Paolo Modesti

Orcid: 0000-0002-2523-1847

According to our database1, Paolo Modesti authored at least 20 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools.
J. Cybersecur. Priv., September, 2024

Automatic generation of security protocols attacks specifications and implementations.
Cyber Secur. Appl., 2024

2023
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN.
Cyber Secur. Appl., December, 2023

Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator.
J. Cybersecur. Priv., August, 2023

Formal Modeling and Security Analysis of Security Protocols.
Proceedings of the Handbook of Formal Analysis and Verification in Cryptography, 2023

2022
A Survey on Intrusion Detection Systems for Fog and Cloud Computing.
Future Internet, 2022

2021
A Script-based Approach for Teaching and Assessing Android Application Development.
ACM Trans. Comput. Educ., 2021

Formal modelling and security analysis of bitcoin's payment protocol.
Comput. Secur., 2021

2020
Integrating Formal Methods for Security in Software Security Education.
Informatics Educ., 2020

Security Analysis of the Open Banking Account and Transaction API Protocol.
CoRR, 2020

Account and Transaction Protocol of the Open Banking Standard.
Proceedings of the Rigorous State-Based Methods - 7th International Conference, 2020

2018
A Methodology for Protocol Verification Applied to EMV® 1.
Proceedings of the Formal Methods: Foundations and Applications - 21st Brazilian Symposium, 2018

2017
An IDE for the Design, Verification and Implementation of Security Protocols.
Proceedings of the 2017 IEEE International Symposium on Software Reliability Engineering Workshops, 2017

2016
Security protocol specification and verification with AnBx.
J. Inf. Secur. Appl., 2016

2015
AnBx: Automatic Generation and Verification of Security Protocols Implementations.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

2012
Verified security protocol modeling and implementation with AnBx.
PhD thesis, 2012

2011
Verifying SeVeCom using set-based abstraction.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
AnBx - Security Protocols Design and Verification.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010


  Loading...