Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of the Open Banking Account and Transaction API Protocol., , and . CoRR, (2020)Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator., , and . J. Cybersecur. Priv., 3 (3): 464-492 (August 2023)Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx.. STM, volume 8743 of Lecture Notes in Computer Science, page 204-208. Springer, (2014)Verified security protocol modeling and implementation with AnBx.. Ca' Foscari University of Venice, Italy, (2012)Verifying SeVeCom using set-based abstraction., and . IWCMC, page 1164-1169. IEEE, (2011)A Survey on Intrusion Detection Systems for Fog and Cloud Computing., , , , , , , and . Future Internet, 14 (3): 89 (2022)AnBx: Automatic Generation and Verification of Security Protocols Implementations.. FPS, volume 9482 of Lecture Notes in Computer Science, page 156-173. Springer, (2015)An IDE for the Design, Verification and Implementation of Security Protocols., and . ISSRE Workshops, page 157-163. IEEE Computer Society, (2017)Security protocol specification and verification with AnBx., , , and . J. Inf. Secur. Appl., (2016)Integrating Formal Methods for Security in Software Security Education.. Informatics Educ., 19 (3): 425-454 (2020)