Flaminia L. Luccio

Orcid: 0000-0002-5409-5039

Affiliations:
  • Ca' Foscari University of Venice, Venice, Italy


According to our database1, Flaminia L. Luccio authored at least 80 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Wearable Wisdom: A Bi-Modal Behavioral Biometric Scheme for Smartwatch User Authentication.
IEEE Access, 2024

Understanding how users choose passwords: analysis and best practices.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

2in1: A Bimodal Behavioral Biometric-based User Authentication Scheme for Smartphones.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

Bridging the Gap: Automated Analysis of Sancus.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs.
SN Comput. Sci., July, 2023

A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case Study.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Accessible Applications to Improve the Tourist Experience.
Proceedings of the Computer-Human Interaction Research and Applications, 2023

2022
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

The Revenge of Password Crackers: Automated Training of Password Cracking Tools.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
FWS: Analyzing, maintaining and transcompiling firewalls.
J. Comput. Secur., 2021

Firmware Extraction from Real IoT Devices through Power Analysis of AES.
Proceedings of the Italian Conference on Cybersecurity, 2021

A Formally Verified Configuration for Hardware Security Modules in the Cloud.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Secure Key Management Policies in Strand Spaces.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions.
Inf., 2020

Broadcasting with Mobile Agents in Dynamic Networks.
Proceedings of the 24th International Conference on Principles of Distributed Systems, 2020

Learning Sign Language from a Sanbot Robot.
Proceedings of the GoodTechs '20: 6th EAI International Conference on Smart Objects and Technologies for Social Good, 2020

Automated Analysis of PUF-based Protocols.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
Gathering of robots in a ring with mobile faults.
Theor. Comput. Sci., 2019

Usable security for QR code.
J. Inf. Secur. Appl., 2019

Gathering of Robots in a Grid with Mobile Faults.
Proceedings of the SOFSEM 2019: Theory and Practice of Computer Science, 2019

Evaluating Security, Privacy and Usability Features of QR Code Readers.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Design and implementation of an airport chatbot.
Proceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good, 2019

2018
Designing Tourism Websites for Children: Guidelines and Experimental Results.
EAI Endorsed Trans. Serious Games, 2018

Neural Cryptanalysis of Classical Ciphers.
Proceedings of the 19th Italian Conference on Theoretical Computer Science, 2018

Usable cryptographic QR codes.
Proceedings of the IEEE International Conference on Industrial Technology, 2018

Accessible Tourism for Users with Hearing Loss.
Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good, 2018

Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Accessible and UsableWebsites and Mobile Applications for People with Autism Spectrum Disorders: a Comparative Study.
EAI Endorsed Trans. Ambient Syst., 2017

Usable and Accessible Tourism Websites for Children: A Case Study of a Naturalistic Oasis.
Proceedings of the Smart Objects and Technologies for Social Good, 2017

2016
Gathering of Robots in a Ring with Mobile Faults.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

A Review of Websites and Mobile Applications for People with Autism Spectrum Disorders: Towards Shared Guidelines.
Proceedings of the Smart Objects and Technologies for Social Good, 2016

Localizing Firewall Security Policies.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors.
Proceedings of the Algorithms for Sensor Systems, 2015

Mobile Agents Rendezvous in Spite of a Malicious Agent.
Proceedings of the Algorithms for Sensor Systems, 2015

2014
Editorial: Fun with Algorithms.
Theory Comput. Syst., 2014

Mobile Agents Rendezvous in spite of a Malicious Agent.
CoRR, 2014

Mignis: A Semantic Based Tool for Firewall Configuration.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Type-based analysis of key management in PKCS#11 cryptographic devices.
J. Comput. Secur., 2013

Type-Based Analysis of Generic Key Management APIs (Long Version).
IACR Cryptol. ePrint Arch., 2013

Type-Based Analysis of Generic Key Management APIs.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

2012
Guessing Bank PINs by Winning a Mastermind Game.
Theory Comput. Syst., 2012

Type-Based Analysis of PKCS#11 Key Management.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

2011
Secure Recharge of Disposable RFID Tickets.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

An Introduction to Security API Analysis.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

2010
Secure Upgrade of Hardware Security Modules in Bank Networks.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Cracking Bank PINs by Playing Mastermind.
Proceedings of the Fun with Algorithms, 5th International Conference, 2010

2009
Contiguous Search Problem in Sierpinski Graphs.
Theory Comput. Syst., 2009

Blunting Differential Attacks on PIN Processing APIs.
Proceedings of the Identity and Privacy in the Internet Age, 2009

Type-Based Analysis of PIN Processing APIs.
Proceedings of the Computer Security, 2009

2008
Decontamination of hypercubes by mobile agents.
Networks, 2008

A New Concept Map Model for E-Learning Environments.
Proceedings of the Web Information Systems and Technologies, 4th International Conference, 2008

Formalizing a Model to Represent and Visualize Concept Spaces in E-Learning Environments.
Proceedings of the WEBIST 2008, 2008

2007
Feedback vertex sets in mesh-based networks.
Theor. Comput. Sci., 2007

Decontaminating Chordal Rings and Tori Using Mobile Agents.
Int. J. Found. Comput. Sci., 2007

Intruder Capture in Sierpinski Graphs.
Proceedings of the Fun with Algorithms, 4th International Conference, 2007

2006
Decontamination of chordal rings and tori.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

2005
Contiguous Search in the Hypercube for Capturing an Intruder.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Size Optimal Strategies for Capturing an Intruder in Mesh Networks.
Proceedings of the 2005 International Conference on Communications in Computing, 2005

2004
Fault-tolerant support for reliable multicast in Mobile Wireless Systems: Design and Evaluation.
Wirel. Networks, 2004

Compact Routing Schemes for Dynamic Ring Networks.
Theory Comput. Syst., 2004

Sorting and election in anonymous asynchronous rings.
J. Parallel Distributed Comput., 2004

A modular approach to Sprouts.
Discret. Appl. Math., 2004

Nesting analysis of mobile ambients.
Comput. Lang. Syst. Struct., 2004

Tighter Bounds on Feedback Vertex Sets in Mesh-Based Networks.
Proceedings of the Structural Information and Communication Complexity, 2004

Mobile Agents Rendezvous When Tokens Fail.
Proceedings of the Structural Information and Communication Complexity, 2004

2003
Routing in Series Parallel Networks.
Theory Comput. Syst., 2003

Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Complexity of Nesting Analysis in Mobile Ambients.
Proceedings of the Verification, 2003

BANANA - A Tool for Boundary Ambients Nesting ANAlysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

Minimum Feedback Vertex Set in Pyramid and Mesh of Trees Networks.
Proceedings of the SIROCCO 10: Proceedings of the 10th Internaltional Colloquium on Structural Information Complexity, 2003

2002
Fault-Tolerant Support for Reliable Multicast in Mobile Wireless Systems.
Proceedings of the NETWORKING 2002, 2002

2001
On Recognizing a String on an Anonymous Ring.
Theory Comput. Syst., 2001

2000
Feedback vertex set in hypercubes.
Inf. Process. Lett., 2000

Sorting Multisets in Anonymous Rings.
Proceedings of the 14th International Parallel & Distributed Processing Symposium (IPDPS'00), 2000

1999
Dynamic Interval Routing on Asynchronous Rings.
Proceedings of the 13th International Parallel Processing Symposium / 10th Symposium on Parallel and Distributed Processing (IPPS / SPDP '99), 1999

1998
Almost Exact Minimum Feedback Vertex Set in Meshes and Butterflies.
Inf. Process. Lett., 1998

1996
Distance Routing on Series Parallel Networks.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Boolean Routing on Chordal Rings.
Proceedings of the Structure, Information and Communication Complexity, 1995

String Recognition on Anonymous Rings.
Proceedings of the Mathematical Foundations of Computer Science 1995, 1995

1994
On the convergence of a parallel algorithm for finding polynomial zeros.
Proceedings of the Sixth IEEE Symposium on Parallel and Distributed Processing, 1994


  Loading...