BibTeX records: Giampaolo Bella

download as .bib file

@article{DBLP:journals/corr/abs-2403-16196,
  author       = {Mario Raciti and
                  Giampaolo Bella},
  title        = {Behind the (Digital Crime) Scenes: An {MSC} Model},
  journal      = {CoRR},
  volume       = {abs/2403.16196},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.16196},
  doi          = {10.48550/ARXIV.2403.16196},
  eprinttype    = {arXiv},
  eprint       = {2403.16196},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-16196.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BellaDR23,
  author       = {Giampaolo Bella and
                  Cristian Daniele and
                  Mario Raciti},
  title        = {The {AILA} Methodology for Automated and Intelligent Likelihood Assignment
                  in Risk Assessment},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {26170--26183},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3245333},
  doi          = {10.1109/ACCESS.2023.3245333},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BellaDR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ia/BellaCLAS23,
  author       = {Giampaolo Bella and
                  Domenico Cantone and
                  Carmelo Fabio Longo and
                  Marianna Nicolosi Asmundo and
                  Daniele Francesco Santamaria},
  title        = {The ontology for agents, systems and integration of services: {OASIS}
                  version 2\({}^{\mbox{{\textdollar}}}\)},
  journal      = {Intelligenza Artificiale},
  volume       = {17},
  number       = {1},
  pages        = {51--62},
  year         = {2023},
  url          = {https://doi.org/10.3233/IA-230002},
  doi          = {10.3233/IA-230002},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ia/BellaCLAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/BellaBBE23,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Stefano Bognanni and
                  Sergio Esposito},
  title        = {PETIoT: PEnetration Testing the Internet of Things},
  journal      = {Internet Things},
  volume       = {22},
  pages        = {100707},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100707},
  doi          = {10.1016/J.IOT.2023.100707},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/BellaBBE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CastiglioneBS23,
  author       = {Gianpietro Castiglione and
                  Giampaolo Bella and
                  Daniele Francesco Santamaria},
  title        = {Towards Grammatical Tagging for the Legal Language of Cybersecurity},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {82:1--82:9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605069},
  doi          = {10.1145/3600160.3605069},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CastiglioneBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EspositoSB23,
  author       = {Sergio Esposito and
                  Daniele Sgandurra and
                  Giampaolo Bella},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {The {VOCODES} Kill Chain for Voice Controllable Devices},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {176--197},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_11},
  doi          = {10.1007/978-3-031-54129-2\_11},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/EspositoSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaugeriDB23,
  author       = {Marcello Maugeri and
                  Cristian Daniele and
                  Giampaolo Bella},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {291--308},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_17},
  doi          = {10.1007/978-3-031-54129-2\_17},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MaugeriDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RacitiB23,
  author       = {Mario Raciti and
                  Giampaolo Bella},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Pantaleone Nespoli and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Up-to-Date Threat Modelling for Soft Privacy on Smart Cars},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14398},
  pages        = {454--473},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54204-6\_27},
  doi          = {10.1007/978-3-031-54204-6\_27},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/RacitiB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RacitiB23,
  author       = {Mario Raciti and
                  Giampaolo Bella},
  title        = {A Threat Model for Soft Privacy on Smart Cars},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023 - Workshops, Delft, Netherlands, July 3-7, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSPW59978.2023.00005},
  doi          = {10.1109/EUROSPW59978.2023.00005},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/RacitiB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/EspositoSB23,
  author       = {Sergio Esposito and
                  Daniele Sgandurra and
                  Giampaolo Bella},
  title        = {Protecting Voice-Controllable Devices Against Self-Issued Voice Commands},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {160--174},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00019},
  doi          = {10.1109/EUROSP57164.2023.00019},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/EspositoSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MaugeriDBP23,
  author       = {Marcello Maugeri and
                  Cristian Daniele and
                  Giampaolo Bella and
                  Erik Poll},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {424--429},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011648600003405},
  doi          = {10.5220/0011648600003405},
  timestamp    = {Thu, 11 May 2023 10:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MaugeriDBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jowo/BellaCS23,
  author       = {Giampaolo Bella and
                  Gianpietro Castiglione and
                  Daniele Francesco Santamaria},
  editor       = {Fumiaki Toyoshima and
                  Megan Katsumi and
                  Guendalina Righetti and
                  Stefano De Giorgis and
                  Maria M. Hedblom and
                  Oliver Kutz and
                  Boyan Brodaric and
                  Michael Gr{\"{u}}ninger and
                  Torsten Hahmann and
                  Damion Dooley Simon and
                  Matthew Lange and
                  Hande K{\"{u}}{\c{c}}{\"{u}}k{-}McGinty and
                  Anoosha Sehar Simon and
                  Rhiannon Cameron and
                  Bart Gajderowicz and
                  Daniela Rosu and
                  Janna Hastings and
                  Davide Audrito and
                  Luigi Di Caro and
                  Francesca Grasso and
                  Roberto Nai and
                  Emilio Sulis and
                  Loris Bozzato and
                  Cogan Shimizu and
                  Antoine Zimmermann and
                  Riccardo Baratella and
                  Stefano Borgo and
                  Sergio de Cesare and
                  Tiago Prince Sales},
  title        = {An Ontological Approach to Compliance Verification of the {NIS} 2
                  Directive},
  booktitle    = {Proceedings of the Joint Ontology Workshops 2023 Episode {IX:} The
                  Quebec Summer of Ontology co-located with the 13th International Conference
                  on Formal Ontology in Information Systems {(FOIS} 2023), Sherbrooke,
                  Qu{\'{e}}bec, Canada, July 19-20, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3637},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3637/paper12.pdf},
  timestamp    = {Mon, 11 Mar 2024 19:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/jowo/BellaCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jowo/BellaCS23a,
  author       = {Giampaolo Bella and
                  Gianpietro Castiglione and
                  Daniele Francesco Santamaria},
  editor       = {Fumiaki Toyoshima and
                  Megan Katsumi and
                  Guendalina Righetti and
                  Stefano De Giorgis and
                  Maria M. Hedblom and
                  Oliver Kutz and
                  Boyan Brodaric and
                  Michael Gr{\"{u}}ninger and
                  Torsten Hahmann and
                  Damion Dooley Simon and
                  Matthew Lange and
                  Hande K{\"{u}}{\c{c}}{\"{u}}k{-}McGinty and
                  Anoosha Sehar Simon and
                  Rhiannon Cameron and
                  Bart Gajderowicz and
                  Daniela Rosu and
                  Janna Hastings and
                  Davide Audrito and
                  Luigi Di Caro and
                  Francesca Grasso and
                  Roberto Nai and
                  Emilio Sulis and
                  Loris Bozzato and
                  Cogan Shimizu and
                  Antoine Zimmermann and
                  Riccardo Baratella and
                  Stefano Borgo and
                  Sergio de Cesare and
                  Tiago Prince Sales},
  title        = {An Automated Method for the Ontological Representation of Security
                  Directives},
  booktitle    = {Proceedings of the Joint Ontology Workshops 2023 Episode {IX:} The
                  Quebec Summer of Ontology co-located with the 13th International Conference
                  on Formal Ontology in Information Systems {(FOIS} 2023), Sherbrooke,
                  Qu{\'{e}}bec, Canada, July 19-20, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3637},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3637/paper18.pdf},
  timestamp    = {Sat, 17 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/jowo/BellaCS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jowo/BellaCS23b,
  author       = {Giampaolo Bella and
                  Gianpietro Castiglione and
                  Daniele Francesco Santamaria},
  editor       = {Fumiaki Toyoshima and
                  Megan Katsumi and
                  Guendalina Righetti and
                  Stefano De Giorgis and
                  Maria M. Hedblom and
                  Oliver Kutz and
                  Boyan Brodaric and
                  Michael Gr{\"{u}}ninger and
                  Torsten Hahmann and
                  Damion Dooley Simon and
                  Matthew Lange and
                  Hande K{\"{u}}{\c{c}}{\"{u}}k{-}McGinty and
                  Anoosha Sehar Simon and
                  Rhiannon Cameron and
                  Bart Gajderowicz and
                  Daniela Rosu and
                  Janna Hastings and
                  Davide Audrito and
                  Luigi Di Caro and
                  Francesca Grasso and
                  Roberto Nai and
                  Emilio Sulis and
                  Loris Bozzato and
                  Cogan Shimizu and
                  Antoine Zimmermann and
                  Riccardo Baratella and
                  Stefano Borgo and
                  Sergio de Cesare and
                  Tiago Prince Sales},
  title        = {A Behaviouristic Approach to Representing Processes and Procedures
                  in the {OASIS} 2 Ontology},
  booktitle    = {Proceedings of the Joint Ontology Workshops 2023 Episode {IX:} The
                  Quebec Summer of Ontology co-located with the 13th International Conference
