A classification of security properties for process algebras R Focardi, R Gorrieri Journal of Computer security 3 (1), 5-33, 1995 | 467 | 1995 |
Classification of Security Properties: (Part I: Information Flow) R Focardi, R Gorrieri International School on Foundations of Security Analysis and Design, 331-396, 2000 | 338 | 2000 |
The compositional security checker: A tool for the verification of information flow security properties R Focardi, R Gorrieri IEEE Transactions on Software Engineering 23 (9), 550-571, 1997 | 274 | 1997 |
Non interference for the analysis of cryptographic protocols R Focardi, R Gorrieri, F Martinelli International Colloquium on Automata, Languages, and Programming, 354-372, 2000 | 165 | 2000 |
Efficient padding oracle attacks on cryptographic hardware R Bardou, R Focardi, Y Kawamoto, L Simionato, G Steel, JK Tsay Annual Cryptology Conference, 608-625, 2012 | 143 | 2012 |
A uniform approach for the definition of security properties R Focardi, F Martinelli International Symposium on Formal Methods, 794-813, 1999 | 143 | 1999 |
Attacking and fixing PKCS# 11 security tokens M Bortolozzo, M Centenaro, R Focardi, G Steel Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 134 | 2010 |
Information flow security in dynamic contexts R Focardi, S Rossi Journal of Computer Security 14 (1), 65-110, 2006 | 125 | 2006 |
Information flow analysis in a discrete-time process algebra R Focardi, R Gorrieri, F Martinelli Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 170-184, 2000 | 115 | 2000 |
Shaping the glitch: optimizing voltage fault injection attacks C Bozzato, R Focardi, F Palmarini IACR transactions on cryptographic hardware and embedded systems 2019 (2 …, 2019 | 106 | 2019 |
Usable security for QR code R Focardi, FL Luccio, HAM Wahsheh Journal of Information Security and Applications 48, 102369, 2019 | 89 | 2019 |
Real-time information flow analysis R Focardi, R Gorrieri, F Martinelli IEEE Journal on Selected Areas in Communications 21 (1), 20-35, 2003 | 86 | 2003 |
A compiler for analyzing cryptographic protocols using noninterference A Durante, R Focardi, R Gorrieri ACM Transactions on Software Engineering and Methodology (TOSEM) 9 (4), 488-528, 2000 | 83 | 2000 |
Surviving the web: A journey into web session security S Calzavara, R Focardi, M Squarcina, M Tempesta ACM Computing Surveys (CSUR) 50 (1), 1-34, 2017 | 80 | 2017 |
Feedback vertex set in hypercubes R Focardi, FL Luccio, D Peleg Information Processing Letters 76 (1-2), 1-5, 2000 | 77 | 2000 |
Using non interference for the analysis of security protocols R Focardi, A Ghelli, R Gorrieri Proceedings of DIMACS Workshop on Design and Formal Verification of Security …, 1997 | 77 | 1997 |
A taxonomy of trace-based security properties for CCS R Focardi, R Gorrieri Proceedings The Computer Security Foundations Workshop VII, 126-136, 1994 | 72 | 1994 |
CookiExt: Patching the browser against session hijacking attacks M Bugliesi, S Calzavara, R Focardi, W Khan Journal of Computer Security 23 (4), 509-537, 2015 | 62 | 2015 |
Verifying persistent security properties A Bossi, R Focardi, C Piazza, S Rossi Computer Languages, Systems & Structures 30 (3-4), 231-258, 2004 | 60 | 2004 |
Classification of Security Properties: (Part II: Network Security) R Focardi, R Gorrieri, F Martinelli International School on Foundations of Security Analysis and Design, 139-185, 2001 | 59 | 2001 |