G. Castiglione, G.Bella, D.F. Santamaria
Elsevier Computers & Security, Vol. 148, January 2025, 104150.
(doi:
10.1016/j.cose.2024.104150)
G.Bella, D. Cantone, M. Nicolosi-Asmundo, D.F. Santamaria
Applied Ontology, vol. 19, no. 2, pp. 143-180, 2024 DOI 10.3233/SW-243543.
(doi:
10.3233/AO-230010)
G.Bella, D. Cantone, G. Castiglione, M. Nicolosi-Asmundo, D.F. Santamaria
Semantic Web, vol. Pre-press, no. Pre-press, pp. 1-52, 2024 DOI 10.3233/SW-243543.
(doi:
10.3233/SW-243543)
G.Bella, D. Cantone, C.F. Longo, M. Nicolosi-Asmundo, D.F. Santamaria
Intelligenza Artificiale, vol. 17, no. 1, pp. 51-62, 2023. DOI 10.3233/IA-230002.
(doi:
10.3233/IA-230002)
-- Link
D.Micale, I.Matteucci, F.Fenzl, R.Rieke, G.Patanè
International Journal of Information Security, 09 March 2023.
(doi:
10.21203/rs.3.rs-2650857/v1) -- Link
G.Bella, C.Daniele, M.Raciti
IEEE Access, 2169-3536, 14 February 2023.
(doi:
10.1109/ACCESS.2023.3245333) -- Link
G.Bella, P.Biondi, S.Bognanni, S.Esposito
Elsevier Internet of Things, Volume 22, July 2023.
(doi:
10.1016/j.iot.2023.100707) -- Link
G.Bella, P.Biondi, G.Tudisco
Springer Automotive Innovation, 1389-1286, 2023.
(doi:
10.1007/s42154-022-00203-2) -- Link
G.Bella, P.Biondi, G.Costantino, I.Matteucci
Elsevier Computer Networks, 1389-1286, 2022.
(doi:
10.1016/j.comnet.2022.109377)
G. Bella, J. Ophoff, K. Renaud, D. Sempreboni, L. Viganò
Springer Philosophy & Technology, 35(72), 2022 -- Link
M.C.Eisele, M.Maugeri, R-Shriwas, C.Huth, G.Bella
Springer Cybersecurity, 2523-3246, 2022
(doi:
10.1186/s42400-022-00123-y)
G.Bella, R.Giustolisi, C.Schürmann
IOS Journal of Computer Security, pp.1-23, 2022.
(doi: 10.3233/JCS-210059) -- Link
G.Bella, P.Biondi, S.Bognanni
Elsevier Internet of Things, 2542-6605, 2022.
(doi:
10.1016/j.iot.2022.100507) -- Link
G.Bella
Emerald Journal of Intellectual Capital, 21(2):291-307, 2020.
(doi: 10.1108/JIC-05-2019-0127)
-- Link
R.Giustolisi, G.Bella, G.Lenzini
IOS Journal of Computer Security, 26(4):509-541, 2018.
(doi: 10.3233/JCS-16891)
-- Link
G.Bella, R.Giustolisi, G.Lenzini, P.Y.A.Ryan
Elsevier Computers & Security, 67:291-307, 2017.
(doi:
10.1016/j.cose.2016.12.005)
-- Link
G.Bella, P.Curzon, G.Lenzini
IOS Journal of Computer Security, 23(5):563-585, 2015.
(doi: 10.3233/JCS-150536)
-- Link
G.Bella
Springer Formal Aspects of Computing, 26(1):3-36, 2014.
(doi:
10.1007/s00165-012-0246-3)
-- Link
G.Bella, G.Costantino, J.Crowcroft, S.Riccobene
Elsevier Computer Standards & Interfaces, 35(1):107-113, 2013.
(doi:
10.1016/j.csi.2012.06.007)
G.Bella, R.Giustolisi, S.Riccobene
Elsevier Computers and Security, 30(8):705-718, 2011.
(doi:
10.1016/j.cose.2011.08.005)
-- Link
W.Arsac, G.Bella, X.Chantry, L.Compagna
Springer Journal of Automated Reasoning, 46(3-4):353-388, 2011.
(doi:
10.1007/s10817-010-9185-y)
-- Link
G.Bella
Springer International Journal of Information Security, 9(2):83-97, 2010.
(doi:
10.1007/s10207-009-0097-y) -- Link
G.Bella, G.Costantino, S.Riccobene
Dynamic Publishers Journal of Information Assurance and Security, 4(4):458-465, 2009.
(doi: 10.1109/IAS.2008.24)
G.Bella, S.Bistarelli, F.Massacci
Dynamic Publishers Journal of Information Assurance and Security, 3(4):313-325, 2008.
(PDF)
G.Bella
Springer Journal of Universal Computer Science, 14(12):2083-2107, 2008.
Link
G.Bella, L.C.Paulson
ACM Transactions on Information and System Security, 9(2):138:161, 2006.
(doi: 10.1145/1151414.1151416)
G.Bella, L.C.Paulson
Springer Journal of Automated Reasoning, 36(1-2):5-37, 2006.
(doi:
10.1007/s10817-005-9018-6)
G.Bella, S.Bistarelli
Elsevier Computers and Security, 24(4):322-333, 2005.
(doi:
10.1016/j.cose.2004.10.004)
G.Bella, F.Massacci, L.C.Paulson
Springer International Journal of Information Security, 4(1-2):175-192, 2005.
(doi:
10.1007/s10207-004-0047-7)
G.Bella, S.Bistarelli
Cambridge University Press Journal of Theory and Practice of Logic Programming, 4(5):1-28,
2004.
(doi:
10.1017/S1471068404002121)
G.Bella
IOS Journal of Computer Security, 11(1):87-132, 2003.
(doi: 10.3233/JCS-2003-11103)
G.Bella, F.Massacci, L.C.Paulson
IEEE Journal on Selected Areas in Communications, 21(1):77-87, 2003.
(doi: 10.1109/JSAC.2002.806133)
G.Bella, E.Riccobene
Springer Journal of Universal Computer Science, 3(12):1337-1381, 1997.
Link
G. Bella, G. Castiglione, S. Esposito, M. G. Mangano, M. Marchetti, M. Maugeri, M. Raciti, Salvatore Riccobene,
D. F. Santamaria
In EAI SmartSP 2024 - 2nd EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles
G. Bella, G. Castiglione, S. Esposito, M. Raciti, S. Riccobene
In 2024 IEEE International Workshop On Technologies for Defense and Security --
Link
G. Castiglione, G.Bella
In SecAssure, the 3rd International Workshop on System Security Assurance (ESORICS 2024) --
Link
M. Maugeri, M.I.P. Morana, S. Esposito, G.Bella
In 2024 IEEE International Conference on Blockchain (Blockchain) --
Link
D. Bonaventura, S. Esposito, G.Bella
In Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024) --
Link
G.Bella, D. Cantone, G. Castiglione, M. Nicolosi-Asmundo, D.F. Santamaria
In Semantic Shields I: 1st International Workshop on Modeling for Cybersecurity (FOIS 2024) --
Link
Cacciato R., Raciti M., Esposito S., Bella G.
In 19th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2024) --
DOI
Blanchini M., Cerreta M., Di Monda D., Fabbri M., Raciti M., Ahmad S. H., Costa G.
In Proceedings of the Italian Conference on Cyber Security (ITASEC 2024) --
DOI
M. Raciti, G. Bella
In 12th International Symposium on Digital Forensics and Security (ISDFS 2024)
--
DOI
S. McFadden, M. Maugeri, C. Hicks, V. Mavroudis, F. Pierazzi
IEEE Workshop on Deep Learning Security and Privacy (DLSP), 2024
--
Link
M. Maugeri
In Proceedings of the 10th International Conference on
Information Systems Security and Privacy
M. Raciti
In Proceedings of the 10th International Conference on Information Systems
Security and Privacy, ISBN 978-989-758-683-5, ISSN 2184-4356,
pages 831-837
S. Esposito, D. Sgandurra, G. Bella
In the 6th International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2023), The Hague, The Netherlands, 25-29 September 2023 --
Link
M. Maugeri, C. Daniele, G. Bella
In the 2nd International Workshop on System Security Assurance (SecAssure), The Hague, The Netherlands, 25-29 September 2023
--
Link
M. Raciti, G. Bella
In 7th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2023), The Hague, The Netherlands, September 25-29, 2023
(DOI:10.1007/978-3-031-54204-6_27)
-- Link
D. Bonaventura, G. Bella, S. Esposito
In Proceedings of the 20th International Conference on Security and Cryptography SECRYPT
-- Link
M. Raciti, G. Bella
In the 2nd Workshop on Automotive Cyber Security (ACSW 2023), July 3, 2023, in Delft, Netherlands
-- Link
G. Bella, G. Castiglione, D.F. Santamaria
In the 18th International Conference on Availability, Reliability and
Security (ARES 2023), August 29-September 1, 2023, Benevento, Italy
(DOI: 10.1145/3600160.3605069)
-- Link
G. Bella, G. Castiglione, D.F. Santamaria
In the 2nd international workshop KM4LAW – Knowledge Management and Process Mining for Law, July 20, 2023 (Sherbrooke, Québec, Canada)
Publication
-- Link
G. Bella, G. Castiglione, D.F. Santamaria
In the 7th Workshop on Foundational Ontology (FOUST) co-located with FOIS 2023, 19-20 July, 2023, Sherbrooke, Québec,
Canada
Publication
-- Link
G. Bella, G. Castiglione, D.F. Santamaria
In the 2nd International Workshop on Ontologies for Services and Society (OSS) at JOWO 2023, 19-20 July, 2023, Sherbrooke, Québec,
Canada
Publication
-- Link
S. Esposito, D. Sgandurra, G. Bella
In the 8th IEEE European Symposium on Security and Privacy (Euro S&P ’23), 2023
M. Maugeri, C. Daniele, G. Bella, E. Poll
In Proceedings of the 9th International Conference on Information Systems Security and Privacy
-
ICISSP, February 22-24, 2023
(DOI: 10.5220/0011648600003405)
-- Link
M.Raciti, G.Bella
In Proceedings of the 9th International Conference on Vehicle Technology and Intelligent
Transport Systems - VEHITS, 394-401, 2023
-- Link
G.Bella
In 15th International Conference on Security for Information Technology and Communications
(SECICT 2022)
--- Link
D.Micale, G.Costantino, I.Matteucci, F.Fenzl, R.Rieke, G.Patanè
In 21st IEEE International Conference on Trust, Security and Privacy in Computing and
Communications (IEEE TrustCom 2022)
P.Biondi, G.Bella, F.Tronci
In 6th International Conference on System Reliability and Safety (ICSRS 2022)
S.Esposito, D.Sgandurra, G.Bella
(doi:
10.48550/arXiv.2202.08619) --- BibTeX --- Link
G.Bella, C.Daniele, M.Raciti
In 6th International Conference on Cryptography, Security and Privacy (CSP 2022)
P.Biondi, S.Bognanni, G.Bella
In International Conference on Internet of Things: Systems, Management and Security (IOTSMS
2021)
Pages 1-8 -- (doi:
10.1109/IOTSMS53705.2021.97048906) --- BibTeX -- Link
G.Costantino, I.Matteucci, D.Micale, G.Patanè
In 10th International Symposium on Security and Privacy on the Internet of Things (SPIoT
2021)
Pages 1753-1762 -- (doi:
10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00236) --- BibTeX
G.Bella, P.Biondi, M.De Vincenzi, G.Tudisco
In International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms
(STRIVE21)
Pages 136-143 -- (doi:10.1109/EuroSPW54576.2021.00022) --- BibTeX -- Link
G.Bella, P.Biondi, G.Tudisco
In International Conference on Trust, Privacy and Security in Digital Business (TrustBUS
2021)
Pages 143-154 -- (doi:10.1007/978-3-030-86586-3_10) --- BibTeX -- Link
G.Bella, D.Cantone, C.Longo, M.Nicolosi-Asmundo, D.F.Santamaria
In Proceedings of IDC 2021, The 14th International Symposium on Intelligent Distributed
Computing, 16-18 September, 2021, Scilla, Reggio Calabria, Italy. -- Link
G.Bella, D.Cantone, C.Longo, M.Nicolosi-Asmundo, D.F.Santamaria
Proceedings of GECON 2021 - Trustworthy Services, Information Exchange and Content Handling in
the Context of Blockchain, 21--23 September, 2021.
F.Pollicino, D.Stabili, G.Bella, M.Marchetti
In IEEE Vehicular Technology Conference -- (doi:
10.1109/VTC2021-Spring51267.2021.9448656) --- BibTeX
G.Bella, P.Biondi, G.Costantino, I.Matteucci, M.Marchetti
In Open Identity Summit 2021 (OID2021)
Pages 37-46 -- (doi:20.500.12116/36500) --- BibTeX
D.Micale, G.Costantino, I.Matteucci, G.Patanè, G.Bella
In Ninth International Conference on Advances in Vehicular Systems, Technologies and
Applications (VEHICULAR 2020)
Pages 40-45 -- (doi:10.6084/m9.figshare.14013218) --- BibTeX -- Link
G.Bella, P.Biondi, G.Costantino, I.Matteucci
In 2020 16th European Dependable Computing Conference (EDCC)
Pages 103-110 -- (doi:10.1109/EDCC51268.2020.00026) --- BibTeX -- Link
P.Biondi, S.Bognanni, G.Bella
In 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)
Pages 237-243 -- (doi:10.1109/FMEC49853.2020.9144875) --- BibTeX -- Link
G.Bella, P.Biondi
In 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP
2019)
Lecture Notes in Computer Science book series (LNCS, volume 11699). Pages 264-274 -- (doi:10.1007/978-3-030-26250-1_21) --- BibTeX -- Link
P.Biondi, G.Bella, G.Costantino, I.Matteucci
In ACM Conference on Mobile Ad Hoc Networking and Computing (MobiHoc 2019)
Pages 399-400 -- (doi:10.1145/3323679.3326614) --- BibTeX
G.Bella, P.Biondi, G.Costantino, I.Matteucci
In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2019)
Pages 308-309 -- (doi:10.1145/3317549.3326305) --- BibTeX
G.Bella
In FMTea 2019: Formal Methods Teaching
pp 228-243 -- (doi: 10.1007/978-3-030-32441-4_15) --- BibTeX
D.Sempreboni, G.Bella, R.Giustolisi, L.Viganò
In International Conference on Security and Cryptography (Secrypt 2019) -- (Link)
G.Bella, K.Renaud, D.Sempreboni, L.Viganò
In International Conference on Security and Cryptography (Secrypt 2019) -- (Link)
G.Bella, P.Biondi, G.Costantino, I.Matteucci
In ACM Workshop on Automotive Cybersecurity (AutoSec 2019)
Pages 3-8 -- (doi:10.1145/3309171.3309175) --- BibTeX -- Link
G.Parasiliti, M.Pennisi, P.Biondi, G.Sgroi, G.Russo, C.Napoli, F.Pappalardo
In 27th Euromicro International Conference on Parallel, Distributed and Network-Based
Processing (PDP 2019)
Pages 323-328 -- (doi:10.1109/EMPDP.2019.8671609)
--- BibTeX
G.Bella, P.Biondi
In 37th International Conference on Computer Safety, Reliability, and Security (SAFECOMP
2018)
Lecture Notes in Computer Science, volume 11094 LNCS, pages 344-352 -- (doi:10.1007/978-3-319-99229-7_29) --- BibTeX -- Link
G.Bella, G.Costantino, F.Marino, F.Martinelli
In 26th Euromicro International Conference on Parallel, Distributed and Network-based
Processing (PDP 2018) -- (doi:PDP2018.2018.00089)
G.Bella, R.Giustolisi
In 9th International Symposium on Engineering Secure Software and Systems (ESSoS 2017) pp
231-239 Springer LNCS 10379. -- (doi:10.1007/978-3-319-62105-0_15)
G.Bella, D.Butin, H.Jonker
In 1st Italian Conference on Cybersecurity (ITASEC 2017) -- (Link)
G.Bella, B.Christianson, L.Viganò
In 24th International Workshop on Security Protocols (IWSP 2016) pp 1--18, LNCS 10368,
Springer -- (doi: 10.1007/978-3-319-62033-6)
G.Bella, R.Giustolisi, G.Lenzini, P.Ryan
In 30th IFIP International Information Security and Privacy Conference (IFIP SEC 2015) pp
495-509, Volume 455, Springer. -- (doi:
10.1007/978-3-319-62033-6)
