Riccardo Focardi
Orcid: 0000-0003-0101-0692Affiliations:
- Ca' Foscari Università Venezia
According to our database1,
Riccardo Focardi
authored at least 124 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dsi.unive.it
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs.
SN Comput. Sci., July, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Proceedings of the Italian Conference on Cybersecurity, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery.
IEEE Secur. Priv., 2020
Proceedings of the Fourth Italian Conference on Cyber Security, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018
Proceedings of the 19th Italian Conference on Theoretical Computer Science, 2018
Proceedings of the IEEE International Conference on Industrial Technology, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Computer and Network Security Essentials., 2018
2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
J. Comput. Secur., 2015
Proceedings of the Programming Languages with Applications to Biology and Security, 2015
Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
J. Comput. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the Foundations of Security Analysis and Design VI, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Proceedings of the Fun with Algorithms, 5th International Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the Computer Security, 2009
2008
Proceedings of the 15th Workshop on Expressiveness in Concurrency, 2008
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
2007
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007
2006
Guest editor's introduction: Special issue on security issues in coordination models, languages, and systems.
Sci. Comput. Program., 2006
Sci. Comput. Program., 2006
2005
Future Gener. Comput. Syst., 2005
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005
Proceedings of the Foundations of Software Science and Computational Structures, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
Proceedings of the Foundations of Security Analysis and Design III, 2004
Proceedings of the Programming Languages and Systems, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
2003
Proceedings of the First International Workshop on Security Issues in Coordination Models, 2003
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003
Proceedings of the Computing: the Australasian Theory Symposiumm, 2003
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003
Proceedings of the Verification, 2003
Proceedings of the Verification, 2003
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003
Proceedings of the 1st International Conference on Software Engineering and Formal Methods (SEFM 2003), 2003
Proceedings of the Parallel Computing Technologies, 2003
Proceedings of the Perspectives of Systems Informatics, 2003
2002
Proceedings of the Verification, 2002
Proceedings of the Logic Based Program Synthesis and Tranformation, 2002
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002
Proceedings of the Foundations of Security Analysis and Design II, 2002
Proceedings of the Foundations of Security Analysis and Design II, 2002
Control Flow Analysis of Mobile Ambients with Security Boundaries.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002
Proceedings of the Algebraic Methodology and Software Technology, 2002
2001
Proceedings of the Theory of Concurrency, Higher Order Languages and Types, 2001
Proceedings of the International Workshop on Concurrency and Coordination, 2001
Proceedings of the Theory of Concurrency, Higher Order Languages and Types, 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
2000
ACM Trans. Softw. Eng. Methodol., 2000
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
Proceedings of the Foundations of Security Analysis and Design, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
Proceedings of the FM'99 - Formal Methods, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties.
IEEE Trans. Software Eng., 1997
1996
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
1995
The security checker: a semantics-based tool for the verification of security properties.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994