Publications

Journal Papers

  • Perceptions of Beauty in Security Ceremonies

    G. Bella, J. Ophoff, K. Renaud, D. Sempreboni, L. Viganò
    Springer Philosophy & Technology, to appear, 2022


  • Embedded Fuzzing: a Review of Challenges, Tools, and Solutions

    M.C.Eisele, M.Maugeri, R-Shriwas, C.Huth, G.Bella
    Springer Cybersecurity, 2523-3246, 2022 (doi: 10.1186/s42400-022-00123-y)


  • Modelling human threats in security ceremonies

    G.Bella, R.Giustolisi, C.Schürmann
    Journal of Computer Security, pp.1-23, 2022. (doi: 10.3233/JCS-210059)


  • Multi-service threats: Attacking and protecting network printers and VoIP phones alike

    G.Bella, P.Biondi, S.Bognanni
    Internet of Things, 2542-6605, 2022. (doi: 10.1016/j.iot.2022.100507) -- Link to issue


  • Out to explore the cybersecurity planet

    G.Bella
    Emerald Journal of Intellectual Capital, 21(2):291-307, 2020. (doi: 10.1108/JIC-05-2019-0127) -- Link to issue


  • Invalid Certificates in Modern Browsers: A Socio-Technical Analysis

    R.Giustolisi, G.Bella, G.Lenzini
    IOS Journal of Computer Security, 26(4):509-541, 2018. (doi: 10.3233/JCS-16891)


  • Trustworthy Exams without Trusted Parties

    G.Bella, R.Giustolisi, G.Lenzini, P.Y.A.Ryan
    Elsevier Computers & Security, 67:291-307, 2017. (doi: 10.1016/j.cose.2016.12.005)


  • Service Security and Privacy as a Socio-Technical Problem

    G.Bella, P.Curzon, G.Lenzini
    IOS Journal of Computer Security, 23(5):563-585, 2015. (doi: 10.3233/JCS-150536)


  • Inductive Study of Confidentiality: for Everyone

    G.Bella
    Springer Formal Aspects of Computing, 26(1):3-36, 2014. (doi: 10.1007/s00165-012-0246-3)


  • Enhancing DSR Maintainance with Power Awareness

    G.Bella, G.Costantino, J.Crowcroft, S.Riccobene
    Elsevier Computer Standards & Interfaces, 35(1):107-113, 2013. (doi: 10.1016/j.csi.2012.06.007)


  • Enforcing Privacy in E-Commerce by Balancing Anonimity and Trust

    G.Bella, R.Giustolisi, S.Riccobene
    Elsevier Computers and Security, 30(8):705-718, 2011. (doi: 10.1016/j.cose.2011.08.005)


  • Multi-Attacker Protocol Validation

    W.Arsac, G.Bella, X.Chantry, L.Compagna
    Springer Journal of Automated Reasoning, 46(3-4):353-388, 2011. (doi: 10.1007/s10817-010-9185-y)


  • The Principle of Guarantee Availability for Security Protocol Analysis

    G.Bella
    Springer International Journal of Information Security, 9(2):83-97, 2010. (doi: 10.1007/s10207-009-0097-y)


  • Evaluating the Device Reputation through Full Observation in MANETs

    G.Bella, G.Costantino, S.Riccobene
    Dynamic Publishers Journal of Information Assurance and Security, 4(4):458-465, 2009. (doi: 10.1109/IAS.2008.24)

  • Retaliation Against Protocol Attacks

    G.Bella, S.Bistarelli, F.Massacci
    Dynamic Publishers Journal of Information Assurance and Security, 3(4):313-325, 2008. (PDF)

  • What is Correctness of Security Protocols?

    G.Bella
    Springer Journal of Universal Computer Science, 14(12):2083-2107, 2008. Link to issue

  • Accountability Protocols: Formalized and Verified

    G.Bella, L.C.Paulson
    ACM Transactions on Information and System Security, 9(2):138:161, 2006. (doi: 10.1145/1151414.1151416)

  • Verifying the SET Purchase Protocols

    G.Bella, L.C.Paulson
    Springer Journal of Automated Reasoning, 36(1-2):5-37, 2006. (doi: 10.1007/s10817-005-9018-6)

  • Information Assurance for Security Protocols

    G.Bella, S.Bistarelli
    Elsevier Computers and Security, 24(4):322-333, 2005. (doi: 10.1016/j.cose.2004.10.004)

  • An Overview of the Verification of SET

    G.Bella, F.Massacci, L.C.Paulson
    Springer International Journal of Information Security, 4(1-2):175-192, 2005. (doi: 10.1007/s10207-004-0047-7)

  • Soft Constraint Programming to Analysing Security Protocols

    G.Bella, S.Bistarelli
    Cambridge University Press Journal of Theory and Practice of Logic Programming, 4(5):1-28, 2004. (doi: 10.1017/S1471068404002121)

  • Inductive Verification of Smartcard Protocols

    G.Bella
    IOS Journal of Computer Security, 11(1):87-132, 2003. (doi: 10.3233/JCS-2003-11103)

  • Verifying the SET Registration Protocols

    G.Bella, F.Massacci, L.C.Paulson
    IEEE Journal on Selected Areas in Communications, 21(1):77-87, 2003. (doi: 10.1109/JSAC.2002.806133)

  • Formal Analysis of the Kerberos Authentication System

    G.Bella, E.Riccobene
    Springer Journal of Universal Computer Science, 3(12):1337-1381, 1997. Link to issue

Conference Papers

2022

  • Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands

    S.Esposito, D.Sgandurra, G.Bella
    (doi: 10.48550/arXiv.2202.08619) --- BibTeX --- Link to paper


  • The AILA Methodology for Automated and Intelligent Likelihood Assignment

    G.Bella, C.Daniele, M.Raciti
    In 6th International Conference on Cryptography, Security and Privacy (CSP 2022)


2021

  • Vulnerability Assessment and Penetration Testing on IP camera

    P.Biondi, S.Bognanni, G.Bella
    In International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2021) Pages 1-8 -- (doi: 10.1109/IOTSMS53705.2021.97048906) --- BibTeX -- Link to issue


  • Private Drivers Identification based on users’ routine

    G.Costantino, I.Matteucci, D.Micale, G.Patanè
    In 10th International Symposium on Security and Privacy on the Internet of Things (SPIoT 2021) Pages 1753-1762 -- (doi: 10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00236) --- BibTeX


  • Privacy and modern cars through a dual lens

    G.Bella, P.Biondi, M.De Vincenzi, G.Tudisco
    In International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms (STRIVE21) Pages 136-143 -- (doi:10.1109/EuroSPW54576.2021.00022) --- BibTeX -- Link to issue


  • Car drivers’ privacy concerns and trust perceptions

    G.Bella, P.Biondi, G.Tudisco
    In International Conference on Trust, Privacy and Security in Digital Business (TrustBUS 2021) Pages 143-154 -- (doi:10.1007/978-3-030-86586-3_10) --- BibTeX -- Link to issue


  • Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS

    G.Bella, D.Cantone, C.Longo, M.Nicolosi-Asmundo, D.F.Santamaria
    In Proceedings of IDC 2021, The 14th International Symposium on Intelligent Distributed Computing, 16-18 September, 2021, Scilla, Reggio Calabria, Italy. -- Link to issue


  • Semantic Representation as a Key Enabler for Blockchain-Based Commerce

    G.Bella, D.Cantone, C.Longo, M.Nicolosi-Asmundo, D.F.Santamaria
    Proceedings of GECON 2021 - Trustworthy Services, Information Exchange and Content Handling in the Context of Blockchain, 21--23 September, 2021.


  • SixPack: Abusing ABS to avoid Misbehavior detection in VANETs

    F.Pollicino, D.Stabili, G.Bella, M.Marchetti
    In IEEE Vehicular Technology Conference -- (doi: 10.1109/VTC2021-Spring51267.2021.9448656) --- BibTeX


  • Towards the COSCA framework for "COnseptualing Secure CArs"

    G.Bella, P.Biondi, G.Costantino, I.Matteucci, M.Marchetti
    In Open Identity Summit 2021 (OID2021) Pages 37-46 -- (doi:20.500.12116/36500) --- BibTeX


2020

2019

  • You overtrust your printer

    G.Bella, P.Biondi
    In 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2019) Lecture Notes in Computer Science book series (LNCS, volume 11699). Pages 264-274 -- (doi:10.1007/978-3-030-26250-1_21) --- BibTeX -- Link to issue


  • Implementing CAN bus security by TOUCAN

    P.Biondi, G.Bella, G.Costantino, I.Matteucci
    In ACM Conference on Mobile Ad Hoc Networking and Computing (MobiHoc 2019) Pages 399-400 -- (doi:10.1145/3323679.3326614) --- BibTeX


  • Poster: Are you secure in your car?

    G.Bella, P.Biondi, G.Costantino, I.Matteucci
    In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2019) Pages 308-309 -- (doi:10.1145/3317549.3326305) --- BibTeX


  • You Already Used Formal Methods but Did Not Know It

    G.Bella
    In FMTea 2019: Formal Methods Teaching pp 228-243 -- (doi: 10.1007/978-3-030-32441-4_15) --- BibTeX


  • What Are The Threats? (Charting The Threat Models Of Security Ceremonies)

    D.Sempreboni, G.Bella, R.Giustolisi, L.Viganò
    In International Conference on Security and Cryptography (Secrypt 2019) -- (Link)


  • An Investigation into the Beautification of Security Ceremonies

    G.Bella, K.Renaud, D.Sempreboni, L.Viganò
    In International Conference on Security and Cryptography (Secrypt 2019) -- (Link)


  • TOUCAN A proTocol tO secUre Controller Area Network

    G.Bella, P.Biondi, G.Costantino, I.Matteucci
    In ACM Workshop on Automotive Cybersecurity (AutoSec 2019) Pages 3-8 -- (doi:10.1145/3309171.3309175) --- BibTeX -- Link to issue


  • A MapReduce based tool for the analysis and discovery of novel therapeutic targets

    G.Parasiliti, M.Pennisi, P.Biondi, G.Sgroi, G.Russo, C.Napoli, F.Pappalardo
    In 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2019) Pages 323-328 -- (doi:10.1109/EMPDP.2019.8671609) --- BibTeX

2018

  • Towards an Integrated Penetration Testing Environment for the CAN Protocol

    G.Bella, P.Biondi
    In 37th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2018) Lecture Notes in Computer Science, volume 11094 LNCS, pages 344-352 -- (doi:10.1007/978-3-319-99229-7_29) --- BibTeX -- Link to issue


  • Getmewhere: A Location-Based Privacy-Preserving Information Service

    G.Bella, G.Costantino, F.Marino, F.Martinelli
    In 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP 2018) -- (doi:PDP2018.2018.00089)

Before 2017

  • A Unifying Theory for Evaluation Systems

    G.Bella, R.Giustolisi
    In 9th International Symposium on Engineering Secure Software and Systems (ESSoS 2017) pp 231-239 Springer LNCS 10379. -- (doi:10.1007/978-3-319-62105-0_15)


  • Analysing Privacy Analyses

    G.Bella, D.Butin, H.Jonker
    In 1st Italian Conference on Cybersecurity (ITASEC 2017) -- (Link)


  • Invisible Security

    G.Bella, B.Christianson, L.Viganò
    In 24th International Workshop on Security Protocols (IWSP 2016) pp 1--18, LNCS 10368, Springer -- (doi: 10.1007/978-3-319-62033-6)


  • Cybersecurity’s Way Forward: to get Beautiful or Invisible

    G.Bella
    In 7th Italian Conference on Theoretical Computer Science (ICTCS 2016) pp 1-7, CEUR 1720, CEUR Workshop Proceedings -- (PDF) --- BibTeX


  • A Secure Exam Protocol Without Trusted Parties

    G.Bella, R.Giustolisi, G.Lenzini, P.Ryan
    In 30th IFIP International Information Security and Privacy Conference (IFIP SEC 2015) pp 495-509, Volume 455, Springer. -- (doi: 10.1007/978-3-319-62033-6)


  • Security is Beautiful

    G.Bella, L.Viganò
    In 23rd International Workshop on Security Protocols (IWSP 2015) pp 247-260, LNCS 9379, Springer


  • A socio-technical methodology for the security and privacy analysis of services

    G.Bella, P.Curzon, R.Giustolisi, G.Lenzini
    In IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW 2014) pp 401-406, IEEE -- (doi:10.1109/COMPSACW.2014.69)


  • The Challenges behind Independent Living Support Systems

    G. Bella, P. Jappinen, J. Laakkonen
    In 8th International Workshop on Human Aspects in Ambient Intelligence (HAI 2014) pp 464-474, LNCS 8610, Springer -- (doi:10.1007/978-3-319-09912-5_39)


  • Secure Exams despite Malicious Management

    G.Bella, R.Giustolisi, G.Lenzini
    In 14th International Conference on Privacy, Security and Trust (PST 2014) pp 274-281, IEEE -- (doi:10.1109/PST.2014.6890949)


  • What Security for Electronic Exams?

    R.Giustolisi, G.Lenzini, G.Bella
    In 8th International Conference on Risks and Security of Internet and Systems (CRiSIS 2013) pp 1-5, IEEE -- (doi:10.1109/CRiSIS.2013.6766348)


  • Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers

    G.Bella, R.Giustolisi, G.Lenzini
    In 11th International Conference on Privacy, Security and Trust (PST 2013) pp 309-316, IEEE -- (doi:10.1109/PST.2013.6596067)


  • A Socio-Technical Understanding of TLS Certificate Validation

    G.Bella, R.Giustolisi, G.Lenzini
    In 7th IFIP International Conference on Trust Managemen (IFIP TM 2013) pp 281-288, Springer -- (doi:10.1007/978-3-642-38323-6_23)


  • Towards Verifying Voter Privacy Through Unlinkability

    D.Butin, D.Gray, G.Bella
    In 5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013) pp 91-106, Springer -- (doi:10.1007/978-3-642-36563-8_7)


  • Verifying Privacy by Little Interaction and No Process Equivalence

    D.Butin, G.Bella
    In International Conference on Security and Cryptography (Secrypt 2012) -- (Link)


  • Layered Analysis of Security Ceremonies

    G.Bella, L.Coles-Kemp
    In 27th IFIP International Information Security and Privacy Conference (IFIP SEC 2012) pp 273-286, Springer -- (doi:10.1007/978-3-642-30436-1_23)


  • Seeing the Full Picture: the Case for Extending Security Ceremony Analysis

    G.Bella, L.Coles-Kemp
    In 9th Australian Information Security Management Conference pp 273-286, Springer -- (doi:10.4225/75/57b55170cd8d1)


  • Holistic Analysis of Mix Protocols

    G.Bella, D.Butin, D.Gray
    In 7th International Symposium on Information Assurance and Security (IAS 2011) IEEE -- (doi:10.1109/ISIAS.2011.6122843)


  • Internet Users' Security and Privacy while they Interact with Amazon

    G.Bella, L.Coles-Kemp
    In International Workshop on Trust and Identity in Mobile Internet (IEEE TrustID 2011) IEEE -- (doi:10.1109/TrustCom.2011.118)


  • Remote Management of Face-to-Face Written Authenticated Though Anonymous Exams

    G.Bella, L.Coles-Kemp, G.Costantino, S.Riccobene
    In 3nd International Conference on Computer Supported Education (CSEDU 2011) pp 431-437 -- (Link)


  • Virtually Perfect Democracy

    G.Bella, P.Ryan, V.Teague
    In 18th International Workshop on Security Protocols (IWSP 2010) pp 161-166, LNCS 7061, Spriger -- (doi:10.1007/978-3-662-45921-8_24)


  • WATA: A System for Written Authenticated Though Anonymous Exams

    G.Bella, G.Costantino, S.Riccobene
    In 2nd International Conference on Computer Supported Education (CSEDU 2010) pp 132-137 -- (Link)


  • Formal Analysis of the Genetic Toggle

    G.Bella, P.Liò
    In 7th Conference on Computational Methods in Systems Biology (CMSB 2009) pp 96-110, Springer -- (doi:10.1007/978-3-642-03845-7_7)


  • Analysing the microRNA-17-92/Myc/E2F/RB Compound Toggle Switch by Theorem Proving

    G.Bella, P.Liò
    In 9th Workshop on Network Tools and Applications in Biology (NETTAB 2009) -- (Link)


  • Enforcing Collaboration in MANET Routing Protocols

    G.Bella, G.Costantino, S.Riccobene
    In 5th International Conference on Wireless and Mobile Communications (ICWMC 2009) IEEE -- (doi:10.1109/ICWMC.2009.28)


  • Attacking Each Other

    W.Arsac, G.Bella, X.Chantry, L.Compagna
    In 17th International Workshop on Security Protocols (IWSP 2009) pp 41-47, Springer -- (doi:10.1007/978-3-642-36213-2_7)


  • Validating Security Protocols under the General Attacker

    W.Arsac, G.Bella, X.Chantry, L.Compagna
    In Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS 2009) pp 34-51, Springer. -- (doi:10.1007/978-3-642-03459-6_3)


  • Spreading of Reputation values in a Mobile Network

    G.Bella, G.Costantino, S.Riccobene
    In Workshop on Information and Communication Technologies, Sept. 2008, Split, Croatia. N.Rozic and D.Begusic (eds.), IEEE Press.


  • A Privacy Paradigm that Tradeoffs Anonymity and Trust

    G.Bella, F.Librizzi, S.Riccobene
    In SoftCOM 2008, International Conference on Software, Telecommunications and Computer Networks, Sept. 2008, Split, Croatia. N.Rozic and D.Begusic (eds.), pp 384-388, IEEE Press. -- (doi:10.1.1.654.5043)


  • Managing Reputation over MANETs

    G.Bella, G.Costantino, S.Riccobene
    In IAS 2008, 4th International Symposium on Information Assurance and Security, Sept. 2008, Naples, Italy. M.Rak et al. (eds.), pp 255-260, IEEE Press. -- (doi:10.1109/IAS.2008.24)


  • Realistic Threats to Self-Enforcing Privacy

    G.Bella, F.Librizzi, S.Riccobene
    In IAS 2008, 4th International Symposium on Information Assurance and Security, Sept. 2008, Naples, Italy. M.Rak et al. (eds.), pp 155-160, IEEE Press. -- (doi:10.1109/IAS.2008.23)


  • Security Protocol Deployment Risk

    S.Foley, G.Bella, S.Bistarelli
    In IWSP 2008, 16th International Workshop on Security Protocols, April 2008, Cambridge, UK. B.Christianson et al. (eds.), LNCS Series, Springer. -- (doi:10.1007/978-3-642-22137-8_3)


  • Augmented Risk Analysis

    G.Bella, S.Bistarelli, P.Peretti, S.Riccobene
    In VODCA 2006, 2nd International Workshop on Views on Designing Complex Architectures, Sept. 2006, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 207-220, ENTCS 168, Elsevier-Science. -- (doi:10.1016/j.entcs.2006.12.006)


  • Locating Mobile Nodes within Logical Networks

    G.Bella, C.Pistagna, S.Riccobene
    In PSC 2005, International Conference on Pervasive Systems and Computing, June 2005, Las Vegas, USA. M. Denko and J.Youn (eds.), pp 54-62, CSREA Press. -- (PDF)


  • Soft Constraints for Security (invited paper)

    G.Bella, S.Bistarelli, S.Foley
    In VODCA 2004, 1st International Workshop on Views on Designing Complex Architectures, Sept. 2004, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 11-29, ENTCS 142, Elsevier-Science. -- Link to issue


  • Distributed Backup through Information Dispersal

    G.Bella, C.Pistagna, S.Riccobene
    In VODCA 2004, 1st International Workshop on Views on Designing Complex Architectures, Sept. 2004, Bertinoro, Italy. M. ter Beek and F.Gadducci (eds.), pp 63-77, ENTCS 142, Elsevier-Science. -- (doi: 10.1016/j.entcs.2004.11.046)


  • Should We Prove Security Policies Correct?

    S.Battiato, G.Bella, S.Riccobene
    In EGCDMAS 2004, 1st International Workshop on Electronic Government, and Commerce: Design, Modeling, Analysis and Security, Sept. 2004, Setubal, Portugal, pp 56-65, INSTICC Press. -- (PDF)


  • Advancing Assurance for Secure Distributed Communications

    G.Bella, S.Bistarelli
    In IEEE IAW 2004, 5th Annual IEEE Information Assurance Workshop, June 2004, New York, USA Pages 306-313. IEEE Press. -- (doi: 10.1109/IAW.2004.1437832)


  • Verifying Second-Level Security Protocols

    G.Bella, C.Longo, L.C.Paulson
    In TPHOLs 2003, 16th International Conference on Theorem Proving in Higher Order Logic, Sept. 2003, Rome, Italy D.Basin and B.Wolff (eds.), pp 352-366, LNCS 2758, Springer. -- (doi: 10.1007/10930755_23)


  • Biometrics to Enhance Smartcard Security: Simulating MOC using TOC

    G.Bella, S.Bistarelli, F.Martinelli
    In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge, UK B.Christianson et al. (eds.), LNCS 3364, pp 324-335, Springer. -- (doi: 10.1007/11542322_39)


  • A Protocol's Life after Attacks

    G.Bella, S.Bistarelli, F.Massacci
    In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge, UK B.Christianson et al. (eds.) , LNCS 3364, pp 3-18, Springer. -- (doi: 10.1007/11542322_3)


  • Is The Verification Problem For Cryptographic Protocols Solved?

    G.Bella, C.Longo, L.C.Paulson
    In IWSP 2003, 11th International Workshop on Security Protocols, April 2003, Cambridge, UK B.Christianson et al. (eds.), LNCS 3364, pp 183-189, Springer. -- (doi: 10.1007/11542322_23)


  • Availability of Protocol Goals

    G.Bella
    In ACM SAC 2003, 18th ACM Symposium on Applied Computing, March 2003, Melbourne FL, USA B.Panda (editor), pp 312-317, ACM press. -- (doi: 10.1145/952532.952596)


  • The Verification of an Industrial Payment Protocol: the SET Purchase Phase

    G.Bella, F.Massacci, L.C.Paulson
    In ACM CCS 2002, 10h ACM Conference on Computer and Communications Security, Nov. 2002, Washington, USA V.Atluri (editor), pp 12-20, ACM press. -- (PDF)


  • Interactive Simulation of Security Policies

    G.Bella
    In ACM SAC 2002, 17th ACM Symposium on Applied Computing, March 2002, Madrid, Spain B.Panda (editor), pp 247-252, ACM press. -- (doi: 10.1145/508791.508842)


  • Analyzing Delegation Properties

    G.Bella, L.C.Paulson
    In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge, UK B.Christianson et al. (eds.), LNCS 2845, pp 120-127, Springer. -- (doi: 10.1007/978-3-540-39871-4_11)


  • Analyzing Delegation Properties

    G.Bella, L.C.Paulson
    In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge, UK B.Christianson et al. (eds.), LNCS 2845, pp 120-127, Springer. -- (doi: 10.1007/978-3-540-39871-4_11)


  • Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks

    G.Bella, S.Bistarelli
    In IWSP 2002, 10th International Workshop on Security Protocols, April 2002, Cambridge, UK B.Christianson et al. (eds.), LNCS 2845, pp 104-119, Springer. -- (doi: 10.1007/978-3-540-39871-4_10)


  • Mechanical Proofs about a Non-Repudiation Protocols

    G.Bella, L.C.Paulson
    In TPHOLs 2001, 14th International Conference on Theorem Proving in Higher Order Logic, Sept. 2001, Edimbugh, UK R.J.Boulton and P.B.Jackson (eds.), pp 91-104, LNCS 2152, Springer. -- (doi: 10.1007/3-540-44755-5_8)


  • Mechanising a Protocol for Smart Cards

    G.Bella
    In e-SMART 2001, 1st International Conference on Research in Smart Cards, Sept. 2001, Cannes, France I.Attali and T.Jensen (eds.), pp 19-33, LNCS 2140, Springer. -- (doi: 10.5555/646803.705982)


  • A Proof of Non-Repudiation

    G.Bella, L.C.Paulson
    In IWSP 2001, 9th International Workshop on Security Protocols, April 2001, Cambridge, UK B.Christianson et al. (eds.), LNCS 2467, pp 119-133, Springer. -- (doi: 10.1007/3-540-44755-5_8)


  • Soft Constraints for Security Protocol Analysis: Confidentiality

    G.Bella, S.Bistarelli
    In PADL 2001, 3rd International Symposium on Practical Aspects of Declarative Languages, March 2001, Las Vegas, USA I.V.Ramakrishnan (editor), pp 108-122, LNCS 1990, Springer. -- (doi: 10.5555/645771.667923)


  • Formal Verification of Cardholder Registration in SET

    G.Bella, F.Massacci, L.C.Paulson, P.Tramontano
    In ESORICS 2000, 6th European Symposium on Research in Computer Security, Oct. 2000, Toulouse, France F.Cuppens et al. (eds.), pp 159-174, LNCS 1895, Springer. -- (PDF)


  • SCSPs for Modelling Attacks to Security Protocols

    G.Bella, S.Bistarelli
    In Workshop on Soft Constraints: Theory and Practice, F.Rossi (editor), satellite event of CP 2000. International Conference on Contraint Programming, Sept. 2000, Singapore. -- (doi: 10.1007/978-3-540-25925-1_10)


  • Lack of Explicitness Strikes Back

    G.Bella
    In IWSP 2000, 8th International Workshop on Security Protocols, April 2000, Cambridge, UK B.Christianson et al. (eds.), LNCS 2133, pp 87-99, Springer. -- (doi: 10.5555/647218.720713)


  • Making Sense of Specifications: the Formalization of SET

    G.Bella, F.Massacci, L.C.Paulson, P.Tramontano
    In IWSP 2000, 8th International Workshop on Security Protocols, April 2000, Cambridge, UK B.Christianson et al. (eds.), LNCS 2133, pp 74-86, Springer. -- (PDF)


  • Modelling Security Protocols based on Smart Cards

    G.Bella
    In CrypTEC 1999, International Workshop on Cryptographic Techniques and E-Commerce, July 1999, Hong Kong, China M.Blum and C.H.Lee (eds.), pp 139-146, Hong Kong CityU press. -- (PDF)


