Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Giampaolo Bella
@article{DBLP:journals/corr/abs-2403-16196, author = {Mario Raciti and Giampaolo Bella}, title = {Behind the (Digital Crime) Scenes: An {MSC} Model}, journal = {CoRR}, volume = {abs/2403.16196}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.16196}, doi = {10.48550/ARXIV.2403.16196}, eprinttype = {arXiv}, eprint = {2403.16196}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-16196.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BellaDR23, author = {Giampaolo Bella and Cristian Daniele and Mario Raciti}, title = {The {AILA} Methodology for Automated and Intelligent Likelihood Assignment in Risk Assessment}, journal = {{IEEE} Access}, volume = {11}, pages = {26170--26183}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3245333}, doi = {10.1109/ACCESS.2023.3245333}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BellaDR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ia/BellaCLAS23, author = {Giampaolo Bella and Domenico Cantone and Carmelo Fabio Longo and Marianna Nicolosi Asmundo and Daniele Francesco Santamaria}, title = {The ontology for agents, systems and integration of services: {OASIS} version 2\({}^{\mbox{{\textdollar}}}\)}, journal = {Intelligenza Artificiale}, volume = {17}, number = {1}, pages = {51--62}, year = {2023}, url = {https://doi.org/10.3233/IA-230002}, doi = {10.3233/IA-230002}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ia/BellaCLAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/BellaBBE23, author = {Giampaolo Bella and Pietro Biondi and Stefano Bognanni and Sergio Esposito}, title = {PETIoT: PEnetration Testing the Internet of Things}, journal = {Internet Things}, volume = {22}, pages = {100707}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100707}, doi = {10.1016/J.IOT.2023.100707}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/BellaBBE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CastiglioneBS23, author = {Gianpietro Castiglione and Giampaolo Bella and Daniele Francesco Santamaria}, title = {Towards Grammatical Tagging for the Legal Language of Cybersecurity}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {82:1--82:9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605069}, doi = {10.1145/3600160.3605069}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CastiglioneBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EspositoSB23, author = {Sergio Esposito and Daniele Sgandurra and Giampaolo Bella}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {The {VOCODES} Kill Chain for Voice Controllable Devices}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {176--197}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_11}, doi = {10.1007/978-3-031-54129-2\_11}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/EspositoSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaugeriDB23, author = {Marcello Maugeri and Cristian Daniele and Giampaolo Bella}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {291--308}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_17}, doi = {10.1007/978-3-031-54129-2\_17}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MaugeriDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RacitiB23, author = {Mario Raciti and Giampaolo Bella}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Pantaleone Nespoli and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Up-to-Date Threat Modelling for Soft Privacy on Smart Cars}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14398}, pages = {454--473}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54204-6\_27}, doi = {10.1007/978-3-031-54204-6\_27}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/RacitiB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/RacitiB23, author = {Mario Raciti and Giampaolo Bella}, title = {A Threat Model for Soft Privacy on Smart Cars}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSPW59978.2023.00005}, doi = {10.1109/EUROSPW59978.2023.00005}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/RacitiB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/EspositoSB23, author = {Sergio Esposito and Daniele Sgandurra and Giampaolo Bella}, title = {Protecting Voice-Controllable Devices Against Self-Issued Voice Commands}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {160--174}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00019}, doi = {10.1109/EUROSP57164.2023.00019}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/EspositoSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MaugeriDBP23, author = {Marcello Maugeri and Cristian Daniele and Giampaolo Bella and Erik Poll}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {424--429}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011648600003405}, doi = {10.5220/0011648600003405}, timestamp = {Thu, 11 May 2023 10:52:54 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MaugeriDBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jowo/BellaCS23, author = {Giampaolo Bella and Gianpietro Castiglione and Daniele Francesco Santamaria}, editor = {Fumiaki Toyoshima and Megan Katsumi and Guendalina Righetti and Stefano De Giorgis and Maria M. Hedblom and Oliver Kutz and Boyan Brodaric and Michael Gr{\"{u}}ninger and Torsten Hahmann and Damion Dooley Simon and Matthew Lange and Hande K{\"{u}}{\c{c}}{\"{u}}k{-}McGinty and Anoosha Sehar Simon and Rhiannon Cameron and Bart Gajderowicz and Daniela Rosu and Janna Hastings and Davide Audrito and Luigi Di Caro and Francesca Grasso and Roberto Nai and Emilio Sulis and Loris Bozzato and Cogan Shimizu and Antoine Zimmermann and Riccardo Baratella and Stefano Borgo and Sergio de Cesare and Tiago Prince Sales}, title = {An Ontological Approach to Compliance Verification of the {NIS} 2 Directive}, booktitle = {Proceedings of the Joint Ontology Workshops 2023 Episode {IX:} The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems {(FOIS} 2023), Sherbrooke, Qu{\'{e}}bec, Canada, July 19-20, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3637}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3637/paper12.pdf}, timestamp = {Mon, 11 Mar 2024 19:12:45 +0100}, biburl = {https://dblp.org/rec/conf/jowo/BellaCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jowo/BellaCS23a, author = {Giampaolo Bella and Gianpietro Castiglione and Daniele Francesco Santamaria}, editor = {Fumiaki Toyoshima and Megan Katsumi and Guendalina Righetti and Stefano De Giorgis and Maria M. Hedblom and Oliver Kutz and Boyan Brodaric and Michael Gr{\"{u}}ninger and Torsten Hahmann and Damion Dooley Simon and Matthew Lange and Hande K{\"{u}}{\c{c}}{\"{u}}k{-}McGinty and Anoosha Sehar Simon and Rhiannon Cameron and Bart Gajderowicz and Daniela Rosu and Janna Hastings and Davide Audrito and Luigi Di Caro and Francesca Grasso and Roberto Nai and Emilio Sulis and Loris Bozzato and Cogan Shimizu and Antoine Zimmermann and Riccardo Baratella and Stefano Borgo and Sergio de Cesare and Tiago Prince Sales}, title = {An Automated Method for the Ontological Representation of Security Directives}, booktitle = {Proceedings of the Joint Ontology Workshops 2023 Episode {IX:} The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems {(FOIS} 2023), Sherbrooke, Qu{\'{e}}bec, Canada, July 19-20, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3637}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3637/paper18.pdf}, timestamp = {Sat, 17 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/jowo/BellaCS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jowo/BellaCS23b, author = {Giampaolo Bella and Gianpietro Castiglione and Daniele Francesco Santamaria}, editor = {Fumiaki Toyoshima and Megan Katsumi and Guendalina Righetti and Stefano De Giorgis and Maria M. Hedblom and Oliver Kutz and Boyan Brodaric and Michael Gr{\"{u}}ninger and Torsten Hahmann and Damion Dooley Simon and Matthew Lange and Hande K{\"{u}}{\c{c}}{\"{u}}k{-}McGinty and Anoosha Sehar Simon and Rhiannon Cameron and Bart Gajderowicz and Daniela Rosu and Janna Hastings and Davide Audrito and Luigi Di Caro and Francesca Grasso and Roberto Nai and Emilio Sulis and Loris Bozzato and Cogan Shimizu and Antoine Zimmermann and Riccardo Baratella and Stefano Borgo and Sergio de Cesare and Tiago Prince Sales}, title = {A Behaviouristic Approach to Representing Processes and Procedures in the {OASIS} 2 Ontology}, booktitle = {Proceedings of the Joint Ontology Workshops 2023 Episode {IX:} The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems {(FOIS} 2023), Sherbrooke, Qu{\'{e}}bec, Canada, July 19-20, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3637}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3637/paper27.pdf}, timestamp = {Sat, 17 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/jowo/BellaCS23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BonaventuraEB23, author = {Davide Bonaventura and Sergio Esposito and Giampaolo Bella}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Smart Bulbs Can Be Hacked to Hack into Your Household}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {218--229}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012092900003555}, doi = {10.5220/0012092900003555}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BonaventuraEB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vehits/RacitiB23, author = {Mario Raciti and Giampaolo Bella}, editor = {Alexey V. Vinel and Jeroen Ploeg and Karsten Berns and Oleg Gusikhin}, title = {How to Model Privacy Threats in the Automotive Domain}, booktitle = {Proceedings of the 9th International Conference on Vehicle Technology and Intelligent Transport Systems, {VEHITS} 2023, Prague, Czech Republic, April 26-28, 2023}, pages = {394--401}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011998800003479}, doi = {10.5220/0011998800003479}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vehits/RacitiB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2022, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-32636-3}, doi = {10.1007/978-3-031-32636-3}, isbn = {978-3-031-32635-6}, timestamp = {Sun, 21 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-05060, author = {Marcello Maugeri and Cristian Daniele and Giampaolo Bella and Erik Poll}, title = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers}, journal = {CoRR}, volume = {abs/2301.05060}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.05060}, doi = {10.48550/ARXIV.2301.05060}, eprinttype = {arXiv}, eprint = {2301.05060}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-05060.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-04900, author = {Giampaolo Bella and Pietro Biondi and Stefano Bognanni and Sergio Esposito}, title = {PETIoT: PEnetration Testing the Internet of Things}, journal = {CoRR}, volume = {abs/2302.04900}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.04900}, doi = {10.48550/ARXIV.2302.04900}, eprinttype = {arXiv}, eprint = {2302.04900}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-04900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-10370, author = {Mario Raciti and Giampaolo Bella}, title = {How to Model Privacy Threats in the Automotive Domain}, journal = {CoRR}, volume = {abs/2303.10370}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.10370}, doi = {10.48550/ARXIV.2303.10370}, eprinttype = {arXiv}, eprint = {2303.10370}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-10370.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-04222, author = {Mario Raciti and Giampaolo Bella}, title = {A Threat Model for Soft Privacy on Smart Cars}, journal = {CoRR}, volume = {abs/2306.04222}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.04222}, doi = {10.48550/ARXIV.2306.04222}, eprinttype = {arXiv}, eprint = {2306.04222}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-04222.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-10061, author = {Giampaolo Bella and Domenico Cantone and Carmelo Fabio Longo and Marianna Nicolosi Asmundo and Daniele Francesco Santamaria}, title = {The Ontology for Agents, Systems and Integration of Services: {OASIS} version 2}, journal = {CoRR}, volume = {abs/2306.10061}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.10061}, doi = {10.48550/ARXIV.2306.10061}, eprinttype = {arXiv}, eprint = {2306.10061}, timestamp = {Thu, 22 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-10061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-17042, author = {Gianpietro Castiglione and Giampaolo Bella and Daniele Francesco Santamaria}, title = {Towards Grammatical Tagging for the Legal Language of Cybersecurity}, journal = {CoRR}, volume = {abs/2306.17042}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.17042}, doi = {10.48550/ARXIV.2306.17042}, eprinttype = {arXiv}, eprint = {2306.17042}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-17042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-17494, author = {Gianpietro Castiglione and Daniele Francesco Santamaria and Giampaolo Bella}, title = {An ontological approach to compliance verification of the {NIS} 2 directive}, journal = {CoRR}, volume = {abs/2306.17494}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.17494}, doi = {10.48550/ARXIV.2306.17494}, eprinttype = {arXiv}, eprint = {2306.17494}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-17494.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-17514, author = {Giampaolo Bella and Gianpietro Castiglione and Daniele Francesco Santamaria}, title = {A behaviouristic approach to representing processes and procedures in the {OASIS} 2 ontology}, journal = {CoRR}, volume = {abs/2306.17514}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.17514}, doi = {10.48550/ARXIV.2306.17514}, eprinttype = {arXiv}, eprint = {2306.17514}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-17514.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-01211, author = {Giampaolo Bella and Gianpietro Castiglione and Daniele Francesco Santamaria}, title = {An automated method for the ontological representation of security directives}, journal = {CoRR}, volume = {abs/2307.01211}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.01211}, doi = {10.48550/ARXIV.2307.01211}, eprinttype = {arXiv}, eprint = {2307.01211}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-01211.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-09019, author = {Davide Bonaventura and Sergio Esposito and Giampaolo Bella}, title = {Smart Bulbs can be Hacked to Hack into your Household}, journal = {CoRR}, volume = {abs/2308.09019}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.09019}, doi = {10.48550/ARXIV.2308.09019}, eprinttype = {arXiv}, eprint = {2308.09019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-09019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-11273, author = {Mario Raciti and Giampaolo Bella}, title = {Up-to-date Threat Modelling for Soft Privacy on Smart Cars}, journal = {CoRR}, volume = {abs/2308.11273}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.11273}, doi = {10.48550/ARXIV.2308.11273}, eprinttype = {arXiv}, eprint = {2308.11273}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-11273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BellaBCM22, author = {Giampaolo Bella and Pietro Biondi and Gianpiero Costantino and Ilaria Matteucci}, title = {Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security}, journal = {Comput. Networks}, volume = {218}, pages = {109377}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109377}, doi = {10.1016/J.COMNET.2022.109377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BellaBCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/EiseleMSHB22, author = {Max Eisele and Marcello Maugeri and Rachna Shriwas and Christopher Huth and Giampaolo Bella}, title = {Embedded fuzzing: a review of challenges, tools, and solutions}, journal = {Cybersecur.}, volume = {5}, number = {1}, pages = {18}, year = {2022}, url = {https://doi.org/10.1186/s42400-022-00123-y}, doi = {10.1186/S42400-022-00123-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/EiseleMSHB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/BellaBB22, author = {Giampaolo Bella and Pietro Biondi and Stefano Bognanni}, title = {Multi-service threats: Attacking and protecting network printers and VoIP phones alike}, journal = {Internet Things}, volume = {18}, pages = {100507}, year = {2022}, url = {https://doi.org/10.1016/j.iot.2022.100507}, doi = {10.1016/J.IOT.2022.100507}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/BellaBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BellaGS22, author = {Giampaolo Bella and Rosario Giustolisi and Carsten Sch{\"{u}}rmann}, title = {Modelling human threats in security ceremonies}, journal = {J. Comput. Secur.}, volume = {30}, number = {3}, pages = {411--433}, year = {2022}, url = {https://doi.org/10.3233/JCS-210059}, doi = {10.3233/JCS-210059}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/BellaGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/EspositoSB22, author = {Sergio Esposito and Daniele Sgandurra and Giampaolo Bella}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {{ALEXA} {VERSUS} {ALEXA:} Controlling Smart Speakers by Self-Issuing Voice Commands}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1064--1078}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497766}, doi = {10.1145/3488932.3497766}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/EspositoSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/BellaDR22, author = {Giampaolo Bella and Cristian Daniele and Mario Raciti}, title = {The {AILA} Methodology for Automated and Intelligent Likelihood Assignment}, booktitle = {6th International Conference on Cryptography, Security and Privacy, {CSP} 2022, Tianjin, China, January 14-16, 2022}, pages = {119--123}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSP55486.2022.00030}, doi = {10.1109/CSP55486.2022.00030}, timestamp = {Mon, 06 Nov 2023 13:06:30 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/BellaDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsrs/BiondiTB22, author = {Pietro Biondi and Fabrizio Tronci and Giampaolo Bella}, title = {Papyrus-Based Safety Analysis Automatization}, booktitle = {6th International Conference on System Reliability and Safety, {ICSRS} 2022, Venice, Italy, November 23-25, 2022}, pages = {469--474}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICSRS56243.2022.10067259}, doi = {10.1109/ICSRS56243.2022.10067259}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsrs/BiondiTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Bella22, author = {Giampaolo Bella}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Interactional Freedom and Cybersecurity}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {1--16}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_1}, doi = {10.1007/978-3-031-32636-3\_1}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/Bella22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woa/BellaCAS22, author = {Giampaolo Bella and Domenico Cantone and Marianna Nicolosi Asmundo and Daniele Francesco Santamaria}, editor = {Angelo Ferrando and Viviana Mascardi}, title = {The ontology for agents, systems and integration of services: recent advancements of {OASIS}}, booktitle = {Proceedings of the 23rd Workshop "From Objects to Agents", Genova, Italy, September 1-3, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3261}, pages = {176--193}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3261/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:40 +0100}, biburl = {https://dblp.org/rec/conf/woa/BellaCAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-06597, author = {Pietro Biondi and Stefano Bognanni and Giampaolo Bella}, title = {Vulnerability Assessment and Penetration Testing on {IP} cameras}, journal = {CoRR}, volume = {abs/2202.06597}, year = {2022}, url = {https://arxiv.org/abs/2202.06597}, eprinttype = {arXiv}, eprint = {2202.06597}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-06597.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-08619, author = {Sergio Esposito and Daniele Sgandurra and Giampaolo Bella}, title = {Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands}, journal = {CoRR}, volume = {abs/2202.08619}, year = {2022}, url = {https://arxiv.org/abs/2202.08619}, eprinttype = {arXiv}, eprint = {2202.08619}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-08619.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-10832, author = {Giampaolo Bella and Pietro Biondi and Stefano Bognanni}, title = {Attacking and Protecting Network Printers and VoIP Phones alike}, journal = {CoRR}, volume = {abs/2202.10832}, year = {2022}, url = {https://arxiv.org/abs/2202.10832}, eprinttype = {arXiv}, eprint = {2202.10832}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-10832.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BellaBVT21, author = {Giampaolo Bella and Pietro Biondi and Marco De Vincenzi and Giuseppe Tudisco}, title = {Privacy and modern cars through a dual lens}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {136--143}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSPW54576.2021.00022}, doi = {10.1109/EUROSPW54576.2021.00022}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BellaBVT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecon/BellaCLAS21, author = {Giampaolo Bella and Domenico Cantone and Cristiano Longo and Marianna Nicolosi Asmundo and Daniele Francesco Santamaria}, editor = {Konstantinos Tserpes and J{\"{o}}rn Altmann and Jos{\'{e}} {\'{A}}ngel Ba{\~{n}}ares and Orna Agmon Ben{-}Yehuda and Karim Djemame and Vlado Stankovski and Bruno Tuffin}, title = {Semantic Representation as a Key Enabler for Blockchain-Based Commerce}, booktitle = {Economics of Grids, Clouds, Systems, and Services - 18th International Conference, {GECON} 2021, Virtual Event, September 21-23, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13072}, pages = {191--198}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92916-9\_17}, doi = {10.1007/978-3-030-92916-9\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecon/BellaCLAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/BellaCLAS21, author = {Giampaolo Bella and Domenico Cantone and Cristiano Longo and Marianna Nicolosi Asmundo and Daniele Francesco Santamaria}, editor = {David Camacho and Domenico Rosaci and Giuseppe M. L. Sarn{\'{e}} and Mario Versaci}, title = {Blockchains Through Ontologies: The Case Study of the Ethereum {ERC721} Standard in oasis}, booktitle = {Intelligent Distributed Computing XIV, 14th International Symposium on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18 September 2021}, series = {Studies in Computational Intelligence}, volume = {1026}, pages = {249--259}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96627-0\_23}, doi = {10.1007/978-3-030-96627-0\_23}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/BellaCLAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/BiondiBB21, author = {Pietro Biondi and Stefano Bognanni and Giampaolo Bella}, editor = {Jaime Mauri Lauret and Mohamed Abdel{-}Maguid and Yaser Jararweh and Elhadj Benkhelifa}, title = {Vulnerability Assessment and Penetration Testing on {IP} camera}, booktitle = {8th International Conference on Internet of Things: Systems, Management and Security, {IOTSMS} 2021, Gandia, Spain, December 6-9, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IOTSMS53705.2021.9704890}, doi = {10.1109/IOTSMS53705.2021.9704890}, timestamp = {Fri, 18 Feb 2022 10:36:42 +0100}, biburl = {https://dblp.org/rec/conf/iotsms/BiondiBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/BellaBCMM21, author = {Giampaolo Bella and Pietro Biondi and Gianpiero Costantino and Ilaria Matteucci and Mirco Marchetti}, editor = {Heiko Ro{\ss}nagel and Christian H. Schunck and Sebastian M{\"{o}}dersheim}, title = {Towards the {COSCA} framework for "COnseptualing Secure CArs"}, booktitle = {Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021}, series = {{LNI}}, volume = {{P-312}}, pages = {37--46}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2021}, url = {https://dl.gi.de/handle/20.500.12116/36500}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/openidentity/BellaBCMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BellaBT21, author = {Giampaolo Bella and Pietro Biondi and Giuseppe Tudisco}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {Car Drivers' Privacy Concerns and Trust Perceptions}, booktitle = {Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12927}, pages = {143--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86586-3\_10}, doi = {10.1007/978-3-030-86586-3\_10}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/BellaBT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/PollicinoSBM21, author = {Francesco Pollicino and Dario Stabili and Giampaolo Bella and Mirco Marchetti}, title = {SixPack: Abusing {ABS} to avoid Misbehavior detection in VANETs}, booktitle = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki, Finland, April 25-28, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9448656}, doi = {10.1109/VTC2021-SPRING51267.2021.9448656}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/PollicinoSBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-02899, author = {Giampaolo Bella and Domenico Cantone and Cristiano Longo and Marianna Nicolosi Asmundo and Daniele Francesco Santamaria}, title = {Blockchains through ontologies: the case study of the Ethereum {ERC721} standard in {OASIS} (Extended Version)}, journal = {CoRR}, volume = {abs/2109.02899}, year = {2021}, url = {https://arxiv.org/abs/2109.02899}, eprinttype = {arXiv}, eprint = {2109.02899}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02899.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-10642, author = {Giampaolo Bella and Pietro Biondi and Gianpiero Costantino and Ilaria Matteucci}, title = {{TOUCAN:} {A} proTocol tO secUre Controller Area Network}, journal = {CoRR}, volume = {abs/2111.10642}, year = {2021}, url = {https://arxiv.org/abs/2111.10642}, eprinttype = {arXiv}, eprint = {2111.10642}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-10642.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-10645, author = {Giampaolo Bella and Pietro Biondi}, title = {You Overtrust Your Printer}, journal = {CoRR}, volume = {abs/2111.10645}, year = {2021}, url = {https://arxiv.org/abs/2111.10645}, eprinttype = {arXiv}, eprint = {2111.10645}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-10645.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-11732, author = {Giampaolo Bella and Pietro Biondi}, title = {Towards an Integrated Penetration Testing Environment for the {CAN} Protocol}, journal = {CoRR}, volume = {abs/2111.11732}, year = {2021}, url = {https://arxiv.org/abs/2111.11732}, eprinttype = {arXiv}, eprint = {2111.11732}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-11732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-12026, author = {Giampaolo Bella and Pietro Biondi and Gianpiero Costantino and Ilaria Matteucci}, title = {{CINNAMON:} {A} Module for {AUTOSAR} Secure Onboard Communication}, journal = {CoRR}, volume = {abs/2111.12026}, year = {2021}, url = {https://arxiv.org/abs/2111.12026}, eprinttype = {arXiv}, eprint = {2111.12026}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-12026.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-12027, author = {Giampaolo Bella and Pietro Biondi and Marco De Vincenzi and Giuseppe Tudisco}, title = {Privacy and modern cars through a dual lens}, journal = {CoRR}, volume = {abs/2111.12027}, year = {2021}, url = {https://arxiv.org/abs/2111.12027}, eprinttype = {arXiv}, eprint = {2111.12027}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-12027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-15467, author = {Giampaolo Bella and Pietro Biondi and Giuseppe Tudisco}, title = {Car drivers' privacy concerns and trust perceptions}, journal = {CoRR}, volume = {abs/2111.15467}, year = {2021}, url = {https://arxiv.org/abs/2111.15467}, eprinttype = {arXiv}, eprint = {2111.15467}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-15467.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-15468, author = {Pietro Biondi and Stefano Bognanni and Giampaolo Bella}, title = {VoIP Can Still Be Exploited - Badly}, journal = {CoRR}, volume = {abs/2111.15468}, year = {2021}, url = {https://arxiv.org/abs/2111.15468}, eprinttype = {arXiv}, eprint = {2111.15468}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-15468.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-06200, author = {Davide Micale and Gianpiero Costantino and Ilaria Matteucci and Giuseppe Patan{\`{e}} and Giampaolo Bella}, title = {Secure Routine: {A} Routine-Based Algorithm for Drivers Identification}, journal = {CoRR}, volume = {abs/2112.06200}, year = {2021}, url = {https://arxiv.org/abs/2112.06200}, eprinttype = {arXiv}, eprint = {2112.06200}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-06200.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-12790, author = {Giampaolo Bella}, title = {Out to Explore the Cybersecurity Planet}, journal = {CoRR}, volume = {abs/2112.12790}, year = {2021}, url = {https://arxiv.org/abs/2112.12790}, eprinttype = {arXiv}, eprint = {2112.12790}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-12790.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/BellaBCM20, author = {Giampaolo Bella and Pietro Biondi and Gianpiero Costantino and Ilaria Matteucci}, title = {{CINNAMON:} {A} Module for {AUTOSAR} Secure Onboard Communication}, booktitle = {16th European Dependable Computing Conference, {EDCC} 2020, Munich, Germany, September 7-10, 2020}, pages = {103--110}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EDCC51268.2020.00026}, doi = {10.1109/EDCC51268.2020.00026}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edcc/BellaBCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmec/BiondiBB20, author = {Pietro Biondi and Stefano Bognanni and Giampaolo Bella}, title = {VoIP Can Still Be Exploited - Badly}, booktitle = {Fifth International Conference on Fog and Mobile Edge Computing, {FMEC} 2020, Paris, France, April 20-23, 2020}, pages = {237--243}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/FMEC49853.2020.9144875}, doi = {10.1109/FMEC49853.2020.9144875}, timestamp = {Fri, 31 Jul 2020 15:47:33 +0200}, biburl = {https://dblp.org/rec/conf/fmec/BiondiBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BellaBCM19, author = {Giampaolo Bella and Pietro Biondi and Gianpiero Costantino and Ilaria Matteucci}, editor = {Ziming Zhao and Qi Alfred Chen and Gail{-}Joon Ahn}, title = {{TOUCAN:} {A} proTocol tO secUre Controller Area Network}, booktitle = {Proceedings of the {ACM} Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019}, pages = {3--8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309171.3309175}, doi = {10.1145/3309171.3309175}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BellaBCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/BellaRS019, author = {Giampaolo Bella and Karen Renaud and Diego Sempreboni and Luca Vigan{\`{o}}}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {An Investigation into the "Beautification" of Security Ceremonies}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {125--136}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007921501250136}, doi = {10.5220/0007921501250136}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/BellaRS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/SempreboniBG019, author = {Diego Sempreboni and Giampaolo Bella and Rosario Giustolisi and Luca Vigan{\`{o}}}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {What Are the Threats? (Charting the Threat Models of Security Ceremonies)}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {161--172}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007924901610172}, doi = {10.5220/0007924901610172}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/SempreboniBG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/BiondiBCM19, author = {Pietro Biondi and Giampaolo Bella and Gianpiero Costantino and Ilaria Matteucci}, title = {Implementing {CAN} bus security by {TOUCAN}}, booktitle = {Proceedings of the Twentieth {ACM} International Symposium on Mobile Ad Hoc Networking and Computing, Mobihoc 2019, Catania, Italy, July 2-5, 2019}, pages = {399--400}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3323679.3326614}, doi = {10.1145/3323679.3326614}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/BiondiBCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/BellaB19, author = {Giampaolo Bella and Pietro Biondi}, editor = {Alexander B. Romanovsky and Elena Troubitsyna and Ilir Gashi and Erwin Schoitsch and Friedemann Bitsch}, title = {You Overtrust Your Printer}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11699}, pages = {264--274}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26250-1\_21}, doi = {10.1007/978-3-030-26250-1\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/BellaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tfm/Bella99, author = {Giampaolo Bella}, editor = {Brijesh Dongol and Luigia Petre and Graeme Smith}, title = {You Already Used Formal Methods but Did Not Know It}, booktitle = {Formal Methods Teaching - Third International Workshop and Tutorial, FMTea 2019, Held as Part of the Third World Congress on Formal Methods, {FM} 2019, Porto, Portugal, October 7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11758}, pages = {228--243}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32441-4\_15}, doi = {10.1007/978-3-030-32441-4\_15}, timestamp = {Thu, 07 Apr 2022 08:44:28 +0200}, biburl = {https://dblp.org/rec/conf/tfm/Bella99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BellaBCM19, author = {Giampaolo Bella and Pietro Biondi and Gianpiero Costantino and Ilaria Matteucci}, title = {Are you secure in your car?: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {308--309}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326305}, doi = {10.1145/3317549.3326305}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BellaBCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GiustolisiBL18, author = {Rosario Giustolisi and Giampaolo Bella and Gabriele Lenzini}, title = {Invalid certificates in modern browsers: {A} socio-technical analysis}, journal = {J. Comput. Secur.}, volume = {26}, number = {4}, pages = {509--541}, year = {2018}, url = {https://doi.org/10.3233/JCS-16891}, doi = {10.3233/JCS-16891}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GiustolisiBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/BellaMCM18, author = {Giampaolo Bella and Francesco Marino and Gianpiero Costantino and Fabio Martinelli}, editor = {Ivan Merelli and Pietro Li{\`{o}} and Igor V. Kotenko}, title = {Getmewhere: {A} Location-Based Privacy-Preserving Information Service}, booktitle = {26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2018, Cambridge, United Kingdom, March 21-23, 2018}, pages = {529--532}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PDP2018.2018.00089}, doi = {10.1109/PDP2018.2018.00089}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/BellaMCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/BellaB18, author = {Giampaolo Bella and Pietro Biondi}, editor = {Barbara Gallina and Amund Skavhaug and Erwin Schoitsch and Friedemann Bitsch}, title = {Towards an Integrated Penetration Testing Environment for the {CAN} Protocol}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, V{\"{a}}ster{\aa}s, Sweden, September 18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11094}, pages = {344--352}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99229-7\_29}, doi = {10.1007/978-3-319-99229-7\_29}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/BellaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stast/2018, editor = {Giampaolo Bella and Gabriele Lenzini and Theo Tryfonas and Debi Ashenden}, title = {{STAST} 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3361331}, doi = {10.1145/3361331}, isbn = {978-1-4503-7285-5}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stast/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BellaGLR17, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, title = {Trustworthy exams without trusted parties}, journal = {Comput. Secur.}, volume = {67}, pages = {291--307}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.12.005}, doi = {10.1016/J.COSE.2016.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BellaGLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/BellaG17, author = {Giampaolo Bella and Rosario Giustolisi}, editor = {Eric Bodden and Mathias Payer and Elias Athanasopoulos}, title = {Idea: {A} Unifying Theory for Evaluation Systems}, booktitle = {Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10379}, pages = {231--239}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-62105-0\_15}, doi = {10.1007/978-3-319-62105-0\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/BellaG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/BellaBJ17, author = {Giampaolo Bella and Denis Butin and Hugo Jonker}, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Analysing Privacy Analyses}, booktitle = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, pages = {19--28}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816/paper-03.