)
- ARCA card: 10278/7587
2002 Article in Conference Proceedings FOCARDI R.; SABINA ROSSI A Security Property for Processes in Dynamic Contexts , ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security WITS02, Convegno: ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security WITS02
- ARCA card: 10278/6021
2002 Article in Conference Proceedings CHIARA BODEI; PIERPAOLO DEGANO; FOCARDI R.; CORRADO PRIAMI Authentication Primitives for Refining Protocol Specifications , ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security WITS02, Convegno: ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security WITS02
- ARCA card: 10278/6022
2002 Article in Conference Proceedings BRAGHIN C.; CORTESI A.; FOCARDI R.; VAN BAKEL S. Boundary Inference for Enforcing Security Policies in Mobile Ambients in RICARDO A. BAEZAYATES; UGO MONTANARI; NICOLA SANTORO EDS., Foundations of Information Technology in the Era of Networking and Mobile Computing, DORDRECHT, Kluwer, vol. 223, pp. 383-395, Convegno: IFIP 17th World Computer Congress - TC1 Stream / 2nd IFIP International Conference on Theoretical Computer Science (TCS 2002), August 25-30, 2002 (ISBN 9781402071812)
- ARCA card: 10278/9627
2002 Article in Conference Proceedings BRAGHIN C.; CORTESI A.; FOCARDI R. Control Flow Analysis of Mobile Ambients with Security Boundaries in BART JACOBS; AREND RENSINK EDS., Formal Methods for Open Object-Based Distributed Systems, DORDRECHT, Kluwer, vol. 209, pp. 197-212, Convegno: IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), March 20-22, 2002 (ISBN 9780792376835)
- ARCA card: 10278/9626
2002 Article in Conference Proceedings C. BRAGHIN; A. CORTESI; FOCARDI R. Freshness Analysis in Security Protocols , 14th Nordic Workshop on Programming Theory (NWPT 02), Convegno: 14th Nordic Workshop on Programming Theory (NWPT 02), 20-22 NOVEMBER 2002
- ARCA card: 10278/6027
2002 Article in Conference Proceedings FOCARDI R; ROSSI S. Information Flow Security in Dynamic Contexts , Computer Security Foundations Workshop, IEEE Computer Society, pp. 307-319, Convegno: CSFW'02, 24-26 June 2002 (ISBN 9780769516899)
- ARCA card: 10278/16049
2002 Article in Conference Proceedings FOCARDI R.; C. PIAZZA; S. ROSSI Proofs Methods for Bisimulation based Information Flow Security , Third International Workshop on Verification, Model Checking and Abstract Interpretation, vol. 2294, pp. 16-31, Convegno: VMCAI 2002 (ISBN 9783540436317) (ISSN 0302-9743)
- ARCA card: 10278/11586
2002 Article in Conference Proceedings BOSSI A.; FOCARDI R; PIAZZA C; ROSSI S Transforming processes to check and ensure Information Flow Security , Algebraic Methodology and Software Technology, vol. 2422 of LNCS, pp. 271-286, Convegno: AMAST 2002 (ISBN 3540441441) (ISSN 0302-9743)
- ARCA card: 10278/32668
2002 Curatorship (a cura di) A. CORTESI; FOCARDI R. Special issue on "Computer Languages and Security" in COMPUTER LANGUAGES, SYSTEMS & STRUCTURES, Elsevier, vol. 28(1) (ISSN 1477-8424)
- ARCA card: 10278/4695
2002 Rapporto di ricerca FOCARDI, Riccardo; LUCCIO, Flaminia Analysing Sprouts , Universita' di Venezia, Dipartimento di Informatica, vol. CS-2002-9
- ARCA card: 10278/16121
2001 Book Article FOCARDI R.; R. GORRIERI Classification of Security Properties (Part I: Information Flow) , Foundations of Security Analysis and Design, SPRINGER VERLAG, vol. 2171, pp. 331-396 (ISBN 3540428968) (ISSN 0302-9743)
- ARCA card: 10278/31853
2001 Article in Conference Proceedings R. FOCARDI; F.L. LUCCIO A new analysis technique for the Sprouts Game , International Conference Fun with Algorithms 2 (FUN 2001), Carleton Scientific, pp. 117-132, Convegno: International Conference Fun with Algorithms 2 (FUN 2001), MAY 29-31 (ISBN 9781894145091)
- ARCA card: 10278/15759
2001 Article in Conference Proceedings ANTONIO DURANTE; FOCARDI R.; ROBERTO GORRIERI CVS at Work: A Report on New Failures upon some Cryptographic Protocol , Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security, vol. 2052, pp. 287-299, Convegno: MMM-ACNS 2001 (ISBN 9783540421030) (ISSN 0302-9743)
- ARCA card: 10278/11794
2001 Article in Conference Proceedings CHIARA BRAGHIN; AGOSTINO CORTESI; FOCARDI R. Control Flow Analysis for information flow security , NORDSEC 2001, Convegno: NORDSEC 2001
- ARCA card: 10278/6023
2001 Article in Conference Proceedings CORTESI A.; RICCARDO FOCARDI Information Flow Security in Mobile Ambients , Proc. of the International Workshop on Cuncurrency and Coordination CONCOORD'01, Amsterdam, Elsevier, vol. 54, pp. 58-68, Convegno: International Workshop on Cuncurrency and Coordination CONCOORD'01, July 2001 (ISSN 1571-0661)
DOI - ARCA card: 10278/22308
2001 Curatorship (a cura di) FOCARDI R.; R. GORRIERI Foundations of Security Analysis and Design - Tutorial Lectures in LECTURE NOTES IN COMPUTER SCIENCE, SPRINGER VERLAG, vol. 2171 (ISBN 3540428968) (ISSN 0302-9743)
- ARCA card: 10278/4694
2000 Journal Article DURANTE A.; FOCARDI R.; GORRIERI R. A Compiler for Analysing Cryptographic Protocols Using Non-Interference in ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, vol. 9(4), pp. 489-530 (ISSN 1049-331X)
- ARCA card: 10278/32512
2000 Journal Article R. FOCARDI; F.L. LUCCIO; D. PELEG Feedback Vertex Set in Hypercubes in INFORMATION PROCESSING LETTERS, vol. 76/1-2, pp. 1-5 (ISSN 0020-0190)
- ARCA card: 10278/16115
2000 Article in Conference Proceedings FOCARDI R.; R. GORRIERI; R. SEGALA A New Definition of Multilevel Security , Workshop on Issues in the Theory of Security (WITS '00), Convegno: Workshop on Issues in the Theory of Security (WITS '00)
- ARCA card: 10278/6025
2000 Article in Conference Proceedings FOCARDI R.; R. GORRIERI; F. MARTINELLI Information Flow in a Discrete-Time Process Algebra , 13th IEEE Computer Security Foundations Workshop (CSFW'00), IEEE Press, Convegno: 13th IEEE Computer Security Foundations Workshop (CSFW'00) (ISBN 0769506712)
- ARCA card: 10278/6026
2000 Article in Conference Proceedings FOCARDI R.; R. GORRIERI; F. MARTINELLI Message Authentication through Non Interference , International Conference on Algebraic Methodology And Software Technology, vol. 1816, pp. 258-272, Convegno: AMAST 2000 (ISBN 3540675302) (ISSN 0302-9743)
- ARCA card: 10278/11796
2000 Article in Conference Proceedings FOCARDI R.; GORRIERI R; MARTINELLI F Non Interference for the Analysis of Cryptographic Protocols , 27th International Colloquium on Automata, Languages and Programming, vol. 1853, pp. 354-372, Convegno: ICALP'00 (ISBN 3540677151) (ISSN 0302-9743)
- ARCA card: 10278/11795
1999 Rapporto di ricerca R. FOCARDI; F.L. LUCCIO Minumum Feedback Vertex Set in k-Dimensional Hypercubes , Universita' Ca' Foscari di Venezia, Dipartimento di Informatica, vol. CS-99-21
- ARCA card: 10278/15706
1997 Journal Article FOCARDI R.; GORRIERI R. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties in IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, vol. 23(9), pp. 550-571 (ISSN 0098-5589)
- ARCA card: 10278/35361
1995 Journal Article FOCARDI R.; GORRIERI R. A Classification of Security Properties for Process Algebras in JOURNAL OF COMPUTER SECURITY, vol. 3(1), pp. 5-33 (ISSN 0926-227X)
- ARCA card: 10278/11520