Efficient unfolding of contextual Petri nets P Baldan, A Bruni, A Corradini, B König, C Rodríguez, S Schwoon Theoretical Computer Science 449, 2-22, 2012 | 62 | 2012 |
Towards a mechanized proof of selene receipt-freeness and vote-privacy A Bruni, E Drewsen, C Schürmann Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017 | 33 | 2017 |
Formal security analysis of the MaCAN protocol A Bruni, M Sojka, F Nielson, H Riis Nielson Integrated Formal Methods: 11th International Conference, IFM 2014 …, 2014 | 33 | 2014 |
Formal verification of ephemeral Diffie-Hellman over COSE (EDHOC) A Bruni, T Sahl Jørgensen, T Grønbech Petersen, C Schürmann Security Standardisation Research: 4th International Conference, SSR 2018 …, 2018 | 30 | 2018 |
Set-Pi: Set Membership Pi-Calculus A Bruni, S Mödersheim, F Nielson, H Riis Nielson Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 185-198, 2015 | 23 | 2015 |
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices K Norrman, V Sundararajan, A Bruni Proceedings of the 18th International Conference on Security and …, 2021 | 22 | 2021 |
Privately connecting mobility to infectious diseases via applied cryptography A Bampoulidis, A Bruni, L Helminger, D Kales, C Rechberger, R Walch arXiv preprint arXiv:2005.02061, 2020 | 19 | 2020 |
Security games for cyber-physical systems R Vigo, A Bruni, E Yüksel Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013 | 17 | 2013 |
Automated analysis of accountability A Bruni, R Giustolisi, C Schuermann Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017 | 12 | 2017 |
AIF-ω: Set-Based Protocol Abstraction with Countable Families S Mödersheim, A Bruni Principles of Security and Trust, 233-253, 2016 | 12 | 2016 |
On the computation of McMillan’s prefix for contextual nets and graph grammars P Baldan, A Bruni, A Corradini, B König, S Schwoon International Conference on Graph Transformation, 91-106, 2010 | 10 | 2010 |
Security protocols as choreographies A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021 | 7 | 2021 |
Practice and challenges of (de-) anonymisation for data sharing A Bampoulidis, A Bruni, I Markopoulos, M Lupu Research Challenges in Information Science: 14th International Conference …, 2020 | 7 | 2020 |
Privately connecting mobility to infectious diseases via applied cryptography A Bruni, L Helminger, D Kales, C Rechberger, R Walch IACR Cryptol. ePrint Arch 522, 2020, 2020 | 6 | 2020 |
Smart-Guard: Defending User Input from Malware M Denzel, A Bruni, MD Ryan The 13th IEEE International Conference on Advanced and Trusted Computing …, 2016 | 6 | 2016 |
Taming Differentiable Logics with Coq Formalisation R Affeldt, A Bruni, E Komendantskaya, N Ślusarz, K Stark arXiv preprint arXiv:2403.13700, 2024 | 4 | 2024 |
Privacy-preserving dispute resolution in the improved bingo voting R Giustolisi, A Bruni Electronic Voting: 5th International Joint Conference, E-Vote-ID 2020 …, 2020 | 3 | 2020 |
Trimming Data Sets: a Verified Algorithm for Robust Mean Estimation I Daukantas, A Bruni, C Schürmann Proceedings of the 23rd International Symposium on Principles and Practice …, 2021 | 2 | 2021 |
Representing session types PB Bock, A Murawska, A Bruni, C Schürmann | 2 | 2016 |
Analysis of security protocols in embedded systems A Bruni Technical University of Denmark, 2016 | 2 | 2016 |