iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/48/10528.bib
@inproceedings{DBLP:conf/evoteid/GiustolisiG24, author = {Rosario Giustolisi and Maryam Sheikhi Garjan}, editor = {David Duenas{-}Cid and Peter B. Roenne and Melanie Volkamer and Jurlind Budurushi and Michelle L. Blom and Adri{\`{a}} Rodr{\'{\i}}guez{-}P{\'{e}}rez and Iuliia Spycher{-}Krivonosova and Jordi Castell{\`{a}}{-}Roca and Jordi Barrat Esteve}, title = {Efficient Cleansing in Coercion-Resistant Voting}, booktitle = {Electronic Voting - 9th International Joint Conference, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {15014}, pages = {72--88}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-72244-8\_5}, doi = {10.1007/978-3-031-72244-8\_5}, timestamp = {Mon, 07 Oct 2024 22:58:47 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/GiustolisiG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sp/GiustolisiGS24, author = {Rosario Giustolisi and Maryam Sheikhi Garjan and Carsten Sch{\"{u}}rmann}, title = {Thwarting Last-Minute Voter Coercion}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco, CA, USA, May 19-23, 2024}, pages = {3423--3439}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SP54263.2024.00112}, doi = {10.1109/SP54263.2024.00112}, timestamp = {Sat, 21 Sep 2024 14:24:56 +0200}, biburl = {https://dblp.org/rec/conf/sp/GiustolisiGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itasec/DavidGMP23, author = {Bernardo David and Rosario Giustolisi and Victor Mortensen and Morten Pedersen}, editor = {Francesco Buccafurri and Elena Ferrari and Gianluca Lax}, title = {Local Differential Privacy in Voting}, booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC} 2023), Bari, Italy, May 2-5, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3488}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3488/paper16.pdf}, timestamp = {Tue, 12 Nov 2024 10:12:41 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DavidGMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/SheikhiGS23, author = {Maryam Sheikhi and Rosario Giustolisi and Carsten Sch{\"{u}}rmann}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Receipt-Free Electronic Voting from zk-SNARK}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {254--266}, publisher = {{SCITEPRESS}}, year = {2023}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SheikhiGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/GiustolisiGS23, author = {Rosario Giustolisi and Maryam Sheikhi Garjan and Carsten Schuermann}, title = {Thwarting Last-Minute Voter Coercion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1876}, year = {2023}, url = {https://eprint.iacr.org/2023/1876}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GiustolisiGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jcs/BellaGS22, author = {Giampaolo Bella and Rosario Giustolisi and Carsten Sch{\"{u}}rmann}, title = {Modelling human threats in security ceremonies}, journal = {J. Comput. Secur.}, volume = {30}, number = {3}, pages = {411--433}, year = {2022}, url = {https://doi.org/10.3233/JCS-210059}, doi = {10.3233/JCS-210059}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/BellaGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acns/GiustolisiS22, author = {Rosario Giustolisi and Carsten Sch{\"{u}}rmann}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {{POSTER:} Enabling User-Accountable Mechanisms in Decision Systems}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {600--605}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_33}, doi = {10.1007/978-3-031-16815-4\_33}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/acns/GiustolisiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/esorics/RakeeiGL22, author = {Mohammadamin Rakeei and Rosario Giustolisi and Gabriele Lenzini}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nicola Dragoni}, title = {Secure Internet Exams Despite Coercion}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13619}, pages = {85--100}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25734-6\_6}, doi = {10.1007/978-3-031-25734-6\_6}, timestamp = {Tue, 28 Feb 2023 08:10:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/RakeeiGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2207-12796, author = {Mohammadamin Rakeei and Rosario Giustolisi and Gabriele Lenzini}, title = {Secure Internet Exams Despite Coercion}, journal = {CoRR}, volume = {abs/2207.12796}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.12796}, doi = {10.48550/ARXIV.2207.12796}, eprinttype = {arXiv}, eprint = {2207.12796}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-12796.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/birthday/BruniCGMS21, author = {Alessandro Bruni and Marco Carbone and Rosario Giustolisi and Sebastian M{\"{o}}dersheim and Carsten Sch{\"{u}}rmann}, editor = {Daniel Dougherty and Jos{\'{e}} Meseguer and Sebastian Alexander M{\"{o}}dersheim and Paul D. Rowe}, title = {Security Protocols as Choreographies}, booktitle = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday}, series = {Lecture Notes in Computer Science}, volume = {13066}, pages = {98--111}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91631-2\_5}, doi = {10.1007/978-3-030-91631-2\_5}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/BruniCGMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/evoteid/GiustolisiB20, author = {Rosario Giustolisi and Alessandro Bruni}, editor = {Robert Krimmer and Melanie Volkamer and Bernhard Beckert and Ralf K{\"{u}}sters and Oksana Kulyk and David Duenas{-}Cid and Mikhel Solvak}, title = {Privacy-Preserving Dispute Resolution in the Improved Bingo Voting}, booktitle = {Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12455}, pages = {67--83}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60347-2\_5}, doi = {10.1007/978-3-030-60347-2\_5}, timestamp = {Fri, 25 Sep 2020 12:44:11 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/GiustolisiB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nss/RafnssonGKH20, author = {Willard Rafnsson and Rosario Giustolisi and Mark Kragerup and Mathias H{\o}yrup}, editor = {Miroslaw Kutylowski and Jun Zhang and Chao Chen}, title = {Fixing Vulnerabilities Automatically with Linters}, booktitle = {Network and System Security - 14th International Conference, {NSS} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12570}, pages = {224--244}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65745-1\_13}, doi = {10.1007/978-3-030-65745-1\_13}, timestamp = {Tue, 05 Jan 2021 17:15:05 +0100}, biburl = {https://dblp.org/rec/conf/nss/RafnssonGKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icete/SempreboniBG019, author = {Diego Sempreboni and Giampaolo Bella and Rosario Giustolisi and Luca Vigan{\`{o}}}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {What Are the Threats? (Charting the Threat Models of Security Ceremonies)}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {161--172}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007924901610172}, doi = {10.5220/0007924901610172}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/SempreboniBG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/stast/GarbaczGNS19, author = {Ivan Garbacz and Rosario Giustolisi and Kasper M{\o}ller Nielsen and Carsten Schuermann}, editor = {Thomas Gro{\ss} and Theo Tryfonas}, title = {A Security Analysis of the Danish Deposit Return System}, booktitle = {Socio-Technical Aspects in Security and Trust - 9th International Workshop, {STAST} 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11739}, pages = {124--139}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-55958-8\_7}, doi = {10.1007/978-3-030-55958-8\_7}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/GarbaczGNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @book{DBLP:series/isc/Giustolisi18, author = {Rosario Giustolisi}, title = {Modelling and Verification of Secure Exams}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-67107-9}, doi = {10.1007/978-3-319-67107-9}, isbn = {978-3-319-67106-2}, timestamp = {Tue, 20 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/Giustolisi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jcs/GiustolisiBL18, author = {Rosario Giustolisi and Giampaolo Bella and Gabriele Lenzini}, title = {Invalid certificates in modern browsers: {A} socio-technical analysis}, journal = {J. Comput. Secur.}, volume = {26}, number = {4}, pages = {509--541}, year = {2018}, url = {https://doi.org/10.3233/JCS-16891}, doi = {10.3233/JCS-16891}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GiustolisiBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/compsec/BellaGLR17, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, title = {Trustworthy exams without trusted parties}, journal = {Comput. Secur.}, volume = {67}, pages = {291--307}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.12.005}, doi = {10.1016/J.COSE.2016.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BellaGLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/essos/BellaG17, author = {Giampaolo Bella and Rosario Giustolisi}, editor = {Eric Bodden and Mathias Payer and Elias Athanasopoulos}, title = {Idea: {A} Unifying Theory for Evaluation Systems}, booktitle = {Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10379}, pages = {231--239}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-62105-0\_15}, doi = {10.1007/978-3-319-62105-0\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/BellaG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isw/BruniGS17, author = {Alessandro Bruni and Rosario Giustolisi and Carsten Schuermann}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Automated Analysis of Accountability}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {417--434}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_23}, doi = {10.1007/978-3-319-69659-1\_23}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/BruniGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nordsec/Giustolisi17, author = {Rosario Giustolisi}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {159--174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_10}, doi = {10.1007/978-3-319-70290-2\_10}, timestamp = {Mon, 26 Jun 2023 20:48:37 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/Giustolisi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/GiustolisiIL17, author = {Rosario Giustolisi and Vincenzo Iovino and Gabriele Lenzini}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Privacy-Preserving Verifiability - {A} Case for an Electronic Exam Protocol}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {139--150}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006429101390150}, doi = {10.5220/0006429101390150}, timestamp = {Thu, 17 Aug 2017 18:31:18 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GiustolisiIL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/fc/GiustolisiIR16, author = {Rosario Giustolisi and Vincenzo Iovino and Peter B. R{\o}nne}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {On the Possibility of Non-interactive E-Voting in the Public-Key Setting}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {193--208}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_13}, doi = {10.1007/978-3-662-53357-4\_13}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/GiustolisiIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icisc/GiustolisiGAH16, author = {Rosario Giustolisi and Christian Gehrmann and Markus Ahlstr{\"{o}}m and Simon Holmberg}, editor = {Seokhie Hong and Jong Hwan Park}, title = {A Secure Group-Based {AKA} Protocol for Machine-Type Communications}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {3--27}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_1}, doi = {10.1007/978-3-319-53177-9\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GiustolisiGAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/GiustolisiG16, author = {Rosario Giustolisi and Christian Gehrmann}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Threats to 5G Group-based Authentication}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {360--367}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005996203600367}, doi = {10.5220/0005996203600367}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GiustolisiG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ispec/DreierGKLL15, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {A Framework for Analyzing Verifiability in Traditional and Electronic Exams}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {514--529}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_35}, doi = {10.1007/978-3-319-17533-1\_35}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/DreierGKLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sec/BellaGLR15, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Hannes Federrath and Dieter Gollmann}, title = {A Secure Exam Protocol Without Trusted Parties}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {495--509}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_33}, doi = {10.1007/978-3-319-18467-8\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BellaGLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/Giustolisi15, author = {Rosario Giustolisi}, title = {Design and Analysis of Secure Exam Protocols}, journal = {CoRR}, volume = {abs/1512.04751}, year = {2015}, url = {http://arxiv.org/abs/1512.04751}, eprinttype = {arXiv}, eprint = {1512.04751}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Giustolisi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/GiustolisiIR15, author = {Rosario Giustolisi and Vincenzo Iovino and Peter B. R{\o}nne}, title = {On the Possibility of Non-Interactive E-Voting in the Public-key Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1119}, year = {2015}, url = {http://eprint.iacr.org/2015/1119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiustolisiIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/compsac/BellaCGL14, author = {Giampaolo Bella and Paul Curzon and Rosario Giustolisi and Gabriele Lenzini}, title = {A Socio-technical Methodology for the Security and Privacy Analysis of Services}, booktitle = {{IEEE} 38th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2014, Vasteras, Sweden, July 21-25, 2014}, pages = {401--406}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/COMPSACW.2014.69}, doi = {10.1109/COMPSACW.2014.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/BellaCGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icete/DreierG0LLR14, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Joaquim Filipe}, title = {Formal Security Analysis of Traditional and Electronic Exams}, booktitle = {E-Business and Telecommunications - 11th International Joint Conference, {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {554}, pages = {294--318}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-25915-4\_16}, doi = {10.1007/978-3-319-25915-4\_16}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/DreierG0LLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/pst/BellaGL14, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Secure exams despite malicious management}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {274--281}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890949}, doi = {10.1109/PST.2014.6890949}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BellaGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/secrypt/DreierGKLLR14, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Formal Analysis of Electronic Exams}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {101--112}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005050901010112}, doi = {10.5220/0005050901010112}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DreierGKLLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/spw/GiustolisiLR14, author = {Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Remark!: {A} Secure Protocol for Remote Exams}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {38--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_5}, doi = {10.1007/978-3-319-12400-1\_5}, timestamp = {Mon, 05 Feb 2024 20:35:15 +0100}, biburl = {https://dblp.org/rec/conf/spw/GiustolisiLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/spw/Giustolisi14, author = {Rosario Giustolisi}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Remark!: {A} Secure Protocol for Remote Exams (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {49--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_6}, doi = {10.1007/978-3-319-12400-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Giustolisi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/crisis/GiustolisiLB13, author = {Rosario Giustolisi and Gabriele Lenzini and Giampaolo Bella}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {What security for electronic exams?}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766348}, doi = {10.1109/CRISIS.2013.6766348}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/GiustolisiLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ifiptm/BellaGL13, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini}, editor = {M. Carmen Fern{\'{a}}ndez Gago and Fabio Martinelli and Siani Pearson and Isaac Agudo}, title = {A Socio-technical Understanding of {TLS} Certificate Validation}, booktitle = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {401}, pages = {281--288}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38323-6\_23}, doi = {10.1007/978-3-642-38323-6\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BellaGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/pst/BellaGL13, author = {Giampaolo Bella and Rosario Giustolisi and Gabriele Lenzini}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Socio-technical formal analysis of {TLS} certificate validation in modern browsers}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {309--316}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596067}, doi = {10.1109/PST.2013.6596067}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BellaGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/trustcom/FerreiraGHKL13, author = {Ana Ferreira and Rosario Giustolisi and Jean{-}Louis Huynen and Vincent Koenig and Gabriele Lenzini}, title = {Studies in Socio-technical Security Analysis: Authentication of Identities with {TLS} Certificates}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1553--1558}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.190}, doi = {10.1109/TRUSTCOM.2013.190}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FerreiraGHKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/compsec/BellaGR11, author = {Giampaolo Bella and Rosario Giustolisi and Salvatore Riccobene}, title = {Enforcing privacy in e-commerce by balancing anonymity and trust}, journal = {Comput. Secur.}, volume = {30}, number = {8}, pages = {705--718}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.08.005}, doi = {10.1016/J.COSE.2011.08.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BellaGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }