CHIARA BODEI
CHIARA BODEI
Computer Science Associate Professor, University of Pisa
Verified email at unipi.it
Title
Cited by
Cited by
Year
Static validation of security protocols
C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson
Journal of Computer Security 13 (3), 347-390, 2005
1712005
Automatic validation of protocol narration
C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 126-140, 2003
1412003
Static analysis for the π-calculus with applications to security
C Bodei, P Degano, F Nielson, HR Nielson
Information and Computation 168 (1), 68-92, 2001
1232001
Control flow analysis for the π-calculus
C Bodei, P Degano, F Nielson, HR Nielson
International Conference on Concurrency Theory, 84-98, 1998
1211998
Safe ambients: Control flow analysis and security
P Degano, F Levi, C Bodei
Annual Asian Computing Science Conference, 199-214, 2000
702000
Static analysis of processes for no read-up and no write-down
C Bodei, P Degano, F Nielson, HR Nielson
International Conference on Foundations of Software Science and Computation …, 1999
691999
Static analysis for secrecy and non-interference in networks of processes
C Bodei, P Degano, F Nielson, HR Nielson
International Conference on Parallel Computing Technologies, 27-41, 2001
542001
Security issues in process calculi
C Bodei
Servizio editoriale universitario, 2000
342000
Flow logic for Dolev–Yao secrecy in cryptographic processes
C Bodei, P Degano, F Nielson, HR Nielson
Future Generation Computer Systems 18 (6), 747-756, 2002
302002
Control flow analysis can find new flaws too
C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson
Proceedings of the Workshop on Issues on the Theory of Security (WITS’04), 2004
262004
A formal analysis for capturing replay attacks in cryptographic protocols
H Gao, C Bodei, P Degano, HR Nielson
Annual Asian Computing Science Conference, 150-165, 2007
232007
Authentication via localized names
C Bodei, P Degano, R Focardi, C Priami
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 98-110, 1999
211999
Tracing where IoT data are collected and aggregated
C Bodei, P Degano, GL Ferrari, L Galletta
arXiv preprint arXiv:1610.08419, 2016
202016
Where do your IoT ingredients come from?
C Bodei, P Degano, GL Ferrari, L Galletta
International Conference on Coordination Languages and Models, 35-50, 2016
202016
Primitives for authentication in process algebras
C Bodei, P Degano, R Focardi, C Priami
Theoretical Computer Science 283 (2), 271-304, 2002
202002
Measuring security in IoT communications
C Bodei, S Chessa, L Galletta
Theoretical Computer Science 764, 100-124, 2019
192019
A control flow analysis for beta-binders with and without static compartments
C Bodei
Theoretical Computer Science 410 (33-34), 3110-3127, 2009
192009
Mobile processes with a distributed environment
C Bodei, P Degano, C Priami
International Colloquium on Automata, Languages, and Programming, 490-501, 1996
181996
A formal analysis of complex type flaw attacks on security protocols
H Gao, C Bodei, P Degano
International Conference on Algebraic Methodology and Software Technology …, 2008
172008
Detecting and preventing type flaws at static time
C Bodei, L Brodo, P Degano, H Gao
Journal of Computer Security 18 (2), 229-264, 2010
162010
The system can't perform the operation now. Try again later.
Articles 1–20