Kerberos version IV: Inductive analysis of the secrecy goals G Bella, LC Paulson Computer Security—ESORICS 98: 5th European Symposium on Research in …, 1998 | 194 | 1998 |
Verifying the SET registration protocols G Bella, F Massacci, LC Paulson IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003 | 111 | 2003 |
Formal Analysis of the Kerberos Authentication System. G Bella, E Riccobene J. Univers. Comput. Sci. 3 (12), 1337-1381, 1997 | 99 | 1997 |
The verification of an industrial payment protocol: The SET purchase phase G Bella, LC Paulson, F Massacci Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 93 | 2002 |
Formal Correctness of Security Protocols G Bella | 89 | 2007 |
Mechanical proofs about a non-repudiation protocol G Bella, LC Paulson Theorem Proving in Higher Order Logics: 14th International Conference …, 2001 | 84 | 2001 |
Verifying the SET purchase protocols G Bella, F Massacci, LC Paulson Journal of Automated Reasoning 36, 5-37, 2006 | 82 | 2006 |
Formal verification of cardholder registration in SET G Bella, F Massacci, LC Paulson, P Tramontano Computer Security-ESORICS 2000: 6th European Symposium on Research in …, 2000 | 82 | 2000 |
Inductive verification of cryptographic protocols G Bella University of Cambridge, Computer Laboratory, 2000 | 79 | 2000 |
Using Isabelle to prove properties of the Kerberos authentication system G Bella, LC Paulson DIMACS Workshop on Design and Formal Verification of Security Protocols 504, 1997 | 75 | 1997 |
Layered analysis of security ceremonies G Bella, L Coles-Kemp Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 67 | 2012 |
Accountability protocols: Formalized and verified G Bella, LC Paulson ACM Transactions on Information and System Security (TISSEC) 9 (2), 138-161, 2006 | 62 | 2006 |
An overview of the verification of SET G Bella, F Massacci, LC Paulson International Journal of Information Security 4, 17-28, 2005 | 58 | 2005 |
Mechanising BAN Kerberos by the inductive method G Bella, LC Paulson Computer Aided Verification: 10th International Conference, CAV'98 Vancouver …, 1998 | 53 | 1998 |
Toucan: A protocol to secure controller area network G Bella, P Biondi, G Costantino, I Matteucci Proceedings of the ACM Workshop on Automotive Cybersecurity, 3-8, 2019 | 52 | 2019 |
Inductive verification of smart card protocols G Bella Journal of Computer Security 11 (1), 87-132, 2003 | 44 | 2003 |
Enforcing privacy in e-commerce by balancing anonymity and trust G Bella, R Giustolisi, S Riccobene Computers & Security 30 (8), 705-718, 2011 | 39 | 2011 |
Verifying second-level security protocols G Bella, C Longo, LC Paulson International Conference on Theorem Proving in Higher Order Logics, 352-366, 2003 | 36 | 2003 |
Soft constraints for security protocol analysis: Confidentiality G Bella, S Bistarelli International Symposium on Practical Aspects of Declarative Languages, 108-122, 2001 | 35 | 2001 |
Multi-attacker protocol validation W Arsac, G Bella, X Chantry, L Compagna Journal of Automated Reasoning 46 (3), 353-388, 2011 | 30 | 2011 |