Suivre
Rosario Giustolisi
Rosario Giustolisi
Adresse e-mail validée de itu.dk - Page d'accueil
Titre
Citée par
Citée par
Année
Enforcing privacy in e-commerce by balancing anonymity and trust
G Bella, R Giustolisi, S Riccobene
Computers & Security 30 (8), 705-718, 2011
392011
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
International Conference on Information Security Practice and Experience …, 2015
32*2015
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014
232014
Remark!: A Secure Protocol for Remote Exams
R Giustolisi, G Lenzini, PYA Ryan
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014
232014
What security for electronic exams?
R Giustolisi, G Lenzini, G Bella
2013 International Conference on Risks and Security of Internet and Systems …, 2013
222013
Threats to 5G group-based authentication
R Giustolisi, C Gerhmann
13th International Conference on Security and Cryptography (SECRYPT 2016 …, 2016
192016
On the possibility of non-interactive e-voting in the public-key setting
R Giustolisi, V Iovino, PB Rønne
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
152016
Socio-technical formal analysis of TLS certificate validation in modern browsers
G Bella, R Giustolisi, G Lenzini
2013 Eleventh Annual Conference on Privacy, Security and Trust, 309-316, 2013
142013
Modelling human threats in security ceremonies
G Bella, R Giustolisi, C Schürmann
Journal of Computer Security 30 (3), 411-433, 2022
122022
Automated analysis of accountability
A Bruni, R Giustolisi, C Schuermann
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017
122017
A secure exam protocol without trusted parties
G Bella, R Giustolisi, G Lenzini, PYA Ryan
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
122015
A socio-technical methodology for the security and privacy analysis of services
G Bella, P Curzon, R Giustolisi, G Lenzini
2014 IEEE 38th International Computer Software and Applications Conference …, 2014
122014
Invalid certificates in modern browsers: A socio-technical analysis
R Giustolisi, G Bella, G Lenzini
Journal of Computer Security 26 (4), 509-541, 2018
112018
Free rides in Denmark: lessons from improperly generated mobile transport tickets
R Giustolisi
Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia …, 2017
102017
What are the threats?(charting the threat models of security ceremonies)
D Sempreboni, G Bella, R Giustolisi, L Vigano
Proceedings of the 16th International Joint Conference on e-Business and …, 2019
92019
Secure exams despite malicious management
G Bella, R Giustolisi, G Lenzini
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
72014
Studies in socio-technical security analysis: authentication of identities with TLS certificates
A Ferreira, R Giustolisi, JL Huynen, V Koenig, G Lenzini
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
72013
Security protocols as choreographies
A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann
Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021
62021
Fixing vulnerabilities automatically with linters
W Rafnsson, R Giustolisi, M Kragerup, M Høyrup
Network and System Security: 14th International Conference, NSS 2020 …, 2020
62020
Trustworthy exams without trusted parties
G Bella, R Giustolisi, G Lenzini, PYA Ryan
Computers & Security 67, 291-307, 2017
62017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20