Rosario Giustolisi

According to our database1, Rosario Giustolisi authored at least 36 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Cleansing in Coercion-Resistant Voting.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024

2023
Thwarting Last-Minute Voter Coercion.
IACR Cryptol. ePrint Arch., 2023

Receipt-Free Electronic Voting from zk-SNARK.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Local Differential Privacy in Voting.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

2022
Modelling human threats in security ceremonies.
J. Comput. Secur., 2022

Secure Internet Exams Despite Coercion.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

POSTER: Enabling User-Accountable Mechanisms in Decision Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Security Protocols as Choreographies.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Fixing Vulnerabilities Automatically with Linters.
Proceedings of the Network and System Security - 14th International Conference, 2020

Privacy-Preserving Dispute Resolution in the Improved Bingo Voting.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

2019
A Security Analysis of the Danish Deposit Return System.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

What Are the Threats? (Charting the Threat Models of Security Ceremonies).
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Modelling and Verification of Secure Exams
Information Security and Cryptography, Springer, ISBN: 978-3-319-67106-2, 2018

Invalid certificates in modern browsers: A socio-technical analysis.
J. Comput. Secur., 2018

2017
Trustworthy exams without trusted parties.
Comput. Secur., 2017

Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets.
Proceedings of the Secure IT Systems, 2017

Automated Analysis of Accountability.
Proceedings of the Information Security - 20th International Conference, 2017

Idea: A Unifying Theory for Evaluation Systems.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

2016
Threats to 5G Group-based Authentication.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Secure Group-Based AKA Protocol for Machine-Type Communications.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

2015
On the Possibility of Non-Interactive E-Voting in the Public-key Setting.
IACR Cryptol. ePrint Arch., 2015

Design and Analysis of Secure Exam Protocols.
CoRR, 2015

A Secure Exam Protocol Without Trusted Parties.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

A Framework for Analyzing Verifiability in Traditional and Electronic Exams.
Proceedings of the Information Security Practice and Experience, 2015

2014
Remark!: A Secure Protocol for Remote Exams.
Proceedings of the Security Protocols XXII, 2014

Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

Formal Analysis of Electronic Exams.
Proceedings of the SECRYPT 2014, 2014

Secure exams despite malicious management.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Formal Security Analysis of Traditional and Electronic Exams.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

A Socio-technical Methodology for the Security and Privacy Analysis of Services.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Socio-technical formal analysis of TLS certificate validation in modern browsers.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

A Socio-technical Understanding of TLS Certificate Validation.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

What security for electronic exams?
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2011
Enforcing privacy in e-commerce by balancing anonymity and trust.
Comput. Secur., 2011


  Loading...