| 2009 |
18 | | Michael Backes,
Martin P. Grochulla,
Catalin Hritcu,
Matteo Maffei:
Achieving Security Despite Compromise Using Zero-knowledge.
CSF 2009: 308-323 |
17 | | Michael Backes,
Marek Hamerlik,
Alessandro Linari,
Matteo Maffei,
Christos Tryfonopoulos,
Gerhard Weikum:
Anonymity and Censorship Resistance in Unstructured Overlay Networks.
OTM Conferences (1) 2009: 147-164 |
| 2008 |
16 | | Michael Backes,
Catalin Hritcu,
Matteo Maffei:
Type-checking zero-knowledge.
ACM Conference on Computer and Communications Security 2008: 357-370 |
15 | | Michael Backes,
Stefan Lorenz,
Matteo Maffei,
Kim Pecina:
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis.
CAV 2008: 419-422 |
14 | | Michael Backes,
Catalin Hritcu,
Matteo Maffei:
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus.
CSF 2008: 195-209 |
13 | | Michael Backes,
Matteo Maffei,
Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
IEEE Symposium on Security and Privacy 2008: 202-215 |
12 | | Michael Backes,
Marek Hamerlik,
Alessandro Linari,
Matteo Maffei,
Christos Tryfonopoulos,
Gerhard Weikum:
Anonymous and censorship resistant content sharing in unstructured overlays.
PODC 2008: 429 |
| 2007 |
11 | | Michael Backes,
Agostino Cortesi,
Matteo Maffei:
Causality-based Abstraction of Multiplicity in Security Protocols.
CSF 2007: 355-369 |
10 | | Michael Backes,
Agostino Cortesi,
Riccardo Focardi,
Matteo Maffei:
A calculus of challenges and responses.
FMSE 2007: 51-60 |
9 | | Michael Backes,
Matteo Maffei,
Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
Formal Protocol Verification Applied 2007 |
8 | | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Dynamic types for authentication.
Journal of Computer Security 15(6): 563-617 (2007) |
| 2005 |
7 | | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Analysis of Typed Analyses of Authentication Protocols.
CSFW 2005: 112-125 |
6 | | Riccardo Focardi,
Matteo Maffei,
Francesco Placella:
Inferring authentication tags.
WITS 2005: 41-49 |
5 | | Matteo Maffei:
Tags for Multi-Protocol Authentication.
Electr. Notes Theor. Comput. Sci. 128(5): 55-63 (2005) |
| 2004 |
4 | | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Compositional Analysis of Authentication Protocols.
ESOP 2004: 140-154 |
3 | | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Authenticity by tagging and typing.
FMSE 2004: 1-12 |
2 | | Riccardo Focardi,
Matteo Maffei:
The rho-spi Calculus at Work: Authentication Case Studies.
Electr. Notes Theor. Comput. Sci. 99: 267-293 (2004) |
| 2003 |
1 | | Michele Bugliesi,
Riccardo Focardi,
Matteo Maffei:
Principles for Entity Authentication.
Ershov Memorial Conference 2003: 294-306 |