FOCARDI Riccardo

Qualifica Professore Ordinario
Telefono 041 234 8438
E-mail focardi@unive.it
ita-sec2017@unive.it - Cybersecurity 2017
Web www.unive.it/persone/focardi (scheda personale)
 http://www.dsi.unive.it/~focardi
Struttura Dipartimento di Scienze Ambientali, Informatica e Statistica
Sito web struttura: http://www.unive.it/dais
Sede: Campus scientifico via Torino

Pubblicazioni per anno

In corso di stampa
  • Focardi, Riccardo; Luccio, Flaminia; Wahsheh, Heider Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study in Kevin Daimi, Guillermo A. Francia, Levent Ertaul, Luis Hernández Encinas, Eman El-Sheikh, Computer and Network Security Essentials, Springer, pp. 207-219 (ISBN 978-3-319-58423-2) (Articolo su libro)
    Link DOI Link al documento: 10278/3687449 abstract
2017
  • Bugliesi, Michele; Calzavara, Stefano; Focardi, Riccardo Formal methods for web security in THE JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, vol. 87, pp. 110-126 (ISSN 2352-2216) (Articolo su rivista)
    Link DOIURL correlato Link al documento: 10278/3685125 abstract
  • Calzavara, Stefano; Focardi, Riccardo; Squarcina, Marco; Tempesta, Mauro Surviving the Web: A Journey into Web Session Security in ACM COMPUTING SURVEYS, vol. 50 (ISSN 0360-0300) (Articolo su rivista)
    Link DOI Link al documento: 10278/3685081 abstract
  • (a cura di) Armando, Alessandro; Baldoni, Roberto; Focardi, Riccardo First Italian Conference on Cybersecurity in Alessandro Armando, Roberto Baldoni, Riccardo Focardi in CEUR WORKSHOP PROCEEDINGS, CEUR-WS, vol. 1816 (ISSN 1613-0073) (Curatela)
    URL correlato Link al documento: 10278/3685918 abstract
2016
  • Bozzato, Claudio; Focardi, Riccardo; Palmarini, Francesco; Steel, Graham APDU-level attacks in PKCS#11 devices , Lecture Notes in Computer Science, Springer Verlag, vol. 9854, pp. 97-117, Convegno: 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, 2016 (ISBN 9783319457185; 9783319457185) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOIURL correlato Link al documento: 10278/3680380 abstract
  • Shantanu Das; Riccardo Focardi; Flaminia Luccio; Euripides Markou; Davide Moro; Marco Squarcina Gathering of Robots in a Ring with Mobile Faults , ICTCS 2016, CEUR, vol. 1720, pp. 122-135, Convegno: 17th Italian Conference on Theoretical Computer Science (ICTCS 2016), September 7-9 2016 (Articolo in Atti di convegno)
    URL correlato Link al documento: 10278/3680255 abstract
  • Adão, Pedro; Focardi, Riccardo; Guttman, Joshua D.; Luccio, Flaminia Localizing firewall security policies , Proceedings - IEEE Computer Security Foundations Symposium, IEEE Computer Society, pp. 194-209, Convegno: 29th IEEE Computer Security Foundations Symposium, CSF 2016, 2016 (ISBN 9781509026074) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/3680246 abstract
  • Calzavara, Stefano; Focardi, Riccardo; Grimm, Niklas; Maffei, Matteo Micro-policies for Web Session Security , IEEE 29th Computer Security Foundations Symposium, CSF 2016, IEEE Computer Society, pp. 179-193, Convegno: IEEE 29th Computer Security Foundations Symposium (ISBN 978-1-5090-2607-4) (Articolo in Atti di convegno)
    Link DOIURL correlato Link al documento: 10278/3684380 abstract
  • Pedro, Adao; Riccardo, Focardi; Joshua, D. Guttman; Flaminia L., Luccio Localizing Security for Distributed Firewalls , 4th Workshop on Hot Issues in Security Principles and Trust, Pubblicazione informale, Convegno: 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016), April, 2016 (Abstract in Atti di convegno)
    Link al documento: 10278/3671317 abstract
2015
  • Bugliesi, Michele; Calzavara, Stefano; Focardi, Riccardo; Khan, Wilayat CookiExt: Patching the browser against session hijacking attacks in JOURNAL OF COMPUTER SECURITY, vol. 23, pp. 509-537 (ISSN 0926-227X) (Articolo su rivista)
    Link DOIURL correlato Link al documento: 10278/3663357 abstract
  • Chiara, Bodei; Linda, Brodo; Riccardo, Focardi Static Evidences for Attack Reconstruction in Chiara Bodei, Linda Brodo, Riccardo Focardi:, Programming Languages with Applications to Biology and Security 2015, Springer, vol. 9465, pp. 162-182 (ISBN 978-3-319-25526-2) (Articolo su libro)
    Link DOI Link al documento: 10278/3671311 abstract
  • Gkaniatsou, Andriana; Mcneill, Fiona; Bundy, Alan; Steel, Graham; Focardi, Riccardo; Bozzato, Claudio Getting to know your card: Reverse-engineering the smart-card application protocol data unit in Andriana Gkaniatsou; Fiona McNeill; Alan Bundy; Graham Steel; Riccardo Focardi; Claudio Bozzato, ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 441-450, Convegno: 31st Annual Computer Security Applications Conference, ACSAC 2015, 2015 (ISBN 9781450336826; 9781450336826) (Articolo in Atti di convegno)
    Link DOIURL correlato Link al documento: 10278/3671310 abstract
  • Focardi, Riccardo; Tempesta, Mauro Development of security extensions based on Chrome APIs , 8th International Workshop on Analysis of Security APIs (ASA-8), no formal editor, Convegno: 8th International Workshop on Analysis of Security APIs (ASA-8), 13/07/2015 (Abstract in Atti di convegno)
    Link al documento: 10278/3662277 abstract
  • Caiazza, Gianluca; Focardi, Riccardo; Squarcina, Marco Run-time analysis of PKCS#11 attacks , 8th International Workshop on Analysis of Security APIs (ASA-8), no formal editor, Convegno: 8th International Workshop on Analysis of Security APIs (ASA-8), 13/07/2015 (Abstract in Atti di convegno)
    Link al documento: 10278/3660277 abstract
  • (a cura di) Riccardo, Focardi; Andrew, C. Myers Principles of Security and Trust - 4th International Conference, POST 2015 in Riccardo Focardi; Andrew C. Myers, Springer, vol. 9036 (ISBN 978-3-662-46665-0) (ISSN 1611-3349) (Curatela)
    Link DOI Link al documento: 10278/3671312 abstract
2014
  • M. Bugliesi; S. Calzavara; R. Focardi; W. Khan Automatic and robust client-side protection for cookie-based sessions , Engineering Secure Software and Systems, Springer, Convegno: 6th International Symposium, ESSoS 2014 (ISBN 9783319048963) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/42442 abstract
  • Pedro, Adão; Claudio, Bozzato; Gian-Luca, Dei Rossi; Focardi, Riccardo; Luccio, Flaminia Mignis: A semantic based tool for firewall configuration , CSF 2014, IEEE, pp. 351-365, Convegno: IEEE 27th Computer Security Foundations Symposium, CSF 2014,, 19-22 July, 2014 (ISBN 9781479942909) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/43839 abstract
  • Michele Bugliesi; Stefano Calzavara; Riccardo Focardi; Wilayat Khan; Mauro Tempesta Provably Sound Browser-Based Enforcement of Web Session Integrity , Proceedings of the 27th Computer Security Foundations Symposium, IEEE, Convegno: Computer Security Foundations Symposium, 19-22 July 2014 (ISBN 9781479942909) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/42652 abstract
  • Pedro Adão; Claudio Bozzato; Gian-Luca Dei Rossi; Riccardo Focardi; Flaminia Luccio A semantic based tool for firewall configuration , HotSpot 2014, no formal editor, Convegno: 2nd Workshop on Hot Issues in Security Principles and Trust (HotSpot 2014), 5th April 2014 (Abstract in Atti di convegno)
    Link al documento: 10278/43846
2013
  • Matteo Centenaro; Riccardo Focardi; Flaminia L. Luccio Type-based Analysis of Key Management in PKCS#11 cryptographic devices in JOURNAL OF COMPUTER SECURITY, vol. 21, pp. 971-1007 (ISSN 0926-227X) (Articolo su rivista)
    Link DOI Link al documento: 10278/35967 abstract
  • Pedro Adão; Riccardo Focardi; Flaminia L. Luccio Type-Based Analysis of Generic Key Management APIs , IEEE CSF, IEEE Computer Society, pp. 97-111, Convegno: IEEE 26th Computer Security Foundations Symposium, Giugno 26–28, 2013 (ISBN 9780769550312) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/37474 abstract
2012
  • R. Focardi; Flaminia Luccio Guessing Bank PINs by Winning a Mastermind Game in THEORY OF COMPUTING SYSTEMS, vol. 50 (1), pp. 52-71 (ISSN 1432-4350) (Articolo su rivista)
    Link DOI Link al documento: 10278/28347 abstract
  • Riccardo Focardi Practical Padding Oracle Attacks on RSA , Defend Yourself! Hands-on Cryptography, Hackin9, IT Security Magazine, pp. 6-23 (Articolo su libro)
    Link al documento: 10278/35298 abstract
  • R. Bardou; R. Focardi; Y. Kawamoto; L. Simionato; G. Steel; J. Tsay Efficient Padding Oracle Attacks on Cryptographic Hardware , 32nd Annual Cryptology Conference, Germany: Springer Verlag Germany, pp. 608-625, Convegno: CRYPTO 2012, August 19-23, 2012 (ISBN 9783642320088) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/35030 abstract
  • R. Focardi; F. Luccio; M. Squarcina Fast SQL Blind Injections in High Latency Networks. , IEEE-AESS Estel Conference - ESTEL 2012, IEEE COMPUTER SOCIETY, pp. 1-6, Convegno: Security and Privacy Special Track, IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL'12), 2-5/10/2012 (ISBN 9781467346870) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/38619 abstract
  • BUGLIESI M.; CALZAVARA S.; FOCARDI R.; SQUARCINA M; Gran: model checking grsecurity RBAC policies , Proceedings 2012 IEEE 25th Computer Security Foundations Symposium CSF 2012, IEEE Computer Society, pp. 126-138, Convegno: CSF 2012, 25-27 June 2012 (ISBN 9780769547183) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/39019 abstract
  • R. Focardi; F. Luccio Secure recharge of disposable RFID tickets , The 8th International Workshop on Formal Aspects of Security & Trust, Germany: Springer Verlag Germany, vol. 7140, pp. 85-99, Convegno: FAST 2011 (ISBN 9783642294198) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/28096 abstract
  • M. Centenaro; R. Focardi; Flaminia Luccio Type-Based Analysis of PKCS#11 Key Management , Principles of Security and Trust, Springer Berlin Heidelberg, vol. 7215, pp. 349-368, Convegno: First International Conference, POST 2012, March 24 - April 1, 2012 (ISBN 9783642286407) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/36662 abstract
  • R. Focardi; F. Luccio Towards a type-based analysis of real PKCS#11 devices , ASA 2012, non definito, Convegno: Proceedings of the 6th International Workshop on Analysis of Security APIs (ASA 2012), June 28 2012 (Abstract in Atti di convegno)
    URL correlato Link al documento: 10278/38723 abstract
2011
  • Riccardo Focardi; Flaminia L. Luccio; Graham Steel An Introduction to Security API Analysis in Alessandro Aldini, Roberto Gorrieri, Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, Springer, vol. 6858, pp. 35-65 (ISBN 9783642230813) (ISSN 0302-9743) (Articolo su libro)
    Link DOI Link al documento: 10278/36856 abstract
  • Focardi, Riccardo; Maffei, Matteo Types for security protocols in Riccardo Focardi; Matteo Maffei, Formal Models and Techniques for Analyzing Security Protocols - Cryptology and Information Security Series, IOS Press, vol. 5, pp. 143-181 (ISBN 9781607507130; 978-1-60750-714-7) (Articolo su libro)
    Link DOI Link al documento: 10278/3662552 abstract
  • FALCONE A.; FOCARDI R Formal Analysis of Key Integrity in PKCS#11 , Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, Germany: Springer Verlag Germany, vol. 6186, pp. 77-94, Convegno: ARSPA-WITS 2010 (ISBN 9783642160738) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/29133 abstract
  • M. CENTENARO; R. FOCARDI Match It or Die: Proving Integrity by Equality , Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, Germany: Springer Verlag Germany, vol. 6186, pp. 130-145, Convegno: ARSPA-WITS 2010 (ISBN 9783642160738) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/4326 abstract
  • R. FOCARDI; F. LUCCIO Secure upgrade of hardware security modules in bank networks , ARSPA-WITS'10, Springer Verlag Germany, vol. 6186, pp. 95-110, Convegno: Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security (ISBN 9783642160738) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/33037 abstract
  • R. Focardi; F. Luccio Analysis and development of Security APIs for disposable RFID tickets , Proceedings of 5th International Workshop on Analysis of Security APIs, not specified, Convegno: 5th International Workshop on Analysis of Security APIs, April 8th, 2011 (Abstract in Atti di convegno)
    URL correlato Link al documento: 10278/24681 abstract
  • R. Focardi; M. Centenaro Fixing PKCS#11 by key-diversification , Proceedings of 5th International Workshop on Analysis of Security APIs, Convegno: 5th International Workshop on Analysis of Security APIs (Abstract in Atti di convegno)
    Link al documento: 10278/28095
2010
  • BUGLIESI M.; FOCARDI R Channel Abstractions for Network Security in MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, vol. 20(1), pp. 3-44 (ISSN 0960-1295) (Articolo su rivista)
    Link DOI Link al documento: 10278/29326 abstract
  • M. BORTOLOZZO; M. CENTENARO; R. FOCARDI; G. STEEL Attacking and Fixing PKCS#11 Security Tokens. in Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov, Proceedings of the 17th ACM Conference on Computer and Communications Security (ACM CCS 2010), ACM press, pp. 260-269, Convegno: 17th ACM Conference on Computer and Communications Security (ACM CCS 2010), October 2010 (ISBN 9781450302449) (Articolo in Atti di convegno)
    Link al documento: 10278/31401 abstract
