Luigi Lo Iacono

According to our database1, Luigi Lo Iacono authored at least 107 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Datenökonomie in digitalen Ökosystemen.
Datenschutz und Datensicherheit (dud), February, 2024

Datenökonomie trifft Datenschutz.
Datenschutz und Datensicherheit (dud), February, 2024

2023
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service.
ACM Trans. Priv. Secur., 2023

Eight Lightweight Usable Security Principles for Developers.
IEEE Secur. Priv., 2023

9. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2023, 2023

Analysing the Safety and Security of a UV-C Disinfection Robot.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
"I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices.
IEEE Trans. Software Eng., 2022

Employees' privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose.
Proc. Priv. Enhancing Technol., 2022

Data cart - designing a tool for the GDPR-compliant handling of personal data by employees.
Behav. Inf. Technol., 2022

A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead.
Behav. Inf. Technol., 2022

8. Usable Security und PrivacyWorkshop.
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022

Data Protection Officers' Perspectives on Privacy Challenges in Digital Ecosystems.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Exploring mental models of the right to informational self-determination of office workers in Germany.
Proc. Priv. Enhancing Technol., 2021

Verify It's You: How Users Perceive Risk-Based Authentication.
IEEE Secur. Priv., 2021

Informationelle Selbstbestimmung am Arbeitsplatz.
Datenschutz und Datensicherheit, 2021

XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication.
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

7. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2021, 2021

What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics.
Proceedings of the Financial Cryptography and Data Security, 2021

Privacy Considerations for Risk-Based Authentication Systems.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

A Case Study on the Implementation of the Right of Access in Privacy Dashboards.
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021

2020
Evaluation of Risk-Based Re-Authentication Methods.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

6. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2020 - Workshopband, 2020

Vision: Shred If Insecure - Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

CREHMA: Cache-aware REST-ful HTTP Message Authentication.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
On the Need for a General REST-Security Framework.
Future Internet, 2019

Security Challenges of the 3GPP 5G Service Based Architecture.
IEEE Commun. Stand. Mag., 2019

Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Mind the cache: large-scale explorative study of web caching.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services.
Proceedings of the Secure IT Systems, 2019

Rotten Cellar: Security and Privacy of the Browser Cache Revisited.
Proceedings of the Secure IT Systems, 2019

5. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2019, 2019

Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

4. Usable Security und Privacy Workshop.
Proceedings of the Mensch und Computer 2018, 2018

Warn if Secure or How to Deal with Security by Default in Software Development?.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Signalling over-privileged mobile applications using passive security indicators.
J. Inf. Secur. Appl., 2017

Anwendung der Blockchain außerhalb von Geldwährungen.
Datenschutz und Datensicherheit, 2017

Sicherheit für REST-basierte Systeme.
Datenschutz und Datensicherheit, 2017

On the Security Expressiveness of REST-Based API Definition Languages.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Mobile Personal Identity Provider Based on OpenID Connect.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Guidelines for adopting frontend architectures and patterns in microservices-based systems.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

3. Workshop Usable Security: Ziele der Usability und Security ausbalancieren.
Proceedings of the Mensch und Computer 2017, 2017

RESTful IoT Authentication Protocols.
Proceedings of the Mobile Security and Privacy, 2017

2016
Usable Security - Results from a Field Study.
i-com, 2016

Untersuchung des Datenverkehrs aktueller Smart-TVs.
Datenschutz und Datensicherheit, 2016

Methods of Data Processing and Communication for a Web-based Wind Flow Visualization.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016

Adaptive Push-based Media Streaming in the Web.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016

Workshop des Arbeitskreises "Usable Security & Privacy" - Ziele, Themen, Ausblick.
Proceedings of the Usability Professionals 2016, Aachen, Germany, September 4-7, 2016, 2016

Usable Security and Privacy: Ansätze und Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen.
Proceedings of the Mensch und Computer 2016, 2016

Towards the Usability Evaluation of Security APIs.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
Signalschutz im Zeitalter von TV-Ökosystemen.
Datenschutz und Datensicherheit, 2015

Web of Services Security.
Datenschutz und Datensicherheit, 2015

Towards Conformance Testing of REST-based Web Services.
Proceedings of the WEBIST 2015, 2015

Partial Data Protection via Structure-Preserving Document Partitioning.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

REST-ful CoAP Message Authentication.
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015

Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten.
Proceedings of the Mensch und Computer 2015, 2015

User Perception and Response to Computer Security Warnings.
Proceedings of the Mensch und Computer 2015, 2015

Authentication Scheme for REST.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

WHELP: Web-Based Holistic E-Learning Platform.
Proceedings of the DeLFI 2015, 2015

2014
Analysis of the current state in website certificate validation.
Secur. Commun. Networks, 2014

UI-Dressing to Detect Phishing.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

SOA-Readiness of REST.
Proceedings of the Service-Oriented and Cloud Computing - Third European Conference, 2014

Service Security Revisited.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Security and Privacy-Enhancing Multicloud Architectures.
IEEE Trans. Dependable Secur. Comput., 2013

A System-Oriented Approach to Full-Text Search on Encrypted Cloud Storage.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
XML Signature Wrapping Angriffe wirksam unterbinden.
Datenschutz und Datensicherheit, 2012

How Much Network Security Must Be Visible in Web Browsers?
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Making XML Signatures Immune to XML Signature Wrapping Attacks.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

XSpRES - Robust and Effective XML Signatures for Web Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Server-Side Streaming Processing of WS-Security.
IEEE Trans. Serv. Comput., 2011

Browser as a Service (BaaS): Security and Performance Enhancements for the Rich Web.
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011

All your clouds are belong to us: security analysis of cloud management interfaces.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Security Prospects through Cloud Computing by Adopting Multiple Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
@neurIST: Infrastructure for Advanced Disease Management Through Integration of Heterogeneous Data, Computing, and Complex Processing Services.
IEEE Trans. Inf. Technol. Biomed., 2010

Packaged HTTP: Reconsidering Web Efficiency.
Int. J. Adv. Comp. Techn., 2010

Identity and access management in multi-institutional medical research.
Elektrotech. Informationstechnik, 2010

Usable Security und Privacy.
Datenschutz und Datensicherheit, 2010

Strategies for health data exchange for secondary, cross-institutional clinical research.
Comput. Methods Programs Biomed., 2010

Password Visualization beyond Password Masking.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Server-Side Streaming Processing of Secured MTOM Attachments.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

Security in OpenSocial-Instrumented Social Networking Services.
Proceedings of the Communications and Multimedia Security, 2010

Security for XML Data Binding.
Proceedings of the Communications and Multimedia Security, 2010

A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages.
Proceedings of the ARES 2010, 2010

2009
XML Signature Wrapping Angriffe - What you process is not always what you verify.
Datenschutz und Datensicherheit, 2009

Vulnerable Cloud: SOAP Message Security Validation Revisited.
Proceedings of the IEEE International Conference on Web Services, 2009

Secure Browser-Based Access to Web Services.
Proceedings of IEEE International Conference on Communications, 2009

Session-Based SOAP Transmission and Processing.
Proceedings of the Seventh IEEE European Conference on Web Services (ECOWS 2009), 2009

On Technical Security Issues in Cloud Computing.
Proceedings of the IEEE International Conference on Cloud Computing, 2009

2008
Elliptic Curve Cryptography in x.509-based PKI.
Proceedings of the Sicherheit 2008: Sicherheit, 2008


@neurIST - Chronic Disease Management through Integration of Heterogeneous Data and Computer-interpretable Guideline Services.
Proceedings of the Global Healthgrid: e-Science Meets Biomedical Informatics, 2008

Non-Blocking Signature of very large SOAP Messages.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

Security Architecture for Distributed Medical Information Systems.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

@neurIST - Towards a System Architecture for Advanced Disease Management through Integration of Heterogeneous Data, Computing, and Complex Processing Services.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008

2007
Intrusion Detection and tolerance in Grid-based applications.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Multi-centric Universal Pseudonymisation for Secondary Use of the EHR.
Proceedings of the From Genes to Personalized HealthCare: Grid Solutions for the Life Sciences, 2007

2006
Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt.
Datenschutz und Datensicherheit, 2006

Secure transfer of measurement data in open systems.
Comput. Stand. Interfaces, 2006

Integrating Data Custodians in eHealth Grids - A Digest of Security and Privacy Aspects.
Proceedings of the 36. Jahrestagung der Gesellschaft für Informatik, 2006

2005
Qualifizierte Signatur im eletronischeen Messdatenaustausch.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

2004
Impacts of Security Protocols on Real-Time Multimedia Communications.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

2003
Vertrauliche Video-Konferenzen im Internet.
Proceedings of the Security, 2003


  Loading...