                  on Formal Ontology in Information Systems {(FOIS} 2023), Sherbrooke,
                  Qu{\'{e}}bec, Canada, July 19-20, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3637},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3637/paper27.pdf},
  timestamp    = {Sat, 17 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/jowo/BellaCS23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BonaventuraEB23,
  author       = {Davide Bonaventura and
                  Sergio Esposito and
                  Giampaolo Bella},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Smart Bulbs Can Be Hacked to Hack into Your Household},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {218--229},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012092900003555},
  doi          = {10.5220/0012092900003555},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BonaventuraEB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vehits/RacitiB23,
  author       = {Mario Raciti and
                  Giampaolo Bella},
  editor       = {Alexey V. Vinel and
                  Jeroen Ploeg and
                  Karsten Berns and
                  Oleg Gusikhin},
  title        = {How to Model Privacy Threats in the Automotive Domain},
  booktitle    = {Proceedings of the 9th International Conference on Vehicle Technology
                  and Intelligent Transport Systems, {VEHITS} 2023, Prague, Czech Republic,
                  April 26-28, 2023},
  pages        = {394--401},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011998800003479},
  doi          = {10.5220/0011998800003479},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vehits/RacitiB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2022,
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-32636-3},
  doi          = {10.1007/978-3-031-32636-3},
  isbn         = {978-3-031-32635-6},
  timestamp    = {Sun, 21 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-05060,
  author       = {Marcello Maugeri and
                  Cristian Daniele and
                  Giampaolo Bella and
                  Erik Poll},
  title        = {Evaluating the Fork-Awareness of Coverage-Guided Fuzzers},
  journal      = {CoRR},
  volume       = {abs/2301.05060},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.05060},
  doi          = {10.48550/ARXIV.2301.05060},
  eprinttype    = {arXiv},
  eprint       = {2301.05060},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-05060.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-04900,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Stefano Bognanni and
                  Sergio Esposito},
  title        = {PETIoT: PEnetration Testing the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/2302.04900},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.04900},
  doi          = {10.48550/ARXIV.2302.04900},
  eprinttype    = {arXiv},
  eprint       = {2302.04900},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-04900.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-10370,
  author       = {Mario Raciti and
                  Giampaolo Bella},
  title        = {How to Model Privacy Threats in the Automotive Domain},
  journal      = {CoRR},
  volume       = {abs/2303.10370},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.10370},
  doi          = {10.48550/ARXIV.2303.10370},
  eprinttype    = {arXiv},
  eprint       = {2303.10370},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-10370.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-04222,
  author       = {Mario Raciti and
                  Giampaolo Bella},
  title        = {A Threat Model for Soft Privacy on Smart Cars},
  journal      = {CoRR},
  volume       = {abs/2306.04222},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.04222},
  doi          = {10.48550/ARXIV.2306.04222},
  eprinttype    = {arXiv},
  eprint       = {2306.04222},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-04222.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-10061,
  author       = {Giampaolo Bella and
                  Domenico Cantone and
                  Carmelo Fabio Longo and
                  Marianna Nicolosi Asmundo and
                  Daniele Francesco Santamaria},
  title        = {The Ontology for Agents, Systems and Integration of Services: {OASIS}
                  version 2},
  journal      = {CoRR},
  volume       = {abs/2306.10061},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.10061},
  doi          = {10.48550/ARXIV.2306.10061},
  eprinttype    = {arXiv},
  eprint       = {2306.10061},
  timestamp    = {Thu, 22 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-10061.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-17042,
  author       = {Gianpietro Castiglione and
                  Giampaolo Bella and
                  Daniele Francesco Santamaria},
  title        = {Towards Grammatical Tagging for the Legal Language of Cybersecurity},
  journal      = {CoRR},
  volume       = {abs/2306.17042},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.17042},
  doi          = {10.48550/ARXIV.2306.17042},
  eprinttype    = {arXiv},
  eprint       = {2306.17042},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-17042.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-17494,
  author       = {Gianpietro Castiglione and
                  Daniele Francesco Santamaria and
                  Giampaolo Bella},
  title        = {An ontological approach to compliance verification of the {NIS} 2
                  directive},
  journal      = {CoRR},
  volume       = {abs/2306.17494},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.17494},
  doi          = {10.48550/ARXIV.2306.17494},
  eprinttype    = {arXiv},
  eprint       = {2306.17494},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-17494.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-17514,
  author       = {Giampaolo Bella and
                  Gianpietro Castiglione and
                  Daniele Francesco Santamaria},
  title        = {A behaviouristic approach to representing processes and procedures
                  in the {OASIS} 2 ontology},
  journal      = {CoRR},
  volume       = {abs/2306.17514},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.17514},
  doi          = {10.48550/ARXIV.2306.17514},
  eprinttype    = {arXiv},
  eprint       = {2306.17514},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-17514.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-01211,
  author       = {Giampaolo Bella and
                  Gianpietro Castiglione and
                  Daniele Francesco Santamaria},
  title        = {An automated method for the ontological representation of security
                  directives},
  journal      = {CoRR},
  volume       = {abs/2307.01211},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.01211},
  doi          = {10.48550/ARXIV.2307.01211},
  eprinttype    = {arXiv},
  eprint       = {2307.01211},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-01211.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-09019,
  author       = {Davide Bonaventura and
                  Sergio Esposito and
                  Giampaolo Bella},
  title        = {Smart Bulbs can be Hacked to Hack into your Household},
  journal      = {CoRR},
  volume       = {abs/2308.09019},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.09019},
  doi          = {10.48550/ARXIV.2308.09019},
  eprinttype    = {arXiv},
  eprint       = {2308.09019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-09019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-11273,
  author       = {Mario Raciti and
                  Giampaolo Bella},
  title        = {Up-to-date Threat Modelling for Soft Privacy on Smart Cars},
  journal      = {CoRR},
  volume       = {abs/2308.11273},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.11273},
  doi          = {10.48550/ARXIV.2308.11273},
  eprinttype    = {arXiv},
  eprint       = {2308.11273},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-11273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BellaBCM22,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Gianpiero Costantino and
                  Ilaria Matteucci},
  title        = {Designing and implementing an AUTOSAR-based Basic Software Module
                  for enhanced security},
  journal      = {Comput. Networks},
  volume       = {218},
  pages        = {109377},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109377},
  doi          = {10.1016/J.COMNET.2022.109377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BellaBCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/EiseleMSHB22,
  author       = {Max Eisele and
                  Marcello Maugeri and
                  Rachna Shriwas and
                  Christopher Huth and
                  Giampaolo Bella},
  title        = {Embedded fuzzing: a review of challenges, tools, and solutions},
  journal      = {Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {18},
  year         = {2022},
  url          = {https://doi.org/10.1186/s42400-022-00123-y},
  doi          = {10.1186/S42400-022-00123-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/EiseleMSHB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/BellaBB22,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Stefano Bognanni},
  title        = {Multi-service threats: Attacking and protecting network printers and
                  VoIP phones alike},
  journal      = {Internet Things},
  volume       = {18},
  pages        = {100507},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.iot.2022.100507},
  doi          = {10.1016/J.IOT.2022.100507},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/BellaBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BellaGS22,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Carsten Sch{\"{u}}rmann},
  title        = {Modelling human threats in security ceremonies},
  journal      = {J. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {411--433},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCS-210059},
  doi          = {10.3233/JCS-210059},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/BellaGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/EspositoSB22,
  author       = {Sergio Esposito and
                  Daniele Sgandurra and
                  Giampaolo Bella},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {{ALEXA} {VERSUS} {ALEXA:} Controlling Smart Speakers by Self-Issuing
                  Voice Commands},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1064--1078},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497766},
  doi          = {10.1145/3488932.3497766},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/EspositoSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/BellaDR22,
  author       = {Giampaolo Bella and
                  Cristian Daniele and
                  Mario Raciti},
  title        = {The {AILA} Methodology for Automated and Intelligent Likelihood Assignment},
  booktitle    = {6th International Conference on Cryptography, Security and Privacy,
                  {CSP} 2022, Tianjin, China, January 14-16, 2022},
  pages        = {119--123},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSP55486.2022.00030},
  doi          = {10.1109/CSP55486.2022.00030},
  timestamp    = {Mon, 06 Nov 2023 13:06:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/BellaDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsrs/BiondiTB22,
