| Enforcing privacy in e-commerce by balancing anonymity and trust G Bella, R Giustolisi, S Riccobene Computers & Security 30 (8), 705-718, 2011 | 19 | 2011 |
| A framework for analyzing verifiability in traditional and electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini Information Security Practice and Experience, 514-529, 2015 | 18* | 2015 |
| What security for electronic exams? R Giustolisi, G Lenzini, G Bella 8th International Conference onRisk and Security of Internet and Systems …, 2013 | 16 | 2013 |
| Remark!: A secure protocol for remote exams R Giustolisi, G Lenzini, PYA Ryan Cambridge International Workshop on Security Protocols, 38-48, 2014 | 15 | 2014 |
| Formal analysis of electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan Security and Cryptography (SECRYPT), 2014 11th International Conference on, 1-12, 2014 | 13 | 2014 |
| Socio-technical formal analysis of TLS certificate validation in modern browsers G Bella, R Giustolisi, G Lenzini Privacy, Security and Trust (PST), 2013 Eleventh Annual International …, 2013 | 8 | 2013 |
| On the possibility of non-interactive e-voting in the public-key setting R Giustolisi, V Iovino, PB Rønne International Conference on Financial Cryptography and Data Security, 193-208, 2016 | 5 | 2016 |
| A secure exam protocol without trusted parties G Bella, R Giustolisi, G Lenzini, PYA Ryan IFIP International Information Security Conference, 495-509, 2015 | 5 | 2015 |
| Secure exams despite malicious management G Bella, R Giustolisi, G Lenzini Privacy, Security and Trust (PST), 2014 Twelfth Annual International …, 2014 | 5 | 2014 |
| Threats to 5G group-based authentication R Giustolisi, C Gerhmann 13th International Conference on Security and Cryptography (SECRYPT 2016 …, 2016 | 3 | 2016 |
| 5G: Towards secure ubiquitous connectivity beyond 2020 M Svensson, N Paladi, R Giustolisi Swedish Institute of Computer Science, 2015 | 3 | 2015 |
| A socio-technical methodology for the security and privacy analysis of services G Bella, P Curzon, R Giustolisi, G Lenzini Computer Software and Applications Conference Workshops (COMPSACW), 2014 …, 2014 | 3 | 2014 |
| Studies in socio-technical security analysis: authentication of identities with TLS certificates A Ferreira, R Giustolisi, JL Huynen, V Koenig, G Lenzini Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 …, 2013 | 3 | 2013 |
| A Socio-technical Understanding of TLS Certificate Validation G Bella, R Giustolisi, G Lenzini IFIP International Conference on Trust Management, 281-288, 2013 | 3 | 2013 |
| On tools for socio-technical security analysis A Ferreira, R Giustolisi, JL Huynen, G Lenzini | 3 | 2013 |
| Trustworthy exams without trusted parties G Bella, R Giustolisi, G Lenzini, PYA Ryan Computers & Security 67, 291-307, 2017 | 2 | 2017 |
| A secure group-based AKA protocol for machine-type communications R Giustolisi, C Gehrmann, M Ahlström, S Holmberg International Conference on Information Security and Cryptology, 3-27, 2016 | 2 | 2016 |
| Formal security analysis of traditional and electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan International Conference on E-Business and Telecommunications, 294-318, 2014 | 1 | 2014 |
| Modelling and Verification of Secure Exams R Giustolisi Springer International Publishing, 2018 | | 2018 |
| Automated Analysis of Accountability A Bruni, R Giustolisi, C Schuermann International Conference on Information Security, 417-434, 2017 | | 2017 |