  • R. FOCARDI; F. LUCCIO Cracking Bank PINs by Playing Mastermind , Fun with algorithms, Springer Verlag Germany, vol. 6099, pp. 202-213, Convegno: 5th International Conference on FUN with Algorithms, FUN 2010 (ISBN 9783642131219) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/3724
2009
  • FOCARDI R.; LUCCIO F. L.; STEEL G. Blunting Differential Attacks on PIN Processing APIs , 14th Nordic Conference on Secure IT Systems, BERLIN, SPRINGER-VERLAG, vol. 5838, pp. 88-103, Convegno: NordSec 2009, 14 October 2009 through 16 October 2009 (ISBN 9783642047657) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/39633 abstract
  • BUGLIESI M.; FOCARDI R Security Abstractions and Intruder Models , Proceedings of the 15th Workshop on Expressiveness in Concurrency (EXPRESS 2008), Toronto, Canada, vol. 242(1), pp. 99-112 (ISSN 1571-0661) (Articolo in Atti di convegno)
    Link al documento: 10278/29325 abstract
  • M. CENTENARO; FOCARDI R.; F. L. LUCCIO; G. STEEL Type-Based Analysis of PIN Processing APIs , 14th European Symposium on Research in Computer Security, BERLIN, SPRINGER-VERLAG, vol. 5789, pp. 53-68, Convegno: ESORICS 2009, SEP 21-23, 2009 (ISBN 9783642044434) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/32641 abstract
  • M. CENTENARO; FOCARDI R.; F. L. LUCCIO; G. STEEL Type-based Analysis of Financial APIs (extended abstract) , Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, non specificato, Convegno: ARSPA-WITS'09, March 2009 (Articolo in Atti di convegno)
    Link al documento: 10278/19328 abstract
  • FOCARDI R.; LUCCIO F.L.; STEEL G. Improving PIN Processing API Security , 3rd International Workshop on Analysis of Security APIs (ASA-3), non specificato, Convegno: 3rd International Workshop on Analysis of Security APIs (ASA-3), July 10-11, 2009 (Abstract in Atti di convegno)
    Link al documento: 10278/39253 abstract
  • M. BORTOLOZZO; G. MARCHETTO; FOCARDI R.; G. STEEL Secure your PKCS#11 token against API attacks! , 3rd International Workshop on Analysis of Security APIs (ASA-3), Convegno: 3rd International Workshop on Analysis of Security APIs (ASA-3), July 2009 (Abstract in Atti di convegno)
    Link al documento: 10278/19327
  • M. CENTENARO; R. FOCARDI; F.L. LUCCIO; G. STEEL Type-based Analysis of Financial APIs , Dipartimento di Informatica dell’Universita` Ca’ Foscari Venezia, vol. CS-2009-2 (Rapporto di ricerca)
    Link al documento: 10278/18838 abstract
2008
  • BRAGHIN C; CORTESI A.; FOCARDI R Information flow security in Boundary Ambients in INFORMATION AND COMPUTATION, vol. 206, pp. 460-489 (ISSN 0890-5401) (Articolo su rivista)
    Link DOI Link al documento: 10278/22285 abstract
  • M. CENTENARO; FOCARDI R. Information flow security of multi-threaded distributed programs , Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security (PLAS'08), ACM Press, pp. 113-124, Convegno: third ACM SIGPLAN workshop on Programming languages and analysis for security (PLAS'08) (ISBN 9781595939364) (Articolo in Atti di convegno)
    Link al documento: 10278/19599
  • BUGLIESI M.; FOCARDI; R Language Based Secure Communication , CSF 2008 - 21st IEEE Symposium on Computer Security Foundations, IEEE Computer Society, pp. 3-16, Convegno: 21st IEEE Symposium on Computer Security Foundations, 23 - 25 June 2008 (ISBN 9780769531823) (Articolo in Atti di convegno)
    Link al documento: 10278/19905
2007
  • M. BUGLIESI; FOCARDI R.; M. MAFFEI Dynamic Types for Authentication in JOURNAL OF COMPUTER SECURITY, vol. 15 (6), pp. 563-617 (ISSN 0926-227X) (Articolo su rivista)
    Link al documento: 10278/30434 abstract
  • M.BACKES; CORTESI A.; R.FOCARDI; M.MAFFEI A calculus of challenges and responses in V.GLIGO; H.MANTEL EDS., Proceedings of the 2007 ACM workshop on Formal methods in security engineering, NEW YORK, ACM, The Association for Computing Machinery, pp. 51-60, Convegno: FMSE07 - ACM workshop on Formal methods in security engineering, November 2nd, 2007 (ISBN 9781595938879) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/22301 abstract
2006
  • FOCARDI R; ROSSI S. Information Flow Security in Dynamic Contexts in JOURNAL OF COMPUTER SECURITY, vol. 14, pp. 65-110 (ISSN 0926-227X) (Articolo su rivista)
    Link al documento: 10278/29828 abstract
  • FOCARDI R.; R. LUCCHI; G. ZAVATTARO Secure shared data-space Coordination Languages: a Process Algebraic survey in SCIENCE OF COMPUTER PROGRAMMING, vol. 63(1), pp. 3-15 (ISSN 0167-6423) (Articolo su rivista)
