Rosario Giustolisi
Rosario Giustolisi
Verified email at itu.dk - Homepage
TitleCited byYear
Enforcing privacy in e-commerce by balancing anonymity and trust
G Bella, R Giustolisi, S Riccobene
Computers & Security 30 (8), 705-718, 2011
192011
A framework for analyzing verifiability in traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini
Information Security Practice and Experience, 514-529, 2015
18*2015
What security for electronic exams?
R Giustolisi, G Lenzini, G Bella
8th International Conference onRisk and Security of Internet and Systems …, 2013
162013
Remark!: A secure protocol for remote exams
R Giustolisi, G Lenzini, PYA Ryan
Cambridge International Workshop on Security Protocols, 38-48, 2014
152014
Formal analysis of electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
Security and Cryptography (SECRYPT), 2014 11th International Conference on, 1-12, 2014
132014
Socio-technical formal analysis of TLS certificate validation in modern browsers
G Bella, R Giustolisi, G Lenzini
Privacy, Security and Trust (PST), 2013 Eleventh Annual International …, 2013
82013
On the possibility of non-interactive e-voting in the public-key setting
R Giustolisi, V Iovino, PB Rønne
International Conference on Financial Cryptography and Data Security, 193-208, 2016
52016
A secure exam protocol without trusted parties
G Bella, R Giustolisi, G Lenzini, PYA Ryan
IFIP International Information Security Conference, 495-509, 2015
52015
Secure exams despite malicious management
G Bella, R Giustolisi, G Lenzini
Privacy, Security and Trust (PST), 2014 Twelfth Annual International …, 2014
52014
Threats to 5G group-based authentication
R Giustolisi, C Gerhmann
13th International Conference on Security and Cryptography (SECRYPT 2016 …, 2016
32016
5G: Towards secure ubiquitous connectivity beyond 2020
M Svensson, N Paladi, R Giustolisi
Swedish Institute of Computer Science, 2015
32015
A socio-technical methodology for the security and privacy analysis of services
G Bella, P Curzon, R Giustolisi, G Lenzini
Computer Software and Applications Conference Workshops (COMPSACW), 2014 …, 2014
32014
Studies in socio-technical security analysis: authentication of identities with TLS certificates
A Ferreira, R Giustolisi, JL Huynen, V Koenig, G Lenzini
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 …, 2013
32013
A Socio-technical Understanding of TLS Certificate Validation
G Bella, R Giustolisi, G Lenzini
IFIP International Conference on Trust Management, 281-288, 2013
32013
On tools for socio-technical security analysis
A Ferreira, R Giustolisi, JL Huynen, G Lenzini
32013
Trustworthy exams without trusted parties
G Bella, R Giustolisi, G Lenzini, PYA Ryan
Computers & Security 67, 291-307, 2017
22017
A secure group-based AKA protocol for machine-type communications
R Giustolisi, C Gehrmann, M Ahlström, S Holmberg
International Conference on Information Security and Cryptology, 3-27, 2016
22016
Formal security analysis of traditional and electronic exams
J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan
International Conference on E-Business and Telecommunications, 294-318, 2014
12014
Modelling and Verification of Secure Exams
R Giustolisi
Springer International Publishing, 2018
2018
Automated Analysis of Accountability
A Bruni, R Giustolisi, C Schuermann
International Conference on Information Security, 417-434, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20