Search filters

List of works by Riccardo Focardi

A Classification of Security Properties for Process Algebras1

scientific article published in January 1995

A Proof System for Information Flow Security

scientific article published in 2003

A Uniform Approach for the Definition of Security Properties

scientific article published in 1999

A calculus of challenges and responses

scientific article published in 2007

A comparison of three authentication properties

scientific article published in January 2003

A compiler for analyzing cryptographic protocols using noninterference

scientific article published in October 2000

A modular approach to Sprouts

scientific article published in December 2004

APDU-Level Attacks in PKCS#11 Devices

scientific article published in 2016

An Introduction to Security API Analysis

scientific article published in 2011

Analysis of Typed Analyses of Authentication Protocols

Attacking and fixing PKCS#11 security tokens

scientific article published in 2010

Authentication primitives for secure protocol specifications

scientific article published in May 2005

Authentication via localized names

Automatic and Robust Client-Side Protection for Cookie-Based Sessions

scientific article published in 2014

Automatic compositional verification of some Security properties

scientific article published in 1996

Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients

scientific article published in August 2004

Blunting Differential Attacks on PIN Processing APIs

scientific article published in 2009

CVS: a compiler for the analysis of cryptographic protocols

Channel abstractions for network security

scientific article published in February 2010

Comparing two information flow security properties

Computer languages and security

scientific article published in April 2002

CookiExt: Patching the browser against session hijacking attacks

scientific article published on 16 September 2015

Cracking Bank PINs by Playing Mastermind

scientific article published in 2010

Editorial

scientific article published on 20 September 2010

Efficient Padding Oracle Attacks on Cryptographic Hardware

scientific article published in 2012

Feedback vertex set in hypercubes

scientific article published in November 2000

Formal Analysis of Key Integrity in PKCS#11

scientific article published in 2010

Formal Models of Timing Attacks on Web Privacy1 1Research partially supported by MURST Progetto Cofinanziato TOSCA

scientific article published in June 2002

Formal methods for web security

scientific article published in February 2017

Getting to know your Card

scientific article published in 2015

Gran: Model Checking Grsecurity RBAC Policies

scientific article published in June 2012

Guessing Bank PINs by Winning a Mastermind Game

article

Guest editor’s introduction: Special issue on security issues in coordination models, languages, and systems

scientific article published in November 2006

Inferring authentication tags

scientific article published in 2005

Information Flow Security in Mobile Ambients1 1Partially supported by MURST Projects “Interpretazione Astratta, Type Systems e Analisi Control-Flow”, and “Certificazione automatica di programmi mediante interpretazione astratta”

scientific article published in August 2001

Information Leakage Detection in Boundary Ambients1 1Partially supported by MIUR Projects “Interpretazione Astratta, Type Systems e Analisi Control-Flow” and “Modelli formali per la sicurezza”, and the EU Contract IST-2001-32617 “Models and

scientific article published in April 2003

Information flow analysis in a discrete-time process algebra

scholarly article

Information flow ecurity in dynamic contexts

Information flow security in Boundary Ambients

scientific article published in February 2008

Information flow security of multi-threaded distributed programs

scientific article published in 2008

Language Based Secure Communication

scientific article published in June 2008

Localizing Firewall Security Policies

scientific article published in June 2016

Match It or Die: Proving Integrity by Equality

scientific article published in 2010

Micro-policies for Web Session Security

scientific article published in June 2016

Mignis: A Semantic Based Tool for Firewall Configuration

scientific article published in July 2014

Nesting analysis of mobile ambients

scientific article published in October 2004

Preface

scientific article published in May 2005

Preface

scientific article published in August 2003

Primitives for authentication in process algebras

scientific article published in June 2002

Provably Sound Browser-Based Enforcement of Web Session Integrity

scientific article published in July 2014

Real-time information flow analysis

scientific article published in January 2003

Refinement operators and information flow security

scientific article published in 2003

Secrecy in Security Protocols as Non Interference

scientific article published in 2000

Secure Recharge of Disposable RFID Tickets

scientific article published in 2012

Secure Upgrade of Hardware Security Modules in Bank Networks

scientific article published in 2010

Secure shared data-space coordination languages: A process algebraic survey

scientific article published in November 2006

Security Abstractions and Intruder Models (Extended Abstract)

scientific article published in July 2009

Security boundaries in mobile ambients

scientific article published in April 2002

Static Evidences for Attack Reconstruction

scientific article published in 2015

Surviving the Web

scientific article published on 6 March 2017

Techniques for Security Checking

scientific article published in June 2002

The Compositional Security Checker: a tool for the verification of information flow security properties

scientific article published in 1997

The ρ-spi Calculus at Work: Authentication Case Studies

scientific article published in August 2004

Type-Based Analysis of Generic Key Management APIs

scientific article published in June 2013

Type-Based Analysis of PIN Processing APIs

scientific article published in 2009

Type-Based Analysis of PKCS#11 Key Management

scientific article published in 2012

Type-based analysis of key management in PKCS#11 cryptographic devices

scientific article published on 20 December 2013

Unwinding in Information Flow Security

scientific article published in August 2004

Verifying persistent security properties

scientific article published in October 2004