Follow
CHIARA BODEI
CHIARA BODEI
Computer Science Associate Professor, University of Pisa
Verified email at unipi.it
Title
Cited by
Cited by
Year
Static validation of security protocols
C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson
Journal of Computer Security 13 (3), 347-390, 2005
1762005
Automatic validation of protocol narration
C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 126-140, 2003
1422003
Control flow analysis for the π-calculus
C Bodei, P Degano, F Nielson, HR Nielson
CONCUR'98 Concurrency Theory: 9th International Conference Nice, France …, 1998
1361998
Static analysis for the π-calculus with applications to security
C Bodei, P Degano, F Nielson, HR Nielson
Information and Computation 168 (1), 68-92, 2001
1272001
Static analysis of processes for no read-up and no write-down
C Bodei, P Degano, F Nielson, HR Nielson
Foundations of Software Science and Computation Structures: Second …, 1999
751999
Safe ambients: Control flow analysis and security
P Degano, F Levi, C Bodei
Advances in Computing Science—ASIAN 2000: 6th Asian Computing Science …, 2000
692000
Static analysis for secrecy and non-interference in networks of processes
C Bodei, P Degano, F Nielson, HR Nielson
International Conference on Parallel Computing Technologies, 27-41, 2001
572001
Security issues in process calculi
C Bodei
Servizio editoriale universitario, 2000
342000
Measuring security in IoT communications
C Bodei, S Chessa, L Galletta
Theoretical Computer Science 764, 100-124, 2019
332019
Language-independent synthesis of firewall policies
C Bodei, P Degano, L Galletta, R Focardi, M Tempesta, L Veronese
2018 ieee european symposium on security and privacy (euros&p), 92-106, 2018
322018
Flow logic for Dolev–Yao secrecy in cryptographic processes
C Bodei, P Degano, F Nielson, HR Nielson
Future Generation Computer Systems 18 (6), 747-756, 2002
322002
Tracing where IoT data are collected and aggregated
C Bodei, P Degano, GL Ferrari, L Galletta
Logical Methods in Computer Science 13, 2017
292017
Control flow analysis can find new flaws too
C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson
Proceedings of the Workshop on Issues on the Theory of Security (WITS’04), 2004
262004
Where do your IoT ingredients come from?
C Bodei, P Degano, GL Ferrari, L Galletta
Coordination Models and Languages: 18th IFIP WG 6.1 International Conference …, 2016
242016
A formal analysis for capturing replay attacks in cryptographic protocols
H Gao, C Bodei, P Degano, H Riis Nielson
Advances in Computer Science–ASIAN 2007. Computer and Network Security: 12th …, 2007
232007
Primitives for authentication in process algebras
C Bodei, P Degano, R Focardi, C Priami
Theoretical Computer Science 283 (2), 271-304, 2002
232002
Authentication via localized names
C Bodei, P Degano, R Focardi, C Priami
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 98-110, 1999
221999
A control flow analysis for beta-binders with and without static compartments
C Bodei
Theoretical Computer Science 410 (33-34), 3110-3127, 2009
212009
On deducing causality in metabolic networks
C Bodei, A Bracciali, D Chiarugi
BMC bioinformatics 9, 1-10, 2008
192008
Open multiparty interaction
C Bodei, L Brodo, R Bruni
Recent Trends in Algebraic Development Techniques: 21st International …, 2013
182013
The system can't perform the operation now. Try again later.
Articles 1–20