@inproceedings{DBLP:conf/evoteid/GiustolisiG24,
author = {Rosario Giustolisi and
Maryam Sheikhi Garjan},
editor = {David Duenas{-}Cid and
Peter B. Roenne and
Melanie Volkamer and
Jurlind Budurushi and
Michelle L. Blom and
Adri{\`{a}} Rodr{\'{\i}}guez{-}P{\'{e}}rez and
Iuliia Spycher{-}Krivonosova and
Jordi Castell{\`{a}}{-}Roca and
Jordi Barrat Esteve},
title = {Efficient Cleansing in Coercion-Resistant Voting},
booktitle = {Electronic Voting - 9th International Joint Conference, E-Vote-ID
2024, Tarragona, Spain, October 2-4, 2024, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {15014},
pages = {72--88},
publisher = {Springer},
year = {2024},
url = {https://doi.org/10.1007/978-3-031-72244-8\_5},
doi = {10.1007/978-3-031-72244-8\_5},
timestamp = {Mon, 07 Oct 2024 22:58:47 +0200},
biburl = {https://dblp.org/rec/conf/evoteid/GiustolisiG24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GiustolisiGS24,
author = {Rosario Giustolisi and
Maryam Sheikhi Garjan and
Carsten Sch{\"{u}}rmann},
title = {Thwarting Last-Minute Voter Coercion},
booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco,
CA, USA, May 19-23, 2024},
pages = {3423--3439},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/SP54263.2024.00112},
doi = {10.1109/SP54263.2024.00112},
timestamp = {Sat, 21 Sep 2024 14:24:56 +0200},
biburl = {https://dblp.org/rec/conf/sp/GiustolisiGS24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/DavidGMP23,
author = {Bernardo David and
Rosario Giustolisi and
Victor Mortensen and
Morten Pedersen},
editor = {Francesco Buccafurri and
Elena Ferrari and
Gianluca Lax},
title = {Local Differential Privacy in Voting},
booktitle = {Proceedings of the Italian Conference on Cyber Security {(ITASEC}
2023), Bari, Italy, May 2-5, 2023},
series = {{CEUR} Workshop Proceedings},
volume = {3488},
publisher = {CEUR-WS.org},
year = {2023},
url = {https://ceur-ws.org/Vol-3488/paper16.pdf},
timestamp = {Tue, 12 Nov 2024 10:12:41 +0100},
biburl = {https://dblp.org/rec/conf/itasec/DavidGMP23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SheikhiGS23,
author = {Maryam Sheikhi and
Rosario Giustolisi and
Carsten Sch{\"{u}}rmann},
editor = {Sabrina De Capitani di Vimercati and
Pierangela Samarati},
title = {Receipt-Free Electronic Voting from zk-SNARK},
booktitle = {Proceedings of the 20th International Conference on Security and Cryptography,
{SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
pages = {254--266},
publisher = {{SCITEPRESS}},
year = {2023},
timestamp = {Wed, 10 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/secrypt/SheikhiGS23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiustolisiGS23,
author = {Rosario Giustolisi and
Maryam Sheikhi Garjan and
Carsten Schuermann},
title = {Thwarting Last-Minute Voter Coercion},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1876},
year = {2023},
url = {https://eprint.iacr.org/2023/1876},
timestamp = {Wed, 10 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/GiustolisiGS23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BellaGS22,
author = {Giampaolo Bella and
Rosario Giustolisi and
Carsten Sch{\"{u}}rmann},
title = {Modelling human threats in security ceremonies},
journal = {J. Comput. Secur.},
volume = {30},
number = {3},
pages = {411--433},
year = {2022},
url = {https://doi.org/10.3233/JCS-210059},
doi = {10.3233/JCS-210059},
timestamp = {Wed, 10 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jcs/BellaGS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GiustolisiS22,
author = {Rosario Giustolisi and
Carsten Sch{\"{u}}rmann},
editor = {Jianying Zhou and
Sridhar Adepu and
Cristina Alcaraz and
Lejla Batina and
Emiliano Casalicchio and
Sudipta Chattopadhyay and
Chenglu Jin and
Jingqiang Lin and
Eleonora Losiouk and
Suryadipta Majumdar and
Weizhi Meng and
Stjepan Picek and
Jun Shao and
Chunhua Su and
Cong Wang and
Yury Zhauniarovich and
Saman A. Zonouz},
title = {{POSTER:} Enabling User-Accountable Mechanisms in Decision Systems},
booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI,
SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {13285},
pages = {600--605},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-16815-4\_33},
doi = {10.1007/978-3-031-16815-4\_33},
timestamp = {Tue, 20 Aug 2024 07:54:44 +0200},
biburl = {https://dblp.org/rec/conf/acns/GiustolisiS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RakeeiGL22,
author = {Mohammadamin Rakeei and
Rosario Giustolisi and
Gabriele Lenzini},
editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
Guillermo Navarro{-}Arribas and
Nicola Dragoni},
title = {Secure Internet Exams Despite Coercion},
booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
- {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022,
Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {13619},
pages = {85--100},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-25734-6\_6},
doi = {10.1007/978-3-031-25734-6\_6},
timestamp = {Tue, 28 Feb 2023 08:10:09 +0100},
biburl = {https://dblp.org/rec/conf/esorics/RakeeiGL22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-12796,
author = {Mohammadamin Rakeei and
Rosario Giustolisi and
Gabriele Lenzini},
title = {Secure Internet Exams Despite Coercion},
journal = {CoRR},
volume = {abs/2207.12796},
year = {2022},
url = {https://doi.org/10.48550/arXiv.2207.12796},
doi = {10.48550/ARXIV.2207.12796},
eprinttype = {arXiv},
eprint = {2207.12796},
timestamp = {Mon, 01 Aug 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2207-12796.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BruniCGMS21,
author = {Alessandro Bruni and
Marco Carbone and
Rosario Giustolisi and
Sebastian M{\"{o}}dersheim and
Carsten Sch{\"{u}}rmann},
editor = {Daniel Dougherty and
Jos{\'{e}} Meseguer and
Sebastian Alexander M{\"{o}}dersheim and
Paul D. Rowe},
title = {Security Protocols as Choreographies},
booktitle = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman
on the Occasion of his 66.66th Birthday},
series = {Lecture Notes in Computer Science},
volume = {13066},
pages = {98--111},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-91631-2\_5},
doi = {10.1007/978-3-030-91631-2\_5},
timestamp = {Wed, 10 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/birthday/BruniCGMS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/GiustolisiB20,
author = {Rosario Giustolisi and
Alessandro Bruni},
editor = {Robert Krimmer and
Melanie Volkamer and
Bernhard Beckert and
Ralf K{\"{u}}sters and
Oksana Kulyk and
David Duenas{-}Cid and
Mikhel Solvak},
title = {Privacy-Preserving Dispute Resolution in the Improved Bingo Voting},
booktitle = {Electronic Voting - 5th International Joint Conference, E-Vote-ID
2020, Bregenz, Austria, October 6-9, 2020, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {12455},
pages = {67--83},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-60347-2\_5},
doi = {10.1007/978-3-030-60347-2\_5},
timestamp = {Fri, 25 Sep 2020 12:44:11 +0200},
biburl = {https://dblp.org/rec/conf/evoteid/GiustolisiB20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/RafnssonGKH20,
author = {Willard Rafnsson and
Rosario Giustolisi and
Mark Kragerup and
Mathias H{\o}yrup},
editor = {Miroslaw Kutylowski and
Jun Zhang and
Chao Chen},
title = {Fixing Vulnerabilities Automatically with Linters},
booktitle = {Network and System Security - 14th International Conference, {NSS}
2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {12570},
pages = {224--244},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-65745-1\_13},
doi = {10.1007/978-3-030-65745-1\_13},
timestamp = {Tue, 05 Jan 2021 17:15:05 +0100},
biburl = {https://dblp.org/rec/conf/nss/RafnssonGKH20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/SempreboniBG019,
author = {Diego Sempreboni and
Giampaolo Bella and
Rosario Giustolisi and
Luca Vigan{\`{o}}},
editor = {Mohammad S. Obaidat and
Pierangela Samarati},
title = {What Are the Threats? (Charting the Threat Models of Security Ceremonies)},
booktitle = {Proceedings of the 16th International Joint Conference on e-Business
and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
Czech Republic, July 26-28, 2019},
pages = {161--172},
publisher = {SciTePress},
year = {2019},
url = {https://doi.org/10.5220/0007924901610172},
doi = {10.5220/0007924901610172},
timestamp = {Tue, 06 Jun 2023 14:58:02 +0200},
biburl = {https://dblp.org/rec/conf/icete/SempreboniBG019.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/GarbaczGNS19,
author = {Ivan Garbacz and
Rosario Giustolisi and
Kasper M{\o}ller Nielsen and
Carsten Schuermann},
editor = {Thomas Gro{\ss} and
Theo Tryfonas},
title = {A Security Analysis of the Danish Deposit Return System},
booktitle = {Socio-Technical Aspects in Security and Trust - 9th International
Workshop, {STAST} 2019, Luxembourg City, Luxembourg, September 26,
2019, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {11739},
pages = {124--139},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-55958-8\_7},
doi = {10.1007/978-3-030-55958-8\_7},
timestamp = {Wed, 10 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/stast/GarbaczGNS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Giustolisi18,
author = {Rosario Giustolisi},
title = {Modelling and Verification of Secure Exams},
series = {Information Security and Cryptography},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-67107-9},
doi = {10.1007/978-3-319-67107-9},
isbn = {978-3-319-67106-2},
timestamp = {Tue, 20 Mar 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/series/isc/Giustolisi18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GiustolisiBL18,
author = {Rosario Giustolisi and
Giampaolo Bella and
Gabriele Lenzini},
title = {Invalid certificates in modern browsers: {A} socio-technical analysis},
journal = {J. Comput. Secur.},
volume = {26},
number = {4},
pages = {509--541},
year = {2018},
url = {https://doi.org/10.3233/JCS-16891},
doi = {10.3233/JCS-16891},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jcs/GiustolisiBL18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BellaGLR17,
author = {Giampaolo Bella and
Rosario Giustolisi and
Gabriele Lenzini and
Peter Y. A. Ryan},
title = {Trustworthy exams without trusted parties},
journal = {Comput. Secur.},
volume = {67},
pages = {291--307},
year = {2017},
url = {https://doi.org/10.1016/j.cose.2016.12.005},
doi = {10.1016/J.COSE.2016.12.005},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/BellaGLR17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BellaG17,
author = {Giampaolo Bella and
Rosario Giustolisi},
editor = {Eric Bodden and
Mathias Payer and
Elias Athanasopoulos},
title = {Idea: {A} Unifying Theory for Evaluation Systems},
booktitle = {Engineering Secure Software and Systems - 9th International Symposium,
ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10379},
pages = {231--239},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-62105-0\_15},
doi = {10.1007/978-3-319-62105-0\_15},
timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/essos/BellaG17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BruniGS17,
author = {Alessandro Bruni and
Rosario Giustolisi and
Carsten Schuermann},
editor = {Phong Q. Nguyen and
Jianying Zhou},
title = {Automated Analysis of Accountability},
booktitle = {Information Security - 20th International Conference, {ISC} 2017,
Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10599},
pages = {417--434},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-69659-1\_23},
doi = {10.1007/978-3-319-69659-1\_23},
timestamp = {Wed, 10 Jan 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/isw/BruniGS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Giustolisi17,
author = {Rosario Giustolisi},
editor = {Helger Lipmaa and
Aikaterini Mitrokotsa and
Raimundas Matulevicius},
title = {Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport
Tickets},
booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
Estonia, November 8-10, 2017, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10674},
pages = {159--174},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-70290-2\_10},
doi = {10.1007/978-3-319-70290-2\_10},
timestamp = {Mon, 26 Jun 2023 20:48:37 +0200},
biburl = {https://dblp.org/rec/conf/nordsec/Giustolisi17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GiustolisiIL17,
author = {Rosario Giustolisi and
Vincenzo Iovino and
Gabriele Lenzini},
editor = {Pierangela Samarati and
Mohammad S. Obaidat and
Enrique Cabello},
title = {Privacy-Preserving Verifiability - {A} Case for an Electronic Exam
Protocol},
booktitle = {Proceedings of the 14th International Joint Conference on e-Business
and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
Spain, July 24-26, 2017},
pages = {139--150},
publisher = {SciTePress},
year = {2017},
url = {https://doi.org/10.5220/0006429101390150},
doi = {10.5220/0006429101390150},
timestamp = {Thu, 17 Aug 2017 18:31:18 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/GiustolisiIL17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GiustolisiIR16,
author = {Rosario Giustolisi and
Vincenzo Iovino and
Peter B. R{\o}nne},
editor = {Jeremy Clark and
Sarah Meiklejohn and
Peter Y. A. Ryan and
Dan S. Wallach and
Michael Brenner and
Kurt Rohloff},
title = {On the Possibility of Non-interactive E-Voting in the Public-Key Setting},
booktitle = {Financial Cryptography and Data Security - {FC} 2016 International
Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
26, 2016, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {9604},
pages = {193--208},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-662-53357-4\_13},
doi = {10.1007/978-3-662-53357-4\_13},
timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/fc/GiustolisiIR16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GiustolisiGAH16,
author = {Rosario Giustolisi and
Christian Gehrmann and
Markus Ahlstr{\"{o}}m and
Simon Holmberg},
editor = {Seokhie Hong and
Jong Hwan Park},
title = {A Secure Group-Based {AKA} Protocol for Machine-Type Communications},
booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International
Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {10157},
pages = {3--27},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-53177-9\_1},
doi = {10.1007/978-3-319-53177-9\_1},
timestamp = {Tue, 14 May 2019 10:00:36 +0200},
biburl = {https://dblp.org/rec/conf/icisc/GiustolisiGAH16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GiustolisiG16,
author = {Rosario Giustolisi and
Christian Gehrmann},
editor = {Christian Callegari and
Marten van Sinderen and
Panagiotis G. Sarigiannidis and
Pierangela Samarati and
Enrique Cabello and
Pascal Lorenz and
Mohammad S. Obaidat},
title = {Threats to 5G Group-based Authentication},
booktitle = {Proceedings of the 13th International Joint Conference on e-Business
and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
Portugal, July 26-28, 2016},
pages = {360--367},
publisher = {SciTePress},
year = {2016},
url = {https://doi.org/10.5220/0005996203600367},
doi = {10.5220/0005996203600367},
timestamp = {Sun, 21 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/GiustolisiG16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/DreierGKLL15,
author = {Jannik Dreier and
Rosario Giustolisi and
Ali Kassem and
Pascal Lafourcade and
Gabriele Lenzini},
editor = {Javier L{\'{o}}pez and
Yongdong Wu},
title = {A Framework for Analyzing Verifiability in Traditional and Electronic
Exams},
booktitle = {Information Security Practice and Experience - 11th International
Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9065},
pages = {514--529},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-17533-1\_35},
doi = {10.1007/978-3-319-17533-1\_35},
timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ispec/DreierGKLL15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BellaGLR15,
author = {Giampaolo Bella and
Rosario Giustolisi and
Gabriele Lenzini and
Peter Y. A. Ryan},
editor = {Hannes Federrath and
Dieter Gollmann},
title = {A Secure Exam Protocol Without Trusted Parties},
booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
2015, Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {455},
pages = {495--509},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-18467-8\_33},
doi = {10.1007/978-3-319-18467-8\_33},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sec/BellaGLR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Giustolisi15,
author = {Rosario Giustolisi},
title = {Design and Analysis of Secure Exam Protocols},
journal = {CoRR},
volume = {abs/1512.04751},
year = {2015},
url = {http://arxiv.org/abs/1512.04751},
eprinttype = {arXiv},
eprint = {1512.04751},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/Giustolisi15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiustolisiIR15,
author = {Rosario Giustolisi and
Vincenzo Iovino and
Peter B. R{\o}nne},
title = {On the Possibility of Non-Interactive E-Voting in the Public-key Setting},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1119},
year = {2015},
url = {http://eprint.iacr.org/2015/1119},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/GiustolisiIR15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BellaCGL14,
author = {Giampaolo Bella and
Paul Curzon and
Rosario Giustolisi and
Gabriele Lenzini},
title = {A Socio-technical Methodology for the Security and Privacy Analysis
of Services},
booktitle = {{IEEE} 38th Annual Computer Software and Applications Conference,
{COMPSAC} Workshops 2014, Vasteras, Sweden, July 21-25, 2014},
pages = {401--406},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/COMPSACW.2014.69},
doi = {10.1109/COMPSACW.2014.69},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/compsac/BellaCGL14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/DreierG0LLR14,
author = {Jannik Dreier and
Rosario Giustolisi and
Ali Kassem and
Pascal Lafourcade and
Gabriele Lenzini and
Peter Y. A. Ryan},
editor = {Mohammad S. Obaidat and
Andreas Holzinger and
Joaquim Filipe},
title = {Formal Security Analysis of Traditional and Electronic Exams},
booktitle = {E-Business and Telecommunications - 11th International Joint Conference,
{ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected
Papers},
series = {Communications in Computer and Information Science},
volume = {554},
pages = {294--318},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-25915-4\_16},
doi = {10.1007/978-3-319-25915-4\_16},
timestamp = {Tue, 16 Aug 2022 23:04:29 +0200},
biburl = {https://dblp.org/rec/conf/icete/DreierG0LLR14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BellaGL14,
author = {Giampaolo Bella and
Rosario Giustolisi and
Gabriele Lenzini},
editor = {Ali Miri and
Urs Hengartner and
Nen{-}Fu Huang and
Audun J{\o}sang and
Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
title = {Secure exams despite malicious management},
booktitle = {2014 Twelfth Annual International Conference on Privacy, Security
and Trust, Toronto, ON, Canada, July 23-24, 2014},
pages = {274--281},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/PST.2014.6890949},
doi = {10.1109/PST.2014.6890949},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/pst/BellaGL14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DreierGKLLR14,
author = {Jannik Dreier and
Rosario Giustolisi and
Ali Kassem and
Pascal Lafourcade and
Gabriele Lenzini and
Peter Y. A. Ryan},
editor = {Mohammad S. Obaidat and
Andreas Holzinger and
Pierangela Samarati},
title = {Formal Analysis of Electronic Exams},
booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
pages = {101--112},
publisher = {SciTePress},
year = {2014},
url = {https://doi.org/10.5220/0005050901010112},
doi = {10.5220/0005050901010112},
timestamp = {Wed, 11 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/secrypt/DreierGKLLR14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GiustolisiLR14,
author = {Rosario Giustolisi and
Gabriele Lenzini and
Peter Y. A. Ryan},
editor = {Bruce Christianson and
James A. Malcolm and
Vashek Maty{\'{a}}s and
Petr Svenda and
Frank Stajano and
Jonathan Anderson},
title = {Remark!: {A} Secure Protocol for Remote Exams},
booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
UK, March 19-21, 2014 Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {8809},
pages = {38--48},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-12400-1\_5},
doi = {10.1007/978-3-319-12400-1\_5},
timestamp = {Mon, 05 Feb 2024 20:35:15 +0100},
biburl = {https://dblp.org/rec/conf/spw/GiustolisiLR14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Giustolisi14,
author = {Rosario Giustolisi},
editor = {Bruce Christianson and
James A. Malcolm and
Vashek Maty{\'{a}}s and
Petr Svenda and
Frank Stajano and
Jonathan Anderson},
title = {Remark!: {A} Secure Protocol for Remote Exams (Transcript of Discussion)},
booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
UK, March 19-21, 2014 Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {8809},
pages = {49--54},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-12400-1\_6},
doi = {10.1007/978-3-319-12400-1\_6},
timestamp = {Thu, 25 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/spw/Giustolisi14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/GiustolisiLB13,
author = {Rosario Giustolisi and
Gabriele Lenzini and
Giampaolo Bella},
editor = {Bruno Crispo and
Ravi S. Sandhu and
Nora Cuppens{-}Boulahia and
Mauro Conti and
Jean{-}Louis Lanet},
title = {What security for electronic exams?},
booktitle = {2013 International Conference on Risks and Security of Internet and
Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
pages = {1--5},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/CRiSIS.2013.6766348},
doi = {10.1109/CRISIS.2013.6766348},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/crisis/GiustolisiLB13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BellaGL13,
author = {Giampaolo Bella and
Rosario Giustolisi and
Gabriele Lenzini},
editor = {M. Carmen Fern{\'{a}}ndez Gago and
Fabio Martinelli and
Siani Pearson and
Isaac Agudo},
title = {A Socio-technical Understanding of {TLS} Certificate Validation},
booktitle = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference,
{IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {401},
pages = {281--288},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-38323-6\_23},
doi = {10.1007/978-3-642-38323-6\_23},
timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ifiptm/BellaGL13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BellaGL13,
author = {Giampaolo Bella and
Rosario Giustolisi and
Gabriele Lenzini},
editor = {Jordi Castell{\`{a}}{-}Roca and
Josep Domingo{-}Ferrer and
Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
Ali A. Ghorbani and
Christian Damsgaard Jensen and
Jes{\'{u}}s A. Manj{\'{o}}n and
Iosif{-}Viorel Onut and
Natalia Stakhanova and
Vicen{\c{c}} Torra and
Jie Zhang},
title = {Socio-technical formal analysis of {TLS} certificate validation in
modern browsers},
booktitle = {Eleventh Annual International Conference on Privacy, Security and
Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
July 10-12, 2013},
pages = {309--316},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/PST.2013.6596067},
doi = {10.1109/PST.2013.6596067},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/pst/BellaGL13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FerreiraGHKL13,
author = {Ana Ferreira and
Rosario Giustolisi and
Jean{-}Louis Huynen and
Vincent Koenig and
Gabriele Lenzini},
title = {Studies in Socio-technical Security Analysis: Authentication of Identities
with {TLS} Certificates},
booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
Symposium on Parallel and Distributed Processing with Applications,
{ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
pages = {1553--1558},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/TrustCom.2013.190},
doi = {10.1109/TRUSTCOM.2013.190},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/FerreiraGHKL13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BellaGR11,
author = {Giampaolo Bella and
Rosario Giustolisi and
Salvatore Riccobene},
title = {Enforcing privacy in e-commerce by balancing anonymity and trust},
journal = {Comput. Secur.},
volume = {30},
number = {8},
pages = {705--718},
year = {2011},
url = {https://doi.org/10.1016/j.cose.2011.08.005},
doi = {10.1016/J.COSE.2011.08.005},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/BellaGR11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}