Rosario Giustolisi
Rosario Giustolisi
Verifierad e-postadress på itu.dk - Startsida
TitelCiteras avÅr
Enforcing privacy in e-commerce by balancing anonymity and trust
G Bella, R Giustolisi, S Riccobene
Computers & Security 30 (8), 705-718, 2011
272011
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
International Conference on Information Security Practice and Experience …, 2015
25*2015
Remark!: A secure protocol for remote exams
R Giustolisi, G Lenzini, PYA Ryan
Cambridge International Workshop on Security Protocols, 38-48, 2014
172014
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014
152014
What security for electronic exams?
R Giustolisi, G Lenzini, G Bella
2013 International Conference on Risks and Security of Internet and Systems …, 2013
142013
Threats to 5G group-based authentication
R Giustolisi, C Gerhmann
13th International Conference on Security and Cryptography (SECRYPT 2016 …, 2016
82016
Socio-technical formal analysis of TLS certificate validation in modern browsers
G Bella, R Giustolisi, G Lenzini
2013 Eleventh Annual Conference on Privacy, Security and Trust, 309-316, 2013
82013
A secure exam protocol without trusted parties
G Bella, R Giustolisi, G Lenzini, PYA Ryan
IFIP International Information Security and Privacy Conference, 495-509, 2015
62015
On the possibility of non-interactive e-voting in the public-key setting
R Giustolisi, V Iovino, PB Rønne
International Conference on Financial Cryptography and Data Security, 193-208, 2016
52016
Secure exams despite malicious management
G Bella, R Giustolisi, G Lenzini
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
52014
Studies in socio-technical security analysis: authentication of identities with TLS certificates
A Ferreira, R Giustolisi, JL Huynen, V Koenig, G Lenzini
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
52013
A secure group-based AKA protocol for machine-type communications
R Giustolisi, C Gehrmann, M Ahlström, S Holmberg
International Conference on Information Security and Cryptology, 3-27, 2016
42016
A socio-technical methodology for the security and privacy analysis of services
G Bella, P Curzon, R Giustolisi, G Lenzini
2014 IEEE 38th International Computer Software and Applications Conference …, 2014
42014
On tools for socio-technical security analysis
A Ferreira, R Giustolisi, JL Huynen, G Lenzini
42013
5G: Towards secure ubiquitous connectivity beyond 2020
M Svensson, N Paladi, R Giustolisi
Swedish Institute of Computer Science, 2015
32015
A Socio-technical Understanding of TLS Certificate Validation
G Bella, R Giustolisi, G Lenzini
IFIP International Conference on Trust Management, 281-288, 2013
32013
Trustworthy exams without trusted parties
G Bella, R Giustolisi, G Lenzini, PYA Ryan
Computers & Security 67, 291-307, 2017
22017
Invalid certificates in modern browsers: A socio-technical analysis
R Giustolisi, G Bella, G Lenzini
Journal of Computer Security 26 (4), 509-541, 2018
12018
Automated Analysis of Accountability
A Bruni, R Giustolisi, C Schuermann
International Conference on Information Security, 417-434, 2017
12017
Free rides in denmark: Lessons from improperly generated mobile transport tickets
R Giustolisi
Nordic Conference on Secure IT Systems, 159-174, 2017
12017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20