Alessandro Bruni

According to our database1, Alessandro Bruni authored at least 22 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Taming Differentiable Logics with Coq Formalisation.
Proceedings of the 15th International Conference on Interactive Theorem Proving, 2024

Robust Mean Estimation by All Means (Short Paper).
Proceedings of the 15th International Conference on Interactive Theorem Proving, 2024

Skolemisation for Intuitionistic Linear Logic.
Proceedings of the Automated Reasoning - 12th International Joint Conference, 2024

2022
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography.
Proc. Priv. Enhancing Technol., 2022

2021
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Trimming Data Sets: a Verified Algorithm for Robust Mean Estimation.
Proceedings of the PPDP 2021: 23rd International Symposium on Principles and Practice of Declarative Programming, 2021

Extended Formal Analysis of the EDHOC Protocol in Tamarin.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

Security Protocols as Choreographies.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Practice and Challenges of (De-)Anonymisation for Data Sharing.
Proceedings of the Research Challenges in Information Science, 2020

Privacy-Preserving Dispute Resolution in the Improved Bingo Voting.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

2019
Technical and Socio-Technical Attacks on the Danish Party Endorsement System.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

2018
Formal Verification of Ephemeral Diffie-Hellman Over COSE (EDHOC).
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

2017
Towards a Mechanized Proof of Selene Receipt-Freeness and Vote-Privacy.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Automated Analysis of Accountability.
Proceedings of the Information Security - 20th International Conference, 2017

2016
Analysis of Security Protocols in Embedded Systems.
PhD thesis, 2016

Smart-Guard: Defending User Input from Malware.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

AIF-ω: Set-Based Protocol Abstraction with Countable Families.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

2015
Set-Pi: Set Membership p-Calculus.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Formal Security Analysis of the MaCAN Protocol.
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014

2013
Security Games for Cyber-Physical Systems.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

2012
Efficient unfolding of contextual Petri nets.
Theor. Comput. Sci., 2012

2010
On the Computation of McMillan's Prefix for Contextual Nets and Graph Grammars.
Proceedings of the Graph Transformations - 5th International Conference, 2010


  Loading...