Leonardo A. Martucci

Orcid: 0000-0002-9980-3473

According to our database1, Leonardo A. Martucci authored at least 39 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
Designing for privacy: Exploring the influence of affect and individual characteristics on users' interactions with privacy policies.
Comput. Secur., November, 2023

A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs.
Proceedings of the Privacy and Identity Management. Sharing in a Digital World, 2023

On-Campus Hands-On Ethical Hacking Course - Design, Deployment and Lessons Learned.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2020
Measuring the Usability of Firewall Rule Sets.
IEEE Access, 2020

Psychological Effects and Their Role in Online Privacy Interactions: A Review.
IEEE Access, 2020

Privacy-Preserving Identifiers for IoT: A Systematic Literature Review.
IEEE Access, 2020

Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Facilitating Privacy Attitudes and Behaviors with Affective Visual Design.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

(In)escapable Affect? Exploring Factors Influencing Privacy-Related Behavioral Intentions.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Natural vs. Technical Language Preference and Their Impact on Firewall Configuration.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

2019
System Administrators Are Parting Ways With Command Line Interfaces: An Exploratory Study of Firewall Interfaces.
CoRR, 2019

System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

E-Consent for Data Privacy: Consent Management for Mobile Health Technologies in Public Health Surveys and Disease Surveillance.
Proceedings of the MEDINFO 2019: Health and Wellbeing e-Networks for All, 2019

2018
Systematic Literature Review on Usability of Firewall Configuration.
ACM Comput. Surv., 2018

A MOOC on Privacy by Design and the GDPR.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems.
Proceedings of the 31st IEEE International Symposium on Computer-Based Medical Systems, 2018

2017
Is It Harmful? Re-examining Privacy Concerns.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

2016
Privacy Impact Assessment Template for Provenance.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Automated Log Audits for Privacy Compliance Validation: A Literature Survey.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Challenges in Managing Firewalls.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

2014
Secure and Privacy-Friendly Public Key Generation and Certification.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Privacy for Peer Profiling in Collective Adaptive Systems.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

iKUP keeps users' privacy in the Smart Grid.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications.
Pervasive Mob. Comput., 2013

Formal definitions for usable access control rule sets from goals to metrics.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2012
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Analysis of privacy-enhancing protocols based on anonymity networks.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

2011
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services.
J. Inf. Process., 2011

Learning Whom to Trust in a Privacy-Friendly Way.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

2009
Identity and Anonymity in Ad Hoc Networks.
PhD thesis, 2009

Revealing the Calling History of SIP VoIP Systems by Timing Attacks.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Self-certified Sybil-free pseudonyms.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2007
Identity Deployment and Management in Wireless Mesh Networks.
Proceedings of the Future of Identity in the Information Society, 2007

Experiences from Educating Practitioners in Vulnerability Analysis.
Proceedings of the Fifth World Conference on Information Security Education, 2007

2005
Requirements for Privacy-Enhancements in Mobile Ad Hoc Networks.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005


  Loading...