IMT Institutional Repository: No conditions. Results ordered -Date Deposited.
http://eprints.imtlucca.it/
Thu, 28 Mar 2024 15:47:44 +0100Thu, 28 Mar 2024 15:47:44 +0100en CaSPiS: a calculus of sessions, pipelines and services
http://eprints.imtlucca.it/2626/
Boreale, Michele and Bruni, Roberto and De Nicola, Rocco and Loreti, Michele CaSPiS: a calculus of sessions, pipelines and services. Mathematical Structures in Computer Science, 25 (3). pp. 666-709. ISSN 0960-1295 (2015) Static analysis techniques for session-oriented calculi
http://eprints.imtlucca.it/2315/
Acciai, Lucia and Bodei, Chiara and Boreale, Michele and Bruni, Roberto and Torres Vieira, Hugo Static analysis techniques for session-oriented calculi. In: Rigorous Software Engineering for Service-Oriented Systems. Lecture Notes in Computer Science (6582). Springer, pp. 214-231. ISBN 978-3-642-20400-5 (2011) Quantitative Multirun Security under Active Adversaries
http://eprints.imtlucca.it/1542/
Boreale, Michele and Pampaloni, Francesca Quantitative Multirun Security under Active Adversaries. In: Proceedings of the Ninth International Conference on Quantitative Evaluation of Systems (QEST), 2012. IEEE, pp. 158-167. ISBN 978-0-7695-4781-7 (2012) CaSPiS: A Calculus of Sessions, Pipelines and Services
http://eprints.imtlucca.it/1493/
Boreale, Michele and Bruni, Roberto and De Nicola, Rocco and Loreti, Michele CaSPiS: A Calculus of Sessions, Pipelines and Services. CSA Technical Report #03/2013 IMT Institute for Advanced Studies Lucca Quantitative information flow, with a view
http://eprints.imtlucca.it/1244/
Boreale, Michele and Pampaloni, Francesca and Paolini, Michela Quantitative information flow, with a view. In: Computer Security – ESORICS 2011. Lecture Notes in Computer Science, 6879 (6879). Springer, pp. 588-606. ISBN 978-3-642-23821-5 (2011) Asymptotic information leakage under one-try attacks
http://eprints.imtlucca.it/1243/
Boreale, Michele and Pampaloni, Francesca and Paolini, Michela Asymptotic information leakage under one-try attacks. In: Foundations of Software Science and Computational Structures. Lecture Notes in Computer Science, 6604 (6604). Springer, pp. 396-410. ISBN 978-3-642-19804-5 (2011) Linear-Time and May-Testing in a Probabilistic Reactive Setting
http://eprints.imtlucca.it/420/
Acciai, Lucia and Boreale, Michele and De Nicola, Rocco Linear-Time and May-Testing in a Probabilistic Reactive Setting. In: Formal Techniques for Distributed Systems (FMOODS/FORTE 2011). Lecture Notes in Computer Science, 6722 . Springer, pp. 29-43. (2011) Testing Equivalence for Mobile Processes
http://eprints.imtlucca.it/364/
Boreale, Michele and De Nicola, Rocco Testing Equivalence for Mobile Processes. Information and Computation, 120 (2). pp. 279-303. ISSN 0890-5401 (1995) Basic Observables for Processes
http://eprints.imtlucca.it/353/
Boreale, Michele and De Nicola, Rocco and Pugliese, Rosario Basic Observables for Processes. In: Automata, Languages and Programming (ICALP 1997). Lecture Notes in Computer Science, 1256 . Springer, pp. 482-492. ISBN 3-540-63165-8 (1997) Asynchronous Observations of Processes
http://eprints.imtlucca.it/348/
Boreale, Michele and De Nicola, Rocco and Pugliese, Rosario Asynchronous Observations of Processes. In: Foundations of Software Science and Computation Structures (FoSSaCS 1998). Lecture Notes in Computer Science, 1378 . Springer, pp. 95-109. ISBN 3-540-64300-1 (1998) Proof Techniques for Cryptographic Processes
http://eprints.imtlucca.it/342/
Boreale, Michele and De Nicola, Rocco and Pugliese, Rosario Proof Techniques for Cryptographic Processes. In: Proc. of the 14th IEEE Symposium Logic In Computer Science (LICS'99). IEEE Computer Society, pp. 157-166. (1999) Process Algebraic Analysis of Cryptographic Protocols
http://eprints.imtlucca.it/335/
Boreale, Michele and De Nicola, Rocco and Pugliese, Rosario Process Algebraic Analysis of Cryptographic Protocols. In: Formal Techniques for Distributed System Development (FORTE 2000). IFIP Conference Proceedings, 183 . Kluwer, pp. 375-392. ISBN 0-7923-7968-3 (2000) Divergence in testing and readiness semantics
http://eprints.imtlucca.it/331/
Boreale, Michele and De Nicola, Rocco and Pugliese, Rosario Divergence in testing and readiness semantics. Theoretical Computer Science, 266 (1-2). pp. 237-248. ISSN 0304-3975 (2001) A Symbolic Semantics for the pi-Calculus
http://eprints.imtlucca.it/361/
Boreale, Michele and De Nicola, Rocco A Symbolic Semantics for the pi-Calculus. Information and Computation, 126 (1). pp. 34-52. ISSN 0890-5401 (1996) A Theory of "May" Testing for Asynchronous Languages
http://eprints.imtlucca.it/341/
Boreale, Michele and De Nicola, Rocco and Pugliese, Rosario A Theory of "May" Testing for Asynchronous Languages. In: Foundations of Software Science and Computation Structures (FoSSaCS 1999). Lecture Notes in Computer Science, 1578 . Springer, pp. 165-179. ISBN 3-540-65719-3 (1999) Proof Techniques for Cryptographic Processes
http://eprints.imtlucca.it/329/
Boreale, Michele and De Nicola, Rocco and Pugliese, Rosario Proof Techniques for Cryptographic Processes. SIAM Journal on Computing., 31 (3). pp. 947-986. ISSN 0097-5397 (2001) Trace and Testing Equivalence on Asynchronous Processes
http://eprints.imtlucca.it/324/
Boreale, Michele and De Nicola, Rocco and Pugliese, Rosario Trace and Testing Equivalence on Asynchronous Processes. Information and Computation, 172 (2). pp. 139-164. ISSN 0890-5401 (2002) Sessions and Pipelines for Structured Service Programming
http://eprints.imtlucca.it/281/
Boreale, Michele and Bruni, Roberto and De Nicola, Rocco and Loreti, Michele Sessions and Pipelines for Structured Service Programming. In: Formal Methods for Open Object-Based Distributed Systems (FMOODS 2008). Lecture Notes in Computer Science, 5051 . Springer, pp. 19-38. ISBN 978-3-540-68862-4 (2008) SCC: A Service Centered Calculus
http://eprints.imtlucca.it/295/
Boreale, Michele and Bruni, Roberto and Caires, Luis and De Nicola, Rocco and Lanese, Ivan and Loreti, Michele and Martins, Francisco and Montanari, Ugo and Ravara, Antonio and Sangiorgi, Davide and Vasconcelos, Vasco Thudichum and Zavattaro, Gianluigi SCC: A Service Centered Calculus. In: Web Services and Formal Methods (WS-FM 2006). Lecture Notes in Computer Science, 4184 . Springer, pp. 38-57. ISBN 3-540-38862-1 (2006) Experimenting with STA, a Tool for Automatic Analysis of Security Protocols
http://eprints.imtlucca.it/133/
Boreale, Michele and Buscemi, Maria Grazia Experimenting with STA, a Tool for Automatic Analysis of Security Protocols. In: Proceedings of ACM Symposium in Applied Computing (SAC ’02). ACM Press, Madrid, pp. 281-285. ISBN 1-58113-445-2 (2002) A Framework for the Analysis of Security Protocols
http://eprints.imtlucca.it/132/
Boreale, Michele and Buscemi, Maria Grazia A Framework for the Analysis of Security Protocols. In: Proceedings of the 13th International Conference on Concurrency Theory (CONCUR ’02). Lecture Notes in Computer Science, 2421 . Springer, pp. 483-498. ISBN 3-540-44043-7 (2002) Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation
http://eprints.imtlucca.it/130/
Boreale, Michele and Buscemi, Maria Grazia Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation. In: Proceedings of the 28th International Symposium on Mathematical Foundations of Computer Science (MFCS ’03). Lecture Notes in Computer Science, 2747 . Springer, pp. 269-278. ISBN 3-540-40671-9 (2003) D-Fusion: A Distinctive Fusion Calculus
http://eprints.imtlucca.it/129/
Boreale, Michele and Buscemi, Maria Grazia and Montanari, Ugo D-Fusion: A Distinctive Fusion Calculus. In: Proceedings of the Second Asian Symposium on Programming Languages and Systems (APLAS’04). Lecture Notes in Computer Science, 3302 . Springer, pp. 296-310. ISBN 3-540-23724-0 (2004) A Method for Symbolic Analysis of Security Protocols
http://eprints.imtlucca.it/128/
Boreale, Michele and Buscemi, Maria Grazia A Method for Symbolic Analysis of Security Protocols. Theoretical Computer Science, 338 (1-3). pp. 393-425. ISSN 0304-3975 (2005) A General Name Binding Mechanism
http://eprints.imtlucca.it/127/
Boreale, Michele and Buscemi, Maria Grazia and Montanari, Ugo A General Name Binding Mechanism. In: Proceedings of Symposium on Trustworthy Global Computing (TGC ’05). Lecture Notes in Computer Science, 3705 . Springer, pp. 61-74. ISBN 3-540-30007-4 (2005)