Sfoglia per Autore
Mostrati risultati da 1 a 7 di 7
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis
2011-01-01 Fiazza, Maria Camilla; Peroli, Michele; Vigano', Luca
Security protocols as environments: A lesson from non-collaboration
2011-01-01 Fiazza, Maria Camilla; Peroli, Michele; Vigano', Luca
Attack Interference: A Path to Defending Security Protocols
2012-01-01 Fiazza, Maria Camilla; Peroli, Michele; Vigano', Luca
An Environmental Paradigm for Defending Security Protocols
2012-01-01 Fiazza, Maria Camilla; Peroli, Michele; Vigano', Luca
VERA: A Flexible Model-Based Vulnerability Testing Tool
2013-01-01 Abian, Blome; Martin, Ochoa; Keqin, Li; Peroli, Michele; Mohammad Torabi, Dashti
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
2014-01-01 Peroli, Michele; Vigano', Luca; Zavatteri, Matteo
A Model-Based Security Testing Approach for Web Applications
2015-01-01 Peroli, Michele
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis | 1-gen-2011 | Fiazza, Maria Camilla; Peroli, Michele; Vigano', Luca | |
Security protocols as environments: A lesson from non-collaboration | 1-gen-2011 | Fiazza, Maria Camilla; Peroli, Michele; Vigano', Luca | |
Attack Interference: A Path to Defending Security Protocols | 1-gen-2012 | Fiazza, Maria Camilla; Peroli, Michele; Vigano', Luca | |
An Environmental Paradigm for Defending Security Protocols | 1-gen-2012 | Fiazza, Maria Camilla; Peroli, Michele; Vigano', Luca | |
VERA: A Flexible Model-Based Vulnerability Testing Tool | 1-gen-2013 | Abian, Blome; Martin, Ochoa; Keqin, Li; Peroli, Michele; Mohammad Torabi, Dashti | |
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) | 1-gen-2014 | Peroli, Michele; Vigano', Luca; Zavatteri, Matteo | |
A Model-Based Security Testing Approach for Web Applications | 1-gen-2015 | Peroli, Michele |
Mostrati risultati da 1 a 7 di 7
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile