Enforcing privacy in e-commerce by balancing anonymity and trust G Bella, R Giustolisi, S Riccobene Computers & Security 30 (8), 705-718, 2011 | 39 | 2011 |
A framework for analyzing verifiability in traditional and electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini International Conference on Information Security Practice and Experience …, 2015 | 33* | 2015 |
Remark!: A Secure Protocol for Remote Exams R Giustolisi, G Lenzini, PYA Ryan Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March …, 2014 | 22 | 2014 |
What security for electronic exams? R Giustolisi, G Lenzini, G Bella 2013 International Conference on Risks and Security of Internet and Systems …, 2013 | 22 | 2013 |
Formal analysis of electronic exams J Dreier, R Giustolisi, A Kassem, P Lafourcade, G Lenzini, PYA Ryan 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-12, 2014 | 21 | 2014 |
Threats to 5G group-based authentication R Giustolisi, C Gerhmann 13th International Conference on Security and Cryptography (SECRYPT 2016 …, 2016 | 18 | 2016 |
On the possibility of non-interactive e-voting in the public-key setting R Giustolisi, V Iovino, PB Rønne Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 15 | 2016 |
Socio-technical formal analysis of TLS certificate validation in modern browsers G Bella, R Giustolisi, G Lenzini 2013 Eleventh Annual Conference on Privacy, Security and Trust, 309-316, 2013 | 13 | 2013 |
A secure exam protocol without trusted parties G Bella, R Giustolisi, G Lenzini, PYA Ryan ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 12 | 2015 |
Invalid certificates in modern browsers: A socio-technical analysis R Giustolisi, G Bella, G Lenzini Journal of Computer Security 26 (4), 509-541, 2018 | 11 | 2018 |
Automated analysis of accountability A Bruni, R Giustolisi, C Schuermann Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017 | 11 | 2017 |
A socio-technical methodology for the security and privacy analysis of services G Bella, P Curzon, R Giustolisi, G Lenzini 2014 IEEE 38th International Computer Software and Applications Conference …, 2014 | 10 | 2014 |
Modelling human threats in security ceremonies G Bella, R Giustolisi, C Schürmann Journal of Computer Security 30 (3), 411-433, 2022 | 9 | 2022 |
Free rides in Denmark: lessons from improperly generated mobile transport tickets R Giustolisi Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia …, 2017 | 9 | 2017 |
What are the threats?(charting the threat models of security ceremonies) D Sempreboni, G Bella, R Giustolisi, L Vigano Proceedings of the 16th International Joint Conference on e-Business and …, 2019 | 8 | 2019 |
A secure group-based AKA protocol for machine-type communications R Giustolisi, C Gehrmann, M Ahlström, S Holmberg Information Security and Cryptology–ICISC 2016: 19th International …, 2017 | 7 | 2017 |
Secure exams despite malicious management G Bella, R Giustolisi, G Lenzini 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 7 | 2014 |
Studies in socio-technical security analysis: authentication of identities with TLS certificates A Ferreira, R Giustolisi, JL Huynen, V Koenig, G Lenzini 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 7 | 2013 |
Trustworthy exams without trusted parties G Bella, R Giustolisi, G Lenzini, PYA Ryan Computers & Security 67, 291-307, 2017 | 6 | 2017 |
Security protocols as choreographies A Bruni, M Carbone, R Giustolisi, S Mödersheim, C Schürmann Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021 | 5 | 2021 |