Sfoglia per Autore
Checking the Expressivity of Firewall Languages
2019 Ceragioli, L.; Degano, P.; Galletta, L.
Using standard typing algorithms incrementally
2019 Busi, M.; Degano, P.; Galletta, L.
Robust Declassification by Incremental Typing
2019 Busi, M.; Degano, P.; Galletta, L.
A Minimal Core Calculus for Solidity Contracts
2019 Bartoletti, M.; Galletta, L.; Murgia, M.
Analysing the Provenance of IoT Data
2020 Bodei, Chiara; Galletta, Letterio
A type language for message passing component-based systems
2020 Savanovic, Zorica; Vieira, Hugo; Galletta, Letterio
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors
2020 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Tobias Mühlberg, Jan; Piessens, Frank
Control-flow flattening preserves the constant-time policy
2020 Busi, M.; Degano, P.; Galletta, L.
MUAC: Access control language for mutual benefits
2020 Ceragioli, L.; Degano, P.; Galletta, L.
Security Metrics at Work on the Things in IoT Systems
2020 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
Private-Yet-Verifiable Contact Tracing
2020 Canidio, Andrea; Costa, Gabriele; Galletta, Letterio
A True Concurrent Model of Smart Contracts Executions
2020 Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio
A theory of transaction parallelism in blockchains
2021 Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio
Mechanical incrementalization of typing algorithms
2021 Busi, M.; Degano, P.; Galletta, L.
Modelling and analysing IoT systems
2021 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio
Framework, Tools and Good Practices for Cybersecurity Curricula
2021 Hajny, J.; Ricci, S.; Piesarskas, E.; Levillain, O.; Galletta, L.; De Nicola, R.
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs
2021 Canidio, Andrea; Costa, Gabriele; Galletta, Letterio
FWS: Analyzing, maintaining and transcompiling firewalls
2021 Bodei, C.; Ceragioli, L.; Degano, P.; Focardi, R.; Galletta, L.; Luccio, F.; Tempesta, M.; Veronese, L.
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty
2021 Degano, P.; Galletta, L.; Gerali, S.
Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays
2021 Bistarelli, S.; De Nicola, R.; Galletta, L.; Laneve, C.; Mercanti, I.; Veschetti, A.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Checking the Expressivity of Firewall Languages | 1-gen-2019 | Ceragioli, L.; Degano, P.; Galletta, L. | |
Using standard typing algorithms incrementally | 1-gen-2019 | Busi, M.; Degano, P.; Galletta, L. | |
Robust Declassification by Incremental Typing | 1-gen-2019 | Busi, M.; Degano, P.; Galletta, L. | |
A Minimal Core Calculus for Solidity Contracts | 1-gen-2019 | Bartoletti, M.; Galletta, L.; Murgia, M. | |
Analysing the Provenance of IoT Data | 1-gen-2020 | Bodei, Chiara; Galletta, Letterio | |
A type language for message passing component-based systems | 1-gen-2020 | Savanovic, Zorica; Vieira, Hugo; Galletta, Letterio | |
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors | 1-gen-2020 | Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Tobias Mühlberg, Jan; Piessens, Frank | |
Control-flow flattening preserves the constant-time policy | 1-gen-2020 | Busi, M.; Degano, P.; Galletta, L. | |
MUAC: Access control language for mutual benefits | 1-gen-2020 | Ceragioli, L.; Degano, P.; Galletta, L. | |
Security Metrics at Work on the Things in IoT Systems | 1-gen-2020 | Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L. | |
Private-Yet-Verifiable Contact Tracing | 1-gen-2020 | Canidio, Andrea; Costa, Gabriele; Galletta, Letterio | |
A True Concurrent Model of Smart Contracts Executions | 1-gen-2020 | Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio | |
A theory of transaction parallelism in blockchains | 1-gen-2021 | Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio | |
Mechanical incrementalization of typing algorithms | 1-gen-2021 | Busi, M.; Degano, P.; Galletta, L. | |
Modelling and analysing IoT systems | 1-gen-2021 | Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio | |
Framework, Tools and Good Practices for Cybersecurity Curricula | 1-gen-2021 | Hajny, J.; Ricci, S.; Piesarskas, E.; Levillain, O.; Galletta, L.; De Nicola, R. | |
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs | 1-gen-2021 | Canidio, Andrea; Costa, Gabriele; Galletta, Letterio | |
FWS: Analyzing, maintaining and transcompiling firewalls | 1-gen-2021 | Bodei, C.; Ceragioli, L.; Degano, P.; Focardi, R.; Galletta, L.; Luccio, F.; Tempesta, M.; Veronese, L. | |
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty | 1-gen-2021 | Degano, P.; Galletta, L.; Gerali, S. | |
Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays | 1-gen-2021 | Bistarelli, S.; De Nicola, R.; Galletta, L.; Laneve, C.; Mercanti, I.; Veschetti, A. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile