Follow
Michele Boreale
Michele Boreale
Verified email at unifi.it - Homepage
Title
Cited by
Cited by
Year
Symbolic trace analysis of cryptographic protocols
M Boreale
Automata, Languages and Programming: 28th International Colloquium, ICALP …, 2001
2262001
SCC: A Service Centered Calculus
M Boreale, R Bruni, L Caires, R De Nicola, I Lanese, M Loreti, F Martins, ...
Web Services and Formal Methods: Third International Workshop, WS-FM 2006 …, 2006
2082006
Proof techniques for cryptographic processes
M Boreale, R De Nicola, R Pugliese
SIAM Journal on Computing 31 (3), 947-986, 2001
1832001
Sessions and pipelines for structured service programming
M Boreale, R Bruni, R De Nicola, M Loreti
Formal Methods for Open Object-Based Distributed Systems: 10th IFIP WG 6.1 …, 2008
1582008
A fully abstract semantics for causality in the-calculus
M Boreale, D Sangiorgi
Acta Informatica 35 (5), 353-400, 1998
1461998
Testing equivalence for mobile processes
M Boreale, R Denicola
Information and Computation 120 (2), 279-303, 1995
1231995
On the expressiveness of internal mobility in name-passing calculi
M Boreale
Theoretical computer science 195 (2), 205-226, 1998
941998
A Symbolic Semantics for the π-Calculus
M Boreale, R De Nicola
Information and Computation 126 (1), 34-52, 1996
831996
Bisimulation in name-passing calculi without matching
M Boreale, D Sangiorgi
Proceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science …, 1998
741998
Trace and testing equivalence on asynchronous processes
M Boreale, R De Nicola, R Pugliese
Information and Computation 172 (2), 139-164, 2002
642002
A coalgebraic perspective on linear weighted automata
F Bonchi, M Bonsangue, M Boreale, J Rutten, A Silva
Information and Computation 211, 77-105, 2012
632012
A Framework for the Analysis of Security Protocols*
M Boreale, MG Buscemi
CONCUR 2002—Concurrency Theory: 13th International Conference Brno, Czech …, 2002
602002
A type system for client progress in a service-oriented calculus
L Acciai, M Boreale
Concurrency, Graphs and Models: Essays Dedicated to Ugo Montanari on the …, 2008
542008
Some congruence properties for π-calculus bisimilarities
M Boreale, D Sangiorgi
Theoretical Computer Science 198 (1-2), 159-176, 1998
531998
Experimenting with STA, a tool for automatic analysis of security protocols
M Boreale, MG Buscemi
Proceedings of the 2002 ACM symposium on Applied computing, 281-285, 2002
502002
Quantifying information leakage in process calculi
M Boreale
Information and Computation 207 (6), 699-725, 2009
492009
Weighted bisimulation in linear algebraic form
M Boreale
CONCUR 2009-Concurrency Theory: 20th International Conference, CONCUR 2009 …, 2009
422009
Asymptotic information leakage under one-try attacks
M Boreale, F Pampaloni, M Paolini
Foundations of Software Science and Computational Structures: 14th …, 2011
392011
Quantifying information leakage in process calculi
M Boreale
ICALP (2), 119-131, 2006
372006
Basic observables for processes
M Boreale, R Pugliese
Information and Computation 149 (1), 77-98, 1999
351999
The system can't perform the operation now. Try again later.
Articles 1–20