NEWS
The 2025 AD Scientific Index is here—explore updated university and researcher rankings!
New! Young University / Institution Rankings 2025
New! The 2025 Edition of the AD Scientific Index is now live!
New! Art & Humanities Rankings 2025
New! Social Sciences and Humanities Rankings 2025
"Exciting Update! The 2025 Edition of the AD Scientific Index is now live!
AD
Scientific Index 2025
Scientist Rankings
University Rankings
Subject Rankings
Country Rankings
login
Login
person_add
Register
insights
H-Index Rankings
insights
i10 Productivity Rankings
format_list_numbered
Citation Rankings
subject
University Subject Rankings
school
Young Universities
format_list_numbered
Top 100 Scientists
format_quote
Top 100 Institutions
format_quote
Compare & Choose
local_fire_department
Country Top Lists
Iliano Cervesato
Carnegie Mellon University - Pittsburgh / United States
Engineering & Technology / Computer Science
AD Scientific Index ID: 883517
Edit Form
Registration, Add Profile,
Premium Membership
Ranking &
Analysis
Job
Experiences (0)
Education
Information (0)
Published Books (0)
Book Chapters (0)
Articles (0)
Presentations (0)
Lessons (0)
Projects (0)
Congresses (0)
Editorship, Referee &
Scientific Board (0 )
Patents /
Designs (0)
Academic Grants
& Awards (0)
Artistic
Activities (0)
Certificate / Course
/ Trainings (0)
Association &
Society Memberships (0)
Contact, Office
& Social Media
person_outline
Iliano Cervesato's MOST POPULAR ARTICLES
1-)
A meta-notation for protocol analysisI Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A ScedrovProceedings of the 12th IEEE Computer Security Foundations Workshop, 55-69, 19993731999
2-)
A linear logical frameworkI Cervesato, F PfenningInformation and computation 179 (1), 19-75, 20022942002
3-)
A concurrent logical framework I: Judgments and propertiesK Watkins, I Cervesato, F Pfenning, D WalkerCARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 20032212003
4-)
The logic of authentication protocolsP Syverson, I CervesatoInternational school on foundations of security analysis and design, 63-137, 20002262000
5-)
The Dolev-Yao intruder is the most powerful attackerI Cervesato16th Annual Symposium on Logic in Computer Science—LICS 1, 1-2, 20011542001
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept