default search action
Matteo Maffei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c92]Anagha Athavale, Ezio Bartocci, Maria Christakis, Matteo Maffei, Dejan Nickovic, Georg Weissenbacher:
Verifying Global Two-Safety Properties in Neural Networks with Confidence. CAV (2) 2024: 329-351 - [c91]Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar:
Securing Lightning Channels against Rational Miners. CCS 2024: 393-407 - [c90]Markus Scherer, Jeppe Fredsgaard Blaabjerg, Alexander Sjösten, Magdalena Solitro, Matteo Maffei:
Wappler: Sound Reachability Analysis for WebAssembly. CSF 2024: 249-264 - [c89]Edgar R. Weippl, Matteo Maffei:
Message from General Chairs; EuroSP 2024. EuroS&P Workshops 2024: 1 - [c88]Edgar R. Weippl, Matteo Maffei:
Message from General Chairs; EuroSP 2024. EuroS&P 2024: xi - [c87]Lukas Aumayr, Esra Ceylan, Yannik Kopyciok, Matteo Maffei, Pedro Moreno-Sanchez, Iosif Salem, Stefan Schmid:
Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries. IFIP Networking 2024: 1-10 - [c86]Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson:
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. SP 2024: 3165-3183 - [c85]Pedro Bernardo, Lorenzo Veronese, Valentino Dalla Valle, Stefano Calzavara, Marco Squarcina, Pedro Adão, Matteo Maffei:
Web Platform Threats: Automated Detection of Web Security Issues With WPT. USENIX Security Symposium 2024 - [i46]Anagha Athavale, Ezio Bartocci, Maria Christakis, Matteo Maffei, Dejan Nickovic, Georg Weissenbacher:
Verifying Global Two-Safety Properties in Neural Networks with Confidence. CoRR abs/2405.14400 (2024) - [i45]Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei:
Alba: The Dawn of Scalable Bridges for Blockchains. IACR Cryptol. ePrint Arch. 2024: 197 (2024) - [i44]Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson:
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. IACR Cryptol. ePrint Arch. 2024: 534 (2024) - [i43]Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Giulia Scaffino, Dionysis Zindros:
Blink: An Optimal Proof of Proof-of-Work. IACR Cryptol. ePrint Arch. 2024: 692 (2024) - [i42]Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar:
Securing Lightning Channels against Rational Miners. IACR Cryptol. ePrint Arch. 2024: 826 (2024) - 2023
- [c84]Sophie Rain, Georgia Avarikioti, Laura Kovács, Matteo Maffei:
Towards a Game-Theoretic Security Analysis of Off-Chain Protocols. CSF 2023: 107-122 - [c83]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Breaking and Fixing Virtual Channels: Domino Attack and Donner. NDSS 2023 - [c82]Lorenzo Veronese, Benjamin Farinier, Pedro Bernardo, Mauro Tempesta, Marco Squarcina, Matteo Maffei:
WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms. SP 2023: 2761-2779 - [c81]Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei:
Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi. USENIX Security Symposium 2023: 733-750 - [c80]Marco Squarcina, Pedro Adão, Lorenzo Veronese, Matteo Maffei:
Cookie Crumbles: Breaking and Fixing Web Session Integrity. USENIX Security Symposium 2023: 5539-5556 - [i41]Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson:
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. CoRR abs/2305.12173 (2023) - 2022
- [c79]Rainer Stütz, Johann Stockinger, Pedro Moreno-Sanchez, Bernhard Haslhofer, Matteo Maffei:
Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin. AFT 2022: 254-267 - [c78]Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei:
Thora: Atomic and Privacy-Preserving Multi-Channel Updates. CCS 2022: 165-178 - [c77]Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei:
Sleepy Channels: Bi-directional Payment Channels without Watchtowers. CCS 2022: 179-192 - [c76]Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan:
Foundations of Coin Mixing Services. CCS 2022: 1259-1273 - [i40]Lorenzo Veronese, Benjamin Farinier, Mauro Tempesta, Marco Squarcina, Matteo Maffei:
WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms. CoRR abs/2201.01649 (2022) - [i39]Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei:
Thora: Atomic And Privacy-Preserving Multi-Channel Updates. IACR Cryptol. ePrint Arch. 2022: 317 (2022) - [i38]Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan:
Foundations of Coin Mixing Services. IACR Cryptol. ePrint Arch. 2022: 942 (2022) - [i37]Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei:
Glimpse: On-Demand, Cross-Chain Communication for Efficient DeFi Applications on Bitcoin-based Blockchains. IACR Cryptol. ePrint Arch. 2022: 1721 (2022) - 2021
- [c75]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures. ASIACRYPT (2) 2021: 635-664 - [c74]Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. Financial Cryptography (2) 2021: 131-150 - [c73]Matteo Romiti, Friedhelm Victor, Pedro Moreno-Sanchez, Peter Sebastian Nordholt, Bernhard Haslhofer, Matteo Maffei:
Cross-Layer Deanonymization Methods in the Lightning Protocol. Financial Cryptography (1) 2021: 187-204 - [c72]Matteo Maffei:
Formal Methods for the Security Analysis of Smart Contracts. FMCAD 2021: 1-2 - [c71]Matteo Maffei:
Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. ICISSP 2021: 7 - [c70]Marco Squarcina, Stefano Calzavara, Matteo Maffei:
The Remote on the Local: Exacerbating Web Attacks Via Service Workers Caches. SP (Workshops) 2021: 432-443 - [c69]Lukas Aumayr, Matteo Maffei, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, Pedro Moreno-Sanchez:
Bitcoin-Compatible Virtual Channels. SP 2021: 901-918 - [c68]Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs. SP 2021: 1834-1851 - [c67]Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffei:
Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web. USENIX Security Symposium 2021: 2917-2934 - [c66]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. USENIX Security Symposium 2021: 4043-4060 - [i36]Clara Schneidewind, Markus Scherer, Matteo Maffei:
The Good, the Bad and the Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts. CoRR abs/2101.05735 (2021) - [i35]Sophie Rain, Zeta Avarikioti, Laura Kovács, Matteo Maffei:
Towards a Game-Theoretic Security Analysis of Off-Chain Protocols. CoRR abs/2109.07429 (2021) - [i34]Johann Stockinger, Bernhard Haslhofer, Pedro Moreno-Sanchez, Matteo Maffei:
Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem. CoRR abs/2109.10229 (2021) - [i33]Nikolaj S. Bjørner, Maria Christakis, Matteo Maffei, Grigore Rosu:
Rigorous Methods for Smart Contracts (Dagstuhl Seminar 21431). Dagstuhl Reports 11(9): 80-101 (2021) - [i32]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. IACR Cryptol. ePrint Arch. 2021: 176 (2021) - [i31]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Donner: UTXO-Based Virtual Channels Across Multiple Hops. IACR Cryptol. ePrint Arch. 2021: 855 (2021) - [i30]Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Monero-Sánchez, Matteo Maffei:
Sleepy Channels: Bitcoin-Compatible Bi-directional Payment Channels without Watchtowers. IACR Cryptol. ePrint Arch. 2021: 1445 (2021) - 2020
- [c65]Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei:
eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. CCS 2020: 621-640 - [c64]Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta:
Language-Based Web Session Integrity. CSF 2020: 107-122 - [c63]Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei:
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. EuroS&P Workshops 2020: 387-396 - [c62]Clara Schneidewind, Markus Scherer, Matteo Maffei:
The Good, The Bad and The Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts. ISoLA (3) 2020: 212-231 - [i29]Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta:
Language-Based Web Session Integrity. CoRR abs/2001.10405 (2020) - [i28]Clara Schneidewind, Ilya Grishchenko, Markus Scherer, Matteo Maffei:
eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts. CoRR abs/2005.06227 (2020) - [i27]Matteo Romiti, Friedhelm Victor, Pedro Moreno-Sanchez, Bernhard Haslhofer, Matteo Maffei:
Cross-Layer Deanonymization Methods in the Lightning Protocol. CoRR abs/2007.00764 (2020) - [i26]Lukas Aumayr, Esra Ceylan, Matteo Maffei, Pedro Moreno-Sanchez, Iosif Salem, Stefan Schmid:
Demand-Aware Payment Channel Networks. CoRR abs/2011.14341 (2020) - [i25]Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffei:
Can I Take Your Subdomain? Exploring Related-Domain Attacks in the Modern Web. CoRR abs/2012.01946 (2020) - [i24]Sergei Tikhomirov, Pedro Moreno-Sanchez, Matteo Maffei:
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. IACR Cryptol. ePrint Arch. 2020: 303 (2020) - [i23]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Generalized Bitcoin-Compatible Channels. IACR Cryptol. ePrint Arch. 2020: 476 (2020) - [i22]Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:
Bitcoin-Compatible Virtual Channels. IACR Cryptol. ePrint Arch. 2020: 554 (2020) - [i21]Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments. IACR Cryptol. ePrint Arch. 2020: 1345 (2020)
2010 – 2019
- 2019
- [j10]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Group ORAM for privacy and access control in outsourced personal records. J. Comput. Secur. 27(1): 1-47 (2019) - [c61]Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. CCS 2019: 801-815 - [c60]Gilles Barthe, Renate Eilers, Pamina Georgiou, Bernhard Gleiss, Laura Kovács, Matteo Maffei:
Verifying Relational Properties using Trace Logic. FMCAD 2019: 170-178 - [c59]Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. NDSS 2019 - [i20]Gilles Barthe, Renate Eilers, Pamina Georgiou, Bernhard Gleiss, Laura Kovács, Matteo Maffei:
Verifying Relational Properties using Trace Logic. CoRR abs/1906.09899 (2019) - [i19]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. CoRR abs/1911.09148 (2019) - [i18]Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2019: 583 (2019) - [i17]Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei:
A2L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs. IACR Cryptol. ePrint Arch. 2019: 589 (2019) - 2018
- [j9]Dominic Deuber, Matteo Maffei, Giulio Malavolta, Max Rabkin, Dominique Schröder, Mark Simkin:
Functional Credentials. Proc. Priv. Enhancing Technol. 2018(2): 64-84 (2018) - [j8]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 5(3): 44 (2018) - [c58]Ilya Grishchenko, Matteo Maffei, Clara Schneidewind:
Foundations and Tools for the Static Analysis of Ethereum Smart Contracts. CAV (1) 2018: 51-78 - [c57]Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin:
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations. CPP 2018: 130-145 - [c56]Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei:
Equivalence Properties by Typing in Cryptographic Branching Protocols. POST 2018: 160-187 - [c55]Ilya Grishchenko, Matteo Maffei, Clara Schneidewind:
A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. POST 2018: 243-269 - [c54]Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg:
UniTraX: Protecting Data Privacy with Discoverable Biases. POST 2018: 278-299 - [c53]Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder:
Simple Password-Hardened Encryption Services. USENIX Security Symposium 2018: 1405-1421 - [c52]Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta:
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring. USENIX Security Symposium 2018: 1493-1510 - [i16]Ilya Grishchenko, Matteo Maffei, Clara Schneidewind:
A Semantic Framework for the Security Analysis of Ethereum smart contracts. CoRR abs/1802.08660 (2018) - [i15]Stefano Calzavara, Riccardo Focardi, Matteo Maffei, Clara Schneidewind, Marco Squarcina, Mauro Tempesta:
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring. CoRR abs/1806.09111 (2018) - [i14]Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2018: 472 (2018) - 2017
- [j7]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 4(1): 5 (2017) - [j6]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 4(4): 18 (2017) - [c51]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Maliciously Secure Multi-Client ORAM. ACNS 2017: 645-664 - [c50]Matteo Maffei, Manuel Reinert, Dominique Schröder:
On the Security of Frequency-Hiding Order-Preserving Encryption. CANS 2017: 51-70 - [c49]Jonathan Katz, Matteo Maffei, Giulio Malavolta, Dominique Schröder:
Subset Predicate Encryption and Its Applications. CANS 2017: 115-134 - [c48]Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei:
A Type System for Privacy Properties. CCS 2017: 409-423 - [c47]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. CCS 2017: 455-471 - [c46]Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei:
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. CSF 2017: 22-36 - [c45]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. NDSS 2017 - [e2]Matteo Maffei, Mark Ryan:
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Lecture Notes in Computer Science 10204, Springer 2017, ISBN 978-3-662-54454-9 [contents] - [i13]Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin:
A Monadic Framework for Relational Verification (Functional Pearl). CoRR abs/1703.00055 (2017) - [i12]Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei:
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. CoRR abs/1705.10482 (2017) - [i11]Stefano Calzavara, Ilya Grishchenko, Matteo Maffei:
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. CoRR abs/1707.07866 (2017) - [i10]Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei:
A Type System for Privacy Properties (Technical Report). CoRR abs/1708.08340 (2017) - [i9]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Maliciously Secure Multi-Client ORAM. IACR Cryptol. ePrint Arch. 2017: 329 (2017) - [i8]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2017: 820 (2017) - 2016
- [j5]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 3(1): 33 (2016) - [c44]Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei:
Micro-policies for Web Session Security. CSF 2016: 179-193 - [c43]Stefano Calzavara, Ilya Grishchenko, Matteo Maffei:
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving. EuroS&P 2016: 47-62 - [i7]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. IACR Cryptol. ePrint Arch. 2016: 1054 (2016) - 2015
- [j4]Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei:
Affine Refinement Types for Secure Distributed Programming. ACM Trans. Program. Lang. Syst. 37(4): 11:1-11:66 (2015) - [c42]Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina:
Symbolic Malleable Zero-Knowledge Proofs. CSF 2015: 412-426 - [c41]Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina:
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. NDSS 2015 - [c40]Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. POST 2015: 303-323 - [c39]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Privacy and Access Control for Outsourced Personal Records. IEEE Symposium on Security and Privacy 2015: 341-358 - [i6]Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. IACR Cryptol. ePrint Arch. 2015: 39 (2015) - [i5]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Privacy and Access Control for Outsourced Personal Records. IACR Cryptol. ePrint Arch. 2015: 224 (2015) - 2014
- [j3]Michael Backes, Catalin Hritcu, Matteo Maffei:
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations. J. Comput. Secur. 22(2): 301-353 (2014) - [j2]Matteo Maffei:
Security & privacy column. ACM SIGLOG News 1(1): 6 (2014) - [c38]Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate:
Differentially private data aggregation with optimal utility. ACSAC 2014: 316-325 - [c37]Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Brief announcement: towards security and privacy for outsourced data in the multi-party setting. PODC 2014: 144-146 - [e1]Matteo Maffei, Emilio Tuosto:
Trustworthy Global Computing - 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8902, Springer 2014, ISBN 978-3-662-45916-4 [contents] - [i4]Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov:
Privacy-preserving Data Aggregation with Optimal Utility. IACR Cryptol. ePrint Arch. 2014: 482 (2014) - 2013
- [c36]Matteo Maffei, Kim Pecina, Manuel Reinert:
Security and Privacy by Declarative Design. CSF 2013: 81-96 - [c35]Fabienne Eigner, Matteo Maffei:
Differential Privacy by Typing in Security Protocols. CSF 2013: 272-286 - [c34]Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications. DPM/SETOP 2013: 213-231 - [c33]Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei:
Logical Foundations of Secure Resource Management in Protocol Implementations. POST 2013: 105-125 - [c32]Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky:
AppGuard - Enforcing User Requirements on Android Apps. TACAS 2013: 543-548 - 2012
- [c31]Michael Backes, Matteo Maffei, Kim Pecina:
Automated Synthesis of Secure Distributed Applications. NDSS 2012 - [c30]Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina:
ObliviAd: Provably Secure and Practical Online Behavioral Advertising. IEEE Symposium on Security and Privacy 2012: 257-271 - [c29]Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei:
Affine Refinement Types for Authentication and Authorization. TGC 2012: 19-33 - 2011
- [c28]Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei:
Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols. CSF 2011: 83-98 - [c27]Michael Backes, Matteo Maffei, Kim Pecina:
A Security API for Distributed Social Networks. NDSS 2011 - [c26]Matteo Maffei, Kim Pecina:
Privacy-aware proof-carrying authorization. PLAS 2011: 7 - [c25]Michael Backes, Matteo Maffei, Kim Pecina:
Securing social networks. PODC 2011: 341-342 - [c24]Michael Backes, Catalin Hritcu, Matteo Maffei:
Union and Intersection Types for Secure Protocol Implementations. TOSCA 2011: 1-28 - [c23]Michael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk:
G2C: Cryptographic Protocols from Goal-Driven Specifications. TOSCA 2011: 57-77 - [p1]Riccardo Focardi, Matteo Maffei:
Types for Security Protocols. Formal Models and Techniques for Analyzing Security Protocols 2011: 143-181 - 2010
- [c22]Michael Backes, Matteo Maffei, Dominique Unruh:
Computationally sound verification of source code. CCS 2010: 387-398 - [c21]Michael Backes, Matteo Maffei, Esfandiar Mohammadi:
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations. FSTTCS 2010: 352-363 - [c20]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
Anonymous Webs of Trust. Privacy Enhancing Technologies 2010: 130-148 - [c19]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
Brief announcement: anonymity and trust in distributed systems. PODC 2010: 237-238 - [c18]Reinhard Wilhelm, Matteo Maffei:
Ubiquitous Verification of Ubiquitous Systems. SEUS 2010: 47-58 - [i3]Michael Backes, Matteo Maffei, Dominique Unruh:
Computationally Sound Verification of Source Code. IACR Cryptol. ePrint Arch. 2010: 416 (2010)
2000 – 2009
- 2009
- [c17]Michael Backes, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei:
Achieving Security Despite Compromise Using Zero-knowledge. CSF 2009: 308-323 - [c16]Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum:
Anonymity and Censorship Resistance in Unstructured Overlay Networks. OTM Conferences (1) 2009: 147-164 - [c15]Michael Backes, Matteo Maffei:
Design and Verification of Anonymous Trust Protocols. Security Protocols Workshop 2009: 143-148 - 2008
- [c14]Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina:
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. CAV 2008: 419-422 - [c13]Michael Backes, Catalin Hritcu, Matteo Maffei:
Type-checking zero-knowledge. CCS 2008: 357-370 - [c12]Michael Backes, Catalin Hritcu, Matteo Maffei:
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. CSF 2008: 195-209 - [c11]Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum:
Anonymous and censorship resistant content sharing in unstructured overlays. PODC 2008: 429 - [c10]Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. SP 2008: 202-215 - 2007
- [j1]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Dynamic types for authentication. J. Comput. Secur. 15(6): 563-617 (2007) - [c9]Michael Backes, Agostino Cortesi, Riccardo Focardi, Matteo Maffei:
A calculus of challenges and responses. FMSE 2007: 51-60 - [c8]Michael Backes, Agostino Cortesi, Matteo Maffei:
Causality-based Abstraction of Multiplicity in Security Protocols. CSF 2007: 355-369 - [i2]Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. Formal Protocol Verification Applied 2007 - [i1]Michael Backes, Matteo Maffei, Dominique Unruh:
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. IACR Cryptol. ePrint Arch. 2007: 289 (2007) - 2006
- [b1]Matteo Maffei:
Dynamic typing for security protocols. Ca' Foscari University of Venice, Italy, 2006 - 2005
- [c7]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Analysis of Typed Analyses of Authentication Protocols. CSFW 2005: 112-125 - [c6]Riccardo Focardi, Matteo Maffei, Francesco Placella:
Inferring authentication tags. WITS 2005: 41-49 - 2004
- [c5]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Authenticity by tagging and typing. FMSE 2004: 1-12 - [c4]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Compositional Analysis of Authentication Protocols. ESOP 2004: 140-154 - [c3]Matteo Maffei:
Tags for Multi-Protocol Authentication. SecCo 2004: 55-63 - 2003
- [c2]Michele Bugliesi, Riccardo Focardi, Matteo Maffei:
Principles for Entity Authentication. Ershov Memorial Conference 2003: 294-306 - [c1]Riccardo Focardi, Matteo Maffei:
The rho-spi Calculus at Work: Authentication Case Studies. MEFISTO 2003: 267-293
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint