A true concurrent model of smart contracts executions M Bartoletti, L Galletta, M Murgia International Conference on Coordination Languages and Models, 243-260, 2020 | 37 | 2020 |
Measuring security in IoT communications C Bodei, S Chessa, L Galletta Theoretical Computer Science 764, 100-124, 2019 | 35 | 2019 |
Provably secure isolation for interruptible enclaved execution on small microprocessors M Busi, J Noorman, J Van Bulck, L Galletta, P Degano, JT Mühlberg, ... 33rd IEEE Computer Security Foundations Symposium, CSF 2020, 262--276, 2020 | 33 | 2020 |
Language-independent synthesis of firewall policies C Bodei, P Degano, L Galletta, R Focardi, M Tempesta, L Veronese 2018 ieee european symposium on security and privacy (euros&p), 92-106, 2018 | 33 | 2018 |
Tracing where IoT data are collected and aggregated C Bodei, P Degano, GL Ferrari, L Galletta Logical Methods in Computer Science 13 (3), 2017 | 30 | 2017 |
Framework, tools and good practices for cybersecurity curricula J Hajny, S Ricci, E Piesarskas, O Levillain, L Galletta, R De Nicola IEEE Access 9, 94723-94747, 2021 | 25 | 2021 |
A minimal core calculus for Solidity contracts M Bartoletti, L Galletta, M Murgia Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019 | 25 | 2019 |
Where do your IoT ingredients come from? C Bodei, P Degano, GL Ferrari, L Galletta Coordination Models and Languages: 18th IFIP WG 6.1 International Conference …, 2016 | 24 | 2016 |
Types for coordinating secure behavioural variations P Degano, GL Ferrari, L Galletta, G Mezzetti Coordination Models and Languages: 14th International Conference …, 2012 | 21 | 2012 |
A two-component language for adaptation: design, semantics and program analysis P Degano, GL Ferrari, L Galletta IEEE Transactions on Software Engineering 42 (6), 505-529, 2015 | 16 | 2015 |
Transcompiling firewalls. C Bodei, P Degano, R Focardi, L Galletta, M Tempesta POST, 303-324, 2018 | 14 | 2018 |
A step towards checking security in IoT C Bodei, P Degano, GL Ferrari, L Galletta arXiv preprint arXiv:1608.03327, 2016 | 14 | 2016 |
Tracking sensitive and untrustworthy data in IoT C Bodei, L Galletta The Italian Conference on Cybersecurity (ITASEC17) 1816, 38-52, 2017 | 13 | 2017 |
Stochastic modeling and analysis of the bitcoin protocol in the presence of block communication delays S Bistarelli, R De Nicola, L Galletta, C Laneve, I Mercanti, A Veschetti Concurrency and Computation: Practice and Experience 35 (16), e6749, 2023 | 12* | 2023 |
Securing interruptible enclaved execution on small microprocessors M Busi, J Noorman, J Van Bulck, L Galletta, P Degano, JT Mühlberg, ... ACM Transactions on Programming Languages and Systems (TOPLAS) 43 (3), 1-77, 2021 | 12 | 2021 |
A two-phase static analysis for reliable adaptation P Degano, GL Ferrari, L Galletta International Conference on Software Engineering and Formal Methods, 347-362, 2014 | 12 | 2014 |
Formalising security in ubiquitous and cloud scenarios C Bodei, P Degano, GL Ferrari, L Galletta, G Mezzetti Computer Information Systems and Industrial Management: 11th IFIP TC 8 …, 2012 | 12 | 2012 |
A type language for message passing component-based systems Z Savanović, L Galletta, HT Vieira arXiv preprint arXiv:2009.07989, 2020 | 11 | 2020 |
A two-component language for COP P Degano, GL Ferrari, L Galletta Proceedings of 6th ACM International Workshop on Context-Oriented …, 2014 | 11 | 2014 |
Adaptivity: Linguistic Mechanisms and Static Analysis Techniques. L Galletta University of Pisa, Italy, 2014 | 11 | 2014 |