Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Riccardo Pucella
Modeling Adversaries in a Logic for Security Protocol Analysis
Logical Methods in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Improved Security Protocol Using Fuzzy Logic With Multi-Parametres in Ad-Hoc Networks
International Journal for Research in Applied Science and Engineering Technology
A Modular Security Analysis of the TLS Handshake Protocol
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Hybrid Security Protocol for Sensor Networks
International Journal of Communication Networks and Distributed Systems
Computer Networks
Communications
Analysis of Quantum Security Direct Communication Protocol
ECDSA Security Protocol for WSBNs
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
A Compositional Logic for Proving Security Properties of Protocols*
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Cloud Security Risk Analysis Method Based on Fuzzy Logic
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
On Optimizing the Security-Throughput Trade-Off in Wireless Networks With Adversaries
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
An Asymmetric Protocol for Argumentation Games in Defeasible Logic
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science