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/BellaBJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stast/2017, editor = {Giampaolo Bella and Gabriele Lenzini}, title = {Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2017, Orlando, FL, USA, December 5, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3167996}, doi = {10.1145/3167996}, isbn = {978-1-4503-6357-0}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stast/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaC016, author = {Giampaolo Bella and Bruce Christianson and Luca Vigan{\`{o}}}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Invisible Security}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {1--9}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_1}, doi = {10.1007/978-3-319-62033-6\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaC016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella16, author = {Giampaolo Bella}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Invisible Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {10--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_2}, doi = {10.1007/978-3-319-62033-6\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stast/2016, editor = {Gabriele Lenzini and Giampaolo Bella and Zinaida Benenson and Carrie E. Gates}, title = {Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2016, Los Angeles, CA, USA, December 5, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3046055}, doi = {10.1145/3046055}, isbn = {978-1-4503-4826-3}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stast/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BellaJ15, author = {Giampaolo Bella and Helge Janicke}, title = {Special issue on the Security Track at the {ACM} Symposium on Applied Computing 2013}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {101--102}, year = {2015}, url = {https://doi.org/10.1007/s10207-015-0280-2}, doi = {10.1007/S10207-015-0280-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BellaJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BellaCL15, author = {Giampaolo Bella and Paul Curzon and Gabriele Lenzini}, title = {Service security and privacy as a socio-technical problem}, journal = {J. Comput. Secur.}, volume = {23}, number = {5}, pages = {563--585}, year = {2015}, url = {https://doi.org/10.3233/JCS-150536}, doi = {10.3233/JCS-150536}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BellaCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BellaGLR15, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Hannes Federrath and Dieter Gollmann}, title = {A Secure Exam Protocol Without Trusted Parties}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {495--509}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_33}, doi = {10.1007/978-3-319-18467-8\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BellaGLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaV15, author = {Giampaolo Bella and Luca Vigan{\`{o}}}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Security is Beautiful}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {247--250}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_25}, doi = {10.1007/978-3-319-26096-9\_25}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stast/2015, editor = {Giampaolo Bella and Gabriele Lenzini}, title = {2015 Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2015, Verona, Italy, July 13, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7351959/proceeding}, isbn = {978-1-5090-0178-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stast/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/Bella14, author = {Giampaolo Bella}, title = {Inductive study of confidentiality: for everyone}, journal = {Formal Aspects Comput.}, volume = {26}, number = {1}, pages = {3--36}, year = {2014}, url = {https://doi.org/10.1007/s00165-012-0246-3}, doi = {10.1007/S00165-012-0246-3}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/Bella14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amt/BellaJL14, author = {Giampaolo Bella and Pekka J{\"{a}}ppinen and Jussi Laakkonen}, editor = {Dominik Slezak and Gerald Schaefer and Son T. Vuong and Yoo{-}Sung Kim}, title = {The Challenges behind Independent Living Support Systems}, booktitle = {Active Media Technology - 10th International Conference, {AMT} 2014, Warsaw, Poland, August 11-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8610}, pages = {464--474}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09912-5\_39}, doi = {10.1007/978-3-319-09912-5\_39}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amt/BellaJL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/BellaCGL14, author = {Giampaolo Bella and Paul Curzon and Rosario Giustolisi and Gabriele Lenzini}, title = {A Socio-technical Methodology for the Security and Privacy Analysis of Services}, booktitle = {{IEEE} 38th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2014, Vasteras, Sweden, July 21-25, 2014}, pages = {401--406}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/COMPSACW.2014.69}, doi = {10.1109/COMPSACW.2014.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/BellaCGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BellaGL14, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Secure exams despite malicious management}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {274--281}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890949}, doi = {10.1109/PST.2014.6890949}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BellaGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stast/2014, editor = {Giampaolo Bella and Gabriele Lenzini}, title = {2014 Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2014, Vienna, Austria, July 18, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6975727/proceeding}, isbn = {978-1-4799-7901-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stast/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BellaCCR13, author = {Giampaolo Bella and Gianpiero Costantino and Jon Crowcroft and Salvatore Riccobene}, title = {Enhancing {DSR} maintenance with power awareness}, journal = {Comput. Stand. Interfaces}, volume = {35}, number = {1}, pages = {107--113}, year = {2013}, url = {https://doi.org/10.1016/j.csi.2012.06.007}, doi = {10.1016/J.CSI.2012.06.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/BellaCCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/GiustolisiLB13, author = {Rosario Giustolisi and Gabriele Lenzini and Giampaolo Bella}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {What security for electronic exams?}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766348}, doi = {10.1109/CRISIS.2013.6766348}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/GiustolisiLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/ButinGB13, author = {Denis Butin and David Gray and Giampaolo Bella}, editor = {Jan J{\"{u}}rjens and Benjamin Livshits and Riccardo Scandariato}, title = {Towards Verifying Voter Privacy through Unlinkability}, booktitle = {Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7781}, pages = {91--106}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36563-8\_7}, doi = {10.1007/978-3-642-36563-8\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/ButinGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/BellaGL13, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini}, editor = {M. Carmen Fern{\'{a}}ndez Gago and Fabio Martinelli and Siani Pearson and Isaac Agudo}, title = {A Socio-technical Understanding of {TLS} Certificate Validation}, booktitle = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {401}, pages = {281--288}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38323-6\_23}, doi = {10.1007/978-3-642-38323-6\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BellaGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BellaGL13, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Socio-technical formal analysis of {TLS} certificate validation in modern browsers}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {309--316}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596067}, doi = {10.1109/PST.2013.6596067}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BellaGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/Bella12, author = {Giampaolo Bella}, title = {Inductive Study of Confidentiality}, journal = {Arch. Formal Proofs}, volume = {2012}, year = {2012}, url = {https://www.isa-afp.org/entries/Inductive\_Confidentiality.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/Bella12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdim/AlmutairiBA12, author = {Saad Almutairi and Giampaolo Bella and Ala Abu{-}Samaha}, editor = {Simon Fong and Pit Pichappan and Sabah Mohammed and Patrick Hung and Sohail Asghar}, title = {Specifying security requirements of context aware system using {UML}}, booktitle = {Seventh International Conference on Digital Information Management, {ICDIM} 2012, Macau, Macao, August 22-24, 2012}, pages = {259--265}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICDIM.2012.6360140}, doi = {10.1109/ICDIM.2012.6360140}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdim/AlmutairiBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BellaC12, author = {Giampaolo Bella and Lizzie Coles{-}Kemp}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Layered Analysis of Security Ceremonies}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {273--286}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_23}, doi = {10.1007/978-3-642-30436-1\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BellaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ButinB12, author = {Denis Butin and Giampaolo Bella}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Verifying Privacy by Little Interaction and No Process Equivalence}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {251--256}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ButinB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/BellaL12, author = {Giampaolo Bella and Gabriele Lenzini}, title = {Foreword from the Workshop Chairs - {STAST} 2012}, booktitle = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2012, Cambridge, MA, USA, June 25, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/STAST.2012.4}, doi = {10.1109/STAST.2012.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/BellaL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BellaGR11, author = {Giampaolo Bella and Rosario Giustolisi and Salvatore Riccobene}, title = {Enforcing privacy in e-commerce by balancing anonymity and trust}, journal = {Comput. Secur.}, volume = {30}, number = {8}, pages = {705--718}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.08.005}, doi = {10.1016/J.COSE.2011.08.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BellaGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ArsacBCC11, author = {Wihem Arsac and Giampaolo Bella and Xavier Chantry and Luca Compagna}, title = {Multi-Attacker Protocol Validation}, journal = {J. Autom. Reason.}, volume = {46}, number = {3-4}, pages = {353--388}, year = {2011}, url = {https://doi.org/10.1007/s10817-010-9185-y}, doi = {10.1007/S10817-010-9185-Y}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ArsacBCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BellaBG11, author = {Giampaolo Bella and Denis Butin and David Gray}, title = {Holistic analysis of mix protocols}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {338--343}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122843}, doi = {10.1109/ISIAS.2011.6122843}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/BellaBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csedu/BellaCCR11, author = {Giampaolo Bella and Gianpiero Costantino and Lizzie Coles{-}Kemp and Salvatore Riccobene}, editor = {Alexander Verbraeck and Markus Helfert and Jos{\'{e}} Cordeiro and Boris Shishkov}, title = {Remote Management of Face-to-face Written Authenticated Though Anonymous Exams}, booktitle = {{CSEDU} 2011 - Proceedings of the 3rd International Conference on Computer Supported Education, Volume 2, Noordwijkerhout, Netherlands, 6-8 May, 2011}, pages = {431--437}, publisher = {SciTePress}, year = {2011}, timestamp = {Fri, 30 Sep 2011 08:32:56 +0200}, biburl = {https://dblp.org/rec/conf/csedu/BellaCCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BellaC11, author = {Giampaolo Bella and Lizzie Coles{-}Kemp}, title = {Internet Users' Security and Privacy While They Interact with Amazon}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {878--883}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.118}, doi = {10.1109/TRUSTCOM.2011.118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BellaC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Bella10, author = {Giampaolo Bella}, title = {The principle of guarantee availability for security protocol analysis}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {2}, pages = {83--97}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0097-y}, doi = {10.1007/S10207-009-0097-Y}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Bella10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csedu/BellaCR10, author = {Giampaolo Bella and Gianpiero Costantino and Salvatore Riccobene}, editor = {Jos{\'{e}} A. Moinhos Cordeiro and Boris Shishkov and Alexander Verbraeck and Markus Helfert}, title = {{WATA} - {A} System for Written Authenticated though Anonymous Exams}, booktitle = {{CSEDU} 2010 - Proceedings of the Second International Conference on Computer Supported Education, Valencia, Spain, April 7-10, 2010 - Volume 2}, pages = {132--137}, publisher = {{INSTICC} Press}, year = {2010}, timestamp = {Tue, 04 Jan 2011 15:45:20 +0100}, biburl = {https://dblp.org/rec/conf/csedu/BellaCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaRT10, author = {Giampaolo Bella and Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm}, title = {Virtually Perfect Democracy}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {161--166}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_24}, doi = {10.1007/978-3-662-45921-8\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BellaR09, author = {Giampaolo Bella and Peter Y. A. Ryan}, title = {Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 {ACM} Symposium on Applied Computing}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {237}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0346}, doi = {10.3233/JCS-2009-0346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BellaR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cmsb/BellaL09, author = {Giampaolo Bella and Pietro Li{\`{o}}}, editor = {Pierpaolo Degano and Roberto Gorrieri}, title = {Formal Analysis of the Genetic Toggle}, booktitle = {Computational Methods in Systems Biology, 7th International Conference, {CMSB} 2009, Bologna, Italy, August 31-September 1, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5688}, pages = {96--110}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03845-7\_7}, doi = {10.1007/978-3-642-03845-7\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cmsb/BellaL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ArsacBCC09, author = {Wihem Arsac and Giampaolo Bella and Xavier Chantry and Luca Compagna}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Validating Security Protocols under the General Attacker}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {34--51}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_3}, doi = {10.1007/978-3-642-03459-6\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ArsacBCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ArsacBCC09, author = {Wihem Arsac and Giampaolo Bella and Xavier Chantry and Luca Compagna}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Attacking Each Other}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {41--47}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_7}, doi = {10.1007/978-3-642-36213-2\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/ArsacBCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/Bella08, author = {Giampaolo Bella}, title = {What is Correctness of Security Protocols?}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {12}, pages = {2083--2106}, year = {2008}, url = {https://doi.org/10.3217/jucs-014-12-2083}, doi = {10.3217/JUCS-014-12-2083}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/Bella08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BellaLR08, author = {Giampaolo Bella and Francesco Librizzi and Salvatore Riccobene}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Realistic Threats to Self-Enforcing Privacy}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {155--160}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.23}, doi = {10.1109/IAS.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/BellaLR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BellaCR08, author = {Giampaolo Bella and Gianpiero Costantino and Salvatore Riccobene}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Managing Reputation over MANETs}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {255--260}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.24}, doi = {10.1109/IAS.2008.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/BellaCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Bella08, author = {Giampaolo Bella}, editor = {Roger L. Wainwright and Hisham Haddad}, title = {Special track on Computer Security: editorial message}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008}, pages = {2095--2096}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1363686.1364192}, doi = {10.1145/1363686.1364192}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/Bella08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyBB08, author = {Simon N. Foley and Giampaolo Bella and Stefano Bistarelli}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Security Protocol Deployment Risk}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {12--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_3}, doi = {10.1007/978-3-642-22137-8\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FoleyBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Bella07, author = {Giampaolo Bella}, title = {Formal Correctness of Security Protocols - With 62 Figures and 4 Tables}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-68136-6}, doi = {10.1007/978-3-540-68136-6}, isbn = {978-3-540-68134-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Bella07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/BellaMP06, author = {Giampaolo Bella and Fabio Massacci and Lawrence C. Paulson}, title = {Verifying the {SET} Purchase Protocols}, journal = {J. Autom. Reason.}, volume = {36}, number = {1-2}, pages = {5--37}, year = {2006}, url = {https://doi.org/10.1007/s10817-005-9018-6}, doi = {10.1007/S10817-005-9018-6}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/BellaMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BellaP06, author = {Giampaolo Bella and Lawrence C. Paulson}, title = {Accountability protocols: Formalized and verified}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {2}, pages = {138--161}, year = {2006}, url = {https://doi.org/10.1145/1151414.1151416}, doi = {10.1145/1151414.1151416}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BellaP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BellaR06, author = {Giampaolo Bella and Peter Y. A. Ryan}, editor = {Hisham Haddad}, title = {Editorial message: special track on computer security}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {321--322}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141355}, doi = {10.1145/1141277.1141355}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/BellaR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BellaBPR07, author = {Giampaolo Bella and Stefano Bistarelli and Pamela Peretti and Salvatore Riccobene}, editor = {Maurice H. ter Beek and Fabio Gadducci}, title = {Augmented Risk Analysis}, booktitle = {Proceedings of the Second International Workshop on Views on Designing Complex Architectures, VODCA@FOSAD 2006, Bertinoro, Italy, September 16-17, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {168}, pages = {207--220}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.12.006}, doi = {10.1016/J.ENTCS.2006.12.006}, timestamp = {Tue, 24 Jan 2023 11:14:31 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BellaBPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BellaB05, author = {Giampaolo Bella and Stefano Bistarelli}, title = {Information Assurance for security protocols}, journal = {Comput. Secur.}, volume = {24}, number = {4}, pages = {322--333}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2004.10.004}, doi = {10.1016/J.COSE.2004.10.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BellaB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BellaMP05, author = {Giampaolo Bella and Fabio Massacci and Lawrence C. Paulson}, title = {An overview of the verification of {SET}}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {1-2}, pages = {17--28}, year = {2005}, url = {https://doi.org/10.1007/s10207-004-0047-7}, doi = {10.1007/S10207-004-0047-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BellaMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BellaR05, author = {Giampaolo Bella and Peter Y. A. Ryan}, title = {Guest Editors' preface}, journal = {J. Comput. Secur.}, volume = {13}, number = {5}, pages = {697}, year = {2005}, url = {https://doi.org/10.3233/jcs-2005-13501}, doi = {10.3233/JCS-2005-13501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BellaR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaPSC/BellaPR05, author = {Giampaolo Bella and Costantino Pistagna and Salvatore Riccobene}, editor = {Laurence Tianruo Yang and Jianhua Ma and Makoto Takizawa and Timothy K. Shih}, title = {Locating Mobile Nodes Within Logical Networks}, booktitle = {Proceedings of the 2005 International Conference on Pervasive Systems and Computing, {PSC} 2005, Las Vegas, Nevada, USA, June 27-30, 2005}, pages = {54--62}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/csreaPSC/BellaPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BellaR05, author = {Giampaolo Bella and Peter Y. A. Ryan}, editor = {Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright}, title = {Special track on computer security}, booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005}, pages = {304--305}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1066677.1066751}, doi = {10.1145/1066677.1066751}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BellaR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/BellaM04, author = {Giampaolo Bella and Ronaldo Menezes}, title = {Special Issue: Computer Security}, journal = {Concurr. Pract. Exp.}, volume = {16}, number = {11}, pages = {1061}, year = {2004}, url = {https://doi.org/10.1002/cpe.803}, doi = {10.1002/CPE.803}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/BellaM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tplp/BellaB04, author = {Giampaolo Bella and Stefano Bistarelli}, title = {Soft Constraint Programming to Analysing Security Protocols}, journal = {Theory Pract. Log. Program.}, volume = {4}, number = {5-6}, pages = {545--572}, year = {2004}, url = {https://doi.org/10.1017/S1471068404002121}, doi = {10.1017/S1471068404002121}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tplp/BellaB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egcdmas/BattiatoBR04, author = {Sebastiano Battiato and Giampaolo Bella and Salvatore Riccobene}, editor = {Mohammad S. Obaidat and Noureddine Boudriga}, title = {Should We Prove Security Policies Correct?}, booktitle = {Electronic Government and Commerce: Design, Modeling, Analysis and Security - Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security, {EGCDMAS} 2004, In conjunction with {ICETE} 2004, Set{\'{u}}bal, Portugal, August 2004}, pages = {56--65}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Wed, 15 Dec 2004 14:13:59 +0100}, biburl = {https://dblp.org/rec/conf/egcdmas/BattiatoBR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BellaR04, author = {Giampaolo Bella and Peter Y. A. Ryan}, editor = {Hisham Haddad and Andrea Omicini and Roger L. Wainwright and Lorie M. Liebrock}, title = {Editoral message: special track on computer security}, booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004}, pages = {373--374}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/967900.967982}, doi = {10.1145/967900.967982}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BellaR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BellaBF06, author = {Giampaolo Bella and Stefano Bistarelli and Simon N. Foley}, editor = {Maurice H. ter Beek and Fabio Gadducci}, title = {Soft Constraints for Security}, booktitle = {Proceedings of the First International Workshop on Views on Designing Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September 11-12, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {142}, pages = {11--29}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2005.07.011}, doi = {10.1016/J.ENTCS.2005.07.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BellaBF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BellaPR06, author = {Giampaolo Bella and Costantino Pistagna and Salvatore Riccobene}, editor = {Maurice H. ter Beek and Fabio Gadducci}, title = {Distributed Backup through Information Dispersal}, booktitle = {Proceedings of the First International Workshop on Views on Designing Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September 11-12, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {142}, pages = {63--77}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.046}, doi = {10.1016/J.ENTCS.2004.11.046}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BellaPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Bella03, author = {Giampaolo Bella}, title = {Inductive Verification of Smart Card Protocols}, journal = {J. Comput. Secur.}, volume = {11}, number = {1}, pages = {87--132}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11103}, doi = {10.3233/JCS-2003-11103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Bella03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/BellaMP03, author = {Giampaolo Bella and Fabio Massacci and Lawrence C. Paulson}, title = {Verifying the {SET} registration protocols}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {1}, pages = {77--87}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2002.806133}, doi = {10.1109/JSAC.2002.806133}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/BellaMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BellaM03, author = {Giampaolo Bella and Ronaldo Menezes}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Computer Security Track Editorial}, booktitle = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, {USA}}, pages = {280--281}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/952532.952590}, doi = {10.1145/952532.952590}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/BellaM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Bella03, author = {Giampaolo Bella}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Availability of Protocol Goals}, booktitle = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, {USA}}, pages = {312--317}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/952532.952596}, doi = {10.1145/952532.952596}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/Bella03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaBM03, author = {Giampaolo Bella and Stefano Bistarelli and Fabio Massacci}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Protocol's Life After Attacks...}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {3--10}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_2}, doi = {10.1007/11542322\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaBM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella03, author = {Giampaolo Bella}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Protocol's Life After Attacks... (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {11--18}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_3}, doi = {10.1007/11542322\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaLP03, author = {Giampaolo Bella and Cristiano Longo and Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Is the Verification Problem for Cryptographic Protocols Solved?}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {183--189}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_23}, doi = {10.1007/11542322\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaLP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaBM03a, author = {Giampaolo Bella and Stefano Bistarelli and Fabio Martinelli}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Biometrics to Enhance Smartcard Security}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {324--332}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_39}, doi = {10.1007/11542322\_39}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaBM03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/BellaLP03, author = {Giampaolo Bella and Cristiano Longo and Lawrence C. Paulson}, editor = {David A. Basin and Burkhart Wolff}, title = {Verifying Second-Level Security Protocols}, booktitle = {Theorem Proving in Higher Order Logics, 16th International Conference, TPHOLs 2003, Rom, Italy, September 8-12, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2758}, pages = {352--366}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10930755\_23}, doi = {10.1007/10930755\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/tphol/BellaLP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0312025, author = {Giampaolo Bella and Stefano Bistarelli}, title = {Soft Constraint Programming to Analysing Security Protocols}, journal = {CoRR}, volume = {cs.CR/0312025}, year = {2003}, url = {http://arxiv.org/abs/cs/0312025}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0312025.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellaPM02, author = {Giampaolo Bella and Lawrence C. Paulson and Fabio Massacci}, editor = {Vijayalakshmi Atluri}, title = {The verification of an industrial payment protocol: the {SET} purchase phase}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {12--20}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586113}, doi = {10.1145/586110.586113}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellaPM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BellaMW02, author = {Giampaolo Bella and Ronaldo Menezes and James A. Whittaker}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Editorial Message: special track on computer security}, booktitle = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain}, pages = {194--195}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/508791.508833}, doi = {10.1145/508791.508833}, timestamp = {Tue, 06 Nov 2018 11:06:47 +0100}, biburl = {https://dblp.org/rec/conf/sac/BellaMW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Bell02, author = {Giampaolo Bella}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Interactive simulation of security policies}, booktitle = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain}, pages = {247--252}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/508791.508842}, doi = {10.1145/508791.508842}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/Bell02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaB02, author = {Giampaolo Bella and Stefano Bistarelli}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {104--119}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_10}, doi = {10.1007/978-3-540-39871-4\_10}, timestamp = {Sat, 05 Sep 2020 18:04:37 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaP02, author = {Giampaolo Bella and Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Analyzing Delegation Properties}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {120--127}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_11}, doi = {10.1007/978-3-540-39871-4\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esmart/Bella01, author = {Giampaolo Bella}, editor = {Isabelle Attali and Thomas P. Jensen}, title = {Mechanising a Protocol for Smart Cards}, booktitle = {Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2140}, pages = {19--33}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45418-7\_3}, doi = {10.1007/3-540-45418-7\_3}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/esmart/Bella01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/padl/BellaB01, author = {Giampaolo Bella and Stefano Bistarelli}, editor = {I. V. Ramakrishnan}, title = {Soft Constraints for Security Protocol Analysis: Confidentiality}, booktitle = {Practical Aspects of Declarative Languages, Third International Symposium, {PADL} 2001, Las Vegas, Nevada, USA, March 11-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1990}, pages = {108--122}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45241-9\_8}, doi = {10.1007/3-540-45241-9\_8}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/padl/BellaB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaP01, author = {Giampaolo Bella and Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Proof of Non-repudiation}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {119--125}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_19}, doi = {10.1007/3-540-45807-7\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tphol/BellaP01, author = {Giampaolo Bella and Lawrence C. Paulson}, editor = {Richard J. Boulton and Paul B. Jackson}, title = {Mechanical Proofs about a Non-repudiation Protocol}, booktitle = {Theorem Proving in Higher Order Logics, 14th International Conference, TPHOLs 2001, Edinburgh, Scotland, UK, September 3-6, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2152}, pages = {91--104}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44755-5\_8}, doi = {10.1007/3-540-44755-5\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/tphol/BellaP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Bella00, author = {Giampaolo Bella}, title = {Inductive verification of cryptographic protocols}, school = {University of Cambridge, {UK}}, year = {2000}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621765}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Bella00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BellaMPT00, author = {Giampaolo Bella and Fabio Massacci and Lawrence C. Paulson and Piero Tramontano}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Yves Deswarte and Dieter Gollmann and Michael Waidner}, title = {Formal Verification of Cardholder Registration in {SET}}, booktitle = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1895}, pages = {159--174}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722599\_10}, doi = {10.1007/10722599\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BellaMPT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaMPT00, author = {Giampaolo Bella and Fabio Massacci and Lawrence C. Paulson and Piero Tramontano}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Making Sense of Specifications: The Formalization of {SET}}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {74--81}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_11}, doi = {10.1007/3-540-44810-1\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaMPT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella00, author = {Giampaolo Bella}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Lack of Explicitness Strikes Back}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {87--93}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_13}, doi = {10.1007/3-540-44810-1\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella00a, author = {Giampaolo Bella}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Lack of Explicitness Strikes Back (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {94--99}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_14}, doi = {10.1007/3-540-44810-1\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella99, author = {Giampaolo Bella}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Modelling Agents' Knowledge Inductively}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {85--94}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_12}, doi = {10.1007/10720107\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asm/BellaR98, author = {Giampaolo Bella and Elvinia Riccobene}, editor = {Uwe Gl{\"{a}}sser and Peter H. Schmitt}, title = {A Realistic Environment for Crypto-Protocol Analyses by ASMs}, booktitle = {Fifth International Workshop on Abstract State Machines, {ASM} 1998, Magdeburg, Germany, September 21-22, Proceedings}, pages = {127--138}, year = {1998}, timestamp = {Tue, 15 Mar 2016 17:22:56 +0100}, biburl = {https://dblp.org/rec/conf/asm/BellaR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BellaP98, author = {Giampaolo Bella and Lawrence C. Paulson}, editor = {Alan J. Hu and Moshe Y. Vardi}, title = {Mechanising {BAN} Kerberos by the Inductive Method}, booktitle = {Computer Aided Verification, 10th International Conference, {CAV} '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1427}, pages = {416--427}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0028763}, doi = {10.1007/BFB0028763}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/BellaP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BellaP98, author = {Giampaolo Bella and Lawrence C. Paulson}, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Kerberos Version 4: Inductive Analysis of the Secrecy Goals}, booktitle = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, pages = {361--375}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055875}, doi = {10.1007/BFB0055875}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BellaP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/BellaR97, author = {Giampaolo Bella and Elvinia Riccobene}, title = {Formal Analysis of the Kerberos Authentication System}, journal = {J. Univers. Comput. Sci.}, volume = {3}, number = {12}, pages = {1337--1381}, year = {1997}, url = {https://doi.org/10.3217/jucs-003-12-1337}, doi = {10.3217/JUCS-003-12-1337}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/BellaR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.