Alessandro Bruni
Cited by
Cited by
Efficient unfolding of contextual Petri nets
P Baldan, A Bruni, A Corradini, B König, C Rodríguez, S Schwoon
Theoretical Computer Science 449, 2-22, 2012
Formal security analysis of the MaCAN protocol
A Bruni, M Sojka, F Nielson, H Riis Nielson
Integrated Formal Methods: 11th International Conference, IFM 2014 …, 2014
Towards a mechanized proof of selene receipt-freeness and vote-privacy
A Bruni, E Drewsen, C Schürmann
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
Set-Pi: Set Membership Pi-Calculus
A Bruni, S Mödersheim, F Nielson, H Riis Nielson
Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 185-198, 2015
Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC)
A Bruni, T Sahl Jĝrgensen, T Grĝnbech Petersen, C Schürmann
Security Standardisation Research: 4th International Conference, SSR 2018 …, 2018
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
K Norrman, V Sundararajan, A Bruni
Proceedings of the 18th International Conference on Security and …, 2021
Security games for cyber-physical systems
R Vigo, A Bruni, E Yüksel
Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013
AIF-ω: Set-Based Protocol Abstraction with Countable Families
S Mödersheim, A Bruni
Principles of Security and Trust, 233-253, 2016
Automated analysis of accountability
A Bruni, R Giustolisi, C Schuermann
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017
On the computation of McMillan’s prefix for contextual nets and graph grammars
P Baldan, A Bruni, A Corradini, B König, S Schwoon
International Conference on Graph Transformation, 91-106, 2010
Smart-Guard: Defending User Input from Malware
M Denzel, A Bruni, MD Ryan
The 13th IEEE International Conference on Advanced and Trusted Computing …, 2016
Security protocols as choreographies
A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann
Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021
Privacy-preserving dispute resolution in the improved bingo voting
R Giustolisi, A Bruni
Electronic Voting: 5th International Joint Conference, E-Vote-ID 2020 …, 2020
Representing Session Types
PB Bock, A Murawska, A Bruni, C Schürmann
Analysis of security protocols in embedded systems
A Bruni
Technical University of Denmark, 2016
Technical and socio-technical attacks on the danish party endorsement system
C Schürmann, A Bruni
Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019
tvalv: No-Cost Mitigation of Network Timing Channels
N Hedam, A Bruni, W Rafnsson
-, 2023
Trimming Data Sets: a Verified Algorithm for Robust Mean Estimation
I Daukantas, A Bruni, C Schürmann
23rd International Symposium on Principles and Practice of Declarative …, 2021
Extended Formal Analysis of the EDHOC Protocol in Tamarin
K Norrman, V Sundararajan, A Bruni
International Conference on E-Business and Telecommunications, 224-248, 2021
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
V Sundararajan, A Bruni
arXiv preprint arXiv:2007.11427, 2020
The system can't perform the operation now. Try again later.
Articles 1–20