Suivre
Alessandro Bruni
Alessandro Bruni
Associate Professor. IT-University of Copenhagen
Adresse e-mail validée de itu.dk - Page d'accueil
Titre
Citée par
Citée par
Année
Efficient unfolding of contextual Petri nets
P Baldan, A Bruni, A Corradini, B König, C Rodríguez, S Schwoon
Theoretical Computer Science 449, 2-22, 2012
552012
Formal security analysis of the MaCAN protocol
A Bruni, M Sojka, F Nielson, H Riis Nielson
Integrated Formal Methods: 11th International Conference, IFM 2014 …, 2014
272014
Set-Pi: Set Membership Pi-Calculus
A Bruni, S Mödersheim, F Nielson, H Riis Nielson
Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 185-198, 2015
242015
Towards a mechanized proof of selene receipt-freeness and vote-privacy
A Bruni, E Drewsen, C Schürmann
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
232017
Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC)
A Bruni, T Sahl Jørgensen, T Grønbech Petersen, C Schürmann
Security Standardisation Research: 4th International Conference, SSR 2018 …, 2018
172018
AIF-ω: Set-Based Protocol Abstraction with Countable Families
S Mödersheim, A Bruni
Principles of Security and Trust, 233-253, 2016
14*2016
Security games for cyber-physical systems
R Vigo, A Bruni, E Yüksel
Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013
142013
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
K Norrman, V Sundararajan, A Bruni
Proceedings of the 18th International Conference on Security and …, 2021
102021
Automated analysis of accountability
A Bruni, R Giustolisi, C Schuermann
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017
92017
On the computation of McMillan’s prefix for contextual nets and graph grammars
P Baldan, A Bruni, A Corradini, B König, S Schwoon
Graph Transformations: 5th International Conference, ICGT 2010, Enschede …, 2010
82010
Smart-Guard: Defending User Input from Malware
M Denzel, A Bruni, MD Ryan
The 13th IEEE International Conference on Advanced and Trusted Computing …, 2016
52016
Security protocols as choreographies
A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann
Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021
32021
Privacy-preserving dispute resolution in the improved bingo voting
R Giustolisi, A Bruni
Electronic Voting: 5th International Joint Conference, E-Vote-ID 2020 …, 2020
32020
Representing Session Types
PB Bock, A Murawska, A Bruni, C Schürmann
22016
Analysis of security protocols in embedded systems
A Bruni
Technical University of Denmark, 2016
22016
Technical and socio-technical attacks on the danish party endorsement system
C Schürmann, A Bruni
Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019
12019
tvalv: No-Cost Mitigation of Network Timing Channels
N Hedam, A Bruni, W Rafnsson
-, 2023
2023
Trimming Data Sets: a Verified Algorithm for Robust Mean Estimation
I Daukantas, A Bruni, C Schürmann
23rd International Symposium on Principles and Practice of Declarative …, 2021
2021
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
V Sundararajan, A Bruni
arXiv preprint arXiv:2007.11427, 2020
2020
Smart-Guard
M Denzel, A Bruni, M Ryan
2016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20