Matteo Maffei
According to our database1,
Matteo Maffei
authored at least 116 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IFIP Networking Conference, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Proceedings of the Computer Aided Verification - 36th International Conference, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
Glimpse: On-Demand, Cross-Chain Communication for Efficient DeFi Applications on Bitcoin-based Blockchains.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
2021
Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Dagstuhl Reports, 2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Practical and Provably Sound Static Analysis of Ethereum Smart Contracts.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the Formal Methods in Computer Aided Design, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
The Good, The Bad and The Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Applications, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
J. Comput. Secur., 2019
A<sup>2</sup>L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs.
IACR Cryptol. ePrint Arch., 2019
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 Formal Methods in Computer Aided Design, 2019
2018
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2018
Proceedings of the Computer Aided Verification - 30th International Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
ACM Trans. Program. Lang. Syst., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
J. Comput. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
Brief announcement: towards security and privacy for outsourced data in the multi-party setting.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
2012
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2010
2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
2008
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Computer Aided Verification, 20th International Conference, 2008
2007
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007
2006
2005
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004
Proceedings of the Programming Languages and Systems, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
2003
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003
Proceedings of the Perspectives of Systems Informatics, 2003