G.Bella, L.Viganò
In 23rd International Workshop on Security Protocols (IWSP 2015) pp 247-260, LNCS 9379,
Springer
G.Bella, P.Curzon, R.Giustolisi, G.Lenzini
In IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW
2014) pp 401-406, IEEE -- (doi:10.1109/COMPSACW.2014.69)
G. Bella, P. Jappinen, J. Laakkonen
In 8th International Workshop on Human Aspects in Ambient Intelligence (HAI 2014) pp
464-474, LNCS 8610, Springer -- (doi:10.1007/978-3-319-09912-5_39)
G.Bella, R.Giustolisi, G.Lenzini
In 14th International Conference on Privacy, Security and Trust (PST 2014) pp 274-281,
IEEE -- (doi:10.1109/PST.2014.6890949)
R.Giustolisi, G.Lenzini, G.Bella
In 8th International Conference on Risks and Security of Internet and Systems (CRiSIS
2013) pp 1-5, IEEE -- (doi:10.1109/CRiSIS.2013.6766348)
G.Bella, R.Giustolisi, G.Lenzini
In 11th International Conference on Privacy, Security and Trust (PST 2013) pp 309-316,
IEEE -- (doi:10.1109/PST.2013.6596067)
G.Bella, R.Giustolisi, G.Lenzini
In 7th IFIP International Conference on Trust Managemen (IFIP TM 2013) pp 281-288,
Springer -- (doi:10.1007/978-3-642-38323-6_23)
D.Butin, D.Gray, G.Bella
In 5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013) pp
91-106, Springer -- (doi:10.1007/978-3-642-36563-8_7)
D.Butin, G.Bella
In International Conference on Security and Cryptography (Secrypt 2012) -- (Link)
G.Bella, L.Coles-Kemp
In 27th IFIP International Information Security and Privacy Conference (IFIP SEC 2012) pp
273-286, Springer -- (doi:10.1007/978-3-642-30436-1_23)
G.Bella, L.Coles-Kemp
In 9th Australian Information Security Management Conference pp 273-286, Springer -- (doi:10.4225/75/57b55170cd8d1)
G.Bella, D.Butin, D.Gray
In 7th International Symposium on Information Assurance and Security (IAS 2011) IEEE --
(doi:10.1109/ISIAS.2011.6122843)
G.Bella, L.Coles-Kemp
In International Workshop on Trust and Identity in Mobile Internet (IEEE TrustID 2011)
IEEE -- (doi:10.1109/TrustCom.2011.118)
G.Bella, L.Coles-Kemp, G.Costantino, S.Riccobene
In 3nd International Conference on Computer Supported Education (CSEDU 2011) pp 431-437
-- (Link)
G.Bella, P.Ryan, V.Teague
In 18th International Workshop on Security Protocols (IWSP 2010) pp 161-166, LNCS 7061,
Spriger -- (doi:10.1007/978-3-662-45921-8_24)
G.Bella, G.Costantino, S.Riccobene
In 2nd International Conference on Computer Supported Education (CSEDU 2010) pp 132-137
-- (Link)
G.Bella, P.Liò
In 7th Conference on Computational Methods in Systems Biology (CMSB 2009) pp 96-110,
Springer -- (doi:10.1007/978-3-642-03845-7_7)
G.Bella, P.Liò
In 9th Workshop on Network Tools and Applications in Biology (NETTAB 2009) -- (Link)
G.Bella, G.Costantino, S.Riccobene
In 5th International Conference on Wireless and Mobile Communications (ICWMC 2009) IEEE
-- (doi:10.1109/ICWMC.2009.28)
W.Arsac, G.Bella, X.Chantry, L.Compagna
In 17th International Workshop on Security Protocols (IWSP 2009) pp 41-47, Springer -- (doi:10.1007/978-3-642-36213-2_7)
W.Arsac, G.Bella, X.Chantry, L.Compagna
In Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the
Theory of Security (ARSPA-WITS 2009) pp 34-51, Springer. -- (doi:10.1007/978-3-642-03459-6_3)
G.Bella, G.Costantino, S.Riccobene
In Workshop on Information and Communication Technologies, Sept. 2008, Split, Croatia.
N.Rozic and D.Begusic (eds.), IEEE Press.
G.Bella, F.Librizzi, S.Riccobene
In SoftCOM 2008, International Conference on Software, Telecommunications and Computer
Networks, Sept. 2008, Split, Croatia. N.Rozic and D.Begusic (eds.), pp 384-388, IEEE Press.
-- (doi:10.1.1.654.5043)
G.Bella, G.Costantino, S.Riccobene
In IAS 2008, 4th International Symposium on Information Assurance and Security, Sept. 2008,
Naples, Italy. M.Rak et al. (eds.), pp 255-260, IEEE Press. -- (doi:10.1109/IAS.2008.24)
G.Bella, F.Librizzi, S.Riccobene
In IAS 2008, 4th International Symposium on Information Assurance and Security, Sept. 2008,
Naples, Italy. M.Rak et al. (eds.), pp 155-160, IEEE Press. -- (doi:10.1109/IAS.2008.23)
S.Foley, G.Bella, S.Bistarelli
In IWSP 2008, 16th International Workshop on Security Protocols, April 2008, Cambridge,
UK. B.Christianson et al. (eds.), LNCS Series, Springer. -- (doi:10.1007/978-3-642-22137-8_3)
G.Bella, S.Bistarelli, P.Peretti, S.Riccobene
In VODCA 2006, 2nd International Workshop on Views on Designing Complex Architectures, Sept.
2006, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 207-220, ENTCS 168,
Elsevier-Science. -- (doi:10.1016/j.entcs.2006.12.006)
G.Bella, C.Pistagna, S.Riccobene
In PSC 2005, International Conference on Pervasive Systems and Computing, June 2005, Las
Vegas, USA. M. Denko and J.Youn (eds.), pp 54-62, CSREA Press. -- (PDF)
G.Bella, S.Bistarelli, S.Foley
In VODCA 2004, 1st International Workshop on Views on Designing Complex Architectures, Sept.
2004, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 11-29, ENTCS 142,
Elsevier-Science. -- Link
G.Bella, C.Pistagna, S.Riccobene
In VODCA 2004, 1st International Workshop on Views on Designing Complex Architectures, Sept.
2004, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 63-77, ENTCS 142,
Elsevier-Science. -- (doi:
10.1016/j.entcs.2004.11.046)
S.Battiato, G.Bella, S.Riccobene
In EGCDMAS 2004, 1st International Workshop on Electronic Government, and Commerce: Design,
Modeling, Analysis and Security, Sept. 2004, Setubal, Portugal, pp 56-65, INSTICC Press. --
(PDF)
G.Bella, S.Bistarelli
In IEEE IAW 2004, 5th Annual IEEE Information Assurance Workshop, June 2004, New York,
USA Pages 306-313. IEEE Press. -- (doi: 10.1109/IAW.2004.1437832)
G.Bella, C.Longo, L.C.Paulson
In TPHOLs 2003, 16th International Conference on Theorem Proving in Higher Order Logic, Sept.
2003, Rome, Italy D.Basin and B.Wolff (eds.), pp 352-366, LNCS 2758, Springer. -- (doi:
10.1007/10930755_23)
G.Bella, S.Bistarelli, F.Martinelli
In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge,
UK B.Christianson et al. (eds.), LNCS 3364, pp 324-335, Springer. -- (doi:
10.1007/11542322_39)
G.Bella, S.Bistarelli, F.Massacci
In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge,
UK B.Christianson et al. (eds.) , LNCS 3364, pp 3-18, Springer. -- (doi:
10.1007/11542322_3)
G.Bella, C.Longo, L.C.Paulson
In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge,
UK B.Christianson et al. (eds.), LNCS 3364, pp 183-189, Springer. -- (doi:
10.1007/11542322_23)
G.Bella
In ACM SAC 2003, 18th ACM Symposium on Applied Computing, March 2003, Melbourne FL, USA
B.Panda (editor), pp 312-317, ACM press. -- (doi: 10.1145/952532.952596)
G.Bella, F.Massacci, L.C.Paulson
In ACM CCS 2002, 10h ACM Conference on Computer and Communications Security, Nov. 2002,
Washington, USA V.Atluri (editor), pp 12-20, ACM press. -- (PDF)
G.Bella
In ACM SAC 2002, 17th ACM Symposium on Applied Computing, March 2002, Madrid, Spain
B.Panda (editor), pp 247-252, ACM press. -- (doi: 10.1145/508791.508842)
G.Bella, L.C.Paulson
In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge,
UK B.Christianson et al. (eds.), LNCS 2845, pp 120-127, Springer. -- (doi:
10.1007/978-3-540-39871-4_11)
G.Bella, L.C.Paulson
In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge,
UK B.Christianson et al. (eds.), LNCS 2845, pp 120-127, Springer. -- (doi:
10.1007/978-3-540-39871-4_11)
G.Bella, S.Bistarelli
In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge,
UK B.Christianson et al. (eds.), LNCS 2845, pp 104-119, Springer. -- (doi:
10.1007/978-3-540-39871-4_10)
G.Bella, L.C.Paulson
In TPHOLs 2001, 14th International Conference on Theorem Proving in Higher Order Logic, Sept.
2001, Edimbugh, UK R.J.Boulton and P.B.Jackson (eds.), pp 91-104, LNCS 2152, Springer. --
(doi:
10.1007/3-540-44755-5_8)
G.Bella
In e-SMART 2001, 1st International Conference on Research in Smart Cards, Sept. 2001, Cannes,
France I.Attali and T.Jensen (eds.), pp 19-33, LNCS 2140, Springer. -- (doi: 10.5555/646803.705982)
G.Bella, L.C.Paulson
In IWSP 2001, 9th International Workshop on Security Protocols, April 2001, Cambridge, UK
B.Christianson et al. (eds.), LNCS 2467, pp 119-133, Springer. -- (doi:
10.1007/3-540-44755-5_8)
G.Bella, S.Bistarelli
In PADL 2001, 3rd International Symposium on Practical Aspects of Declarative Languages, March
2001, Las Vegas, USA I.V.Ramakrishnan (editor), pp 108-122, LNCS 1990, Springer. -- (doi:
10.5555/645771.667923)
G.Bella, F.Massacci, L.C.Paulson, P.Tramontano
In ESORICS 2000, 6th European Symposium on Research in Computer Security, Oct. 2000, Toulouse,
France F.Cuppens et al. (eds.), pp 159-174, LNCS 1895, Springer. -- (PDF)
G.Bella, S.Bistarelli
In Workshop on Soft Constraints: Theory and Practice, F.Rossi (editor), satellite event of CP
2000. International Conference on Contraint Programming, Sept. 2000, Singapore. -- (doi:
10.1007/978-3-540-25925-1_10)
G.Bella
In IWSP 2000, 8th International Workshop on Security Protocols, April 2000, Cambridge, UK
B.Christianson et al. (eds.), LNCS 2133, pp 87-99, Springer. -- (doi: 10.5555/647218.720713)
G.Bella, F.Massacci, L.C.Paulson, P.Tramontano
In IWSP 2000, 8th International Workshop on Security Protocols, April 2000, Cambridge, UK
B.Christianson et al. (eds.), LNCS 2133, pp 74-86, Springer. -- (PDF)
G.Bella
In CrypTEC 1999, International Workshop on Cryptographic Techniques and E-Commerce, July 1999,
Hong Kong, China M.Blum and C.H.Lee (eds.), pp 139-146, Hong Kong CityU press. -- (PDF)
G.Bella
In CrypTEC 1999, International Workshop on Cryptographic Techniques and E-Commerce, July 1999,
Hong Kong, China M.Blum and C.H.Lee (eds.), pp 139-146, Hong Kong CityU press. -- (PDF)
G.Bella
In IWSP 1999, 7th International Workshop on Security Protocols, April 1999, Cambridge, UK
B.Christianson et al. (eds.), LNCS 1796, pp 85-94, Springer. -- (doi:
10.1007/10720107_12)
G.Bella, L.C.Paulson
In ESORICS 1998, 5th European Symposium on Research in Computer Security, Sept. 1998, Louvain
la Neuve, Belgium J.J.Quisquater et al. (eds.), LNCS 1485, pp 361-375, Springer. -- (doi:
10.1007/BFb0055875)
G.Bella, L.C.Paulson
In CAV 1998, 10th Conference on Computer Aided Verification, June 1998, Vancouver, Canada
A.J.Hu and M.Y.Vardi (eds.), LNCS 1427, pp 416-427, Springer. -- (doi:
10.1007/BFb0028763)
G.Bella, E.Riccobene
In 5th International Workshop on Abstract State Machines, U.Glasser (editor), satellite event
of INFORMATIK 2000. Sept. 1998, Magdeburg, Germany. -- (PDF)
G.Bella, L.C.Paulson
In DIMACS 1997, Workshop on Design and Formal Verification of Security Protocols, Sept. 1997,
New York, USA. H.Orman and C.Meadows (eds.), on CD-ROM. -- (PDF)
G.Bella, E.Riccobene
In AICA 1997, Congresso Annuale dell'Associazione Italiana per il Calcolo Automatico, Sept.
1997, Milan, Italy. -- (PDF)
G.Bella, E.Riccobene
AICA 1996, Congresso Annuale dell'Associazione Italiana per il Calcolo Automatico, Sept. 1996,
Rome, Italy
-- (PDF)
G.Bella
Springer Information Security and Cryptography series. -- (ISBN:
978-3-540-68136-6)
Based on Bella's Ph.D. thesis mentioned below, it entirely rewrites it and extends it with four new
chapters.
(Book)
G.Bella, S.Bistarelli, F.Massacci
Chapter 1 in IOS "Information Assurance and Computer Security", Volume 6 of NATO Security
through Science Series. -- (ISBN: 1-58603-678-5)
Editors: J.P. Thomas and M. Essaaidi
November 2006, 216 pp., Hardcover
(Book Chapter)
G.Bella
CUCL Technical Report 493 - Cambridge University Computer Laboratory press, Sept. 2000. --
(PDF)
Accepted for publication as LNCS monograph by Springer in Jan. 2005 but never published as it was
later extended as "Formal Correcteness of Security Protocols", which was accepted for publication in
Springer's Information Security and Cryptography series in June 2006.
(Ph.D. Thesis)
G.Bella
CUCL Technical Report 460 - Cambridge University Computer Laboratory press, March 1999. --
(PDF)
(Technical Reports)
G.Bella, L.C.Paulson
CUCL Technical Report 447 - Cambridge University Computer Laboratory press, Sept. 1998. --
(PDF)
(Technical Reports)