Follow
Riccardo Bresciani
Riccardo Bresciani
Lero@TCD
Verified email at cs.tcd.ie
Title
Cited by
Cited by
Year
The ZRTP protocol analysis on the Diffie-Hellman mode
R Bresciani
Computer Science Department Technical Report TCD-CS-2009-13, Trinity College …, 2009
172009
The ZRTP protocol security considerations
R Bresciani, S Superiore, S Anna, I Pisa
Technical Report, École Normale and Supérieure Cachan, 2007
162007
A formal security proof for the ZRTP Protocol
R Bresciani, A Butterfield
2009 International Conference for Internet Technology and Secured …, 2009
152009
A UTP semantics of pGCL as a homogeneous relation
R Bresciani, A Butterfield
International Conference on Integrated Formal Methods, 191-205, 2012
112012
A probabilistic theory of designs based on distributions
R Bresciani, A Butterfield
International Symposium on Unifying Theories of Programming, 105-123, 2012
72012
Towards a UTP-style framework to deal with probabilities
R Bresciani, A Butterfield
Technical Report TCD-CS-2011-09, FMG, Trinity College Dublin, Ireland …, 2011
72011
ProVerif analysis of the ZRTP protocol
R Bresciani, A Butterfield
International Journal for Infonomics (IJI) 3 (3), 1060-1064, 2010
72010
A UTP approach towards probabilistic protocol verification
R Bresciani, A Butterfield
Security and Communication Networks 7 (1), 99-107, 2014
42014
Weakening the Dolev-Yao model through probability
R Bresciani, A Butterfield
Proceedings of the 2nd international conference on Security of information …, 2009
32009
From distributions to probabilistic reactive programs
R Bresciani, A Butterfield
International Colloquium on Theoretical Aspects of Computing, 94-111, 2013
12013
Nilpotency of square matrices with non-negative elements
R Bresciani, M Poletti, A Butterfield
Tech. rep. TCD-CS-2011-17. FMG, Trinity College Dublin, Ireland, 2011
12011
The ZRTP Protocol
R Bresciani
Security Considerations, 2007
12007
Probabilistic Program Verification in the style of the Unifying Theories of Programming
R Bresciani
Trinity College Dublin, 2013
2013
Static Analysis of Circuits for Security
R BRESCIANI
2011
Security Considerations
R Bresciani
2007
GVS
R Bresciani
2007
The system can't perform the operation now. Try again later.
Articles 1–16