  author       = {Pietro Biondi and
                  Fabrizio Tronci and
                  Giampaolo Bella},
  title        = {Papyrus-Based Safety Analysis Automatization},
  booktitle    = {6th International Conference on System Reliability and Safety, {ICSRS}
                  2022, Venice, Italy, November 23-25, 2022},
  pages        = {469--474},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICSRS56243.2022.10067259},
  doi          = {10.1109/ICSRS56243.2022.10067259},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsrs/BiondiTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Bella22,
  author       = {Giampaolo Bella},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Interactional Freedom and Cybersecurity},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_1},
  doi          = {10.1007/978-3-031-32636-3\_1},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/Bella22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woa/BellaCAS22,
  author       = {Giampaolo Bella and
                  Domenico Cantone and
                  Marianna Nicolosi Asmundo and
                  Daniele Francesco Santamaria},
  editor       = {Angelo Ferrando and
                  Viviana Mascardi},
  title        = {The ontology for agents, systems and integration of services: recent
                  advancements of {OASIS}},
  booktitle    = {Proceedings of the 23rd Workshop "From Objects to Agents", Genova,
                  Italy, September 1-3, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3261},
  pages        = {176--193},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3261/paper14.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:40 +0100},
  biburl       = {https://dblp.org/rec/conf/woa/BellaCAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-06597,
  author       = {Pietro Biondi and
                  Stefano Bognanni and
                  Giampaolo Bella},
  title        = {Vulnerability Assessment and Penetration Testing on {IP} cameras},
  journal      = {CoRR},
  volume       = {abs/2202.06597},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.06597},
  eprinttype    = {arXiv},
  eprint       = {2202.06597},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-06597.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-08619,
  author       = {Sergio Esposito and
                  Daniele Sgandurra and
                  Giampaolo Bella},
  title        = {Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice
                  Commands},
  journal      = {CoRR},
  volume       = {abs/2202.08619},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.08619},
  eprinttype    = {arXiv},
  eprint       = {2202.08619},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-08619.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-10832,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Stefano Bognanni},
  title        = {Attacking and Protecting Network Printers and VoIP Phones alike},
  journal      = {CoRR},
  volume       = {abs/2202.10832},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.10832},
  eprinttype    = {arXiv},
  eprint       = {2202.10832},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-10832.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BellaBVT21,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Marco De Vincenzi and
                  Giuseppe Tudisco},
  title        = {Privacy and modern cars through a dual lens},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {136--143},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSPW54576.2021.00022},
  doi          = {10.1109/EUROSPW54576.2021.00022},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BellaBVT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecon/BellaCLAS21,
  author       = {Giampaolo Bella and
                  Domenico Cantone and
                  Cristiano Longo and
                  Marianna Nicolosi Asmundo and
                  Daniele Francesco Santamaria},
  editor       = {Konstantinos Tserpes and
                  J{\"{o}}rn Altmann and
                  Jos{\'{e}} {\'{A}}ngel Ba{\~{n}}ares and
                  Orna Agmon Ben{-}Yehuda and
                  Karim Djemame and
                  Vlado Stankovski and
                  Bruno Tuffin},
  title        = {Semantic Representation as a Key Enabler for Blockchain-Based Commerce},
  booktitle    = {Economics of Grids, Clouds, Systems, and Services - 18th International
                  Conference, {GECON} 2021, Virtual Event, September 21-23, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13072},
  pages        = {191--198},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92916-9\_17},
  doi          = {10.1007/978-3-030-92916-9\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecon/BellaCLAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/BellaCLAS21,
  author       = {Giampaolo Bella and
                  Domenico Cantone and
                  Cristiano Longo and
                  Marianna Nicolosi Asmundo and
                  Daniele Francesco Santamaria},
  editor       = {David Camacho and
                  Domenico Rosaci and
                  Giuseppe M. L. Sarn{\'{e}} and
                  Mario Versaci},
  title        = {Blockchains Through Ontologies: The Case Study of the Ethereum {ERC721}
                  Standard in oasis},
  booktitle    = {Intelligent Distributed Computing XIV, 14th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18
                  September 2021},
  series       = {Studies in Computational Intelligence},
  volume       = {1026},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96627-0\_23},
  doi          = {10.1007/978-3-030-96627-0\_23},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/BellaCLAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotsms/BiondiBB21,
  author       = {Pietro Biondi and
                  Stefano Bognanni and
                  Giampaolo Bella},
  editor       = {Jaime Mauri Lauret and
                  Mohamed Abdel{-}Maguid and
                  Yaser Jararweh and
                  Elhadj Benkhelifa},
  title        = {Vulnerability Assessment and Penetration Testing on {IP} camera},
  booktitle    = {8th International Conference on Internet of Things: Systems, Management
                  and Security, {IOTSMS} 2021, Gandia, Spain, December 6-9, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IOTSMS53705.2021.9704890},
  doi          = {10.1109/IOTSMS53705.2021.9704890},
  timestamp    = {Fri, 18 Feb 2022 10:36:42 +0100},
  biburl       = {https://dblp.org/rec/conf/iotsms/BiondiBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/openidentity/BellaBCMM21,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Gianpiero Costantino and
                  Ilaria Matteucci and
                  Mirco Marchetti},
  editor       = {Heiko Ro{\ss}nagel and
                  Christian H. Schunck and
                  Sebastian M{\"{o}}dersheim},
  title        = {Towards the {COSCA} framework for "COnseptualing Secure CArs"},
  booktitle    = {Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021},
  series       = {{LNI}},
  volume       = {{P-312}},
  pages        = {37--46},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2021},
  url          = {https://dl.gi.de/handle/20.500.12116/36500},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/openidentity/BellaBCMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BellaBT21,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Giuseppe Tudisco},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Car Drivers' Privacy Concerns and Trust Perceptions},
  booktitle    = {Trust, Privacy and Security in Digital Business - 18th International
                  Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12927},
  pages        = {143--154},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86586-3\_10},
  doi          = {10.1007/978-3-030-86586-3\_10},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/BellaBT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/PollicinoSBM21,
  author       = {Francesco Pollicino and
                  Dario Stabili and
                  Giampaolo Bella and
                  Mirco Marchetti},
  title        = {SixPack: Abusing {ABS} to avoid Misbehavior detection in VANETs},
  booktitle    = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki,
                  Finland, April 25-28, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9448656},
  doi          = {10.1109/VTC2021-SPRING51267.2021.9448656},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/PollicinoSBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-02899,
  author       = {Giampaolo Bella and
                  Domenico Cantone and
                  Cristiano Longo and
                  Marianna Nicolosi Asmundo and
                  Daniele Francesco Santamaria},
  title        = {Blockchains through ontologies: the case study of the Ethereum {ERC721}
                  standard in {OASIS} (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2109.02899},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.02899},
  eprinttype    = {arXiv},
  eprint       = {2109.02899},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-02899.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-10642,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Gianpiero Costantino and
                  Ilaria Matteucci},
  title        = {{TOUCAN:} {A} proTocol tO secUre Controller Area Network},
  journal      = {CoRR},
  volume       = {abs/2111.10642},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.10642},
  eprinttype    = {arXiv},
  eprint       = {2111.10642},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-10642.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-10645,
  author       = {Giampaolo Bella and
                  Pietro Biondi},
  title        = {You Overtrust Your Printer},
  journal      = {CoRR},
  volume       = {abs/2111.10645},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.10645},
  eprinttype    = {arXiv},
  eprint       = {2111.10645},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-10645.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-11732,
  author       = {Giampaolo Bella and
                  Pietro Biondi},
  title        = {Towards an Integrated Penetration Testing Environment for the {CAN}
                  Protocol},
  journal      = {CoRR},
  volume       = {abs/2111.11732},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.11732},
  eprinttype    = {arXiv},
  eprint       = {2111.11732},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-11732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-12026,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Gianpiero Costantino and
                  Ilaria Matteucci},
  title        = {{CINNAMON:} {A} Module for {AUTOSAR} Secure Onboard Communication},
  journal      = {CoRR},
  volume       = {abs/2111.12026},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.12026},
  eprinttype    = {arXiv},
  eprint       = {2111.12026},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-12026.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-12027,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Marco De Vincenzi and
                  Giuseppe Tudisco},
  title        = {Privacy and modern cars through a dual lens},
  journal      = {CoRR},
  volume       = {abs/2111.12027},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.12027},
  eprinttype    = {arXiv},
  eprint       = {2111.12027},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-12027.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-15467,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Giuseppe Tudisco},
  title        = {Car drivers' privacy concerns and trust perceptions},
  journal      = {CoRR},
  volume       = {abs/2111.15467},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.15467},
  eprinttype    = {arXiv},
  eprint       = {2111.15467},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-15467.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-15468,
  author       = {Pietro Biondi and
                  Stefano Bognanni and
                  Giampaolo Bella},
  title        = {VoIP Can Still Be Exploited - Badly},
  journal      = {CoRR},
  volume       = {abs/2111.15468},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.15468},
  eprinttype    = {arXiv},
  eprint       = {2111.15468},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-15468.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-06200,
  author       = {Davide Micale and
                  Gianpiero Costantino and
                  Ilaria Matteucci and
                  Giuseppe Patan{\`{e}} and
                  Giampaolo Bella},
  title        = {Secure Routine: {A} Routine-Based Algorithm for Drivers Identification},
  journal      = {CoRR},
  volume       = {abs/2112.06200},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.06200},
  eprinttype    = {arXiv},
  eprint       = {2112.06200},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-06200.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-12790,
  author       = {Giampaolo Bella},
  title        = {Out to Explore the Cybersecurity Planet},
  journal      = {CoRR},
  volume       = {abs/2112.12790},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.12790},
  eprinttype    = {arXiv},
  eprint       = {2112.12790},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-12790.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/BellaBCM20,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Gianpiero Costantino and
                  Ilaria Matteucci},
  title        = {{CINNAMON:} {A} Module for {AUTOSAR} Secure Onboard Communication},
  booktitle    = {16th European Dependable Computing Conference, {EDCC} 2020, Munich,
                  Germany, September 7-10, 2020},
  pages        = {103--110},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EDCC51268.2020.00026},
  doi          = {10.1109/EDCC51268.2020.00026},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edcc/BellaBCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmec/BiondiBB20,
  author       = {Pietro Biondi and
                  Stefano Bognanni and
                  Giampaolo Bella},
  title        = {VoIP Can Still Be Exploited - Badly},
  booktitle    = {Fifth International Conference on Fog and Mobile Edge Computing, {FMEC}
                  2020, Paris, France, April 20-23, 2020},
  pages        = {237--243},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/FMEC49853.2020.9144875},
  doi          = {10.1109/FMEC49853.2020.9144875},
  timestamp    = {Fri, 31 Jul 2020 15:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/fmec/BiondiBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BellaBCM19,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Gianpiero Costantino and
                  Ilaria Matteucci},
  editor       = {Ziming Zhao and
                  Qi Alfred Chen and
                  Gail{-}Joon Ahn},
  title        = {{TOUCAN:} {A} proTocol tO secUre Controller Area Network},
  booktitle    = {Proceedings of the {ACM} Workshop on Automotive Cybersecurity, AutoSec@CODASPY
                  2019, Richardson, TX, USA, March 27, 2019},
  pages        = {3--8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309171.3309175},
  doi          = {10.1145/3309171.3309175},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BellaBCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/BellaRS019,
  author       = {Giampaolo Bella and
                  Karen Renaud and
                  Diego Sempreboni and
                  Luca Vigan{\`{o}}},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {An Investigation into the "Beautification" of Security Ceremonies},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {125--136},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007921501250136},
  doi          = {10.5220/0007921501250136},
  timestamp    = {Tue, 06 Jun 2023 14:58:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/BellaRS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/SempreboniBG019,
  author       = {Diego Sempreboni and
                  Giampaolo Bella and
                  Rosario Giustolisi and
                  Luca Vigan{\`{o}}},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {What Are the Threats? (Charting the Threat Models of Security Ceremonies)},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {161--172},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007924901610172},
  doi          = {10.5220/0007924901610172},
  timestamp    = {Wed, 18 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/SempreboniBG019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/BiondiBCM19,
  author       = {Pietro Biondi and
                  Giampaolo Bella and
                  Gianpiero Costantino and
                  Ilaria Matteucci},
  title        = {Implementing {CAN} bus security by {TOUCAN}},
  booktitle    = {Proceedings of the Twentieth {ACM} International Symposium on Mobile
                  Ad Hoc Networking and Computing, Mobihoc 2019, Catania, Italy, July
                  2-5, 2019},
  pages        = {399--400},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3323679.3326614},
  doi          = {10.1145/3323679.3326614},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/BiondiBCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/BellaB19,
  author       = {Giampaolo Bella and
                  Pietro Biondi},
  editor       = {Alexander B. Romanovsky and
                  Elena Troubitsyna and
                  Ilir Gashi and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {You Overtrust Your Printer},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2019 Workshops,
                  ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September
                  10, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11699},
  pages        = {264--274},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26250-1\_21},
  doi          = {10.1007/978-3-030-26250-1\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/BellaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tfm/Bella99,
  author       = {Giampaolo Bella},
  editor       = {Brijesh Dongol and
                  Luigia Petre and
                  Graeme Smith},
  title        = {You Already Used Formal Methods but Did Not Know It},
  booktitle    = {Formal Methods Teaching - Third International Workshop and Tutorial,
                  FMTea 2019, Held as Part of the Third World Congress on Formal Methods,
                  {FM} 2019, Porto, Portugal, October 7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11758},
  pages        = {228--243},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32441-4\_15},
  doi          = {10.1007/978-3-030-32441-4\_15},
  timestamp    = {Thu, 07 Apr 2022 08:44:28 +0200},
  biburl       = {https://dblp.org/rec/conf/tfm/Bella99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BellaBCM19,
  author       = {Giampaolo Bella and
                  Pietro Biondi and
                  Gianpiero Costantino and
                  Ilaria Matteucci},
  title        = {Are you secure in your car?: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {308--309},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326305},
  doi          = {10.1145/3317549.3326305},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BellaBCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GiustolisiBL18,
  author       = {Rosario Giustolisi and
                  Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {Invalid certificates in modern browsers: {A} socio-technical analysis},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {509--541},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-16891},
  doi          = {10.3233/JCS-16891},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GiustolisiBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/BellaMCM18,
  author       = {Giampaolo Bella and
                  Francesco Marino and
                  Gianpiero Costantino and
                  Fabio Martinelli},
  editor       = {Ivan Merelli and
                  Pietro Li{\`{o}} and
                  Igor V. Kotenko},
  title        = {Getmewhere: {A} Location-Based Privacy-Preserving Information Service},
  booktitle    = {26th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2018, Cambridge, United Kingdom, March
                  21-23, 2018},
  pages        = {529--532},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PDP2018.2018.00089},
  doi          = {10.1109/PDP2018.2018.00089},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/BellaMCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/BellaB18,
  author       = {Giampaolo Bella and
                  Pietro Biondi},
  editor       = {Barbara Gallina and
                  Amund Skavhaug and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {Towards an Integrated Penetration Testing Environment for the {CAN}
                  Protocol},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2018 Workshops,
                  ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, V{\"{a}}ster{\aa}s,
                  Sweden, September 18, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11094},
  pages        = {344--352},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99229-7\_29},
  doi          = {10.1007/978-3-319-99229-7\_29},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/BellaB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stast/2018,
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini and
                  Theo Tryfonas and
                  Debi Ashenden},
  title        = {{STAST} 2018: 8th International Workshop on Socio-Technical Aspects
                  in Security and Trust, San Juan, Puerto Rico, USA, December, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3361331},
  doi          = {10.1145/3361331},
  isbn         = {978-1-4503-7285-5},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BellaGLR17,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  title        = {Trustworthy exams without trusted parties},
  journal      = {Comput. Secur.},
  volume       = {67},
  pages        = {291--307},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.12.005},
  doi          = {10.1016/J.COSE.2016.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BellaGLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BellaG17,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi},
  editor       = {Eric Bodden and
                  Mathias Payer and
                  Elias Athanasopoulos},
  title        = {Idea: {A} Unifying Theory for Evaluation Systems},
  booktitle    = {Engineering Secure Software and Systems - 9th International Symposium,
                  ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10379},
  pages        = {231--239},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-62105-0\_15},
  doi          = {10.1007/978-3-319-62105-0\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/BellaG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/BellaBJ17,
  author       = {Giampaolo Bella and
                  Denis Butin and
                  Hugo Jonker},
  editor       = {Alessandro Armando and
                  Roberto Baldoni and
                  Riccardo Focardi},
  title        = {Analysing Privacy Analyses},
  booktitle    = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17),
                  Venice, Italy, January 17-20, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1816},
  pages        = {19--28},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1816/paper-03.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/BellaBJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stast/2017,
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {Proceedings of the 7th Workshop on Socio-Technical Aspects in Security
                  and Trust, {STAST} 2017, Orlando, FL, USA, December 5, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3167996},
  doi          = {10.1145/3167996},
  isbn         = {978-1-4503-6357-0},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaC016,
  author       = {Giampaolo Bella and
                  Bruce Christianson and
                  Luca Vigan{\`{o}}},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Invisible Security},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_1},
  doi          = {10.1007/978-3-319-62033-6\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaC016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella16,
  author       = {Giampaolo Bella},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Invisible Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {10--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_2},
  doi          = {10.1007/978-3-319-62033-6\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stast/2016,
  editor       = {Gabriele Lenzini and
                  Giampaolo Bella and
                  Zinaida Benenson and
                  Carrie E. Gates},
  title        = {Proceedings of the 6th Workshop on Socio-Technical Aspects in Security
                  and Trust, {STAST} 2016, Los Angeles, CA, USA, December 5, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3046055},
  doi          = {10.1145/3046055},
  isbn         = {978-1-4503-4826-3},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BellaJ15,
  author       = {Giampaolo Bella and
                  Helge Janicke},
  title        = {Special issue on the Security Track at the {ACM} Symposium on Applied
                  Computing 2013},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {101--102},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-015-0280-2},
  doi          = {10.1007/S10207-015-0280-2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BellaJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BellaCL15,
  author       = {Giampaolo Bella and
                  Paul Curzon and
                  Gabriele Lenzini},
  title        = {Service security and privacy as a socio-technical problem},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {563--585},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-150536},
  doi          = {10.3233/JCS-150536},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BellaCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BellaGLR15,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {A Secure Exam Protocol Without Trusted Parties},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {495--509},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_33},
  doi          = {10.1007/978-3-319-18467-8\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BellaGLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaV15,
  author       = {Giampaolo Bella and
                  Luca Vigan{\`{o}}},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Security is Beautiful},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {247--250},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_25},
  doi          = {10.1007/978-3-319-26096-9\_25},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stast/2015,
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {2015 Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2015, Verona, Italy, July 13, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7351959/proceeding},
  isbn         = {978-1-5090-0178-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/Bella14,
  author       = {Giampaolo Bella},
  title        = {Inductive study of confidentiality: for everyone},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {1},
  pages        = {3--36},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00165-012-0246-3},
  doi          = {10.1007/S00165-012-0246-3},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/Bella14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amt/BellaJL14,
  author       = {Giampaolo Bella and
                  Pekka J{\"{a}}ppinen and
                  Jussi Laakkonen},
  editor       = {Dominik Slezak and
                  Gerald Schaefer and
                  Son T. Vuong and
                  Yoo{-}Sung Kim},
  title        = {The Challenges behind Independent Living Support Systems},
  booktitle    = {Active Media Technology - 10th International Conference, {AMT} 2014,
                  Warsaw, Poland, August 11-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8610},
  pages        = {464--474},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09912-5\_39},
  doi          = {10.1007/978-3-319-09912-5\_39},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amt/BellaJL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BellaCGL14,
  author       = {Giampaolo Bella and
                  Paul Curzon and
                  Rosario Giustolisi and
                  Gabriele Lenzini},
  title        = {A Socio-technical Methodology for the Security and Privacy Analysis
                  of Services},
  booktitle    = {{IEEE} 38th Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2014, Vasteras, Sweden, July 21-25, 2014},
  pages        = {401--406},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/COMPSACW.2014.69},
  doi          = {10.1109/COMPSACW.2014.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/BellaCGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BellaGL14,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Gabriele Lenzini},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Secure exams despite malicious management},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {274--281},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890949},
  doi          = {10.1109/PST.2014.6890949},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/BellaGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stast/2014,
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {2014 Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2014, Vienna, Austria, July 18, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6975727/proceeding},
  isbn         = {978-1-4799-7901-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/BellaCCR13,
  author       = {Giampaolo Bella and
                  Gianpiero Costantino and
                  Jon Crowcroft and
                  Salvatore Riccobene},
  title        = {Enhancing {DSR} maintenance with power awareness},
  journal      = {Comput. Stand. Interfaces},
  volume       = {35},
  number       = {1},
  pages        = {107--113},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.csi.2012.06.007},
  doi          = {10.1016/J.CSI.2012.06.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/BellaCCR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/GiustolisiLB13,
  author       = {Rosario Giustolisi and
                  Gabriele Lenzini and
                  Giampaolo Bella},
  editor       = {Bruno Crispo and
                  Ravi S. Sandhu and
                  Nora Cuppens{-}Boulahia and
                  Mauro Conti and
                  Jean{-}Louis Lanet},
  title        = {What security for electronic exams?},
  booktitle    = {2013 International Conference on Risks and Security of Internet and
                  Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CRiSIS.2013.6766348},
  doi          = {10.1109/CRISIS.2013.6766348},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/GiustolisiLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/ButinGB13,
  author       = {Denis Butin and
                  David Gray and
                  Giampaolo Bella},
  editor       = {Jan J{\"{u}}rjens and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Towards Verifying Voter Privacy through Unlinkability},
  booktitle    = {Engineering Secure Software and Systems - 5th International Symposium,
                  ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7781},
  pages        = {91--106},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36563-8\_7},
  doi          = {10.1007/978-3-642-36563-8\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/ButinGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BellaGL13,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Gabriele Lenzini},
  editor       = {M. Carmen Fern{\'{a}}ndez Gago and
                  Fabio Martinelli and
                  Siani Pearson and
                  Isaac Agudo},
  title        = {A Socio-technical Understanding of {TLS} Certificate Validation},
  booktitle    = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {401},
  pages        = {281--288},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38323-6\_23},
  doi          = {10.1007/978-3-642-38323-6\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/BellaGL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BellaGL13,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Gabriele Lenzini},
  editor       = {Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ali A. Ghorbani and
                  Christian Damsgaard Jensen and
                  Jes{\'{u}}s A. Manj{\'{o}}n and
                  Iosif{-}Viorel Onut and
                  Natalia Stakhanova and
                  Vicen{\c{c}} Torra and
                  Jie Zhang},
  title        = {Socio-technical formal analysis of {TLS} certificate validation in
                  modern browsers},
  booktitle    = {Eleventh Annual International Conference on Privacy, Security and
                  Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
                  July 10-12, 2013},
  pages        = {309--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PST.2013.6596067},
  doi          = {10.1109/PST.2013.6596067},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/BellaGL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/Bella12,
  author       = {Giampaolo Bella},
  title        = {Inductive Study of Confidentiality},
  journal      = {Arch. Formal Proofs},
  volume       = {2012},
  year         = {2012},
  url          = {https://www.isa-afp.org/entries/Inductive\_Confidentiality.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/Bella12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdim/AlmutairiBA12,
  author       = {Saad Almutairi and
                  Giampaolo Bella and
                  Ala Abu{-}Samaha},
  editor       = {Simon Fong and
                  Pit Pichappan and
                  Sabah Mohammed and
                  Patrick Hung and
                  Sohail Asghar},
  title        = {Specifying security requirements of context aware system using {UML}},
  booktitle    = {Seventh International Conference on Digital Information Management,
                  {ICDIM} 2012, Macau, Macao, August 22-24, 2012},
  pages        = {259--265},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDIM.2012.6360140},
  doi          = {10.1109/ICDIM.2012.6360140},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdim/AlmutairiBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BellaC12,
  author       = {Giampaolo Bella and
                  Lizzie Coles{-}Kemp},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Layered Analysis of Security Ceremonies},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {273--286},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_23},
  doi          = {10.1007/978-3-642-30436-1\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BellaC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ButinB12,
  author       = {Denis Butin and
                  Giampaolo Bella},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Verifying Privacy by Little Interaction and No Process Equivalence},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {251--256},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ButinB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/BellaL12,
  author       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {Foreword from the Workshop Chairs - {STAST} 2012},
  booktitle    = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2012, Cambridge, MA, USA, June 25, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/STAST.2012.4},
  doi          = {10.1109/STAST.2012.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/BellaL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BellaGR11,
  author       = {Giampaolo Bella and
                  Rosario Giustolisi and
                  Salvatore Riccobene},
  title        = {Enforcing privacy in e-commerce by balancing anonymity and trust},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {8},
  pages        = {705--718},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.08.005},
  doi          = {10.1016/J.COSE.2011.08.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BellaGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ArsacBCC11,
  author       = {Wihem Arsac and
                  Giampaolo Bella and
                  Xavier Chantry and
                  Luca Compagna},
  title        = {Multi-Attacker Protocol Validation},
  journal      = {J. Autom. Reason.},
  volume       = {46},
  number       = {3-4},
  pages        = {353--388},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10817-010-9185-y},
  doi          = {10.1007/S10817-010-9185-Y},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ArsacBCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BellaBG11,
  author       = {Giampaolo Bella and
                  Denis Butin and
                  David Gray},
  title        = {Holistic analysis of mix protocols},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {338--343},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122843},
  doi          = {10.1109/ISIAS.2011.6122843},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BellaBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csedu/BellaCCR11,
  author       = {Giampaolo Bella and
                  Gianpiero Costantino and
                  Lizzie Coles{-}Kemp and
                  Salvatore Riccobene},
  editor       = {Alexander Verbraeck and
                  Markus Helfert and
                  Jos{\'{e}} Cordeiro and
                  Boris Shishkov},
  title        = {Remote Management of Face-to-face Written Authenticated Though Anonymous
                  Exams},
  booktitle    = {{CSEDU} 2011 - Proceedings of the 3rd International Conference on
                  Computer Supported Education, Volume 2, Noordwijkerhout, Netherlands,
                  6-8 May, 2011},
  pages        = {431--437},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Fri, 30 Sep 2011 08:32:56 +0200},
  biburl       = {https://dblp.org/rec/conf/csedu/BellaCCR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BellaC11,
  author       = {Giampaolo Bella and
                  Lizzie Coles{-}Kemp},
  title        = {Internet Users' Security and Privacy While They Interact with Amazon},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {878--883},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.118},
  doi          = {10.1109/TRUSTCOM.2011.118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BellaC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Bella10,
  author       = {Giampaolo Bella},
  title        = {The principle of guarantee availability for security protocol analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {2},
  pages        = {83--97},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0097-y},
  doi          = {10.1007/S10207-009-0097-Y},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Bella10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csedu/BellaCR10,
  author       = {Giampaolo Bella and
                  Gianpiero Costantino and
                  Salvatore Riccobene},
  editor       = {Jos{\'{e}} A. Moinhos Cordeiro and
                  Boris Shishkov and
                  Alexander Verbraeck and
                  Markus Helfert},
  title        = {{WATA} - {A} System for Written Authenticated though Anonymous Exams},
  booktitle    = {{CSEDU} 2010 - Proceedings of the Second International Conference
                  on Computer Supported Education, Valencia, Spain, April 7-10, 2010
                  - Volume 2},
  pages        = {132--137},
  publisher    = {{INSTICC} Press},
  year         = {2010},
  timestamp    = {Tue, 04 Jan 2011 15:45:20 +0100},
  biburl       = {https://dblp.org/rec/conf/csedu/BellaCR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaRT10,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Virtually Perfect Democracy},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {161--166},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_24},
  doi          = {10.1007/978-3-662-45921-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BellaR09,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  title        = {Journal of Computer SecuritySpecial Number devoted to the best papers
                  of the Security Track at the 2006 {ACM} Symposium on Applied Computing},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {237},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0346},
  doi          = {10.3233/JCS-2009-0346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BellaR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cmsb/BellaL09,
  author       = {Giampaolo Bella and
                  Pietro Li{\`{o}}},
  editor       = {Pierpaolo Degano and
                  Roberto Gorrieri},
  title        = {Formal Analysis of the Genetic Toggle},
  booktitle    = {Computational Methods in Systems Biology, 7th International Conference,
                  {CMSB} 2009, Bologna, Italy, August 31-September 1, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5688},
  pages        = {96--110},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03845-7\_7},
  doi          = {10.1007/978-3-642-03845-7\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cmsb/BellaL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ArsacBCC09,
  author       = {Wihem Arsac and
                  Giampaolo Bella and
                  Xavier Chantry and
                  Luca Compagna},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Validating Security Protocols under the General Attacker},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_3},
  doi          = {10.1007/978-3-642-03459-6\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ArsacBCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ArsacBCC09,
  author       = {Wihem Arsac and
                  Giampaolo Bella and
                  Xavier Chantry and
                  Luca Compagna},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Attacking Each Other},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {41--47},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_7},
  doi          = {10.1007/978-3-642-36213-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ArsacBCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/Bella08,
  author       = {Giampaolo Bella},
  title        = {What is Correctness of Security Protocols?},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {12},
  pages        = {2083--2106},
  year         = {2008},
  url          = {https://doi.org/10.3217/jucs-014-12-2083},
  doi          = {10.3217/JUCS-014-12-2083},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/Bella08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BellaLR08,
  author       = {Giampaolo Bella and
                  Francesco Librizzi and
                  Salvatore Riccobene},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Realistic Threats to Self-Enforcing Privacy},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {155--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.23},
  doi          = {10.1109/IAS.2008.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BellaLR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BellaCR08,
  author       = {Giampaolo Bella and
                  Gianpiero Costantino and
                  Salvatore Riccobene},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Managing Reputation over MANETs},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {255--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.24},
  doi          = {10.1109/IAS.2008.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BellaCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Bella08,
  author       = {Giampaolo Bella},
  editor       = {Roger L. Wainwright and
                  Hisham Haddad},
  title        = {Special track on Computer Security: editorial message},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC),
                  Fortaleza, Ceara, Brazil, March 16-20, 2008},
  pages        = {2095--2096},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1363686.1364192},
  doi          = {10.1145/1363686.1364192},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/Bella08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FoleyBB08,
  author       = {Simon N. Foley and
                  Giampaolo Bella and
                  Stefano Bistarelli},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Security Protocol Deployment Risk},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {12--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_3},
  doi          = {10.1007/978-3-642-22137-8\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FoleyBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Bella07,
  author       = {Giampaolo Bella},
  title        = {Formal Correctness of Security Protocols - With 62 Figures and 4 Tables},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-68136-6},
  doi          = {10.1007/978-3-540-68136-6},
  isbn         = {978-3-540-68134-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Bella07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/BellaMP06,
  author       = {Giampaolo Bella and
                  Fabio Massacci and
                  Lawrence C. Paulson},
  title        = {Verifying the {SET} Purchase Protocols},
  journal      = {J. Autom. Reason.},
  volume       = {36},
  number       = {1-2},
  pages        = {5--37},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10817-005-9018-6},
  doi          = {10.1007/S10817-005-9018-6},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/BellaMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BellaP06,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  title        = {Accountability protocols: Formalized and verified},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {138--161},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151414.1151416},
  doi          = {10.1145/1151414.1151416},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BellaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BellaR06,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  editor       = {Hisham Haddad},
  title        = {Editorial message: special track on computer security},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {321--322},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141355},
  doi          = {10.1145/1141277.1141355},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BellaR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BellaBPR07,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli and
                  Pamela Peretti and
                  Salvatore Riccobene},
  editor       = {Maurice H. ter Beek and
                  Fabio Gadducci},
  title        = {Augmented Risk Analysis},
  booktitle    = {Proceedings of the Second International Workshop on Views on Designing
                  Complex Architectures, VODCA@FOSAD 2006, Bertinoro, Italy, September
                  16-17, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {168},
  pages        = {207--220},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.12.006},
  doi          = {10.1016/J.ENTCS.2006.12.006},
  timestamp    = {Tue, 24 Jan 2023 11:14:31 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BellaBPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BellaB05,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli},
  title        = {Information Assurance for security protocols},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {322--333},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2004.10.004},
  doi          = {10.1016/J.COSE.2004.10.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BellaB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BellaMP05,
  author       = {Giampaolo Bella and
                  Fabio Massacci and
                  Lawrence C. Paulson},
  title        = {An overview of the verification of {SET}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {4},
  number       = {1-2},
  pages        = {17--28},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10207-004-0047-7},
  doi          = {10.1007/S10207-004-0047-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BellaMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BellaR05,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  title        = {Guest Editors' preface},
  journal      = {J. Comput. Secur.},
  volume       = {13},
  number       = {5},
  pages        = {697},
  year         = {2005},
  url          = {https://doi.org/10.3233/jcs-2005-13501},
  doi          = {10.3233/JCS-2005-13501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BellaR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaPSC/BellaPR05,
  author       = {Giampaolo Bella and
                  Costantino Pistagna and
                  Salvatore Riccobene},
  editor       = {Laurence Tianruo Yang and
                  Jianhua Ma and
                  Makoto Takizawa and
                  Timothy K. Shih},
  title        = {Locating Mobile Nodes Within Logical Networks},
  booktitle    = {Proceedings of the 2005 International Conference on Pervasive Systems
                  and Computing, {PSC} 2005, Las Vegas, Nevada, USA, June 27-30, 2005},
  pages        = {54--62},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaPSC/BellaPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BellaR05,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  editor       = {Hisham Haddad and
                  Lorie M. Liebrock and
                  Andrea Omicini and
                  Roger L. Wainwright},
  title        = {Special track on computer security},
  booktitle    = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
                  Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages        = {304--305},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066677.1066751},
  doi          = {10.1145/1066677.1066751},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BellaR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/BellaM04,
  author       = {Giampaolo Bella and
                  Ronaldo Menezes},
  title        = {Special Issue: Computer Security},
  journal      = {Concurr. Pract. Exp.},
  volume       = {16},
  number       = {11},
  pages        = {1061},
  year         = {2004},
  url          = {https://doi.org/10.1002/cpe.803},
  doi          = {10.1002/CPE.803},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/BellaM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tplp/BellaB04,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli},
  title        = {Soft Constraint Programming to Analysing Security Protocols},
  journal      = {Theory Pract. Log. Program.},
  volume       = {4},
  number       = {5-6},
  pages        = {545--572},
  year         = {2004},
  url          = {https://doi.org/10.1017/S1471068404002121},
  doi          = {10.1017/S1471068404002121},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tplp/BellaB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egcdmas/BattiatoBR04,
  author       = {Sebastiano Battiato and
                  Giampaolo Bella and
                  Salvatore Riccobene},
  editor       = {Mohammad S. Obaidat and
                  Noureddine Boudriga},
  title        = {Should We Prove Security Policies Correct?},
  booktitle    = {Electronic Government and Commerce: Design, Modeling, Analysis and
                  Security - Proceedings of the 1st International Workshop on Electronic
                  Government and Commerce: Design, Modeling, Analysis and Security,
                  {EGCDMAS} 2004, In conjunction with {ICETE} 2004, Set{\'{u}}bal,
                  Portugal, August 2004},
  pages        = {56--65},
  publisher    = {{INSTICC} Press},
  year         = {2004},
  timestamp    = {Wed, 15 Dec 2004 14:13:59 +0100},
  biburl       = {https://dblp.org/rec/conf/egcdmas/BattiatoBR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BellaR04,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan},
  editor       = {Hisham Haddad and
                  Andrea Omicini and
                  Roger L. Wainwright and
                  Lorie M. Liebrock},
  title        = {Editoral message: special track on computer security},
  booktitle    = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),
                  Nicosia, Cyprus, March 14-17, 2004},
  pages        = {373--374},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/967900.967982},
  doi          = {10.1145/967900.967982},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BellaR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BellaBF06,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli and
                  Simon N. Foley},
  editor       = {Maurice H. ter Beek and
                  Fabio Gadducci},
  title        = {Soft Constraints for Security},
  booktitle    = {Proceedings of the First International Workshop on Views on Designing
                  Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September
                  11-12, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {142},
  pages        = {11--29},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2005.07.011},
  doi          = {10.1016/J.ENTCS.2005.07.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/BellaBF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BellaPR06,
  author       = {Giampaolo Bella and
                  Costantino Pistagna and
                  Salvatore Riccobene},
  editor       = {Maurice H. ter Beek and
                  Fabio Gadducci},
  title        = {Distributed Backup through Information Dispersal},
  booktitle    = {Proceedings of the First International Workshop on Views on Designing
                  Complex Architectures, VODCA@FOSAD 2004, Bertinoro, Italy, September
                  11-12, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {142},
  pages        = {63--77},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.11.046},
  doi          = {10.1016/J.ENTCS.2004.11.046},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BellaPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Bella03,
  author       = {Giampaolo Bella},
  title        = {Inductive Verification of Smart Card Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {87--132},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11103},
  doi          = {10.3233/JCS-2003-11103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Bella03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/BellaMP03,
  author       = {Giampaolo Bella and
                  Fabio Massacci and
                  Lawrence C. Paulson},
  title        = {Verifying the {SET} registration protocols},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {21},
  number       = {1},
  pages        = {77--87},
  year         = {2003},
  url          = {https://doi.org/10.1109/JSAC.2002.806133},
  doi          = {10.1109/JSAC.2002.806133},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/BellaMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BellaM03,
  author       = {Giampaolo Bella and
                  Ronaldo Menezes},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Computer Security Track Editorial},
  booktitle    = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC),
                  March 9-12, 2003, Melbourne, FL, {USA}},
  pages        = {280--281},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/952532.952590},
  doi          = {10.1145/952532.952590},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BellaM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Bella03,
  author       = {Giampaolo Bella},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Availability of Protocol Goals},
  booktitle    = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC),
                  March 9-12, 2003, Melbourne, FL, {USA}},
  pages        = {312--317},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/952532.952596},
  doi          = {10.1145/952532.952596},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/Bella03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaBM03,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli and
                  Fabio Massacci},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Protocol's Life After Attacks...},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_2},
  doi          = {10.1007/11542322\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaBM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella03,