  • Modelling Security Protocols based on Smart Cards

    G.Bella
    In CrypTEC 1999, International Workshop on Cryptographic Techniques and E-Commerce, July 1999, Hong Kong, China M.Blum and C.H.Lee (eds.), pp 139-146, Hong Kong CityU press. -- (PDF)


  • Modelling Agents' Knowledge Inductively

    G.Bella
    In IWSP 1999, 7th International Workshop on Security Protocols, April 1999, Cambridge, UK B.Christianson et al. (eds.), LNCS 1796, pp 85-94, Springer. -- (doi: 10.1007/10720107_12)


  • Kerberos Version IV: Inductive Analysis of the Secrecy Goals

    G.Bella, L.C.Paulson
    In ESORICS 1998, 5th European Symposium on Research in Computer Security, Sept. 1998, Louvain la Neuve, Belgium J.J.Quisquater et al. (eds.), LNCS 1485, pp 361-375, Springer. -- (doi: 10.1007/BFb0055875)


  • Mechanising BAN Kerberos by the Inductive Method

    G.Bella, L.C.Paulson
    In CAV 1998, 10th Conference on Computer Aided Verification, June 1998, Vancouver, Canada A.J.Hu and M.Y.Vardi (eds.), LNCS 1427, pp 416-427, Springer. -- (doi: 10.1007/BFb0028763)


  • A Realistic Environment for Crypto-Protocol Analyses by ASMs

    G.Bella, E.Riccobene
    In 5th International Workshop on Abstract State Machines, U.Glasser (editor), satellite event of INFORMATIK 2000. Sept. 1998, Magdeburg, Germany. -- (PDF)


  • Using Isabelle to Prove Properties of the Kerberos Authentication System

    G.Bella, L.C.Paulson
    In DIMACS 1997, Workshop on Design and Formal Verification of Security Protocols, Sept. 1997, New York, USA. H.Orman and C.Meadows (eds.), on CD-ROM. -- (PDF)


  • The Validation of a Bidirectional Serial/Parallel Shift Register by Evolving Algebras

    G.Bella, E.Riccobene
    In AICA 1997, Congresso Annuale dell'Associazione Italiana per il Calcolo Automatico, Sept. 1997, Milan, Italy. -- (PDF)


  • Le Algebre Evolventi per la Validazione di Hardware

    G.Bella, E.Riccobene
    AICA 1996, Congresso Annuale dell'Associazione Italiana per il Calcolo Automatico, Sept. 1996, Rome, Italy -- (PDF)


Misc

  • Formal Correctness of Security Protocols

    G.Bella
    Springer Information Security and Cryptography series. -- (ISBN: 978-3-540-68136-6) Based on Bella's Ph.D. thesis mentioned below, it entirely rewrites it and extends it with four new chapters. (Book)


  • Retaliation: Can We Live with Flaws?

    G.Bella, S.Bistarelli, F.Massacci
    Chapter 1 in IOS "Information Assurance and Computer Security", Volume 6 of NATO Security through Science Series. -- (ISBN: 1-58603-678-5)
    Editors: J.P. Thomas and M. Essaaidi
    November 2006, 216 pp., Hardcover (Book Chapter)


  • Inductive Verification of Cryptographic Protocols

    G.Bella
    CUCL Technical Report 493 - Cambridge University Computer Laboratory press, Sept. 2000. -- (PDF)
    Accepted for publication as LNCS monograph by Springer in Jan. 2005 but never published as it was later extended as "Formal Correcteness of Security Protocols", which was accepted for publication in Springer's Information Security and Cryptography series in June 2006. (Ph.D. Thesis)


  • Message Reception in the Inductive Approach

    G.Bella
    CUCL Technical Report 460 - Cambridge University Computer Laboratory press, March 1999. -- (PDF) (Technical Reports)


  • Are Timestamps worth the Effort? A Formal Treatment

    G.Bella, L.C.Paulson
    CUCL Technical Report 447 - Cambridge University Computer Laboratory press, Sept. 1998. -- (PDF) (Technical Reports)