Research Outputs Bruno Crispo


  • Eskandari, Mojtaba; Ahmad, Maqsood; Oliveira, Anderson Santana de; Crispo, Bruno, "Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps" in Proceedings on Privacy Enhancing Technologies, United States of Ameria: De Gruyter Open, 2017. - (WATER TREATMENT TECHNOLOGY; 1). Proceedings of: PETS 2017, Minneapolis, Minnesota, USA, July 2017. - DOI: 10.1515/popets-2017-0008
  • Maqsood Ahmad, Valerio Costamagna, Bruno Crispo, Francesco Bergadano, "TeICC: Targeted Execution of Inter-Component Communications in Android" in Proceedings of the 32nd ACM Symposium on Applied Computing April 3-6, 2017, Marrakesh, Morocco (ACM SAC 2017), Marrakesh, Morocco: ACM, 2017. Proceedings of: ACM SAC 2017, Marakesh, Morocco, 2-6 April, 2017
  • Buriro, Attaullah; Akhtar, Zahid; Crispo, Bruno; Del Frari, Filippo, "Age, gender and operating-hand estimation on smart mobile devices" in Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), Bonn: Gesellschaft fur Informatik (GI), 2016, p. 1-5. - (GI-EDITION). - ISBN: 9783885796541. Proceedings of: 15th International Conference of the Biometrics Special Interest Group, BIOSIG 2016, Darmstadt, 2016. - URL: http://subs.emis.de/LNI/Proceedings.html . - DOI: 10.1109/BIOSIG.2016.7736910
  • Bernardini, César; Crispo, Bruno, "Analyzing gateways' impact on caching for micro CDNs based on CCN" in ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, Lisbon: SciTePress, 2016, p. 19-26. - ISBN: 9789897581960. Proceedings of: 7th International Conference on Data Communication Networking, DCNET 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016, Lisbon, 2016. - URL: http://www.scitepress.org/DigitalLibrary/HomePage.aspx
  • Cardenas, Alvaro; Crispo, Bruno, "Cyber-Physical Security and Privacy [Guest editors' introduction]". - (IEEE INTERNET COMPUTING; 5), 2016, 3 p. - DOI: 10.1109/MIC.2016.107
  • Ahmad, Maqsood; Crispo, Bruno; Gebremichael, Teklay, "Empirical analysis on the use of dynamic code updates in android and its security implications" in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Oulu, Finland: Springer Verlag, 2016, p. 119-134. - (LECTURE NOTES IN COMPUTER SCIENCE). - ISBN: 9783319475592. Proceedings of: 21st Nordic Conference on Secure IT Systems, NordSec 2016, fin, 2016. - URL: http://springerlink.com/content/0302-9743/copyright/2005/ . - DOI: 10.1007/978-3-319-47560-8_8
  • Aziz, Benjamin; Arenas, Alvaro; Crispo, Bruno (edited by), "Engineering Secure Internet of Things Systems", by vari, regno unito: IET, 2016. - ISBN: 978-1-78561-053-0
  • Buriro, Attaullah; Crispo, Bruno; Delfrari, Filippo; Wrona, Konrad, "Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication" in Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, Stati Uniti: Institute of Electrical and Electronics Engineers Inc., 2016, p. 276-285. - ISBN: 9781509008247. Proceedings of: 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, usa, 2016. - DOI: 10.1109/SPW.2016.20
  • Crispo, B.; Palazzi, C. (edited by), "I moderni sistemi operativi.", by S. Andrew Tanenbaum, Herbert Bos, Italia: Pearson Education Italia, 2016, 584 p. - ISBN: 9788891901019
  • Asghar, Muhammad Rizwan; Bernardini, Cesar; Crispo, Bruno, "PROTECTOR: Privacy-preserving information lookup in content-centric networks" in 2016 IEEE International Conference on Communications, ICC 2016, USA: Institute of Electrical and Electronics Engineers Inc., 2016, p. 1-7. - ISBN: 9781479966646. Proceedings of: 2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia, 2016. - DOI: 10.1109/ICC.2016.7511193
  • Asghar, Muhammad Rizwan; Russello, Giovanni; Crispo, Bruno, "E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud" in Proceedings - 2015 International Conference on Future Internet of Things and Cloud, FiCloud 2015 and 2015 International Conference on Open and Big Data, OBD 2015, New York: Institute of Electrical and Electronics Engineers Inc., 2015, p. 135-144. - ISBN: 9781467381031. Proceedings of: 3rd International Conference on Future Internet of Things and Cloud, FiCloud 2015, Rome, 2015. - DOI: 10.1109/FiCloud.2015.43
  • Buriro, Attaullah; Crispo, Bruno; Frari, Filippo Del; Klardie, Jeffrey; Wrona, Konrad S., "ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones" in Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK: Springer-Verlag, 2015, p. 45-61. - (Lecture Notes in Computer Science). - ISBN: 978-3-319-29937-2. Proceedings of: PASSWORD 2015, Cambridge, UK, December 7-9, 2015
  • Mauro Conti; Bruno Crispo; Daniele Diodati; Jukka K. Nurminen; Cristina M. Pinotti; Taavi Teemaa;, "Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones" in IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v. 2015, (2015), p. 2778-2790. - DOI: 10.1109/TPDS.2014.2360693
  • Lopez, Javier; Ray, Indrajit; Crispo, Bruno (edited by), "Risks and security of internet and systems: 9th international conference, CRiSIS 2014 Trento, Italy, august 27–29, 2014 revised selected papers", by vari, Trento: Springer Verlag, 2015. - (LECTURE NOTES IN COMPUTER SCIENCE). - ISBN: 9783319171265. - URL: http://springerlink.com/content/0302-9743/copyright/2005/ . - DOI: 10.1007/978-3-319-17127-2
  • Zhauniarovich, Yury; Ahmad, Maqsood; Gadyatskaya, Olga; Crispo, Bruno; Massacci, Fabio, "StaDynA: Addressing the problem of dynamic code updates in the security analysis of android applications" in CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, San Antonio, Texas, USA: Association for Computing Machinery, Inc, 2015, p. 37-48. - ISBN: 9781450331913. Proceedings of: 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, usa, 2015. - DOI: 10.1145/2699026.2699105
  • Buriro, Attaullah; Crispo, Bruno; Frari, Filippo Del; Wrona, Konrad, "Touchstroke: Smartphone user authentication based on touch-typing biometrics" in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin: Springer Verlag, 2015, p. 27-34. - (LECTURE NOTES IN COMPUTER SCIENCE). - ISBN: 9783319232218. Proceedings of: 18th International Conference on Image Analysis and Processing, ICIAP 2015 BioFor, CTMR, RHEUMA, ISCA, MADiMa, SBMI, and QoEM, napoli, 2015. - URL: http://springerlink.com/content/0302-9743/copyright/2005/ . - DOI: 10.1007/978-3-319-23222-5_4
  • Zhauniarovich, Yury; Philippov, Anton; Gadyatskaya, Olga; Crispo, Bruno; Massacci, Fabio, "Towards black box testing of android apps" in Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015, New York: Institute of Electrical and Electronics Engineers Inc., 2015, p. 501-510. - ISBN: 9781467365901. Proceedings of: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, 2015. - DOI: 10.1109/ARES.2015.70
  • S. Ortolani; M. Conti; B. Crispo, "Censorship-resilient communications through information scattering" in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin: Spinger Verlag, 2014, p. 82-89. - ISBN: 978-3-662-45920-1. Proceedings of: 18th International Workshop Security Protocols, Cambridge; United Kingdom, 24 March 2010 through 26 March 2010
  • Y. Zhauniarovich; O. Gadyatskaya; B. Crispo; F. La Spina; E. Moser, "FSquaDRA: Fast Detection of Repackaged Applications" in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), berlin: Berlin: Springer-Verlag, 2014, p. 130-145. - ISBN: 978-3-662-43935-7. Proceedings of: DBSEC 2014, Vienna; Austria, 14 July 2014 through 16 July 2014. - DOI: 10.1007/978-3-662-43936-4-9
  • A. Herzberg; H. Shulman; B. Crispo, "Less is more: cipher-suite negotiation for DNSSEC" in Less is more: cipher-suite negotiation for DNSSEC, Washington: ACM, 2014, p. 346-355. - ISBN: 978-1-4503-3005-3. Proceedings of: ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014. - DOI: 10.1145/2664243.2664283
  • Y. Zhauniarovich; G. Russello; M. Conti; B. Crispo; E. Fernandes, "MOSES: Supporting and Enforcing Security Profiles on Smartphones" in IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v. 11, n. 3 (2014), p. 211-223. - DOI: 10.1109/TDSC.2014.2300482
  • M. Rizwan Asghar; A. Gehani; B. Crispo; G. Russello, "PIDGIN: privacy-preserving interest and content sharing in opportunistic networks." in Proceedings of the 9th ACM symposium on Information, computer and communications security, NY: ACM, 2014, p. 135-146. - ISBN: 978-1-4503-2800-5. Proceedings of: ASIA CCS '14, New Orleans, LA, USA, December 8-12, 2014. - DOI: 10.1145/2590296.2590303
  • Mojtaba Eskandari; Anderson Santana de Oliveira; Bruno Crispo, "VLOC: An Approach To Verify The Physical Location Of A Virtual Machine In Cloud" in IEEE CloudCom 2014, IEEE CloudCom 2014: IEEE, 2014. Proceedings of: CloudCom, Singapore, Dec 2014
  • E.S. Canlar; M. Conti;B. Crispo; R. Di Pietro, "CREPUSCOLO: A collusion resistant privacy preserving location verification system" in 2013 International Conference on Risks and Security of Internet and Systems, WASHINGTON: IEEE, 2013. Proceedings of: CRiSIS 2013, La Rochelle; France, 23 October 2013 through 25 October 2013. - DOI: 10.1109/CRiSIS.2013.6766357
  • Y. Zhauniarovich; O. Gadyatskaya; B. Crispo, "Enabling trusted stores for android." in ACM Conference on Computer and Communications Security, USA: ACM, 2013, p. 1345-1348. - ISBN: 978-1-4503-2477-9. Proceedings of: CCS'13, Berlin, Germany, November 4-8, 2013. - DOI: 10.1145/2508859.2512496
  • M. Rizwan Asgha; M. Ion; G. Russello; B. Crispo, "Enforcing security policies in outsourced environments" in COMPUTER SECURITY, v. 35, (2013), p. 2-24. - DOI: 10.1016/j.cose.2012.11.010
  • M. Decat; B. Lagaisse; D. Van Landuyt; B. Crispo; W. Joosen, "Federated Authorization for Software-as-a-Service Applications." in OTM Conferences 2013, Berlin: Berlin: Springer-Verlag, 2013, p. 342-359. - ISBN: 978-3-642-41029-1. Proceedings of: OTM 2013, Philadelphia, Usa, July 28, 2013 – July 31, 2013. - DOI: 10.1007/978-3-642-41030-7_25
  • E. Fernandes; B. Crispo; M. Conti, "FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment." in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v. 8, n. 6 (2013), p. 1027-1037. - DOI: 10.1109/TIFS.2013.2259818
  • B. P. S. Rocha; M. Conti; S. Etalle; B. Crispo, "Hybrid Static-Runtime Information Flow and Declassification Enforcement." in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v. 8, n. 8 (2013), p. 1294-1305. - DOI: 10.1109/TIFS.2013.2267798
  • M. Decat; B. Lagaisse; W. Joosen; B. Crispo, "Introducing concurrency in policy-based access control" in 8th Workshop on Middleware for Next Generation Internet Computing, WASHINGTON: ACM, 2013. - ISBN: 978-1-4503-2551-6. Proceedings of: MW4NG 2013, Beijing; China, 9 December 2013 through 13 December 2013. - DOI: 10.1145/2541608.2541611
  • K. Bicakci; B. Crispo; G. Oligeri, "LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload." in ACM TRANSACTIONS ON INTERNET TECHNOLOGY, v. 13, n. 2 (2013), p. 1-5. - DOI: 10.1145/2542214.2542216
  • Mauro Conti;Jeroen Willemsen;Bruno Crispo, "Providing Source Location Privacy in Wireless Sensor Networks: A Survey" in IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, v. 15, n. 3 (2013), p. 1238-1280. - DOI: 10.1109/SURV.2013.011413.00118
  • Muhammad Rizwan Asghar; G. Russello; B. Crispo; M. Ion, "Supporting complex queries and access policies for multi-user encrypted databases." in CCSW, Usa: ACM, 2013, p. 77-88. - ISBN: 978-1-4503-2490-8. Proceedings of: CCSW'13, Berlin, Germany, November 4, 2013. - DOI: 10.1145/2517488.2517492
  • S. Ortolani; C. Giuffrida; B. Crispo, "Unprivileged Black-Box Detection of User-Space Keyloggers." in IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v. 10, n. 1 (2013), p. 40-52. - DOI: 10.1109/TDSC.2012.76
  • M. Conti; A. Hasani; B. Crispo, "Virtual private social networks and a facebook implementation" in ACM TRANSACTIONS ON THE WEB, v. 7, n. 3 (2013). - DOI: 10.1145/2516633.2516636
  • Eyüp S. Canlar; M. Conti; B. Crispo; R. Di Pietro, "Windows Mobile LiveSD Forensics." in JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v. 36, n. 2 (2013), p. 677-684. - DOI: 10.1016/j.jnca.2012.12.024
  • M. Conti; B. Crispo; E. Fernandes; Y. Zhauniarovich, "CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android" in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v. 7, n. 5 (2012), p. 1426-1438. - DOI: 10.1109/TIFS.2012.2204249
  • G. Russello; M. Conti; B. Crispo; E. Fernandes; Y. Zhauniarovich, "Demonstrating the effectiveness of MOSES for separation of execution modes" in Proceedings of the 2012 ACM Conference on Computer and Communications Security, Washington: ACM, 2012, p. 998-1000. - ISBN: 978-1-4503-1651-4. Proceedings of: CCS 2012, Raleigh, NC; United States, 16 October 2012 through 18 October 2012. - DOI: 10.1145/2382196.2382304
  • M. Ion; G. Russello; B. Crispo, "Design and implementation of a confidentiality and access control solution for publish/subscribe systems" in COMPUTER NETWORKS, v. 2012, (2012), p. 2014-2037. - DOI: 10.1016/j.comnet.2012.02.013
  • A.Armando; S. Ranise; F.Turkmen; B. Crispo, "Efficient run-time solving of RBAC user authorization queries: pushing the envelope." in CODASPY '12 Proceedings of the second ACM conference on Data and Application Security and Privacy, New York City: ACM Press, 2012, p. 241-248. - ISBN: 978-1-4503-1091-8. Proceedings of: CODASPY, San Antonio, TX, USA, 7-9 February 2012. - DOI: 10.1145/2133601.2133631
  • J. Camenisch; B. Crispo; S. Fischer-Hübner;R. Leenes;G. Russello (edited by), "IFIP Advances in Information and Communication Technology: Preface", by J. Camenisch, B. Crispo, S. Fischer-hübner, R. Leenes, G. Russello, Amsterdam: Elsevier B.V., 2012, 1 p. - ISBN: 9783642316678
  • C. Giuffrida; S. Ortolani; B. Crispo, "Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions" in 7th ACM Symposium on Information, Computer and Communications Security, Usa: ACM, 2012, p. 10-21. - ISBN: 978-1-4503-1648-4. Proceedings of: ASIACCS 2012, Seul, South Korea, May 2012
  • G. Russello; M. Conti; B. Crispo; E. Fernandes, "MOSES: supporting operation modes on smartphones" in 17th ACM Symposium on Access Control Models and Technologies, New York City: ACM Press, 2012, p. 3-12. - ISBN: 978-1-4503-1295-0. Proceedings of: SACMAT, Newark, NJ, USA, 20-22 June 2012. - DOI: 10.1145/2295136.2295140
  • Stefano Ortolani; Bruno Crispo, "NoisyKey: Tolerating Keyloggers via Keystrokes Hiding" in 7th USENIX Workshop on Hot Topics in Security, HotSec'12, New York: USENIX Association, 2012. Proceedings of: HotSec'12, Bellevue, WA, USA, 7 August 2012
  • M. Conti; D. Diodati; CM. Pinotti; B. Crispo, "Optimal solutions for pairing services on smartphones: A strategy to minimize energy consumption" in 2012 IEEE International Conference on Green Computing and Communications, wASHINGTON: IEEE, 2012, p. 269-276. - ISBN: 9780769548654. Proceedings of: CPSCom 2012, Besancon; France, 20 November 2012 through 23 November 2012. - DOI: 10.1109/GreenCom.2012.51
  • Eyüp S. Canlar; M. Conti; B. Crispo; R. Di Pietro, "Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System." in Security Protocols Workshop, Berlin: Berlin: Springer-Verlag, 2012, p. 199-213. - ISBN: 978-3-642-35693-3. Proceedings of: Security Protocols, Cambridge, April 12-13, 2012. - DOI: 10.1007/978-3-642-35694-0_22
  • Giunchiglia, F.; Crispo, B.; Zhang, R., "Access control via lightweight ontologies" in 2011 IEEE Fifth International Conference on Semantic Computing, Palo Alto, CA, USA: Computer society Press of the IEEE, 2011, p. 352-355. - ISBN: 9781457716485. Proceedings of: ICSC 2011, Palo Alto, CA, USA, September 18-21, 2011. - DOI: 10.1109/ICSC.2011.23
  • M Conti; N. Vu Thien Nga; B. Crispo;, "CRePE: Context-Related Policy Enforcement for Android" in Lecture Notes in Computer ScienceInformation Security, Boca Raton, FL, USA: Berlin: Springer Verlag Germany -Darmstadt: Steinkopff., 2011, p. 331-345. - ISBN: 978-3-642-18177-1. Proceedings of: ISC 2010, Boca Raton, FL, USA, October 25-28, 2010. - DOI: 10.1007/978-3-642-18178-8_29
  • G. Gheorghe; B. Crispo; R. Carbone; L. Desmet; W. Joosen, "Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement" in Middleware 2011, Lisbon, Portugal,: Springer Verlag Germany- Berlin,Darmstadt: Steinkopff., 2011, p. 350-369. - (LNCS). - ISBN: 978-3-642-25820-6. Proceedings of: MIddleware 2011, Lisbon, Portugal,, December 12-16, 2011. - DOI: 10.1007/978-3-642-25821-3_18
  • DIMITRAKOS THEO; KRISHNAN NAIR SRIJITH; GHEORGHE GABRIELA; CRISPO BRUNO, "Distributed computer system", US9195852B2. - Filing date: 2011
  • M. Ion; G. Russello; B. Crispo, "Enforcing Multi-user Access Policies to Encrypted Cloud Databases" in 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, NEW YORK: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2011, p. 175-177. - ISBN: 978-0-7695-4330-7. Proceedings of: POLICY, Pisa, Italy, 6-8 June 2011. - DOI: 10.1109/POLICY.2011.14
  • M.R. Asghar; M. Ion; G. Russello; B. Crispo, "ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments" in Sixth International Conference on Availability, Reliability and Security, Vienna, Austria: IEEE, 2011, p. 99-108. - ISBN: 978-1-4577-0979-1. Proceedings of: Ares 2011, Vienna, Austria, August 22-26, 2011. - DOI: 10.1109/WoWMoM.2011.5986491
  • S.Ortolani; M. Conti; B. Crispo; R. Di Pietro, "Event handoff unobservability in WSN" in OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, Berlin: Berlin: Springer-Verlag, 2011, p. 20-28. - ISBN: 978-3-642-19227-2. Proceedings of: IFIP WG, Sofia, 5 March 2010 through 6 March 2010. - DOI: 10.1007/978-3-642-19228-9_3
  • Stefano Ortolani;Mauro Conti;Bruno Crispo;Roberto Di Pietro, "Events privacy in WSNs: A new model and its application" in 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Lucca, Italy: Computer society Press of the IEEE, 2011, p. 1-9. - ISBN: 978-1-4577-0352-2. Proceedings of: WOWMOM 2011, Lucca, Italy, 20-24 June, 2011. - DOI: 10.1109/WoWMoM.2011.5986491
  • S. Ortolani; C. Giuffrida; B. Crispo, "KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware" in Recent Advances in Intrusion Detection - 14th International Symposium, Berlin: Springer-Verlag, 2011, p. 81-100. - (Lecture Notes in Computer Science; 6961). - ISBN: 978-3-642-23643-3. Proceedings of: RAID 2011, Menlo Park, CA, USA, 20-21 September 2011. - DOI: 10.1007/978-3-642-23644-0_5
  • M. Conti; I. Zachia-Zlatea; B. Crispo, "Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call" in ASIACCS '11 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China: ACM PRESS, 2011, p. 249-259. - ISBN: 978-1-4503-0564-8. Proceedings of: Asiaccs, Hong Kong, China, March 22-24, 2011. - DOI: 10.1145/1966913.1966945
  • J. Camenisch; B. Crispo; S. Fischer-Hübner; R. Leenes; G. Russello (edited by), "Privacy and Identity Management for Life", by Jan Camenisch, Bruno Crispo, Simone Fischer-hübner, Ronald Leenes, Giovanni Russello, Berlin: Berlin: Springer-Verlag, 2011. - ISBN: 978-3-642-31667-8. - DOI: 10.1007/978-3-642-31668-5
  • B. Christianson; B. Crispo; James A. Malcolm; F. Stajano (edited by), "Security Protocols XIX", by Bruce Christianson, Bruno Crispo, A. James Malcolm, Frank Stajano, Berlin: Berlin: Springer-Verlag, 2011, 1 p. - ISBN: 978-3-642-25866-4. - DOI: 10.1007/978-3-642-25867-1
  • L. Marconi; R. Di Pietro; B. Crispo; M. Conti, "Time in Privacy Preserving LBSs: An Overlooked Dimension" in INTERNATIONAL JOURNAL OF VEHICULAR TECHNOLOGY, v. 2011, n. ID.486975 (2011). - DOI: 10.1155/2011/486975
  • F. Turkmen; E. (EJ)Jung; B. Crispo, "Towards Run-Time Verification in Access Control" in Policies for Distributed Systems and Networks, NEW YORK: IEEE, 2011, p. 25-32. - ISBN: 978-1-4244-9879-6. Proceedings of: POLICY, Pisa, 6-8 June 2011. - DOI: 10.1109/POLICY.2011.49
  • M. Conti; A. Hasani; B. Crispo, "Virtual private social networksProceedings of the first ACM conference on Data and application security and privacy - CODASPY '11" in Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11, San Antonio, TX, USA: ACM Press New York, NY, USA, 2011, p. 39-50. - ISBN: 978-1-4503-0466-5. Proceedings of: CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011. - DOI: 10.1145/1943513.1943521
  • G. Russello; B. Crispo; E. Fernandes; Y. Zhauniarovich, "YAASE: Yet Another Android Security Extension" in 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust, New York: IEEE, 2011, p. 1033-1040. - ISBN: 978-1-4577-1931-8. Proceedings of: PASSAT, Boston, MA, USA, 9-11 Ottobre 2011. - DOI: 10.1109/PASSAT/SocialCom.2011.151
  • B. Aziz; A. Arenas; G. Cortese; B. Crispo; S. Causetti, "A Secure and Scalable Grid-Based Content Management System" in The Fifth International Conference on Availability, Reliability and Security: ARES 2010: Proceedings, Los Alamitos, CA ; Tokyo: IEEE, 2010, p. 404-409. - ISBN: 9780769539652. Proceedings of: ARES 2010, Krakow, 2010. - URL: http://doi.ieeecomputersociety.org/10.1109/ARES.2010.80 . - DOI: 10.1109/ARES.2010.80
  • F. Turkmen; B. Crispo; P. Mazzoleni, "A service-based context management framework for cross-enterprise collaboration" in SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing, New York, NY: ACM, 2010, p. 2443-2450. - ISBN: 9781605586397. Proceedings of: SAC '10, Sierre, Switzerland, 22nd-26th March 2010. - URL: http://doi.acm.org/10.1145/1774088.1774595 . - DOI: 10.1145/1774088.1774595
  • M. Ion; G. Russello; B. Crispo, "An implementation of event and filter confidentiality in pub/sub systems and its application to e-health" in CCS '10: Proceedings of the 17th ACM conference on Computer and communications security, New York, NY: ACM, 2010, p. 696-698. - ISBN: 9781450302456. Proceedings of: CCS '10, Chicago, IL, 4th-8th October 2010. - URL: http://doi.acm.org/10.1145/1866307.1866401 . - DOI: 10.1145/1866307.1866401
  • S. Ortolani; C. Giuffrida; B. Crispo, "Bait your hook: a novel detection technique for keyloggers" in Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010: Proceedings, Berlin; Heidelberg: Springer, 2010, p. 198-217. - (Lecture Notes in Computer Science). - ISBN: 9783642155116. Proceedings of: RAID, Ottawa, 15th-17th September 2010. - URL: http://portal.acm.org/citation.cfm?id=1894166.1894180 . - DOI: 10.1007/978-3-642-15512-3_11
  • G. Gheorghe; B. Crispo; D. Schleicher;T. Anstett; F. Leymann; R. Mietzner; G. Monakova, "Combining Enforcement Strategies in Service Oriented Architectures" in Service-Oriented Computing - 8th International Conference, ICSOC 2010, San Francisco, CA, USA: Berlin: Springer Verlag Germany -Darmstadt: Steinkopff., 2010, p. 288-302. - (Lecture Notes in Computer Science). - ISBN: 9783642173578. Proceedings of: ICSOC 2010, San Francisco, CA, USA, December 7-10, 2010. - DOI: 10.1007/978-3-642-17358-5_20
  • G. Gheorghe; P. Mori; B. Crispo; F. Martinelli, "Enforcing UCON Policies on the Enterprise Service Bus" in On the Move to Meaningful Internet Systems, OTM 2010 - Confederated International, Berlin: Springer, 2010, p. 876-893. - (Lecture Notes in Computer Science). - ISBN: 9783642169489. Proceedings of: OTM 2010, Hersonissos, 25th-29th October 2010. - URL: http://dx.doi.org/10.1007/978-3-642-16949-6 . - DOI: 10.1007/978-3-642-16949-6
  • B. Crispo; G. Gheorghe; V. Di Giacomo; D. Presenza, "MASTER as a Security Management Tool for Policy Compliance" in Towards a Service-Based Internet: Third European Conference, ServiceWave 2010: Proceedings, Berlin; Heidelberg: Springer, 2010, p. 213-214. - (Lecture Notes in Computer Science). - ISBN: 9783642176937. Proceedings of: SeviceWave, Ghent, 13th-15th December 2010. - URL: http://dx.doi.org/10.1007/978-3-642-17694-4 . - DOI: 10.1007/978-3-642-17694-4
  • M. Ion; G. Russello; B. Crispo, "Providing Confidentiality in Content-based Publish/subscribe Systems" in Proceedings of the 2010 International Conference on Security and Cryptography: (SECRYPT), Setúbal: SciTePress, 2010, p. 1-6. - ISBN: 9789898425188. Proceedings of: SECRYPT 2010, Athens, 26th-28th July 2010
  • A. Artale; B. Crispo; F. Giunchiglia; F. Turkmen; R. Zhang, "Reasoning about Relation Based Access Control" in 2010 Fourth International Conference on Network and System Security: NSS 2010: Proceedings, Piscataway, NJ: IEEE, 2010, p. 231-238. Proceedings of: NSS 2010, Melbourne, 1st-3rd September 2010. - URL: http://dx.doi.org/10.1109/NSS.2010.76 . - DOI: 10.1109/NSS.2010.76
  • R. Zhang; F. Giunchiglia; B. Crispo; L. Song, "Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment" in WIRELESS PERSONAL COMMUNICATIONS, v. 55, n. no. 1 (2010), p. 5-17. - DOI: 10.1007/s11277-009-9782-4
  • B. Christianson; B. Crispo; J. A. Malcom; M. Roe (Ed. critica a cura di), Security Protocols: 15th International Workshop: revised selected papers, Berlin; Heidelberg; New York: Springer, 2010. - (Lecture Notes in Computer Science). - ISBN: 9783642177729. - URL: http://www.springerlink.com/content/978-3-642-17772-9/ . - DOI: 10.1007/978-3-642-17773-6
  • M. Ion; G. Russello; B. Crispo, "Supporting Publication and Subscription Confidentiality in Pub/Sub Networks" in 6th Iternational ICST Conference on Security and Privacy in Communication Networks, Berlin: Springer Verlag, 2010. Proceedings of: SecureComm, Singapore, 7-9, September, 2010
  • M. Ion; G. Russello; B. Crispo, "Supporting Publication and Subscription Confidentiality in Pub/Sub Networks" in Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010: Proceedings, Berlin; Heidelberg: Springer, 2010, p. 272-289. - (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering). - ISBN: 9783642161605. Proceedings of: SecureComm 2010, Singapore, 7th-9th September 2010. - URL: http://dx.doi.org/10.1007/978-3-642-16161-2_16 . - DOI: 10.1007/978-3-642-16161-2_16
  • L. Marconi; R. Di Pietro; B. Crispo; M. Conti, "Time Warp: How Time Affects Privacy in LBSs" in Information and Communications Security: 12th International Conference: ICICS 2010: Proceedings, Berlin; Heidelberg: Springer, 2010, p. 325-339. - (Lecture Notes in Computer Science). - ISBN: 9783642176494. Proceedings of: ICICS 2010, Barcelona, 15th-17th December 2010. - URL: http://dx.doi.org/10.1007/978-3-642-17650-0 . - DOI: 10.1007/978-3-642-17650-0
  • CONTI MAURO; CRISPO BRUNO; ZACHIA-ZLATEA IRINA, "User authentication Method for Access to a Mobile User Terminal and Corresponding Mobile User Terminal", 0001403435. - Filing date: 2010
  • G. Gheorghe; S. Neuhaus; B. Crispo, "xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement" in Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010: Proceedings, Berlin; Heidelberg: Springer, 2010, p. 63-78. - (IFIP Advance in Information and Communication Technology). - ISBN: 9783642134456. Proceedings of: IFIPTM 2010, Morioka, Japan, 16th-18th June 2010. - URL: http://dx.doi.org/10.1007/978-3-642-13446-3 . - DOI: 10.1007/978-3-642-13446-3
  • E Jung; B Crispo; L Ranaweera;, "An efficient and scalable algorithm for policy compatibility in service virtualization" in 10th IEEE/ACM International Conference on Grid Computing, Tokyo, Los Alamitos: IEEE Computer Society, 2009, p. 58-65. - ISBN: 9781424451487. Proceedings of: IEEE/ACM Grid Computing 2009, Banff, 2009. - DOI: 10.1109/GRID.2009.5353068
  • M. Kacimi; S. Ortolani; B. Crispo, "Anonymous opinion exchange over untrusted social networks" in Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, New York, NY, USA: ACM, 2009, p. 26-32. - ISBN: 9781605584638. Proceedings of: SNS 09, Nuremberg, 2009. - URL: http://doi.acm.org/10.1145/1578002.1578007 . - DOI: 10.1145/1578002.1578007
  • P. Mazzoleni; B. Crispo; S. Sivasubramanian; E. Bertino, "Efficient integration of fine-grained access control and resource brokering in grid" in THE JOURNAL OF SUPERCOMPUTING, v. 49, (2009), p. 108-126. - URL: http://portal.acm.org/citation.cfm?id=1569326.1569332 . - DOI: 10.1007/s11227-008-0248-3
  • P. Massonet; A. Arenas; F. Martinelli; P. Mori; B. Crispo, "GridTrust—A Usage Control-Based Trust and Security Framework for Service-Based Grids" in E Di Nitto, A-m Sassen, P Traverso, A Zwegers (edited by), At Your Service, Cambridge: MIT Press, 2009, p. 407-428. - (Cooperative Information Systems). - ISBN: 9780262042536
  • B. Christianson; B. Crispo; J. Malcolm; M. Roe (edited by), "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface", by B. Christianson, B. Crispo, J. Malcolm, M. Roe, Berlin Heidelberg: Springer Verlag, 2009, 1 p. - (LECTURE NOTES IN COMPUTER SCIENCE). - ISBN: 9783642049033. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0-71549134600&partnerID=40&md5=44ec313987ede52c09beab39656bda34
  • F. GIUNCHIGLIA; RUI ZHANG; BRUNO CRISPO, "Ontology Driven Community Access Control" in PROCEEDINGS OF THE 1ST WORKSHOP ON TRUST AND PRIVACY ON THE SOCIAL AND SEMANTIC WEB (SPOT2009), Berlin: Springer, 2009, p. xx-xx. Proceedings of: SPOT2009, HERAKLION, GREECE, JUNE 1, 2009
  • B. Christianson; B. Crispo; J. A. Malcom; M. Roe (Ed. critica a cura di), Security Protocols: 14th International Workshop: revised selected papers, Berlin; Heidelberg; New York: Springer, 2009. - (LNCS). - ISBN: 9783642049033. - URL: http://www.springerlink.com/content/978-3-642-04903-3/ . - DOI: 10.1007/978-3-642-04904-0
  • S. K. Nair;B. Crispo;A. S. Tanenbaum, "Towards a Secure Application-Semantic Aware Policy Enforcement Architecture" in 14th International Workshop on Security Protocols, Berlin, Heidelberg, New York: Springer-Verlag, 2009, p. 26-31. - (LNCS). - ISBN: 9783642049033. Proceedings of: SPW, Cambridge, 2009. - URL: http://dx.doi.org/10.1007/978-3-642-04904-0_5 . - DOI: 10.1007/978-3-642-04904-0_5
  • A. Herzberg; H. Shulman; A. Saxena; B. Crispo, "Towards a Theory of White-Box Security" in 24th IFIP TC 11 International Information Security Conference, Berlin, New York, Heidelberg: Springer, 2009, p. 342-352. - (IFIP). - ISBN: 9783642012433. Proceedings of: IFIP SEC 2009, Pafos, 2009. - URL: http://dx.doi.org/10.1007/978-3-642-01244-0 . - DOI: 10.1007/978-3-642-01244-0
  • R. Zhang; A. Artale; F. Giunchiglia; B. Crispo, "Using Description Logics in Relation Based Access Control" in Proceedings of The 22nd International Workshop on Description Logics (DL2009): Springer, 2009. Proceedings of: DL2009, Oxford, July 2009
  • M. Gerla ; R. G. Cascella ; Z. Cao ; B. Crispo ; R. Battiti, "An efficient weak secrecy scheme for network coding data dissemination in VANET" in Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Francia: IEEE, 2008. Proceedings of: PIMRC, Cannes, France, 15-18 Settembre 2008
  • B. Crispo ; M. Rieback ; A. S. Tanenbaum ; O. Whitehouse ; L. Yang, "Crimeware in Small Devices" in Z. Ramzan, M. Jakobsson (edited by), Crimeware: Understanding New Attacks and Defenses, London: Addison Wesley Professional, 2008. - ISBN: 9780321501950
  • F. Turkmen ; P. Mazzoleni ; B. Crispo ; E. Bertino, "P-CDN: Extending Access Control Capabilities of P2P Systems to provide CDN Services" in Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), New York, N.Y.: IEEE Press, 2008, p. 480-486. - ISBN: 978-1-4244-2702-4. Proceedings of: Computers and Communications, 2008. ISCC 2008. IEEE Symposium on Computers and Communications, Marrakech, Marocco, 6th-9th July 2008
  • F. Giunchiglia; R. Zhang; B. Crispo, "RelBAC: Relation Based Access Control" in Proceedings: SKG 2008, The Fourth International Conference on Semantics, Knowledge and Grid, IEEE Computer Society, 2008, WA DC, USA: IEEE, 2008, p. 3-11
  • F. Giunchiglia; R. Zhang; B. Crispo, "RelBAC: Relation Based Access Control" in Proceedings of the 2008 Fourth International Conference on Semantics, Knowledge and Grid, Washington, DC, USA: IEEE Computer Society, 2008, p. 3-11. - (IEEE). Proceedings of: SKG2008, BEIJIN, 2008. - URL: http://portal.acm.org/citation.cfm?id=1494651.1495599 . - DOI: 10.1109/SKG.2008.76
  • S. Nair ; R. Gerrits ; B. Crispo ; A. S. Tanenbaum, "Turning Teenagers into Stores" in COMPUTER, v. 41, n. 2 (2008), p. 58-62
  • R. G. Cascella ; Z. Cao ; B. Crispo ; M. Gerla ; R. Battiti, "Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution" in IFIP Wireless Days Conference, USA: IEEE Press, 2008. Proceedings of: IFIP Wireless Days Conference, Dubai, UAE, 24-28 Novembre 2008
  • P. Mazzoleni ; B. Crispo ; S. Sivasubramanian ; E. Bertino, "XACML policy integration algorithms" in ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v. 11, n. 1 (2008), p. 219-227
  • S. Nair; M. Dashti; B. Crispo; A. S. Tanenbaum, "A Hybrid PKI-IBC Based Ephemerizer System" in New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, Germania: Springer, 2007. - (IFIP International Federation for Information Processing; 232). - ISBN: 9780387723662. Proceedings of: SEC 2007, Sandton, 14th-16th May 2007
  • B. Popescu ; B. Crispo ; A. S. Tanenbaum ; A. Bakker, "Design and Implementation of a Secure Wide-Area Object Middleware" in COMPUTER NETWORKS, v. 2007, (2007), p. 2484-2513
  • M. Rieback ; N. Simpson ; B. Crispo ; A. S. Tanenbaum, "RFID Malware: Design Principles and Examples" in PERVASIVE AND MOBILE COMPUTING, v. Vol. 2, n. 4 (2007), p. 405-426
  • B. Christianson ; J. A. Malcolm ; B. Crispo ; M. Roe (Ed. critica a cura di), Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, New York: Springer, 2007. - (Lecture Notes in Computer Science; 4631). - ISBN: 9783540771555
  • B. Christianson; B. Crispo; J. A. Malcom; M. Roe (edited by), "Security Protocols: 12th International Workshop: revised selected papers", Berlin; Heidelberg; New York: Springer, 2007. - ISBN: 9783540409250. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0-38149030080&partnerID=40&md5=b49af39df67abe2eae17b9f7187c1b0d
  • B. Christianson; B. Crispo; J. Malcolm; M. Roe (edited by), "Lecturer Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface", by B. Christianson, B. Crispo, J. Malcolm, M. Roe, Berlin Heidelberg: Springer Verlag, 2006, 1 p. - (LECTURE NOTES IN COMPUTER SCIENCE). - ISBN: 9783540409250. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0-33749669058&partnerID=40&md5=ce8f7042c3619af9358d51f87fa34a33
  • M. Rieback ; B. Crispo ; A. S. Tanenbaum, "Malware: Truth vs. Myth" in IEEE SECURITY & PRIVACY, v. 4, n. 4 (2006), p. 70-72
  • M. Rieback ; N. Simpson ; B. Crispo ; A. S. Tanenbaum, "RFID Malware: Design Principles and Examples" in PERVASIVE AND MOBILE COMPUTING, v. 2, n. 4 (2006), p. 405-426
  • Popescu, B.C.; Crispo, B.; Tanenbaum, A.S.; Blaze, M.; Christianson, B.; Stajano, F.; Anderson, R.; Mitchell, C.; Roe, M.; Mayo, B.; Massacci, F.; Ozment, A.; Bond, M.; Danezis, G.; Crispo, B.; Murdoch, S., "Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System" in Security Protocols - 12th International Workshop, Revised Selected Papers;, Berlin; Heidelberg: Springer, 2006, p. 213-220. - (LECTURE NOTES IN COMPUTER SCIENCE). - ISBN: 978-354040925-0. Proceedings of: SPW 2004, Cambridge, 26th-28th April 2004. - DOI: 10.1007/11861386_24
  • A. S. Tanenbaum ; C. Gamage ; B. Crispo, "Taking Sensor Networks from the Lab to the Jungle" in COMPUTER, v. 39, n. 8 (2006), p. 98-100
  • M. Rieback ; B. Crispo ; A. S. Tanenbaum, "The Evolution of RFID Security" in IEEE PERVASIVE COMPUTING, v. 5, n. 1 (2006), p. 62-69
  • C. Gamage ; J. Leiwo ; K. Bicakci ; B. Crispo ; A. S. Tanenbaum, "A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks" in Proceedings of the 2005 Intelligent Sensors, Sensor Networks & Information Processing Conference, Piscataway (NJ): IEEE Operations Center, 2005, p. 45-50. - ISBN: 0-7803-9399-6. Proceedings of: ISSNIP, Melbourne, 5th-8th December 2005. - DOI: 10.1109/ISSNIP.2005.1595554
  • B. Popescu ; B. Crispo ; A. S. Tanenbaum ; M. Zeeman, "Describing Security Policies for Replicated Globe Objects" in Security Protocols, 11th International Workshop. Revised Selected Papers, .: Springer, 2005. - (LNCS). - ISBN: 3-540-28389-7. Proceedings of: 11th Security Protocols International Workshop, Cambridge, UK, April, 2-4 2003
  • P. Mazzoleni ; B. Crispo ; S. Sivasubramanian ; E. Bertino, "Efficient Integration of Fine-grained Access Control in Large-scale Grid Services" in Proceedings of the 2005 IEEE International Conference on Services Computing, Los Alamitos (CA): IEEE Computer Society, 2005, p. 77-84. - ISBN: 0-7695-2408-7. Proceedings of: SCC 2005, Orlando (FL), 11th-15th July 2005. - DOI: 10.1109/SCC.2005.49
  • K. Bicakci ; C. Gamage ; B. Crispo ; A. S. Tanenbaum, "One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks" in Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005,, Berlin: Springer, 2005, p. 80-90. - (LNCS; 3813). - ISBN: 978-3-540-30912-3. Proceedings of: ESAS 2005, Visegrad, 13th-14th July 2005
  • B. Crispo ; S. Sivasubramanian ; P. Mazzoleni ; E. Bertino, "P-Hera: scalable fine-grained access control for P2P" in ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems, Usa: IEEE Computer Society, 2005. - ISBN: 0-7695-2281-5. Proceedings of: ICPADS 2005, Fukuoka, Japan, 20-22 July 2005. - DOI: 10.1109/ICPADS.2005.98
  • M. Rieback ; B. Crispo ; A. S. Tanenbaum, "RFID Guardian: A Battery-Powered Mobile Device for Personal RFID Privacy Management" in Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Berlin: Springer, 2005, p. 184-194. - (LNCS; 3574). - ISBN: 3-540-26547-3. Proceedings of: ACISP 2005, Brisbane, 4th-6th July 2005
  • B. Popescu ; M. Van Steen ; B. Crispo ; A. S. Tanenbaum ; S. Jan ; K. Ihor, "Securely Replicated Web Documents." in Proceedings of the 19th International Parallel and Distributed Processing Symposium, USA: IEEE Computer Society, 2005. - ISBN: 0-7695-2312-9. Proceedings of: IPDPS 2005, Denver (CA), 4th-8th April 2005
  • B. Christianson ; B. Crispo ; J. A. Malcolm ; M. Roe (edited by), "Security Protocol International Workshop proceedings, 11 ed.", by Vari, Berlin: Springer, 2005. - (LNCS; 3364). - ISBN: 9783540283898
  • B. Popescu ; B. Crispo ; F. Kamperman ; A. S. Tanenbaum, "A DRM security architecture for home networks" in DRM '04 : proceedings of the fourth ACM Workshop on Digital Rights Management, New York, N.Y.: Association for Computing Machinery, 2004. - ISBN: 1581139691. Proceedings of: DRM 2004, Washington DC, 25 October 2004
  • E. Bertino ; B. Crispo ; J. Joshi ; K. D. Wengliang ; R. S. Sandhu, "Panel: security for grid-based computing systems issues and challenges" in Proceedings of the 9th ACM Symposium on Access Control Models and Technologies: ACM, 2004. Proceedings of: ACM SACMAT: 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, NY, 2nd-4th June 2004
  • B. Crispo ; E. Bertino ; P. Mazzoleni, "Support Multi-Dimensional Trustworthiness for Grid Workflow" in Proceedings of the DELOS Workshop: Digital Library Architecture: Edizioni Libreria Progetto, 2004, p. 195-204. Proceedings of: DELOS Workshop: Digital Library Architectures 2004, Cagliari, 24th-25th June 2004
  • B. Crispo ; B. Popescu ; A. S. Tanenbaum, "Symmetric Key Authentication Services Revisited" in Information Security and Privacy: 9th Australasian Conference, ACISP 2004 Proceedings, Berlin: Springer, 2004, p. 248-261. - (Lecture Notes in Computer Science; 3108). - ISBN: 3-540-22379-7. Proceedings of: ACISP 2004, Sidney, 13th-15th July 2004
  • B. Christianson ; B. Crispo ; J. A. Malcolm ; M. Roe (edited by), "The Security Protocol International Workshop proceedings, 10 ed.", Berlin: Springer, 2004. - (LNCS series; 2845)
  • E. Bertino ; P. Mazzoleni ; B. Crispo ; S. Sivasubramanian ; E. Ferrari, "Towards supporting fine-grained access control for Grid Resource" in Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2004, Los Alamitos (CA): IEEE Computer Society, 2004. - ISBN: 0-7695-2118-5. Proceedings of: IEEE FTDCS 2004, Suzhou, 26th-28th May 2004. - DOI: 10.1109/FTDCS.2004.1316594
  • B. Popescu ; B. Crispo ; A. S. Tanenbaum, "A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System" in 8th IEEE symposium on computers and communications, 2003. Proceedings of: IEEE Computer Society, Kemer-Antalya, 30th June-3rd July 2003
  • B. Popescu ; B. Crispo ; A. S. Tanenbaum, "Secure Data Replication on Un-Trusted Host" in Proceedings of HotOS IX : The 9th Workshop on Hot Topics in Operating Systems, Lihue, Hawaii, USA, May 18 - 21, 2003, [S.L]: Usenix Association, 2003, Lihue (HI), 18th-21st May 2003
  • F. BERGADANO; D. CAVAGNINO; B. CRISPO, "Individual Authentication in Multiparty Communications" in COMPUTERS & SECURITY, v. 21,8, (2002), p. 719-735
  • B. Christianson; J. A. Malcolm; B. Crispo; M. Roe (Ed. critica a cura di), Security Protocols: 9th International Workshop: revised selected papers, Berlin; Heidelberg; New York: Springer, 2002. - (LNCS). - ISBN: 9783540442639. - URL: http://www.springerlink.com/content/978-3-540-44263-9/ . - DOI: 10.1007/3-540-45807-7
  • B. CRISPO, "Delegation Protocols for Electronic Commerce" in 6th IEEE Symposium on Computers and Communications, 2001
  • B. CRISPO; G. RUFFO, "Reasoning about Accountability within Delegation" in 3rd International Conference on Information and Communications, 2001
  • B. Christianson;B. Crispo;J. A. Malcom;M. Roe (Ed. critica a cura di), Security Protocols: 8th International Workshop: revised selected papers, Berlin; Heidelberg; New York: Springer, 2001. - (LNCS). - ISBN: 9783540425663. - URL: http://www.springerlink.com/content/978-3-540-42566-3/ . - DOI: 10.1007/3-540-44810-1
  • F. BERGADANO; D. CAVAGNINO; B. CRISPO, "Chained Stream Authentication" in 7th Annual Workshop on Selected Areas in Cryptography, 2000
  • B. Christianson;B. Crispo;W. S. Harbison;M. Roe (Ed. critica a cura di), Security Protocols: 6th International Workshop: revised selected papers, Berlin; Heidelberg; New York: Springer, 1999. - (LNCS). - ISBN: 9783540656630. - URL: http://www.springerlink.com/content/978-3-540-65663-0/ . - DOI: 10.1007/3-540-49135-X
  • R.J. ANDERSON; B. CRISPO; J.H. LEE; C. MANIFAVAS; V. MATYAS JR. F.A.P. PETITCOLAS, "The Global Internet Trust Register", 1999
  • R. J. Anderson ; B. Crispo ; J. Lee ; C. Manifavas ; V. Matyas ; F. Petitcolas, The Global Internet Trust Register, Cambridge, Mass. ; London: MIT press, 1999, 150 p. - ISBN: 9780262511056
  • R.J. ANDERSON; F. BERGADANO; B. CRISPO; J.H. LEE; C. MANIFAVAS; R.M. NEEDHAM, "A New Family of Authentication Protocols" in OPERATING SYSTEMS REVIEW, v. 32,4, (1998), p. 9-20
  • F. BERGADANO; B. CRISPO; G. RUFFO, "High Dictionary Compression for Proactive Password Checking" in ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v. 1,1, (1998)
  • T.M.A. Lomas. B. Christianson; B. Crispo;M. Roe (edited by), "Security Protocols: 5th International Workshop: revised selected papers", Berlin; Heidelberg; New York: Springer, 1998. - (LNCS). - ISBN: 9783540640400. - URL: http://www.springerlink.com/content/978-3-540-64040-0/ . - DOI: 10.1007/BFb0028154
  • F. BERGADANO; B. CRISPO; M. LOMAS, "Strong Authentication and Privacy with Standard Browsers" in JOURNAL OF COMPUTER SECURITY, v. 5,3, (1997), p. 191-212