Rosario Giustolisi
Rosario Giustolisi
Verifierad e-postadress på itu.dk - Startsida
Titel
Citeras av
Citeras av
År
Enforcing privacy in e-commerce by balancing anonymity and trust
G Bella, R Giustolisi, S Riccobene
Computers & Security 30 (8), 705-718, 2011
312011
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
International Conference on Information Security Practice and Experience …, 2015
27*2015
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014
172014
Remark!: A secure protocol for remote exams
R Giustolisi, G Lenzini, PYA Ryan
Cambridge International Workshop on Security Protocols, 38-48, 2014
172014
What security for electronic exams?
R Giustolisi, G Lenzini, G Bella
2013 International Conference on Risks and Security of Internet and Systems …, 2013
172013
Threats to 5G group-based authentication
R Giustolisi, C Gerhmann
13th International Conference on Security and Cryptography (SECRYPT 2016 …, 2016
132016
On the possibility of non-interactive e-voting in the public-key setting
R Giustolisi, V Iovino, PB Rønne
International Conference on Financial Cryptography and Data Security, 193-208, 2016
82016
Socio-technical formal analysis of TLS certificate validation in modern browsers
G Bella, R Giustolisi, G Lenzini
2013 Eleventh Annual Conference on Privacy, Security and Trust, 309-316, 2013
82013
A secure exam protocol without trusted parties
G Bella, R Giustolisi, G Lenzini, PYA Ryan
IFIP International Information Security and Privacy Conference, 495-509, 2015
62015
Secure exams despite malicious management
G Bella, R Giustolisi, G Lenzini
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
62014
Automated Analysis of Accountability
A Bruni, R Giustolisi, C Schürmann
International Conference on Information Security, 417-434, 2017
52017
A secure group-based AKA protocol for machine-type communications
R Giustolisi, C Gehrmann, M Ahlström, S Holmberg
International Conference on Information Security and Cryptology, 3-27, 2016
52016
A socio-technical methodology for the security and privacy analysis of services
G Bella, P Curzon, R Giustolisi, G Lenzini
2014 IEEE 38th International Computer Software and Applications Conference …, 2014
52014
Studies in socio-technical security analysis: authentication of identities with TLS certificates
A Ferreira, R Giustolisi, JL Huynen, V Koenig, G Lenzini
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
52013
On tools for socio-technical security analysis
A Ferreira, R Giustolisi, JL Huynen, G Lenzini
42013
Invalid certificates in modern browsers: A socio-technical analysis
R Giustolisi, G Bella, G Lenzini
Journal of Computer Security 26 (4), 509-541, 2018
32018
5g: Towards secure ubiquitous connectivity beyond 2020
M Svensson, N Paladi, R Giustolisi
Swedish Institute of Computer Science, 2015
32015
A Socio-technical Understanding of TLS Certificate Validation
G Bella, R Giustolisi, G Lenzini
IFIP International Conference on Trust Management, 281-288, 2013
32013
Modelling and Verification of Secure Exams
R Giustolisi
Springer International Publishing, 2018
22018
Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets
R Giustolisi
Nordic Conference on Secure IT Systems, 159-174, 2017
22017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20