Follow
Alessandro Bruni
Title
Cited by
Cited by
Year
Efficient unfolding of contextual Petri nets
P Baldan, A Bruni, A Corradini, B König, C Rodríguez, S Schwoon
Theoretical Computer Science 449, 2-22, 2012
582012
Formal security analysis of the MaCAN protocol
A Bruni, M Sojka, F Nielson, H Riis Nielson
Integrated Formal Methods: 11th International Conference, IFM 2014 …, 2014
312014
Towards a mechanized proof of selene receipt-freeness and vote-privacy
A Bruni, E Drewsen, C Schürmann
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
292017
Set-Pi: Set Membership Pi-Calculus
A Bruni, S Mödersheim, F Nielson, H Riis Nielson
Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 185-198, 2015
242015
Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC)
A Bruni, T Sahl Jĝrgensen, T Grĝnbech Petersen, C Schürmann
Security Standardisation Research: 4th International Conference, SSR 2018 …, 2018
222018
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
K Norrman, V Sundararajan, A Bruni
Proceedings of the 18th International Conference on Security and …, 2021
162021
Security games for cyber-physical systems
R Vigo, A Bruni, E Yüksel
Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013
152013
AIF-ω: Set-Based Protocol Abstraction with Countable Families
S Mödersheim, A Bruni
Principles of Security and Trust, 233-253, 2016
132016
Automated analysis of accountability
A Bruni, R Giustolisi, C Schuermann
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017
102017
On the computation of McMillan’s prefix for contextual nets and graph grammars
P Baldan, A Bruni, A Corradini, B König, S Schwoon
International Conference on Graph Transformation, 91-106, 2010
82010
Security protocols as choreographies
A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann
Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021
52021
Smart-Guard: Defending User Input from Malware
M Denzel, A Bruni, MD Ryan
The 13th IEEE International Conference on Advanced and Trusted Computing …, 2016
52016
Privacy-preserving dispute resolution in the improved bingo voting
R Giustolisi, A Bruni
Electronic Voting: 5th International Joint Conference, E-Vote-ID 2020 …, 2020
22020
Representing session types
PB Bock, A Murawska, A Bruni, C Schürmann
22016
Analysis of security protocols in embedded systems
A Bruni
Technical University of Denmark, 2016
22016
Technical and socio-technical attacks on the danish party endorsement system
C Schürmann, A Bruni
Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019
12019
Taming Differentiable Logics with Coq Formalisation
A Bruni
2024
Taming Differentiable Logics with Coq Formalisation
R Affeldt, A Bruni, E Komendantskaya, N Ślusarz, K Stark
arXiv preprint arXiv:2403.13700, 2024
2024
Extended Formal Analysis of the EDHOC Protocol in Tamarin
K Norrman, V Sundararajan, A Bruni
International Conference on E-Business and Telecommunications, 224-248, 2023
2023
tvalv: No-Cost Mitigation of Network Timing Channels
N Hedam, A Bruni, W Rafnsson
-, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20