| Publication | Date of Publication | Type |
|---|
Revealing the trajectories of KLAIM tuples, statically Models, Languages, and Tools for Concurrent and Distributed Programming | 2024-02-23 | Paper |
The \texttt{link}-calculus for open multiparty interactions Information and Computation | 2020-12-15 | Paper |
Natural projection as partial model checking Journal of Automated Reasoning | 2020-11-02 | Paper |
Security metrics at work on the things in IoT systems From Lambda Calculus to Cybersecurity Through Program Analysis | 2020-07-20 | Paper |
From natural projection to partial model checking and back | 2019-09-16 | Paper |
Measuring security in IoT communications Theoretical Computer Science | 2019-03-13 | Paper |
A formal approach to open multiparty interactions Theoretical Computer Science | 2019-02-21 | Paper |
A flat process calculus for nested membrane interactions Scientific Annals of Computer Science | 2019-02-08 | Paper |
Tracing where IoT data are collected and aggregated | 2017-10-12 | Paper |
An analysis for causal properties of membrane interactions | 2016-04-26 | Paper |
Last mile's resources Semantics, Logics, and Calculi | 2016-03-23 | Paper |
A Global Occurrence Counting Analysis for Brane Calculi Logic-Based Program Synthesis and Transformation | 2016-02-05 | Paper |
Pierpaolo Degano Programming Languages with Applications to Biology and Security | 2016-01-08 | Paper |
Static evidences for attack reconstruction Programming Languages with Applications to Biology and Security | 2016-01-08 | Paper |
Causal static analysis for brane calculi Theoretical Computer Science | 2015-06-10 | Paper |
Control flow analysis for brane calculi Electronic Notes in Theoretical Computer Science | 2015-03-19 | Paper |
Linguistic mechanisms for context-aware security Theoretical Aspects of Computing – ICTAC 2014 | 2015-01-13 | Paper |
Control Flow Analysis of Generalised Boolean Networks Electronic Notes in Theoretical Computer Science | 2014-03-21 | Paper |
A static analysis for beta-binders Electronic Notes in Theoretical Computer Science | 2014-01-17 | Paper |
A quantitative study of two attacks | 2013-09-20 | Paper |
Performance evaluation of security protocols specified in LySa | 2013-09-20 | Paper |
Open Multiparty Interaction Recent Trends in Algebraic Development Techniques | 2013-09-13 | Paper |
Techniques for security checking: non-interference vs control flow analysis Electronic Notes in Theoretical Computer Science | 2013-07-24 | Paper |
Static Detection of Logic Flaws in Service-Oriented Applications Foundations and Applications of Security Analysis | 2009-10-22 | Paper |
A control flow analysis for Beta-binders with and without static compartments Theoretical Computer Science | 2009-08-07 | Paper |
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols Algebraic Methodology and Software Technology | 2009-01-27 | Paper |
On formal descriptions for knitting recursive patterns Journal of Mathematics and the Arts | 2008-11-25 | Paper |
Knitting for Fun: A Recursive Sweater Lecture Notes in Computer Science | 2007-11-15 | Paper |
Programming Languages and Systems Lecture Notes in Computer Science | 2007-09-28 | Paper |
scientific article; zbMATH DE number 2102772 (Why is no real title available?) | 2004-09-24 | Paper |
scientific article; zbMATH DE number 1860683 (Why is no real title available?) | 2003-06-02 | Paper |
Static analysis for the \(\pi\)-calculus with applications to security Information and Computation | 2003-01-14 | Paper |
scientific article; zbMATH DE number 1834562 (Why is no real title available?) | 2002-11-24 | Paper |
Primitives for authentication in process algebras. Theoretical Computer Science | 2002-07-15 | Paper |
scientific article; zbMATH DE number 1696438 (Why is no real title available?) | 2002-07-08 | Paper |
scientific article; zbMATH DE number 1512075 (Why is no real title available?) | 2001-09-04 | Paper |
Names of the \(\pi\)-calculus agents handled locally Theoretical Computer Science | 2000-12-12 | Paper |