


Остановите войну!
for scientists:
Matteo Maffei
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [i38]Lorenzo Veronese, Benjamin Farinier, Mauro Tempesta, Marco Squarcina, Matteo Maffei:
WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms. CoRR abs/2201.01649 (2022) - [i37]Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei:
Thora: Atomic And Privacy-Preserving Multi-Channel Updates. IACR Cryptol. ePrint Arch. 2022: 317 (2022) - 2021
- [c73]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures. ASIACRYPT (2) 2021: 635-664 - [c72]Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. Financial Cryptography (2) 2021: 131-150 - [c71]Matteo Romiti
, Friedhelm Victor
, Pedro Moreno-Sanchez
, Peter Sebastian Nordholt, Bernhard Haslhofer
, Matteo Maffei:
Cross-Layer Deanonymization Methods in the Lightning Protocol. Financial Cryptography (1) 2021: 187-204 - [c70]Matteo Maffei:
Formal Methods for the Security Analysis of Smart Contracts. FMCAD 2021: 1-2 - [c69]Matteo Maffei:
Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. ICISSP 2021: 7 - [c68]Marco Squarcina, Stefano Calzavara, Matteo Maffei:
The Remote on the Local: Exacerbating Web Attacks Via Service Workers Caches. SP Workshops 2021: 432-443 - [c67]Lukas Aumayr, Matteo Maffei, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, Pedro Moreno-Sanchez:
Bitcoin-Compatible Virtual Channels. IEEE Symposium on Security and Privacy 2021: 901-918 - [c66]Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs. IEEE Symposium on Security and Privacy 2021: 1834-1851 - [c65]Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffei:
Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web. USENIX Security Symposium 2021: 2917-2934 - [c64]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. USENIX Security Symposium 2021: 4043-4060 - [i36]Clara Schneidewind, Markus Scherer, Matteo Maffei:
The Good, the Bad and the Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts. CoRR abs/2101.05735 (2021) - [i35]Sophie Rain, Zeta Avarikioti, Laura Kovács, Matteo Maffei:
Towards a Game-Theoretic Security Analysis of Off-Chain Protocols. CoRR abs/2109.07429 (2021) - [i34]Johann Stockinger, Bernhard Haslhofer, Pedro Moreno-Sanchez, Matteo Maffei:
Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem. CoRR abs/2109.10229 (2021) - [i33]Nikolaj S. Bjørner, Maria Christakis, Matteo Maffei, Grigore Rosu:
Rigorous Methods for Smart Contracts (Dagstuhl Seminar 21431). Dagstuhl Reports 11(9): 80-101 (2021) - [i32]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. IACR Cryptol. ePrint Arch. 2021: 176 (2021) - [i31]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Donner: UTXO-Based Virtual Channels Across Multiple Hops. IACR Cryptol. ePrint Arch. 2021: 855 (2021) - [i30]Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Monero-Sánchez, Matteo Maffei:
Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers. IACR Cryptol. ePrint Arch. 2021: 1445 (2021) - 2020
- [c63]Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei:
eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. CCS 2020: 621-640 - [c62]Stefano Calzavara
, Riccardo Focardi
, Niklas Grimm, Matteo Maffei, Mauro Tempesta:
Language-Based Web Session Integrity. CSF 2020: 107-122 - [c61]Sergei Tikhomirov, Pedro Moreno-Sanchez
, Matteo Maffei:
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. EuroS&P Workshops 2020: 387-396 - [c60]Clara Schneidewind, Markus Scherer, Matteo Maffei:
The Good, The Bad and The Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts. ISoLA (3) 2020: 212-231 - [i29]Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta:
Language-Based Web Session Integrity. CoRR abs/2001.10405 (2020) - [i28]Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei:
eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. CoRR abs/2005.06227 (2020) - [i27]Matteo Romiti, Friedhelm Victor, Pedro Moreno-Sanchez, Bernhard Haslhofer, Matteo Maffei:
Cross-Layer Deanonymization Methods in the Lightning Protocol. CoRR abs/2007.00764 (2020) - [i26]Lukas Aumayr, Esra Ceylan, Matteo Maffei, Pedro Moreno-Sanchez, Iosif Salem, Stefan Schmid:
Demand-Aware Payment Channel Networks. CoRR abs/2011.14341 (2020) - [i25]Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffei:
Can I Take Your Subdomain? Exploring Related-Domain Attacks in the Modern Web. CoRR abs/2012.01946 (2020) - [i24]Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei:
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. IACR Cryptol. ePrint Arch. 2020: 303 (2020) - [i23]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez
, Siavash Riahi:
Generalized Bitcoin-Compatible Channels. IACR Cryptol. ePrint Arch. 2020: 476 (2020) - [i22]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez
, Siavash Riahi:
Bitcoin-Compatible Virtual Channels. IACR Cryptol. ePrint Arch. 2020: 554 (2020) - [i21]Erkan Tairi, Pedro Moreno-Sanchez
, Matteo Maffei:
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. IACR Cryptol. ePrint Arch. 2020: 1345 (2020)
2010 – 2019
- 2019
- [j12]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Group ORAM for privacy and access control in outsourced personal records. J. Comput. Secur. 27(1): 1-47 (2019) - [c59]Christoph Egger
, Pedro Moreno-Sanchez
, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. CCS 2019: 801-815 - [c58]Gilles Barthe, Renate Eilers, Pamina Georgiou, Bernhard Gleiss, Laura Kovács, Matteo Maffei:
Verifying Relational Properties using Trace Logic. FMCAD 2019: 170-178 - [c57]Giulio Malavolta, Pedro Moreno-Sanchez
, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. NDSS 2019 - [i20]Gilles Barthe, Renate Eilers, Pamina Georgiou, Bernhard Gleiss, Laura Kovács, Matteo Maffei:
Verifying Relational Properties using Trace Logic. CoRR abs/1906.09899 (2019) - [i19]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. CoRR abs/1911.09148 (2019) - [i18]Christoph Egger, Pedro Moreno-Sanchez
, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2019: 583 (2019) - [i17]Erkan Tairi, Pedro Moreno-Sanchez
, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs. IACR Cryptol. ePrint Arch. 2019: 589 (2019) - 2018
- [j11]Dominic Deuber, Matteo Maffei, Giulio Malavolta, Max Rabkin, Dominique Schröder, Mark Simkin:
Functional Credentials. Proc. Priv. Enhancing Technol. 2018(2): 64-84 (2018) - [j10]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 5(3): 44 (2018) - [c56]Ilya Grishchenko, Matteo Maffei, Clara Schneidewind:
Foundations and Tools for the Static Analysis of Ethereum Smart Contracts. CAV (1) 2018: 51-78 - [c55]Niklas Grimm, Kenji Maillard
, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin
:
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations. CPP 2018: 130-145 - [c54]Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei:
Equivalence Properties by Typing in Cryptographic Branching Protocols. POST 2018: 160-187 - [c53]Ilya Grishchenko, Matteo Maffei, Clara Schneidewind:
A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. POST 2018: 243-269 - [c52]Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg:
UniTraX: Protecting Data Privacy with Discoverable Biases. POST 2018: 278-299 - [c51]Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder:
Simple Password-Hardened Encryption Services. USENIX Security Symposium 2018: 1405-1421 - [c50]Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta:
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring. USENIX Security Symposium 2018: 1493-1510 - [i16]Ilya Grishchenko, Matteo Maffei, Clara Schneidewind:
A Semantic Framework for the Security Analysis of Ethereum smart contracts. CoRR abs/1802.08660 (2018) - [i15]Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta:
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring. CoRR abs/1806.09111 (2018) - [i14]Giulio Malavolta, Pedro Moreno-Sanchez
, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2018: 472 (2018) - 2017
- [j9]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 4(1): 5 (2017) - [j8]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 4(4): 18 (2017) - [c49]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
:
Maliciously Secure Multi-Client ORAM. ACNS 2017: 645-664 - [c48]Matteo Maffei, Manuel Reinert, Dominique Schröder:
On the Security of Frequency-Hiding Order-Preserving Encryption. CANS 2017: 51-70 - [c47]Jonathan Katz, Matteo Maffei, Giulio Malavolta, Dominique Schröder:
Subset Predicate Encryption and Its Applications. CANS 2017: 115-134 - [c46]Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei:
A Type System for Privacy Properties. CCS 2017: 409-423 - [c45]Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. CCS 2017: 455-471 - [c44]Stefano Calzavara
, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei:
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. CSF 2017: 22-36 - [c43]Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. NDSS 2017 - [e2]Matteo Maffei, Mark Ryan:
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Lecture Notes in Computer Science 10204, Springer 2017, ISBN 978-3-662-54454-9 [contents] - [i13]Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin:
A Monadic Framework for Relational Verification (Functional Pearl). CoRR abs/1703.00055 (2017) - [i12]Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei:
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. CoRR abs/1705.10482 (2017) - [i11]Stefano Calzavara, Ilya Grishchenko, Matteo Maffei:
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. CoRR abs/1707.07866 (2017) - [i10]Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei:
A Type System for Privacy Properties (Technical Report). CoRR abs/1708.08340 (2017) - [i9]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Maliciously Secure Multi-Client ORAM. IACR Cryptol. ePrint Arch. 2017: 329 (2017) - [i8]Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2017: 820 (2017) - 2016
- [j7]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 3(1): 33 (2016) - [c42]Stefano Calzavara
, Riccardo Focardi
, Niklas Grimm, Matteo Maffei:
Micro-policies for Web Session Security. CSF 2016: 179-193 - [c41]Stefano Calzavara
, Ilya Grishchenko, Matteo Maffei:
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. EuroS&P 2016: 47-62 - [i7]Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. IACR Cryptol. ePrint Arch. 2016: 1054 (2016) - 2015
- [j6]Michele Bugliesi, Stefano Calzavara
, Fabienne Eigner, Matteo Maffei:
Affine Refinement Types for Secure Distributed Programming. ACM Trans. Program. Lang. Syst. 37(4): 11:1-11:66 (2015) - [c40]Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina:
Symbolic Malleable Zero-Knowledge Proofs. CSF 2015: 412-426 - [c39]Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei, Kim Pecina:
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. NDSS 2015 - [c38]Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. POST 2015: 303-323 - [c37]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
:
Privacy and Access Control for Outsourced Personal Records. IEEE Symposium on Security and Privacy 2015: 341-358 - [i6]Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. IACR Cryptol. ePrint Arch. 2015: 39 (2015) - [i5]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Privacy and Access Control for Outsourced Personal Records. IACR Cryptol. ePrint Arch. 2015: 224 (2015) - 2014
- [j5]Michael Backes, Catalin Hritcu, Matteo Maffei:
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations. J. Comput. Secur. 22(2): 301-353 (2014) - [j4]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 1(1): 6 (2014) - [c36]Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate:
Differentially private data aggregation with optimal utility. ACSAC 2014: 316-325 - [c35]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
:
Brief announcement: towards security and privacy for outsourced data in the multi-party setting. PODC 2014: 144-146 - [e1]Matteo Maffei, Emilio Tuosto:
Trustworthy Global Computing - 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8902, Springer 2014, ISBN 978-3-662-45916-4 [contents] - [i4]Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov:
Privacy-preserving Data Aggregation with Optimal Utility. IACR Cryptol. ePrint Arch. 2014: 482 (2014) - 2013
- [c34]Matteo Maffei, Kim Pecina, Manuel Reinert:
Security and Privacy by Declarative Design. CSF 2013: 81-96 - [c33]Fabienne Eigner, Matteo Maffei:
Differential Privacy by Typing in Security Protocols. CSF 2013: 272-286 - [c32]Michael Backes, Sebastian Gerling, Christian Hammer
, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. DPM/SETOP 2013: 213-231 - [c31]Michele Bugliesi, Stefano Calzavara
, Fabienne Eigner, Matteo Maffei:
Logical Foundations of Secure Resource Management in Protocol Implementations. POST 2013: 105-125 - [c30]Michael Backes, Sebastian Gerling, Christian Hammer
, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Enforcing User Requirements on Android Apps. TACAS 2013: 543-548 - 2012
- [c29]Michael Backes, Matteo Maffei, Kim Pecina:
Automated Synthesis of Secure Distributed Applications. NDSS 2012 - [c28]Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina:
ObliviAd: Provably Secure and Practical Online Behavioral Advertising. IEEE Symposium on Security and Privacy 2012: 257-271 - [c27]Michele Bugliesi, Stefano Calzavara
, Fabienne Eigner, Matteo Maffei:
Affine Refinement Types for Authentication and Authorization. TGC 2012: 19-33 - 2011
- [c26]Michele Bugliesi, Stefano Calzavara
, Fabienne Eigner, Matteo Maffei:
Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols. CSF 2011: 83-98 - [c25]Michael Backes, Matteo Maffei, Kim Pecina:
A Security API for Distributed Social Networks. NDSS 2011 - [c24]Matteo Maffei, Kim Pecina:
Privacy-aware proof-carrying authorization. PLAS 2011: 7 - [c23]Michael Backes, Matteo Maffei, Kim Pecina:
Securing social networks. PODC 2011: 341-342 - [c22]Michael Backes, Catalin Hritcu, Matteo Maffei:
Union and Intersection Types for Secure Protocol Implementations. TOSCA 2011: 1-28 - [c21]Michael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk:
G2C: Cryptographic Protocols from Goal-Driven Specifications. TOSCA 2011: 57-77 - [p1]Riccardo Focardi
, Matteo Maffei:
Types for Security Protocols. Formal Models and Techniques for Analyzing Security Protocols 2011: 143-181 - 2010
- [c20]Michael Backes, Matteo Maffei, Dominique Unruh
:
Computationally sound verification of source code. CCS 2010: 387-398 - [c19]Michael Backes, Matteo Maffei, Esfandiar Mohammadi:
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations. FSTTCS 2010: 352-363 - [c18]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
Anonymous Webs of Trust. Privacy Enhancing Technologies 2010: 130-148 - [c17]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
Brief announcement: anonymity and trust in distributed systems. PODC 2010: 237-238 - [c16]Reinhard Wilhelm, Matteo Maffei:
Ubiquitous Verification of Ubiquitous Systems. SEUS 2010: 47-58 - [i3]Michael Backes, Matteo Maffei, Dominique Unruh:
Computationally Sound Verification of Source Code. IACR Cryptol. ePrint Arch. 2010: 416 (2010)
2000 – 2009
- 2009
- [c15]Michael Backes, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei:
Achieving Security Despite Compromise Using Zero-knowledge. CSF 2009: 308-323 - [c14]Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos
, Gerhard Weikum:
Anonymity and Censorship Resistance in Unstructured Overlay Networks. OTM Conferences (1) 2009: 147-164 - [c13]Michael Backes, Matteo Maffei:
Design and Verification of Anonymous Trust Protocols. Security Protocols Workshop 2009: 143-148 - 2008
- [c12]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. CAV 2008: 419-422 - [c11]Michael Backes, Catalin Hritcu, Matteo Maffei:
Type-checking zero-knowledge. CCS 2008: 357-370 - [c10]Michael Backes, Catalin Hritcu, Matteo Maffei:
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. CSF 2008: 195-209 - [c9]Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum:
Anonymous and censorship resistant content sharing in unstructured overlays. PODC 2008: 429 - [c8]Michael Backes, Matteo Maffei, Dominique Unruh
:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. IEEE Symposium on Security and Privacy 2008: 202-215 - 2007
- [j3]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Dynamic types for authentication. J. Comput. Secur. 15(6): 563-617 (2007) - [c7]Michael Backes, Agostino Cortesi
, Riccardo Focardi
, Matteo Maffei:
A calculus of challenges and responses. FMSE 2007: 51-60 - [c6]Michael Backes, Agostino Cortesi
, Matteo Maffei:
Causality-based Abstraction of Multiplicity in Security Protocols. CSF 2007: 355-369 - [i2]Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. Formal Protocol Verification Applied 2007 - [i1]Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. IACR Cryptol. ePrint Arch. 2007: 289 (2007) - 2005
- [j2]Matteo Maffei:
Tags for Multi-Protocol Authentication. Electron. Notes Theor. Comput. Sci. 128(5): 55-63 (2005) - [c5]Michele Bugliesi, Riccardo Focardi
, Matteo Maffei:
Analysis of Typed Analyses of Authentication Protocols. CSFW 2005: 112-125 - [c4]