  author       = {Giampaolo Bella},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Protocol's Life After Attacks... (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {11--18},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_3},
  doi          = {10.1007/11542322\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaLP03,
  author       = {Giampaolo Bella and
                  Cristiano Longo and
                  Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Is the Verification Problem for Cryptographic Protocols Solved?},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {183--189},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_23},
  doi          = {10.1007/11542322\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaLP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaBM03a,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli and
                  Fabio Martinelli},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Biometrics to Enhance Smartcard Security},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {324--332},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_39},
  doi          = {10.1007/11542322\_39},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaBM03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/BellaLP03,
  author       = {Giampaolo Bella and
                  Cristiano Longo and
                  Lawrence C. Paulson},
  editor       = {David A. Basin and
                  Burkhart Wolff},
  title        = {Verifying Second-Level Security Protocols},
  booktitle    = {Theorem Proving in Higher Order Logics, 16th International Conference,
                  TPHOLs 2003, Rom, Italy, September 8-12, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2758},
  pages        = {352--366},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10930755\_23},
  doi          = {10.1007/10930755\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/tphol/BellaLP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0312025,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli},
  title        = {Soft Constraint Programming to Analysing Security Protocols},
  journal      = {CoRR},
  volume       = {cs.CR/0312025},
  year         = {2003},
  url          = {http://arxiv.org/abs/cs/0312025},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0312025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellaPM02,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson and
                  Fabio Massacci},
  editor       = {Vijayalakshmi Atluri},
  title        = {The verification of an industrial payment protocol: the {SET} purchase
                  phase},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {12--20},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586113},
  doi          = {10.1145/586110.586113},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellaPM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BellaMW02,
  author       = {Giampaolo Bella and
                  Ronaldo Menezes and
                  James A. Whittaker},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Editorial Message: special track on computer security},
  booktitle    = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC),
                  March 10-14, 2002, Madrid, Spain},
  pages        = {194--195},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/508791.508833},
  doi          = {10.1145/508791.508833},
  timestamp    = {Tue, 06 Nov 2018 11:06:47 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BellaMW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Bell02,
  author       = {Giampaolo Bella},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Interactive simulation of security policies},
  booktitle    = {Proceedings of the 2002 {ACM} Symposium on Applied Computing (SAC),
                  March 10-14, 2002, Madrid, Spain},
  pages        = {247--252},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/508791.508842},
  doi          = {10.1145/508791.508842},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/Bell02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaB02,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_10},
  doi          = {10.1007/978-3-540-39871-4\_10},
  timestamp    = {Sat, 05 Sep 2020 18:04:37 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaP02,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Analyzing Delegation Properties},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {120--127},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_11},
  doi          = {10.1007/978-3-540-39871-4\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esmart/Bella01,
  author       = {Giampaolo Bella},
  editor       = {Isabelle Attali and
                  Thomas P. Jensen},
  title        = {Mechanising a Protocol for Smart Cards},
  booktitle    = {Smart Card Programming and Security, International Conference on Research
                  in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2140},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45418-7\_3},
  doi          = {10.1007/3-540-45418-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/esmart/Bella01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/padl/BellaB01,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli},
  editor       = {I. V. Ramakrishnan},
  title        = {Soft Constraints for Security Protocol Analysis: Confidentiality},
  booktitle    = {Practical Aspects of Declarative Languages, Third International Symposium,
                  {PADL} 2001, Las Vegas, Nevada, USA, March 11-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1990},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45241-9\_8},
  doi          = {10.1007/3-540-45241-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/padl/BellaB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaP01,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Proof of Non-repudiation},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {119--125},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_19},
  doi          = {10.1007/3-540-45807-7\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tphol/BellaP01,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  editor       = {Richard J. Boulton and
                  Paul B. Jackson},
  title        = {Mechanical Proofs about a Non-repudiation Protocol},
  booktitle    = {Theorem Proving in Higher Order Logics, 14th International Conference,
                  TPHOLs 2001, Edinburgh, Scotland, UK, September 3-6, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2152},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44755-5\_8},
  doi          = {10.1007/3-540-44755-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/tphol/BellaP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Bella00,
  author       = {Giampaolo Bella},
  title        = {Inductive verification of cryptographic protocols},
  school       = {University of Cambridge, {UK}},
  year         = {2000},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621765},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Bella00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BellaMPT00,
  author       = {Giampaolo Bella and
                  Fabio Massacci and
                  Lawrence C. Paulson and
                  Piero Tramontano},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Formal Verification of Cardholder Registration in {SET}},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_10},
  doi          = {10.1007/10722599\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BellaMPT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaMPT00,
  author       = {Giampaolo Bella and
                  Fabio Massacci and
                  Lawrence C. Paulson and
                  Piero Tramontano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Making Sense of Specifications: The Formalization of {SET}},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {74--81},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_11},
  doi          = {10.1007/3-540-44810-1\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaMPT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella00,
  author       = {Giampaolo Bella},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Lack of Explicitness Strikes Back},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {87--93},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_13},
  doi          = {10.1007/3-540-44810-1\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella00a,
  author       = {Giampaolo Bella},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Lack of Explicitness Strikes Back (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {94--99},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_14},
  doi          = {10.1007/3-540-44810-1\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella99,
  author       = {Giampaolo Bella},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Modelling Agents' Knowledge Inductively},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {85--94},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_12},
  doi          = {10.1007/10720107\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asm/BellaR98,
  author       = {Giampaolo Bella and
                  Elvinia Riccobene},
  editor       = {Uwe Gl{\"{a}}sser and
                  Peter H. Schmitt},
  title        = {A Realistic Environment for Crypto-Protocol Analyses by ASMs},
  booktitle    = {Fifth International Workshop on Abstract State Machines, {ASM} 1998,
                  Magdeburg, Germany, September 21-22, Proceedings},
  pages        = {127--138},
  year         = {1998},
  timestamp    = {Tue, 15 Mar 2016 17:22:56 +0100},
  biburl       = {https://dblp.org/rec/conf/asm/BellaR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BellaP98,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  editor       = {Alan J. Hu and
                  Moshe Y. Vardi},
  title        = {Mechanising {BAN} Kerberos by the Inductive Method},
  booktitle    = {Computer Aided Verification, 10th International Conference, {CAV}
                  '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1427},
  pages        = {416--427},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0028763},
  doi          = {10.1007/BFB0028763},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BellaP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BellaP98,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Kerberos Version 4: Inductive Analysis of the Secrecy Goals},
  booktitle    = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  pages        = {361--375},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055875},
  doi          = {10.1007/BFB0055875},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BellaP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/BellaR97,
  author       = {Giampaolo Bella and
                  Elvinia Riccobene},
  title        = {Formal Analysis of the Kerberos Authentication System},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {3},
  number       = {12},
  pages        = {1337--1381},
  year         = {1997},
  url          = {https://doi.org/10.3217/jucs-003-12-1337},
  doi          = {10.3217/JUCS-003-12-1337},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/BellaR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics