default search action
Giampaolo Bella
Person information
- affiliation: University of Catania, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria:
SecOnto: Ontological Representation of Security Directives. Comput. Secur. 148: 104150 (2025) - 2024
- [j31]Giampaolo Bella, Domenico Cantone, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
Towards a semantic blockchain: A behaviouristic approach to modelling Ethereum. Appl. Ontology 19(2): 143-180 (2024) - [j30]Giampaolo Bella, Domenico Cantone, Gianpietro Castiglione, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
A behaviouristic semantic approach to blockchain-based e-commerce. Semantic Web 15(5): 1863-1914 (2024) - [c100]Ruben Cacciato, Mario Raciti, Sergio Esposito, Giampaolo Bella:
Modelling the privacy landscape of the Internet of Vehicles. ARES 2024: 103:1-103:7 - [c99]Marcello Maugeri, Mirko Ignazio Paolo Morana, Sergio Esposito, Giampaolo Bella:
User-Empowered Federated Learning in the Automotive Domain. Blockchain 2024: 669-674 - [c98]Mario Raciti, Giampaolo Bella:
Behind the (Digital Crime) Scenes: An MSC Model. ISDFS 2024: 1-6 - [c97]Davide Bonaventura, Sergio Esposito, Giampaolo Bella:
The IoT Breaches Your Household Again. SECRYPT 2024: 475-482 - [i27]Mario Raciti, Giampaolo Bella:
Behind the (Digital Crime) Scenes: An MSC Model. CoRR abs/2403.16196 (2024) - [i26]Davide Bonaventura, Sergio Esposito, Giampaolo Bella:
The IoT Breaches your Household Again. CoRR abs/2407.12159 (2024) - 2023
- [j29]Giampaolo Bella, Cristian Daniele, Mario Raciti:
The AILA Methodology for Automated and Intelligent Likelihood Assignment in Risk Assessment. IEEE Access 11: 26170-26183 (2023) - [j28]Giampaolo Bella, Domenico Cantone, Carmelo Fabio Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
The ontology for agents, systems and integration of services: OASIS version 2$. Intelligenza Artificiale 17(1): 51-62 (2023) - [j27]Giampaolo Bella, Pietro Biondi, Stefano Bognanni, Sergio Esposito:
PETIoT: PEnetration Testing the Internet of Things. Internet Things 22: 100707 (2023) - [c96]Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria:
Towards Grammatical Tagging for the Legal Language of Cybersecurity. ARES 2023: 82:1-82:9 - [c95]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
The VOCODES Kill Chain for Voice Controllable Devices. ESORICS Workshops (2) 2023: 176-197 - [c94]Marcello Maugeri, Cristian Daniele, Giampaolo Bella:
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing. ESORICS Workshops (2) 2023: 291-308 - [c93]Mario Raciti, Giampaolo Bella:
Up-to-Date Threat Modelling for Soft Privacy on Smart Cars. ESORICS Workshops (1) 2023: 454-473 - [c92]Mario Raciti, Giampaolo Bella:
A Threat Model for Soft Privacy on Smart Cars. EuroS&P Workshops 2023: 1-10 - [c91]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
Protecting Voice-Controllable Devices Against Self-Issued Voice Commands. EuroS&P 2023: 160-174 - [c90]Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll:
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. ICISSP 2023: 424-429 - [c89]Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria:
An Ontological Approach to Compliance Verification of the NIS 2 Directive. JOWO 2023 - [c88]Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria:
An Automated Method for the Ontological Representation of Security Directives. JOWO 2023 - [c87]Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria:
A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology. JOWO 2023 - [c86]Davide Bonaventura, Sergio Esposito, Giampaolo Bella:
Smart Bulbs Can Be Hacked to Hack into Your Household. SECRYPT 2023: 218-229 - [c85]Mario Raciti, Giampaolo Bella:
How to Model Privacy Threats in the Automotive Domain. VEHITS 2023: 394-401 - [e6]Giampaolo Bella, Mihai Doinea, Helge Janicke:
Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13809, Springer 2023, ISBN 978-3-031-32635-6 [contents] - [i25]Marcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll:
Evaluating the Fork-Awareness of Coverage-Guided Fuzzers. CoRR abs/2301.05060 (2023) - [i24]Giampaolo Bella, Pietro Biondi, Stefano Bognanni, Sergio Esposito:
PETIoT: PEnetration Testing the Internet of Things. CoRR abs/2302.04900 (2023) - [i23]Mario Raciti, Giampaolo Bella:
How to Model Privacy Threats in the Automotive Domain. CoRR abs/2303.10370 (2023) - [i22]Mario Raciti, Giampaolo Bella:
A Threat Model for Soft Privacy on Smart Cars. CoRR abs/2306.04222 (2023) - [i21]Giampaolo Bella, Domenico Cantone, Carmelo Fabio Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
The Ontology for Agents, Systems and Integration of Services: OASIS version 2. CoRR abs/2306.10061 (2023) - [i20]Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria:
Towards Grammatical Tagging for the Legal Language of Cybersecurity. CoRR abs/2306.17042 (2023) - [i19]Gianpietro Castiglione, Daniele Francesco Santamaria, Giampaolo Bella:
An ontological approach to compliance verification of the NIS 2 directive. CoRR abs/2306.17494 (2023) - [i18]Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria:
A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology. CoRR abs/2306.17514 (2023) - [i17]Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria:
An automated method for the ontological representation of security directives. CoRR abs/2307.01211 (2023) - [i16]Davide Bonaventura, Sergio Esposito, Giampaolo Bella:
Smart Bulbs can be Hacked to Hack into your Household. CoRR abs/2308.09019 (2023) - [i15]Mario Raciti, Giampaolo Bella:
Up-to-date Threat Modelling for Soft Privacy on Smart Cars. CoRR abs/2308.11273 (2023) - 2022
- [j26]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security. Comput. Networks 218: 109377 (2022) - [j25]Max Eisele, Marcello Maugeri, Rachna Shriwas, Christopher Huth, Giampaolo Bella:
Embedded fuzzing: a review of challenges, tools, and solutions. Cybersecur. 5(1): 18 (2022) - [j24]Giampaolo Bella, Pietro Biondi, Stefano Bognanni:
Multi-service threats: Attacking and protecting network printers and VoIP phones alike. Internet Things 18: 100507 (2022) - [j23]Giampaolo Bella, Rosario Giustolisi, Carsten Schürmann:
Modelling human threats in security ceremonies. J. Comput. Secur. 30(3): 411-433 (2022) - [c84]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands. AsiaCCS 2022: 1064-1078 - [c83]Giampaolo Bella, Cristian Daniele, Mario Raciti:
The AILA Methodology for Automated and Intelligent Likelihood Assignment. CSP 2022: 119-123 - [c82]Pietro Biondi, Fabrizio Tronci, Giampaolo Bella:
Papyrus-Based Safety Analysis Automatization. ICSRS 2022: 469-474 - [c81]Giampaolo Bella:
Interactional Freedom and Cybersecurity. SecITC 2022: 1-16 - [c80]Giampaolo Bella, Domenico Cantone, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
The ontology for agents, systems and integration of services: recent advancements of OASIS. WOA 2022: 176-193 - [i14]Pietro Biondi, Stefano Bognanni, Giampaolo Bella:
Vulnerability Assessment and Penetration Testing on IP cameras. CoRR abs/2202.06597 (2022) - [i13]Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands. CoRR abs/2202.08619 (2022) - [i12]Giampaolo Bella, Pietro Biondi, Stefano Bognanni:
Attacking and Protecting Network Printers and VoIP Phones alike. CoRR abs/2202.10832 (2022) - 2021
- [c79]Giampaolo Bella, Pietro Biondi, Marco De Vincenzi, Giuseppe Tudisco:
Privacy and modern cars through a dual lens. EuroS&P Workshops 2021: 136-143 - [c78]Giampaolo Bella, Domenico Cantone, Cristiano Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
Semantic Representation as a Key Enabler for Blockchain-Based Commerce. GECON 2021: 191-198 - [c77]Giampaolo Bella, Domenico Cantone, Cristiano Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
Blockchains Through Ontologies: The Case Study of the Ethereum ERC721 Standard in oasis. IDC 2021: 249-259 - [c76]Pietro Biondi, Stefano Bognanni, Giampaolo Bella:
Vulnerability Assessment and Penetration Testing on IP camera. IOTSMS 2021: 1-8 - [c75]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci, Mirco Marchetti:
Towards the COSCA framework for "COnseptualing Secure CArs". Open Identity Summit 2021: 37-46 - [c74]Giampaolo Bella, Pietro Biondi, Giuseppe Tudisco:
Car Drivers' Privacy Concerns and Trust Perceptions. TrustBus 2021: 143-154 - [c73]Francesco Pollicino, Dario Stabili, Giampaolo Bella, Mirco Marchetti:
SixPack: Abusing ABS to avoid Misbehavior detection in VANETs. VTC Spring 2021: 1-6 - [i11]Giampaolo Bella, Domenico Cantone, Cristiano Longo, Marianna Nicolosi Asmundo, Daniele Francesco Santamaria:
Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version). CoRR abs/2109.02899 (2021) - [i10]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
TOUCAN: A proTocol tO secUre Controller Area Network. CoRR abs/2111.10642 (2021) - [i9]Giampaolo Bella, Pietro Biondi:
You Overtrust Your Printer. CoRR abs/2111.10645 (2021) - [i8]Giampaolo Bella, Pietro Biondi:
Towards an Integrated Penetration Testing Environment for the CAN Protocol. CoRR abs/2111.11732 (2021) - [i7]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
CINNAMON: A Module for AUTOSAR Secure Onboard Communication. CoRR abs/2111.12026 (2021) - [i6]Giampaolo Bella, Pietro Biondi, Marco De Vincenzi, Giuseppe Tudisco:
Privacy and modern cars through a dual lens. CoRR abs/2111.12027 (2021) - [i5]Giampaolo Bella, Pietro Biondi, Giuseppe Tudisco:
Car drivers' privacy concerns and trust perceptions. CoRR abs/2111.15467 (2021) - [i4]Pietro Biondi, Stefano Bognanni, Giampaolo Bella:
VoIP Can Still Be Exploited - Badly. CoRR abs/2111.15468 (2021) - [i3]Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella:
Secure Routine: A Routine-Based Algorithm for Drivers Identification. CoRR abs/2112.06200 (2021) - [i2]Giampaolo Bella:
Out to Explore the Cybersecurity Planet. CoRR abs/2112.12790 (2021) - 2020
- [c72]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
CINNAMON: A Module for AUTOSAR Secure Onboard Communication. EDCC 2020: 103-110 - [c71]Pietro Biondi, Stefano Bognanni, Giampaolo Bella:
VoIP Can Still Be Exploited - Badly. FMEC 2020: 237-243
2010 – 2019
- 2019
- [c70]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
TOUCAN: A proTocol tO secUre Controller Area Network. AutoSec@CODASPY 2019: 3-8 - [c69]Giampaolo Bella, Karen Renaud, Diego Sempreboni, Luca Viganò:
An Investigation into the "Beautification" of Security Ceremonies. ICETE (2) 2019: 125-136 - [c68]Diego Sempreboni, Giampaolo Bella, Rosario Giustolisi, Luca Viganò:
What Are the Threats? (Charting the Threat Models of Security Ceremonies). ICETE (2) 2019: 161-172 - [c67]Pietro Biondi, Giampaolo Bella, Gianpiero Costantino, Ilaria Matteucci:
Implementing CAN bus security by TOUCAN. MobiHoc 2019: 399-400 - [c66]Giampaolo Bella, Pietro Biondi:
You Overtrust Your Printer. SAFECOMP Workshops 2019: 264-274 - [c65]Giampaolo Bella:
You Already Used Formal Methods but Did Not Know It. FMTea 2019: 228-243 - [c64]Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci:
Are you secure in your car?: poster. WiSec 2019: 308-309 - 2018
- [j22]Rosario Giustolisi, Giampaolo Bella, Gabriele Lenzini:
Invalid certificates in modern browsers: A socio-technical analysis. J. Comput. Secur. 26(4): 509-541 (2018) - [c63]Giampaolo Bella, Francesco Marino, Gianpiero Costantino, Fabio Martinelli:
Getmewhere: A Location-Based Privacy-Preserving Information Service. PDP 2018: 529-532 - [c62]Giampaolo Bella, Pietro Biondi:
Towards an Integrated Penetration Testing Environment for the CAN Protocol. SAFECOMP Workshops 2018: 344-352 - [e5]Giampaolo Bella, Gabriele Lenzini, Theo Tryfonas, Debi Ashenden:
STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018. ACM 2018, ISBN 978-1-4503-7285-5 [contents] - 2017
- [j21]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
Trustworthy exams without trusted parties. Comput. Secur. 67: 291-307 (2017) - [c61]Giampaolo Bella, Rosario Giustolisi:
Idea: A Unifying Theory for Evaluation Systems. ESSoS 2017: 231-239 - [c60]Giampaolo Bella, Denis Butin, Hugo Jonker:
Analysing Privacy Analyses. ITASEC 2017: 19-28 - [e4]Giampaolo Bella, Gabriele Lenzini:
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2017, Orlando, FL, USA, December 5, 2017. ACM 2017, ISBN 978-1-4503-6357-0 [contents] - 2016
- [c59]Giampaolo Bella, Bruce Christianson, Luca Viganò:
Invisible Security. Security Protocols Workshop 2016: 1-9 - [c58]Giampaolo Bella:
Invisible Security (Transcript of Discussion). Security Protocols Workshop 2016: 10-18 - [e3]Gabriele Lenzini, Giampaolo Bella, Zinaida Benenson, Carrie E. Gates:
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2016, Los Angeles, CA, USA, December 5, 2016. ACM 2016, ISBN 978-1-4503-4826-3 [contents] - 2015
- [j20]Giampaolo Bella, Helge Janicke:
Special issue on the Security Track at the ACM Symposium on Applied Computing 2013. Int. J. Inf. Sec. 14(2): 101-102 (2015) - [j19]Giampaolo Bella, Paul Curzon, Gabriele Lenzini:
Service security and privacy as a socio-technical problem. J. Comput. Secur. 23(5): 563-585 (2015) - [c57]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
A Secure Exam Protocol Without Trusted Parties. SEC 2015: 495-509 - [c56]Giampaolo Bella, Luca Viganò:
Security is Beautiful. Security Protocols Workshop 2015: 247-250 - [e2]Giampaolo Bella, Gabriele Lenzini:
2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0178-1 [contents] - 2014
- [j18]Giampaolo Bella:
Inductive study of confidentiality: for everyone. Formal Aspects Comput. 26(1): 3-36 (2014) - [c55]Giampaolo Bella, Pekka Jäppinen, Jussi Laakkonen:
The Challenges behind Independent Living Support Systems. AMT 2014: 464-474 - [c54]Giampaolo Bella, Paul Curzon, Rosario Giustolisi, Gabriele Lenzini:
A Socio-technical Methodology for the Security and Privacy Analysis of Services. COMPSAC Workshops 2014: 401-406 - [c53]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
Secure exams despite malicious management. PST 2014: 274-281 - [e1]Giampaolo Bella, Gabriele Lenzini:
2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7901-1 [contents] - 2013
- [j17]Giampaolo Bella, Gianpiero Costantino, Jon Crowcroft, Salvatore Riccobene:
Enhancing DSR maintenance with power awareness. Comput. Stand. Interfaces 35(1): 107-113 (2013) - [c52]Rosario Giustolisi, Gabriele Lenzini, Giampaolo Bella:
What security for electronic exams? CRiSIS 2013: 1-5 - [c51]Denis Butin, David Gray, Giampaolo Bella:
Towards Verifying Voter Privacy through Unlinkability. ESSoS 2013: 91-106 - [c50]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
A Socio-technical Understanding of TLS Certificate Validation. IFIPTM 2013: 281-288 - [c49]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
Socio-technical formal analysis of TLS certificate validation in modern browsers. PST 2013: 309-316 - 2012
- [j16]Giampaolo Bella:
Inductive Study of Confidentiality. Arch. Formal Proofs 2012 (2012) - [c48]Saad Almutairi, Giampaolo Bella, Ala Abu-Samaha:
Specifying security requirements of context aware system using UML. ICDIM 2012: 259-265 - [c47]Giampaolo Bella, Lizzie Coles-Kemp:
Layered Analysis of Security Ceremonies. SEC 2012: 273-286 - [c46]Denis Butin, Giampaolo Bella:
Verifying Privacy by Little Interaction and No Process Equivalence. SECRYPT 2012: 251-256 - [c45]Giampaolo Bella, Gabriele Lenzini:
Foreword from the Workshop Chairs - STAST 2012. STAST 2012 - 2011
- [j15]Giampaolo Bella, Rosario Giustolisi, Salvatore Riccobene:
Enforcing privacy in e-commerce by balancing anonymity and trust. Comput. Secur. 30(8): 705-718 (2011) - [j14]Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna:
Multi-Attacker Protocol Validation. J. Autom. Reason. 46(3-4): 353-388 (2011) - [c44]Giampaolo Bella, Denis Butin, David Gray:
Holistic analysis of mix protocols. IAS 2011: 338-343 - [c43]Giampaolo Bella, Gianpiero Costantino, Lizzie Coles-Kemp, Salvatore Riccobene:
Remote Management of Face-to-face Written Authenticated Though Anonymous Exams. CSEDU (2) 2011: 431-437 - [c42]Giampaolo Bella, Lizzie Coles-Kemp:
Internet Users' Security and Privacy While They Interact with Amazon. TrustCom 2011: 878-883 - 2010
- [j13]Giampaolo Bella:
The principle of guarantee availability for security protocol analysis. Int. J. Inf. Sec. 9(2): 83-97 (2010) - [c41]Giampaolo Bella, Gianpiero Costantino, Salvatore Riccobene:
WATA - A System for Written Authenticated though Anonymous Exams. CSEDU (2) 2010: 132-137 - [c40]Giampaolo Bella, Peter Y. A. Ryan, Vanessa Teague:
Virtually Perfect Democracy. Security Protocols Workshop 2010: 161-166
2000 – 2009
- 2009
- [j12]Giampaolo Bella, Peter Y. A. Ryan:
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing. J. Comput. Secur. 17(3): 237 (2009) - [c39]Giampaolo Bella, Pietro Liò:
Formal Analysis of the Genetic Toggle. CMSB 2009: 96-110 - [c38]Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna:
Validating Security Protocols under the General Attacker. ARSPA-WITS 2009: 34-51 - [c37]Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna:
Attacking Each Other. Security Protocols Workshop 2009: 41-47 - 2008
- [j11]Giampaolo Bella:
What is Correctness of Security Protocols? J. Univers. Comput. Sci. 14(12): 2083-2106 (2008) - [c36]Giampaolo Bella, Francesco Librizzi, Salvatore Riccobene:
Realistic Threats to Self-Enforcing Privacy. IAS 2008: 155-160 - [c35]Giampaolo Bella, Gianpiero Costantino, Salvatore Riccobene:
Managing Reputation over MANETs. IAS 2008: 255-260 - [c34]Giampaolo Bella:
Special track on Computer Security: editorial message. SAC 2008: 2095-2096 - [c33]Simon N. Foley, Giampaolo Bella, Stefano Bistarelli:
Security Protocol Deployment Risk. Security Protocols Workshop 2008: 12-20 - 2007
- [b2]Giampaolo Bella:
Formal Correctness of Security Protocols - With 62 Figures and 4 Tables. Information Security and Cryptography, Springer 2007, ISBN 978-3-540-68134-2, pp. 1-234 - 2006
- [j10]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson:
Verifying the SET Purchase Protocols. J. Autom. Reason. 36(1-2): 5-37 (2006) - [j9]Giampaolo Bella, Lawrence C. Paulson:
Accountability protocols: Formalized and verified. ACM Trans. Inf. Syst. Secur. 9(2): 138-161 (2006) - [c32]Giampaolo Bella, Peter Y. A. Ryan:
Editorial message: special track on computer security. SAC 2006: 321-322 - [c31]Giampaolo Bella, Stefano Bistarelli, Pamela Peretti, Salvatore Riccobene:
Augmented Risk Analysis. VODCA@FOSAD 2006: 207-220 - 2005
- [j8]Giampaolo Bella, Stefano Bistarelli:
Information Assurance for security protocols. Comput. Secur. 24(4): 322-333 (2005) - [j7]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson:
An overview of the verification of SET. Int. J. Inf. Sec. 4(1-2): 17-28 (2005) - [j6]Giampaolo Bella, Peter Y. A. Ryan:
Guest Editors' preface. J. Comput. Secur. 13(5): 697- (2005) - [c30]Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene:
Locating Mobile Nodes Within Logical Networks. PSC 2005: 54-62 - [c29]Giampaolo Bella, Peter Y. A. Ryan:
Special track on computer security. SAC 2005: 304-305 - 2004
- [j5]Giampaolo Bella, Ronaldo Menezes:
Special Issue: Computer Security. Concurr. Pract. Exp. 16(11): 1061 (2004) - [j4]Giampaolo Bella, Stefano Bistarelli:
Soft Constraint Programming to Analysing Security Protocols. Theory Pract. Log. Program. 4(5-6): 545-572 (2004) - [c28]Sebastiano Battiato, Giampaolo Bella, Salvatore Riccobene:
Should We Prove Security Policies Correct? EGCDMAS 2004: 56-65 - [c27]Giampaolo Bella, Peter Y. A. Ryan:
Editoral message: special track on computer security. SAC 2004: 373-374 - [c26]Giampaolo Bella, Stefano Bistarelli, Simon N. Foley:
Soft Constraints for Security. VODCA@FOSAD 2004: 11-29 - [c25]Giampaolo Bella, Costantino Pistagna, Salvatore Riccobene:
Distributed Backup through Information Dispersal. VODCA@FOSAD 2004: 63-77 - 2003
- [j3]Giampaolo Bella:
Inductive Verification of Smart Card Protocols. J. Comput. Secur. 11(1): 87-132 (2003) - [j2]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson:
Verifying the SET registration protocols. IEEE J. Sel. Areas Commun. 21(1): 77-87 (2003) - [c24]Giampaolo Bella, Ronaldo Menezes:
Computer Security Track Editorial. SAC 2003: 280-281 - [c23]Giampaolo Bella:
Availability of Protocol Goals. SAC 2003: 312-317 - [c22]Giampaolo Bella, Stefano Bistarelli, Fabio Massacci:
A Protocol's Life After Attacks.... Security Protocols Workshop 2003: 3-10 - [c21]Giampaolo Bella:
A Protocol's Life After Attacks... (Discussion). Security Protocols Workshop 2003: 11-18 - [c20]Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson:
Is the Verification Problem for Cryptographic Protocols Solved?. Security Protocols Workshop 2003: 183-189 - [c19]Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli:
Biometrics to Enhance Smartcard Security. Security Protocols Workshop 2003: 324-332 - [c18]Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson:
Verifying Second-Level Security Protocols. TPHOLs 2003: 352-366 - [i1]Giampaolo Bella, Stefano Bistarelli:
Soft Constraint Programming to Analysing Security Protocols. CoRR cs.CR/0312025 (2003) - 2002
- [c17]Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci:
The verification of an industrial payment protocol: the SET purchase phase. CCS 2002: 12-20 - [c16]Giampaolo Bella, Ronaldo Menezes, James A. Whittaker:
Editorial Message: special track on computer security. SAC 2002: 194-195 - [c15]Giampaolo Bella:
Interactive simulation of security policies. SAC 2002: 247-252 - [c14]Giampaolo Bella, Stefano Bistarelli:
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. Security Protocols Workshop 2002: 104-119 - [c13]Giampaolo Bella, Lawrence C. Paulson:
Analyzing Delegation Properties. Security Protocols Workshop 2002: 120-127 - 2001
- [c12]Giampaolo Bella:
Mechanising a Protocol for Smart Cards. E-smart 2001: 19-33 - [c11]Giampaolo Bella, Stefano Bistarelli:
Soft Constraints for Security Protocol Analysis: Confidentiality. PADL 2001: 108-122 - [c10]Giampaolo Bella, Lawrence C. Paulson:
A Proof of Non-repudiation. Security Protocols Workshop 2001: 119-125 - [c9]Giampaolo Bella, Lawrence C. Paulson:
Mechanical Proofs about a Non-repudiation Protocol. TPHOLs 2001: 91-104 - 2000
- [b1]Giampaolo Bella:
Inductive verification of cryptographic protocols. University of Cambridge, UK, 2000 - [c8]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano:
Formal Verification of Cardholder Registration in SET. ESORICS 2000: 159-174 - [c7]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano:
Making Sense of Specifications: The Formalization of SET. Security Protocols Workshop 2000: 74-81 - [c6]Giampaolo Bella:
Lack of Explicitness Strikes Back. Security Protocols Workshop 2000: 87-93 - [c5]Giampaolo Bella:
Lack of Explicitness Strikes Back (Transcript of Discussion). Security Protocols Workshop 2000: 94-99
1990 – 1999
- 1999
- [c4]Giampaolo Bella:
Modelling Agents' Knowledge Inductively. Security Protocols Workshop 1999: 85-94 - 1998
- [c3]Giampaolo Bella, Elvinia Riccobene:
A Realistic Environment for Crypto-Protocol Analyses by ASMs. Workshop on Abstract State Machines 1998: 127-138 - [c2]Giampaolo Bella, Lawrence C. Paulson:
Mechanising BAN Kerberos by the Inductive Method. CAV 1998: 416-427 - [c1]Giampaolo Bella, Lawrence C. Paulson:
Kerberos Version 4: Inductive Analysis of the Secrecy Goals. ESORICS 1998: 361-375 - 1997
- [j1]Giampaolo Bella, Elvinia Riccobene:
Formal Analysis of the Kerberos Authentication System. J. Univers. Comput. Sci. 3(12): 1337-1381 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint