Follow
Massimo Merro
Title
Cited by
Cited by
Year
Bisimulation congruences in safe ambients
M Merro, M Hennessy
Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of …, 2002
1482002
On asynchrony in name-passing calculi
M Merro, D Sangiorgi
Automata, Languages and Programming: 25th International Colloquium, ICALP'98 …, 1998
1371998
Behavioral theory for mobile ambients
M Merro, FZ Nardelli
Journal of the ACM (JACM) 52 (6), 961-1023, 2005
1042005
An observational theory for mobile ad hoc networks (full version)
M Merro
Information and Computation 207 (2), 194-208, 2009
972009
A timed calculus for wireless systems
M Merro, F Ballardin, E Sibilio
Theoretical Computer Science 412 (47), 6585-6611, 2011
842011
On asynchrony in name-passing calculi
M Merro, D Sangiorgi
Mathematical Structures in Computer Science 14 (5), 715-767, 2004
812004
Communication interference in mobile boxed ambients
M Bugliesi, S Crafa, M Merro, V Sassone
FST TCS 2002: Foundations of Software Technology and Theoretical Computer …, 2002
782002
Modeling consensus in a process calculus
U Nestmann, R Fuzzati, M Merro
CONCUR 2003-Concurrency Theory: 14th International Conference, Marseille …, 2003
592003
A formal approach to cyber-physical attacks
R Lanotte, M Merro, R Muradore, L Viganò
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 436-450, 2017
572017
A semantic theory of the Internet of Things
R Lanotte, M Merro
Information and Computation 259, 72-101, 2018
562018
Communication and mobility control in boxed ambients
M Bugliesi, S Crafa, M Merro, V Sassone
Information and Computation 202 (1), 39-86, 2005
552005
Typing and Subtyping Mobility in Boxed Ambients*
M Merro, V Sassone
CONCUR 2002—Concurrency Theory: 13th International Conference Brno, Czech …, 2002
502002
Towards a behavioural theory of access and mobility control in distributed systems
M Hennessy, M Merro, J Rathke
Theoretical Computer Science 322 (3), 615-669, 2004
482004
An observational theory for mobile ad hoc networks
M Merro
Electronic Notes in Theoretical Computer Science 173, 275-293, 2007
462007
Bisimulation proof methods for mobile ambients
M Merro, FZ Nardelli
ICALP 3, 584-598, 2003
442003
Model checking ad hoc network routing protocols: Aran vs. endaira
D Benetti, M Merro, L Vigano
2010 8th IEEE International Conference on Software Engineering and Formal …, 2010
432010
Towards a behavioural theory of access and mobility control in distributed systems
M Hennessy, M Merro, J Rathke
Lecture Notes in Computer Science, 282-298, 2003
432003
A semantic analysis of key management protocols for wireless sensor networks
D Macedonio, M Merro
Science of Computer Programming 81, 53-78, 2014
412014
A formal approach to physics-based attacks in cyber-physical systems
R Lanotte, M Merro, A Munteanu, L Vigano
ACM Transactions on Privacy and Security (TOPS) 23 (1), 1-41, 2020
352020
A bisimulation-based semantic theory of safe ambients
M Merro, M Hennessy
ACM Transactions on Programming Languages and Systems (TOPLAS) 28 (2), 290-330, 2006
332006
The system can't perform the operation now. Try again later.
Articles 1–20