Luigi Lo Iacono
Orcid: 0000-0002-7863-0622
According to our database1,
Luigi Lo Iacono
authored at least 112 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Datenschutz und Datensicherheit (dud), February, 2024
Datenschutz und Datensicherheit (dud), February, 2024
"You Received $100,000 From Johnny": A Mixed-Methods Study on Push Notification Security and Privacy in Android Apps.
IEEE Access, 2024
Proceedings of the Mensch und Computer 2024, 2024
Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service.
ACM Trans. Priv. Secur., 2023
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.
Proceedings of the Ubiquitous Security, 2023
Proceedings of the Mensch und Computer 2023, 2023
Proceedings of the IEEE International Conference on Robotics and Automation, 2023
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
"I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices.
IEEE Trans. Software Eng., 2022
Employees' privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose.
Proc. Priv. Enhancing Technol., 2022
Data cart - designing a tool for the GDPR-compliant handling of personal data by employees.
Behav. Inf. Technol., 2022
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead.
Behav. Inf. Technol., 2022
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
2021
Exploring mental models of the right to informational self-determination of office workers in Germany.
Proc. Priv. Enhancing Technol., 2021
IEEE Secur. Priv., 2021
Datenschutz und Datensicherheit, 2021
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication.
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021., 2021
Proceedings of the Mensch und Computer 2021, 2021
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics.
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021
2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020
Vision: Shred If Insecure - Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Commun. Stand. Mag., 2019
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild.
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services.
Proceedings of the Secure IT Systems, 2019
Proceedings of the Secure IT Systems, 2019
Proceedings of the Mensch und Computer 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Mensch und Computer 2018, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
2017
J. Inf. Secur. Appl., 2017
Datenschutz und Datensicherheit, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Guidelines for adopting frontend architectures and patterns in microservices-based systems.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Proceedings of the Mensch und Computer 2017, 2017
Proceedings of the Mobile Security and Privacy, 2017
2016
Datenschutz und Datensicherheit, 2016
Methods of Data Processing and Communication for a Web-based Wind Flow Visualization.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016
Proceedings of the Usability Professionals 2016, Aachen, Germany, September 4-7, 2016, 2016
Usable Security and Privacy: Ansätze und Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen.
Proceedings of the Mensch und Computer 2016, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
2015
Proceedings of the WEBIST 2015, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015
Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten.
Proceedings of the Mensch und Computer 2015, 2015
Proceedings of the Mensch und Computer 2015, 2015
Proceedings of the Future Network Systems and Security - First International Conference, 2015
2014
Secur. Commun. Networks, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Proceedings of the Service-Oriented and Cloud Computing - Third European Conference, 2014
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013
2012
Datenschutz und Datensicherheit, 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012
XSpRES - Robust and Effective XML Signatures for Web Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
2011
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
@neurIST: Infrastructure for Advanced Disease Management Through Integration of Heterogeneous Data, Computing, and Complex Processing Services.
IEEE Trans. Inf. Technol. Biomed., 2010
Elektrotech. Informationstechnik, 2010
Strategies for health data exchange for secondary, cross-institutional clinical research.
Comput. Methods Programs Biomed., 2010
Proceedings of the Eighth International Network Conference (INC 2010), 2010
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010
Proceedings of the Communications and Multimedia Security, 2010
Proceedings of the Communications and Multimedia Security, 2010
Proceedings of the ARES 2010, 2010
2009
Datenschutz und Datensicherheit, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Seventh IEEE European Conference on Web Services (ECOWS 2009), 2009
Proceedings of the IEEE International Conference on Cloud Computing, 2009
2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Proceedings of the Global Healthgrid: e-Science Meets Biomedical Informatics, 2008
@neurIST - Chronic Disease Management through Integration of Heterogeneous Data and Computer-interpretable Guideline Services.
Proceedings of the Global Healthgrid: e-Science Meets Biomedical Informatics, 2008
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008
@neurIST - Towards a System Architecture for Advanced Disease Management through Integration of Heterogeneous Data, Computing, and Complex Processing Services.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the From Genes to Personalized HealthCare: Grid Solutions for the Life Sciences, 2007
2006
Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt.
Datenschutz und Datensicherheit, 2006
Integrating Data Custodians in eHealth Grids - A Digest of Security and Privacy Aspects.
Proceedings of the 36. Jahrestagung der Gesellschaft für Informatik, 2006
2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
2003