Volgen
Rosario Giustolisi
Rosario Giustolisi
Geverifieerd e-mailadres voor itu.dk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Enforcing privacy in e-commerce by balancing anonymity and trust
G Bella, R Giustolisi, S Riccobene
Computers & Security 30 (8), 705-718, 2011
392011
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
International Conference on Information Security Practice and Experience …, 2015
33*2015
What security for electronic exams?
R Giustolisi, G Lenzini, G Bella
2013 International Conference on Risks and Security of Internet and Systems …, 2013
222013
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014
212014
Remark!: A Secure Protocol for Remote Exams
R Giustolisi, G Lenzini, PYA Ryan
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
212014
Threats to 5G group-based authentication
R Giustolisi, C Gerhmann
13th International Conference on Security and Cryptography (SECRYPT 2016 …, 2016
182016
On the possibility of non-interactive e-voting in the public-key setting
R Giustolisi, V Iovino, PB Rønne
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
152016
Socio-technical formal analysis of TLS certificate validation in modern browsers
G Bella, R Giustolisi, G Lenzini
2013 Eleventh Annual Conference on Privacy, Security and Trust, 309-316, 2013
132013
Invalid certificates in modern browsers: A socio-technical analysis
R Giustolisi, G Bella, G Lenzini
Journal of Computer Security 26 (4), 509-541, 2018
112018
A secure exam protocol without trusted parties
G Bella, R Giustolisi, G Lenzini, PYA Ryan
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
112015
Automated analysis of accountability
A Bruni, R Giustolisi, C Schuermann
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017
102017
A socio-technical methodology for the security and privacy analysis of services
G Bella, P Curzon, R Giustolisi, G Lenzini
2014 IEEE 38th International Computer Software and Applications Conference …, 2014
102014
Modelling human threats in security ceremonies
G Bella, R Giustolisi, C Schürmann
Journal of Computer Security 30 (3), 411-433, 2022
92022
Free rides in Denmark: lessons from improperly generated mobile transport tickets
R Giustolisi
Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia …, 2017
92017
What are the threats?(charting the threat models of security ceremonies)
D Sempreboni, G Bella, R Giustolisi, L Vigano
Proceedings of the 16th International Joint Conference on e-Business and …, 2019
82019
A secure group-based AKA protocol for machine-type communications
R Giustolisi, C Gehrmann, M Ahlström, S Holmberg
Information Security and Cryptology–ICISC 2016: 19th International …, 2017
72017
Studies in socio-technical security analysis: authentication of identities with TLS certificates
A Ferreira, R Giustolisi, JL Huynen, V Koenig, G Lenzini
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
72013
Secure exams despite malicious management
G Bella, R Giustolisi, G Lenzini
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
62014
Security protocols as choreographies
A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann
Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021
52021
A security analysis of the Danish deposit return system
I Garbacz, R Giustolisi, K Møller Nielsen, C Schuermann
Socio-Technical Aspects in Security and Trust: 9th International Workshop …, 2021
52021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20