Follow
Alessandro Bruni
Title
Cited by
Cited by
Year
Efficient unfolding of contextual Petri nets
P Baldan, A Bruni, A Corradini, B König, C Rodríguez, S Schwoon
Theoretical Computer Science 449, 2-22, 2012
542012
Formal security analysis of the MaCAN protocol
A Bruni, M Sojka, F Nielson, H Riis Nielson
International Conference on Integrated Formal Methods, 241-255, 2014
262014
Set-Pi: Set Membership Pi-Calculus
A Bruni, S Mödersheim, F Nielson, H Riis Nielson
Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 185-198, 2015
232015
Towards a mechanized proof of selene receipt-freeness and vote-privacy
A Bruni, E Drewsen, C Schürmann
International Joint Conference on Electronic Voting, 110-126, 2017
192017
Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC)
A Bruni, T Sahl Jørgensen, T Grønbech Petersen, C Schürmann
International Conference on Research in Security Standardisation, 21-36, 2018
152018
AIF-ω: Set-Based Protocol Abstraction with Countable Families
S Mödersheim, A Bruni
Principles of Security and Trust, 233-253, 2016
142016
Security games for cyber-physical systems
R Vigo, A Bruni, E Yüksel
Nordic Conference on Secure IT Systems, 17-32, 2013
132013
Automated analysis of accountability
A Bruni, R Giustolisi, C Schuermann
International Conference on Information Security, 417-434, 2017
92017
On the computation of McMillan’s prefix for contextual nets and graph grammars
P Baldan, A Bruni, A Corradini, B König, S Schwoon
International Conference on Graph Transformation, 91-106, 2010
82010
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
K Norrman, V Sundararajan, A Bruni
Proceedings of the 18th International Conference on Security and …, 2021
72021
Smart-Guard: Defending User Input from Malware
M Denzel, A Bruni, MD Ryan
The 13th IEEE International Conference on Advanced and Trusted Computing …, 2016
52016
Privacy-preserving dispute resolution in the improved bingo voting
R Giustolisi, A Bruni
International Joint Conference on Electronic Voting, 67-83, 2020
22020
Analysis of security protocols in embedded systems
A Bruni
Technical University of Denmark, 2016
22016
Representing Session Types
PB Bock, A Bruni, A Murawska, C Schürmann
Dale Miller’s Festschrift, 2016
12016
Trimming Data Sets: a Verified Algorithm for Robust Mean Estimation
I Daukantas, A Bruni, C Schürmann
23rd International Symposium on Principles and Practice of Declarative …, 2021
2021
Security Protocols as Choreographies
A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann
Protocols, Strands, and Logic, 98-111, 2021
2021
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
V Sundararajan, A Bruni
arXiv preprint arXiv:2007.11427, 2020
2020
Technical and Socio-Technical Attacks on the Danish Party Endorsement System
C Schürmann, A Bruni
International Joint Conference on Electronic Voting, 200-215, 2019
2019
Smart-Guard
M Denzel, A Bruni, M Ryan
2016
of host publication: Proceedings of the 5th International Conference on Principles of Security and Trust (POST 2016)
SA Mödersheim, A Bruni
peer-review› Article in proceedings–Annual report year: 2016 9635, 233-253, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20