Enforcing privacy in e-commerce by balancing anonymity and trust G Bella, R Giustolisi, S Riccobene Computers & Security 30 (8), 705-718, 2011 | 27 | 2011 |
A framework for analyzing verifiability in traditional and electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini International Conference on Information Security Practice and Experience …, 2015 | 25* | 2015 |
Remark!: A secure protocol for remote exams R Giustolisi, G Lenzini, PYA Ryan Cambridge International Workshop on Security Protocols, 38-48, 2014 | 17 | 2014 |
Formal analysis of electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014 | 15 | 2014 |
What security for electronic exams? R Giustolisi, G Lenzini, G Bella 2013 International Conference on Risks and Security of Internet and Systems …, 2013 | 14 | 2013 |
Threats to 5G group-based authentication R Giustolisi, C Gerhmann 13th International Conference on Security and Cryptography (SECRYPT 2016 …, 2016 | 8 | 2016 |
Socio-technical formal analysis of TLS certificate validation in modern browsers G Bella, R Giustolisi, G Lenzini 2013 Eleventh Annual Conference on Privacy, Security and Trust, 309-316, 2013 | 8 | 2013 |
A secure exam protocol without trusted parties G Bella, R Giustolisi, G Lenzini, PYA Ryan IFIP International Information Security and Privacy Conference, 495-509, 2015 | 6 | 2015 |
On the possibility of non-interactive e-voting in the public-key setting R Giustolisi, V Iovino, PB Rønne International Conference on Financial Cryptography and Data Security, 193-208, 2016 | 5 | 2016 |
Secure exams despite malicious management G Bella, R Giustolisi, G Lenzini 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 5 | 2014 |
Studies in socio-technical security analysis: authentication of identities with TLS certificates A Ferreira, R Giustolisi, JL Huynen, V Koenig, G Lenzini 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 5 | 2013 |
A secure group-based AKA protocol for machine-type communications R Giustolisi, C Gehrmann, M Ahlström, S Holmberg International Conference on Information Security and Cryptology, 3-27, 2016 | 4 | 2016 |
A socio-technical methodology for the security and privacy analysis of services G Bella, P Curzon, R Giustolisi, G Lenzini 2014 IEEE 38th International Computer Software and Applications Conference …, 2014 | 4 | 2014 |
On tools for socio-technical security analysis A Ferreira, R Giustolisi, JL Huynen, G Lenzini | 4 | 2013 |
5G: Towards secure ubiquitous connectivity beyond 2020 M Svensson, N Paladi, R Giustolisi Swedish Institute of Computer Science, 2015 | 3 | 2015 |
A Socio-technical Understanding of TLS Certificate Validation G Bella, R Giustolisi, G Lenzini IFIP International Conference on Trust Management, 281-288, 2013 | 3 | 2013 |
Trustworthy exams without trusted parties G Bella, R Giustolisi, G Lenzini, PYA Ryan Computers & Security 67, 291-307, 2017 | 2 | 2017 |
Invalid certificates in modern browsers: A socio-technical analysis R Giustolisi, G Bella, G Lenzini Journal of Computer Security 26 (4), 509-541, 2018 | 1 | 2018 |
Automated Analysis of Accountability A Bruni, R Giustolisi, C Schuermann International Conference on Information Security, 417-434, 2017 | 1 | 2017 |
Free rides in denmark: Lessons from improperly generated mobile transport tickets R Giustolisi Nordic Conference on Secure IT Systems, 159-174, 2017 | 1 | 2017 |