    Link al documento: 10278/29467 abstract
  • (a cura di) FOCARDI R. Special Issue on CSFW17 in JOURNAL OF COMPUTER SECURITY, IOS Press, vol. 14(2) (ISSN 0926-227X) (Curatela)
    Link al documento: 10278/4697
2005
  • C. BODEI; P. DEGANO; FOCARDI R.; C. PRIAMI Authentication primitives for secure protocol specifications in FUTURE GENERATION COMPUTER SYSTEMS, vol. 21(4), pp. 645-653 (ISSN 0167-739X) (Articolo su rivista)
    Link al documento: 10278/11521 abstract
  • FOCARDI R. Static Analysis of Authentication , Foundations of Security Analysis and Design III, SPRINGER VERLAG, vol. 3655, pp. 109-132 (ISBN 9783540289555) (ISSN 0302-9743) (Articolo su libro)
    Link al documento: 10278/36855 abstract
  • BUGLIESI M.; FOCARDI R; MAFFEI M Analysis of Typed Analyses of Authentication Protocols , CSFW 2005 - Computer Security Foundation Workshop, IEEE, pp. 112-125, Convegno: CSFW 2005 - Computer Security Foundation Workshop, 20-22 June 2005 (ISBN 0769523404) (Articolo in Atti di convegno)
    Link al documento: 10278/5637
  • FOCARDI R.; ROSSI S; SABELFELD A Bridging Language-Based and Process Calculi Security , Foundations of Software Science and Computational Structures, vol. 3441, pp. 299-315, Convegno: 8th International Conference, FOSSACS 2005 (ISBN 3540253882) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/34383 abstract
  • FOCARDI R.; MAFFEI M.; PLACELLA F. Inferring Authentication Tags , Proceedings of 2005 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS'05), Convegno: 2005 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS'05) (Articolo in Atti di convegno)
    Link al documento: 10278/6024
  • (a cura di) FOCARDI R. Special Issue on CSFW16 in JOURNAL OF COMPUTER SECURITY, IOS press, vol. 13(3) (ISSN 0926-227X) (Curatela)
    Link al documento: 10278/4696
2004
  • FOCARDI R.; LUCCIO F.L. A modular approach to Sprouts in DISCRETE APPLIED MATHEMATICS, vol. 144 (3), pp. 303-319 (ISSN 0166-218X) (Articolo su rivista)
    Link al documento: 10278/31292 abstract
  • CHIARA BRAGHIN; CORTESI A.; RICCARDO FOCARDI; FLAMINIA L. LUCCIO; CARLA PIAZZA Nesting analysis of mobile ambients in COMPUTER LANGUAGES, SYSTEMS & STRUCTURES, vol. 30 (3-4), pp. 207-230 (ISSN 1477-8424) (Articolo su rivista)
    Link DOI Link al documento: 10278/29447 abstract
  • BOSSI A; FOCARDI R; MACEDONIO D; PIAZZA C; ROSSI S. Unwinding in Information Flow Security in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, vol. 99, pp. 127-154 (ISSN 1571-0661) (Articolo su rivista)
    Link DOIURL correlato Link al documento: 10278/38887 abstract
  • BOSSI A.; FOCARDI R.; PIAZZA C.; ROSSI S. Verifying Persistent Security Properties. in COMPUTER LANGUAGES, SYSTEMS & STRUCTURES, vol. 30, pp. 231-258 (ISSN 1477-8424) (Articolo su rivista)
    Link DOIURL correlato Link al documento: 10278/39178 abstract
  • FOCARDI R.; ROBERTO GORRIERI; FABIO MARTINELLI Classification of Security Properties (Part II: Network Security) , Foundations of Security Analysis and Design II, SPRINGER VERLAG, vol. 2946, pp. 331-396 (ISBN 9783540209553) (ISSN 0302-9743) (Articolo su libro)
    Link al documento: 10278/36661 abstract
  • BUGLIESI M.; FOCARDI R.; MAFFEI M. Authenticity by tagging and typing , FMSE, ACM, pp. 1-12, Convegno: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering FMSE 2004, October 2004 (ISBN 9781581139716) (Articolo in Atti di convegno)
    Link al documento: 10278/5638
  • C. BRAGHIN; A. CORTESI; FOCARDI R.; F.L. LUCCIO; C. PIAZZA Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients , Formal Methods for Security and Time, Amsterdam, Elsevier, vol. 99, pp. 319-337, Convegno: Mefisto, November 3-5, 2003 (ISSN 1571-0661) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/24983 abstract
  • BUGLIESI M.; RICCARDO FOCARDI; MATTEO MAFFEI Compositional Analysis of Authentication Protocols , Programming Languages and Systems, 13th European Symposium on Programming, ESOP 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings., vol. 2986, pp. 140-154 (ISBN 3540213139) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/23344
  • R. FOCARDI; F.L. LUCCIO How tasty is a cannibal? A strategy for the mesh cannibal game , Fun 2004, Pisa, Edizioni Plus Universita' di Pisa, pp. 171-183, Convegno: Third International Conference on Fun with Algorithms, MAY 26-28 2004 (ISBN 9788884921505) (Articolo in Atti di convegno)
    Link al documento: 10278/15760
  • FOCARDI R.; M. MAFFEI The ro-spi Calculus at Work: Authentication Case Studies , Formal Methods for Security and Time, vol. 99, pp. 267-293, Convegno: MEFISTO (ISSN 1571-0661) (Articolo in Atti di convegno)
    Link al documento: 10278/11797
  • (a cura di) FOCARDI R.; R. GORRIERI Foundations of Security Analysis and Design II - Tutorial Lectures in LECTURE NOTES IN COMPUTER SCIENCE, SPRINGER VERLAG, vol. 2946 (ISBN 3540209557) (ISSN 0302-9743) (Curatela)
    Link al documento: 10278/4693
  • (a cura di) FOCARDI R. Proceedings of 17th IEEE Computer Security Foundations Workshop (CSFW17) , IEEE COMPUTER SOCIETY (ISBN 076952169X) (Curatela)
    Link al documento: 10278/4647 abstract
  • (a cura di) FOCARDI R.; G. ZAVATTARO Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo 2004) in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, Amsterdam Netherlands: Elsevier -link esterno , Fax: 011 31 20 4853598, vol. ENTCS 128(5) (ISSN 1571-0661) (Curatela)
    Link al documento: 10278/4649 abstract
2003
  • FOCARDI R.; R. GORRIERI; F. MARTINELLI A Comparison of Three Authentication Properties in THEORETICAL COMPUTER SCIENCE, vol. 291(3), pp. 219-388 (ISSN 0304-3975) (Articolo su rivista)
    Link al documento: 10278/36683 abstract
  • FOCARDI R.; GORRIERI R.; MARTINELLI F. Real-Time Information Flow Analysis in IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, vol. 21(1), pp. 20-35 (ISSN 0733-8716) (Articolo su rivista)
    Link al documento: 10278/35103 abstract
  • BOSSI A.; FOCARDI R; PIAZZA C; ROSSI S A Proof System for Information Flow Security , Logic Based Program Synthesis and Transformation, vol. 2664, pp. 199-218, Convegno: LOPSTR '02 (ISBN 3540404384) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/32533 abstract
  • C.BODEI; P.DEGANO; FOCARDI R.; C.PRIAMI Authentication Primitives for Protocol Specifications , Parallel Computing Technologies, vol. 2763, pp. 49-65, Convegno: 7th International Conference, PaCT 2003 (ISBN 9783540406730) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/11522 abstract
  • C. BRAGHIN; A. CORTESI; S. FILIPPONE; R. FOCARDI; F.L. LUCCIO; C. PIAZZA BANANA: A tool for Boundary Ambients Nesting ANAlysis in Hubert Garavel, John Hatcliff, Tools and Algorithms for the Construction and Analysis of Systems, Heidelberg, Springer Verlag, vol. 2619, pp. 437-441, Convegno: Tools and Algorithms for the Construction and Analysis of Systems, 9th International Conference, TACAS 2003, April 7-11, 2003 (ISBN 3540008985) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/30387 abstract
  • BOSSI A.; FOCARDI R; PIAZZA C; ROSSI S Bisimulation and Unwinding for Verifying Possibilistic Security Properties , Verification, Model Checking, and Abstract Interpretation, vol. 2575 of LNCS, pp. 223-237, Convegno: VMCAI'03 (ISBN 3540003487) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/12642 abstract
  • C. BRAGHIN; A. CORTESI; R. FOCARDI; F.L. LUCCIO; C. PIAZZA Complexity of Nesting Analysis in Mobile Ambients in Lenore D. Zuck et al., Verification, Model Checking, and Abstract Interpretation, Heidelberg, Springer Verlag, vol. 2575, pp. 86-101, Convegno: Verification, Model Checking, and Abstract Interpretation, 4th International Conference, VMCAI 2003, January 9-11, 2002 (ISBN 3540003487) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/15803 abstract
  • CHIARA BRAGHIN; CORTESI A.; RICCARDO FOCARDI Information Leakage Detection in Boundary Ambients , Proc. Computing: The Australasian Theory Symposium, Elsevier, vol. 78, pp. 127-147, Convegno: Computing: The Australasian Theory Symposium (CATS'03), 4th to 7th February, 2003 (ISSN 1571-0661) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/25033 abstract
  • BUGLIESI M.; RICCARDO FOCARDI; MATTEO MAFFEI Principles for Entity Authentication , Perspectives of Systems Informatics, 5th International Andrei Ershov Memorial Conference, PSI 2003, Akademgorodok, Novosibirsk, Russia, July 9-12, 2003, Revised Papers, vol. 2890, pp. 294-306 (ISBN 3540208135) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/13496
  • BOSSI A; FOCARDI R; PIAZZA C; ROSSI S. Refinement Operators and Information Flow Security , 1st International Conference on Software Engineering and Formal Methods, IEEE Computer Society, pp. 44-53, Convegno: SEFM'03, 22-27 September (ISBN 9780769519494) (Articolo in Atti di convegno)
    Link al documento: 10278/16047
  • (a cura di) FOCARDI R. Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW16) , IEEE Computer Society (ISBN 076951927X) (Curatela)
    Link al documento: 10278/4648
  • (a cura di) FOCARDI R.; G. ZAVATTARO Proceedings of 1st International Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo'03) in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, Amsterdam Netherlands: Elsevier -link esterno , Fax: 011 31 20 4853598, vol. ENTCS 85(3) (ISSN 1571-0661) (Curatela)
    Link al documento: 10278/4650
2002
  • CORTESI A.; FOCARDI R. Computer Languages and Security in COMPUTER LANGUAGES, vol. 28(1), pp. 1-2 (ISSN 0096-0551) (Articolo su rivista)
    Link DOI Link al documento: 10278/12126
  • BODEI C.; DEGANO P.; FOCARDI R.; PRIAMI C. Primitives for Authentication in Process Algebras in THEORETICAL COMPUTER SCIENCE, vol. 283(2), pp. 271-304 (ISSN 0304-3975) (Articolo su rivista)
    Link al documento: 10278/31293 abstract
  • BRAGHIN C.; CORTESI A.; FOCARDI R. Security Boundaries in Mobile Ambient in COMPUTER LANGUAGES, vol. 28(1), pp. 101-127 (ISSN 0096-0551) (Articolo su rivista)
    Link DOI Link al documento: 10278/26404
  • BUGLIESI M.; GIUSEPPE CASTAGNA; SILVIA CRAFA; RICCARDO FOCARDI; VLADIMIRO SASSONE A Survey of Name-Passing Calculi and Crypto-Primitives , Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, Germany:Springer Verlag Germany, vol. 2946, pp. 91-138 (ISBN 3540209557) (ISSN 0302-9743) (Articolo su libro)
    Link al documento: 10278/7587
  • FOCARDI R.; SABINA ROSSI A Security Property for Processes in Dynamic Contexts , ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security WITS02, Convegno: ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security WITS02 (Articolo in Atti di convegno)
    Link al documento: 10278/6021
  • CHIARA BODEI; PIERPAOLO DEGANO; FOCARDI R.; CORRADO PRIAMI Authentication Primitives for Refining Protocol Specifications , ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security WITS02, Convegno: ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security WITS02 (Articolo in Atti di convegno)
    Link al documento: 10278/6022
  • BRAGHIN C.; CORTESI A.; FOCARDI R.; VAN BAKEL S. Boundary Inference for Enforcing Security Policies in Mobile Ambients in RICARDO A. BAEZAYATES; UGO MONTANARI; NICOLA SANTORO EDS., Foundations of Information Technology in the Era of Networking and Mobile Computing, DORDRECHT, Kluwer, vol. 223, pp. 383-395, Convegno: IFIP 17th World Computer Congress - TC1 Stream / 2nd IFIP International Conference on Theoretical Computer Science (TCS 2002), August 25-30, 2002 (ISBN 9781402071812) (Articolo in Atti di convegno)
    Link al documento: 10278/9627
  • BRAGHIN C.; CORTESI A.; FOCARDI R. Control Flow Analysis of Mobile Ambients with Security Boundaries in BART JACOBS; AREND RENSINK EDS., Formal Methods for Open Object-Based Distributed Systems, DORDRECHT, Kluwer, vol. 209, pp. 197-212, Convegno: IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), March 20-22, 2002 (ISBN 9780792376835) (Articolo in Atti di convegno)
    Link al documento: 10278/9626
  • C. BRAGHIN; A. CORTESI; FOCARDI R. Freshness Analysis in Security Protocols , 14th Nordic Workshop on Programming Theory (NWPT 02), Convegno: 14th Nordic Workshop on Programming Theory (NWPT 02), 20-22 NOVEMBER 2002 (Articolo in Atti di convegno)
    Link al documento: 10278/6027
  • FOCARDI R; ROSSI S. Information Flow Security in Dynamic Contexts , Computer Security Foundations Workshop, IEEE Computer Society, pp. 307-319, Convegno: CSFW'02, 24-26 June 2002 (ISBN 9780769516899) (Articolo in Atti di convegno)
    Link al documento: 10278/16049
  • FOCARDI R.; C. PIAZZA; S. ROSSI Proofs Methods for Bisimulation based Information Flow Security , Third International Workshop on Verification, Model Checking and Abstract Interpretation, vol. 2294, pp. 16-31, Convegno: VMCAI 2002 (ISBN 9783540436317) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/11586
  • BOSSI A.; FOCARDI R; PIAZZA C; ROSSI S Transforming processes to check and ensure Information Flow Security , Algebraic Methodology and Software Technology, vol. 2422 of LNCS, pp. 271-286, Convegno: AMAST 2002 (ISBN 3540441441) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/32668 abstract
  • (a cura di) A. CORTESI; FOCARDI R. Special issue on "Computer Languages and Security" in COMPUTER LANGUAGES, SYSTEMS & STRUCTURES, Elsevier, vol. 28(1) (ISSN 1477-8424) (Curatela)
    Link al documento: 10278/4695
  • FOCARDI, Riccardo; LUCCIO, Flaminia Analysing Sprouts , Universita' di Venezia, Dipartimento di Informatica, vol. CS-2002-9 (Rapporto di ricerca)
    Link al documento: 10278/16121
2001
  • FOCARDI R.; R. GORRIERI Classification of Security Properties (Part I: Information Flow) , Foundations of Security Analysis and Design, SPRINGER VERLAG, vol. 2171, pp. 331-396 (ISBN 3540428968) (ISSN 0302-9743) (Articolo su libro)
    Link al documento: 10278/31853 abstract
  • R. FOCARDI; F.L. LUCCIO A new analysis technique for the Sprouts Game , International Conference Fun with Algorithms 2 (FUN 2001), Carleton Scientific, pp. 117-132, Convegno: International Conference Fun with Algorithms 2 (FUN 2001), MAY 29-31 (ISBN 9781894145091) (Articolo in Atti di convegno)
    Link al documento: 10278/15759
  • ANTONIO DURANTE; FOCARDI R.; ROBERTO GORRIERI CVS at Work: A Report on New Failures upon some Cryptographic Protocol , Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security, vol. 2052, pp. 287-299, Convegno: MMM-ACNS 2001 (ISBN 9783540421030) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/11794
  • CHIARA BRAGHIN; AGOSTINO CORTESI; FOCARDI R. Control Flow Analysis for information flow security , NORDSEC 2001, Convegno: NORDSEC 2001 (Articolo in Atti di convegno)
    Link al documento: 10278/6023
  • CORTESI A.; RICCARDO FOCARDI Information Flow Security in Mobile Ambients , Proc. of the International Workshop on Cuncurrency and Coordination CONCOORD'01, Amsterdam, Elsevier, vol. 54, pp. 58-68, Convegno: International Workshop on Cuncurrency and Coordination CONCOORD'01, July 2001 (ISSN 1571-0661) (Articolo in Atti di convegno)
    Link DOI Link al documento: 10278/22308 abstract
  • (a cura di) FOCARDI R.; R. GORRIERI Foundations of Security Analysis and Design - Tutorial Lectures in LECTURE NOTES IN COMPUTER SCIENCE, SPRINGER VERLAG, vol. 2171 (ISBN 3540428968) (ISSN 0302-9743) (Curatela)
    Link al documento: 10278/4694
2000
  • DURANTE A.; FOCARDI R.; GORRIERI R. A Compiler for Analysing Cryptographic Protocols Using Non-Interference in ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, vol. 9(4), pp. 489-530 (ISSN 1049-331X) (Articolo su rivista)
    Link al documento: 10278/32512 abstract
  • R. FOCARDI; F.L. LUCCIO; D. PELEG Feedback Vertex Set in Hypercubes in INFORMATION PROCESSING LETTERS, vol. 76/1-2, pp. 1-5 (ISSN 0020-0190) (Articolo su rivista)
    Link al documento: 10278/16115 abstract
  • FOCARDI R.; R. GORRIERI; R. SEGALA A New Definition of Multilevel Security , Workshop on Issues in the Theory of Security (WITS '00), Convegno: Workshop on Issues in the Theory of Security (WITS '00) (Articolo in Atti di convegno)
    Link al documento: 10278/6025 abstract
  • FOCARDI R.; R. GORRIERI; F. MARTINELLI Information Flow in a Discrete-Time Process Algebra , 13th IEEE Computer Security Foundations Workshop (CSFW'00), IEEE Press, Convegno: 13th IEEE Computer Security Foundations Workshop (CSFW'00) (ISBN 0769506712) (Articolo in Atti di convegno)
    Link al documento: 10278/6026 abstract
  • FOCARDI R.; R. GORRIERI; F. MARTINELLI Message Authentication through Non Interference , International Conference on Algebraic Methodology And Software Technology, vol. 1816, pp. 258-272, Convegno: AMAST 2000 (ISBN 3540675302) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/11796 abstract
  • FOCARDI R.; GORRIERI R; MARTINELLI F Non Interference for the Analysis of Cryptographic Protocols , 27th International Colloquium on Automata, Languages and Programming, vol. 1853, pp. 354-372, Convegno: ICALP'00 (ISBN 3540677151) (ISSN 0302-9743) (Articolo in Atti di convegno)
    Link al documento: 10278/11795 abstract
1999
  • R. FOCARDI; F.L. LUCCIO Minumum Feedback Vertex Set in k-Dimensional Hypercubes , Universita' Ca' Foscari di Venezia, Dipartimento di Informatica, vol. CS-99-21 (Rapporto di ricerca)
    Link al documento: 10278/15706
1997
  • FOCARDI R.; GORRIERI R. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties in IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, vol. 23(9), pp. 550-571 (ISSN 0098-5589) (Articolo su rivista)
    Link al documento: 10278/35361 abstract
1995
  • FOCARDI R.; GORRIERI R. A Classification of Security Properties for Process Algebras in JOURNAL OF COMPUTER SECURITY, vol. 3(1), pp. 5-33 (ISSN 0926-227X) (Articolo su rivista)
    Link al documento: 10278/11520 abstract