Alessandro Bruni
Alessandro Bruni
Assistant Professor. IT-University of Copenhagen
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Efficient unfolding of contextual Petri nets
P Baldan, A Bruni, A Corradini, B König, C Rodríguez, S Schwoon
Theoretical Computer Science 449, 2-22, 2012
Formal security analysis of the MaCAN protocol
A Bruni, M Sojka, F Nielson, HR Nielson
International Conference on Integrated Formal Methods, 241-255, 2014
Set-Pi: Set Membership Pi-Calculus
A Bruni, S Mödersheim, F Nielson, H Riis Nielson
Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 185-198, 2015
Towards a mechanized proof of selene receipt-freeness and vote-privacy
A Bruni, E Drewsen, C Schürmann
International Joint Conference on Electronic Voting, 110-126, 2017
Security games for cyber-physical systems
R Vigo, A Bruni, E Yüksel
Nordic Conference on Secure IT Systems, 17-32, 2013
AIF-ω: Set-Based Protocol Abstraction with Countable Families
S Mödersheim, A Bruni
Principles of Security and Trust, 233-253, 2016
Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC)
A Bruni, TS Jørgensen, TG Petersen, C Schürmann
International Conference on Research in Security Standardisation, 21-36, 2018
On the computation of McMillan’s prefix for contextual nets and graph grammars
P Baldan, A Bruni, A Corradini, B König, S Schwoon
International Conference on Graph Transformation, 91-106, 2010
Automated analysis of accountability
A Bruni, R Giustolisi, C Schuermann
International Conference on Information Security, 417-434, 2017
Smart-Guard: Defending User Input from Malware
M Denzel, A Bruni, MD Ryan
The 13th IEEE International Conference on Advanced and Trusted Computing …, 2016
Representing Session Types
PB Bock, A Bruni, A Murawska, C Schürmann
Dale Miller’s Festschrift, 2016
Privacy-Preserving Dispute Resolution in the Improved Bingo Voting
R Giustolisi, A Bruni
International Joint Conference on Electronic Voting, 67-83, 2020
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
K Norrman, V Sundararajan, A Bruni
arXiv preprint arXiv:2007.11427, 2020
The NeverEnding story: lack of common security protocols in the electronic communication sector
A Bruni
Technical and Socio-Technical Attacks on the Danish Party Endorsement System
C Schürmann, A Bruni
International Joint Conference on Electronic Voting, 200-215, 2019
M Denzel, A Bruni, M Ryan
of host publication: Proceedings of the 5th International Conference on Principles of Security and Trust (POST 2016)
SA Mödersheim, A Bruni
peer-review› Article in proceedings–Annual report year: 2016 9635, 233-253, 2016
Analysis of Security Protocols in Embedded Systems
A Bruni
Technical University of Denmark, 2016
Verification of Stateful Protocols-Set-Based Abstractions in the Applied Pi-Calculus
A Bruni, SA Mödersheim, F Nielson, HR Nielson
19th Nordic Conference on Secure IT Systems (NordSec 2014), 281-282, 2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19