default search action
Luigi Lo Iacono
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Thomas Neteler, Sascha Fahl, Luigi Lo Iacono:
"You Received $100,000 From Johnny": A Mixed-Methods Study on Push Notification Security and Privacy in Android Apps. IEEE Access 12: 112499-112516 (2024) - [j32]Denis Feth, Hartmut Schmitt, Luigi Lo Iacono:
Datenökonomie trifft Datenschutz. Datenschutz und Datensicherheit (dud) 48(2): 73 (2024) - [j31]Hartmut Schmitt, Christian H. Schunck, Luigi Lo Iacono:
Datenökonomie in digitalen Ökosystemen. Datenschutz und Datensicherheit (dud) 48(2): 77-81 (2024) - [c78]Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono:
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web. ARES 2024: 4:1-4:12 - [c77]Jan Tolsdorf, Luigi Lo Iacono:
Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany. HCI (46) 2024: 98-117 - [c76]Luigi Lo Iacono, Hartmut Schmitt, Denis Feth, Andreas Heinemann:
10. Usable Security und Privacy Workshop - Proposal. MuC (Workshopband) 2024 - [i12]Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. CoRR abs/2403.11798 (2024) - [i11]Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono:
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web. CoRR abs/2405.13744 (2024) - 2023
- [j30]Peter Leo Gorski, Luigi Lo Iacono, Matthew Smith:
Eight Lightweight Usable Security Principles for Developers. IEEE Secur. Priv. 21(1): 20-26 (2023) - [j29]Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. ACM Trans. Priv. Secur. 26(1): 6:1-6:36 (2023) - [c75]Vincent Unsel, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example. CODASPY 2023: 237-243 - [c74]Desiana Nurchalifah, Sebastian Blumenthal, Luigi Lo Iacono, Nico Hochgeschwender:
Analysing the Safety and Security of a UV-C Disinfection Robot. ICRA 2023: 12729-12736 - [c73]Luigi Lo Iacono, Hartmut Schmitt, Denis Feth, Andreas Heinemann:
9. Usable Security und Privacy Workshop. MuC (Workshopband) 2023 - [c72]Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. UbiSec 2023: 401-419 - [i10]Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Privacy Considerations for Risk-Based Authentication Systems. CoRR abs/2301.01505 (2023) - [i9]Vincent Unsel, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example. CoRR abs/2303.12361 (2023) - 2022
- [j28]Christian Reuter, Luigi Lo Iacono, Alexander Benlian:
A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead. Behav. Inf. Technol. 41(10): 2035-2048 (2022) - [j27]Jan Tolsdorf, Florian Dehling, Luigi Lo Iacono:
Data cart - designing a tool for the GDPR-compliant handling of personal data by employees. Behav. Inf. Technol. 41(10): 2084-2119 (2022) - [j26]Jan Tolsdorf, Delphine Reinhardt, Luigi Lo Iacono:
Employees' privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose. Proc. Priv. Enhancing Technol. 2022(2): 68-94 (2022) - [j25]Peter Leo Gorski, Sebastian Möller, Stephan Wiefling, Luigi Lo Iacono:
"I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices. IEEE Trans. Software Eng. 48(9): 3467-3484 (2022) - [c71]Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Data Protection Officers' Perspectives on Privacy Challenges in Digital Ecosystems. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 228-247 - [c70]Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
8. Usable Security und PrivacyWorkshop. MuC (Workshopband) 2022 - [i8]Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. CoRR abs/2206.15139 (2022) - 2021
- [j24]Luigi Lo Iacono, Hartmut Schmitt:
Informationelle Selbstbestimmung am Arbeitsplatz. Datenschutz und Datensicherheit 45(1): 1 (2021) - [j23]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
Verify It's You: How Users Perceive Risk-Based Authentication. IEEE Secur. Priv. 19(6): 47-57 (2021) - [j22]Jan Tolsdorf, Florian Dehling, Delphine Reinhardt, Luigi Lo Iacono:
Exploring mental models of the right to informational self-determination of office workers in Germany. Proc. Priv. Enhancing Technol. 2021(3): 5-27 (2021) - [c69]Jan Tolsdorf, Michael Fischer, Luigi Lo Iacono:
A Case Study on the Implementation of the Right of Access in Privacy Dashboards. APF 2021: 23-46 - [c68]Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Privacy Considerations for Risk-Based Authentication Systems. EuroS&P Workshops 2021: 320-327 - [c67]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics. Financial Cryptography (2) 2021: 361-381 - [c66]Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
7. Usable Security und Privacy Workshop. MuC (Workshopband) 2021 - [c65]Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono:
Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication. Open Identity Summit 2021: 59-70 - [c64]Paul Höller, Alexander Krumeich, Luigi Lo Iacono:
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany. SEC 2021: 3-18 - [c63]Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono:
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems. SEC 2021: 332-347 - [i7]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics. CoRR abs/2101.10681 (2021) - [i6]Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono:
Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication. CoRR abs/2105.12477 (2021) - [i5]Paul Höller, Alexander Krumeich, Luigi Lo Iacono:
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany. CoRR abs/2106.10460 (2021) - 2020
- [c62]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. ACSAC 2020: 203-218 - [c61]Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, Sascha Fahl:
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. CHI 2020: 1-13 - [c60]Hoai Viet Nguyen, Luigi Lo Iacono:
CREHMA: Cache-aware REST-ful HTTP Message Authentication. CODASPY 2020: 49-60 - [c59]Jan Tolsdorf, Luigi Lo Iacono:
Vision: Shred If Insecure - Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces. EuroS&P Workshops 2020: 172-177 - [c58]Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
6. Usable Security und Privacy Workshop. MuC (Workshopband) 2020 - [c57]Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono:
Evaluation of Risk-Based Re-Authentication Methods. SEC 2020: 280-294 - [i4]Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. CoRR abs/2003.07622 (2020) - [i3]Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono:
Evaluation of Risk-based Re-Authentication Methods. CoRR abs/2008.07795 (2020) - [i2]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. CoRR abs/2010.00339 (2020)
2010 – 2019
- 2019
- [j21]Hans Christian Rudolph, Andreas Kunz, Luigi Lo Iacono, Hoai Viet Nguyen:
Security Challenges of the 3GPP 5G Service Based Architecture. IEEE Commun. Stand. Mag. 3(1): 60-65 (2019) - [j20]Luigi Lo Iacono, Hoai Viet Nguyen, Peter Leo Gorski:
On the Need for a General REST-Security Framework. Future Internet 11(3): 56 (2019) - [c56]Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack. CCS 2019: 1915-1936 - [c55]Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann:
5. Usable Security und Privacy Workshop. MuC (Workshopband) 2019 - [c54]Florian Dehling, Tobias Mengel, Luigi Lo Iacono:
Rotten Cellar: Security and Privacy of the Browser Cache Revisited. NordSec 2019: 20-36 - [c53]Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services. NordSec 2019: 188-203 - [c52]Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath:
Mind the cache: large-scale explorative study of web caching. SAC 2019: 2497-2506 - [c51]Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. SEC 2019: 134-148 - 2018
- [c50]Peter Leo Gorski, Luigi Lo Iacono, Stephan Wiefling, Sebastian Möller:
Warn if Secure or How to Deal with Security by Default in Software Development?. HAISA 2018: 170-190 - [c49]Luigi Lo Iacono, Hartmut Schmitt, Andreas Heinemann:
4. Usable Security und Privacy Workshop. MuC (Workshopband) 2018 - [c48]Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl:
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. SOUPS @ USENIX Security Symposium 2018: 265-281 - 2017
- [j19]Hoai Viet Nguyen, Luigi Lo Iacono:
Sicherheit für REST-basierte Systeme. Datenschutz und Datensicherheit 41(2): 99-103 (2017) - [j18]Stephan Wiefling, Luigi Lo Iacono, Frederik Sandbrink:
Anwendung der Blockchain außerhalb von Geldwährungen. Datenschutz und Datensicherheit 41(8): 482-486 (2017) - [j17]Luigi Lo Iacono, Peter Leo Gorski, Josephine Grosse, Nils Gruschka:
Signalling over-privileged mobile applications using passive security indicators. J. Inf. Secur. Appl. 34: 27-33 (2017) - [c47]Luigi Lo Iacono, Hartmut Schmitt, Andreas Heinemann:
3. Workshop Usable Security: Ziele der Usability und Security ausbalancieren. MuC (Workshopband) 2017 - [c46]Holger Harms, Collin Rogowski, Luigi Lo Iacono:
Guidelines for adopting frontend architectures and patterns in microservices-based systems. ESEC/SIGSOFT FSE 2017: 902-907 - [c45]Luigi Lo Iacono, Nils Gruschka, Peter Nehren:
Mobile Personal Identity Provider Based on OpenID Connect. TrustBus 2017: 19-31 - [c44]Hoai Viet Nguyen, Jan Tolsdorf, Luigi Lo Iacono:
On the Security Expressiveness of REST-Based API Definition Languages. TrustBus 2017: 215-231 - [p1]Hoai Viet Nguyen, Luigi Lo Iacono:
RESTful IoT Authentication Protocols. Mobile Security and Privacy 2017: 217-234 - 2016
- [j16]Aline Jaritz, Luigi Lo Iacono:
Untersuchung des Datenverkehrs aktueller Smart-TVs. Datenschutz und Datensicherheit 40(8): 511-518 (2016) - [j15]Luigi Lo Iacono, Hoai Viet Nguyen, Hartmut Schmitt:
Usable Security - Results from a Field Study. i-com 15(2): 203-209 (2016) - [c43]Peter Leo Gorski, Luigi Lo Iacono:
Towards the Usability Evaluation of Security APIs. HAISA 2016: 252-265 - [c42]Luigi Lo Iacono, Hartmut Schmitt:
Usable Security and Privacy: Ansätze und Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen. MuC (Workshopband) 2016 - [c41]Hartmut Schmitt, Luigi Lo Iacono, Sascha Wagner:
Workshop des Arbeitskreises "Usable Security & Privacy" - Ziele, Themen, Ausblick. UP 2016 - [c40]Marc Skutnik, Luigi Lo Iacono, Christian Neuhaus:
Methods of Data Processing and Communication for a Web-based Wind Flow Visualization. WEBIST (1) 2016: 32-41 - [c39]Luigi Lo Iacono, Silvia Santano Guillén:
Adaptive Push-based Media Streaming in the Web. WEBIST (1) 2016: 121-129 - 2015
- [j14]Luigi Lo Iacono:
Signalschutz im Zeitalter von TV-Ökosystemen. Datenschutz und Datensicherheit 39(2): 89-92 (2015) - [j13]Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian:
Web of Services Security. Datenschutz und Datensicherheit 39(5): 317-322 (2015) - [c38]Sven Hricaj, Luigi Lo Iacono, Hoai Viet Nguyen, Marc Skutnik, Annette Ricke, Sven Wagner:
WHELP: Web-Based Holistic E-Learning Platform. DeLFI 2015: 317-319 - [c37]Luigi Lo Iacono, Hoai Viet Nguyen:
Authentication Scheme for REST. FNSS 2015: 113-128 - [c36]Luigi Lo Iacono, Hartmut Schmitt:
Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten. MuC (Workshopband) 2015: 617-619 - [c35]Wolfgang Börger, Luigi Lo Iacono:
User Perception and Response to Computer Security Warnings. MuC (Workshopband) 2015: 621-645 - [c34]Hoai Viet Nguyen, Luigi Lo Iacono:
REST-ful CoAP Message Authentication. SIoT 2015: 35-43 - [c33]Luigi Lo Iacono:
Partial Data Protection via Structure-Preserving Document Partitioning. TrustCom/BigDataSE/ISPA (1) 2015: 801-807 - [c32]Luigi Lo Iacono, Hoai Viet Nguyen:
Towards Conformance Testing of REST-based Web Services. WEBIST 2015: 217-227 - 2014
- [j12]Nils Gruschka, Luigi Lo Iacono, Christoph Sorge:
Analysis of the current state in website certificate validation. Secur. Commun. Networks 7(5): 865-877 (2014) - [c31]Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian:
Service Security Revisited. IEEE SCC 2014: 464-471 - [c30]Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian:
SOA-Readiness of REST. ESOCC 2014: 81-92 - [c29]Luigi Lo Iacono, Hoai Viet Nguyen, Tobias Hirsch, Maurice Baiers, Sebastian Möller:
UI-Dressing to Detect Phishing. HPCC/CSS/ICESS 2014: 747-754 - 2013
- [j11]Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau:
Security and Privacy-Enhancing Multicloud Architectures. IEEE Trans. Dependable Secur. Comput. 10(4): 212-224 (2013) - [c28]Luigi Lo Iacono, Daniel Behnam Torkian:
A System-Oriented Approach to Full-Text Search on Encrypted Cloud Storage. CSC 2013: 24-29 - 2012
- [j10]Meiko Jensen, Holger Junker, Luigi Lo Iacono, Christian Mainka, Jörg Schwenk:
XML Signature Wrapping Angriffe wirksam unterbinden. Datenschutz und Datensicherheit 36(4): 236-240 (2012) - [c27]Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
Making XML Signatures Immune to XML Signature Wrapping Attacks. CLOSER (Selected Papers) 2012: 151-167 - [c26]Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XSpRES - Robust and Effective XML Signatures for Web Services. CLOSER 2012: 187-197 - [c25]Tobias Hirsch, Luigi Lo Iacono, Ina Wechsung:
How Much Network Security Must Be Visible in Web Browsers? TrustBus 2012: 1-16 - 2011
- [j9]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Norbert Luttenberger:
Server-Side Streaming Processing of WS-Security. IEEE Trans. Serv. Comput. 4(4): 272-285 (2011) - [c24]Meiko Jensen, Jörg Schwenk, Jens-Matthias Bohli, Nils Gruschka, Luigi Lo Iacono:
Security Prospects through Cloud Computing by Adopting Multiple Clouds. IEEE CLOUD 2011: 565-572 - [c23]Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
All your clouds are belong to us: security analysis of cloud management interfaces. CCSW 2011: 3-14 - [c22]Nils Gruschka, Luigi Lo Iacono:
Browser as a Service (BaaS): Security and Performance Enhancements for the Rich Web. KiVS 2011: 208-210 - 2010
- [j8]Bernice S. Elger, Jimison Iavindrasana, Luigi Lo Iacono, Henning Müller, Nicolas Roduit, Paul E. Summers, Jessica Wright:
Strategies for health data exchange for secondary, cross-institutional clinical research. Comput. Methods Programs Biomed. 99(3): 230-251 (2010) - [j7]Simone Fischer-Hübner, Luigi Lo Iacono, Sebastian Möller:
Usable Security und Privacy. Datenschutz und Datensicherheit 34(11): 773-782 (2010) - [j6]Nils Gruschka, Luigi Lo Iacono, Hariharan Rajasekaran:
Identity and access management in multi-institutional medical research. Elektrotech. Informationstechnik 127(5): 143-150 (2010) - [j5]Nils Gruschka, Luigi Lo Iacono, Namhi Kang:
Packaged HTTP: Reconsidering Web Efficiency. Int. J. Adv. Comp. Techn. 2(1): 93-99 (2010) - [j4]Siegfried Benkner, Antonio Arbona, Guntram Berti, Alessandro Chiarini, Robert Dunlop, Gerhard Engelbrecht, Alejandro F. Frangi, Christoph M. Friedrich, S. Hanser, Peer Hasselmeyer, Rod D. Hose, Jimison Iavindrasana, Martin Koehler, Luigi Lo Iacono, Guy Lonsdale, Rodolphe Meyer, Bob Moore, Hariharan Rajasekaran, Paul E. Summers, Alexander Wöhrer, Steven Wood:
@neurIST: Infrastructure for Advanced Disease Management Through Integration of Heterogeneous Data, Computing, and Complex Processing Services. IEEE Trans. Inf. Technol. Biomed. 14(6): 1365-1377 (2010) - [c21]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono:
A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages. ARES 2010: 410-415 - [c20]Matthias Häsel, Luigi Lo Iacono:
Security in OpenSocial-Instrumented Social Networking Services. Communications and Multimedia Security 2010: 40-52 - [c19]Nils Gruschka, Luigi Lo Iacono:
Security for XML Data Binding. Communications and Multimedia Security 2010: 53-63 - [c18]Nils Gruschka, Luigi Lo Iacono:
Server-Side Streaming Processing of Secured MTOM Attachments. ECOWS 2010: 11-18 - [c17]Nils Gruschka, Luigi Lo Iacono:
Password Visualization beyond Password Masking. INC 2010: 179-188
2000 – 2009
- 2009
- [j3]Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk:
XML Signature Wrapping Angriffe - What you process is not always what you verify. Datenschutz und Datensicherheit 33(9): 553-560 (2009) - [c16]Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono:
On Technical Security Issues in Cloud Computing. IEEE CLOUD 2009: 109-116 - [c15]Nils Gruschka, Luigi Lo Iacono:
Session-Based SOAP Transmission and Processing. ECOWS 2009: 183-189 - [c14]Luigi Lo Iacono, Hariharan Rajasekaran:
Secure Browser-Based Access to Web Services. ICC 2009: 1-5 - [c13]Nils Gruschka, Luigi Lo Iacono:
Vulnerable Cloud: SOAP Message Security Validation Revisited. ICWS 2009: 625-631 - 2008
- [c12]Hariharan Rajasekaran, Luigi Lo Iacono, Peer Hasselmeyer, Jochen Fingberg, Paul E. Summers, Siegfried Benkner, Gerhard Engelbrecht, Antonio Arbona, Alessandro Chiarini, Christoph M. Friedrich, Martin Hofmann-Apitius, Kai Kumpf, Bob Moore, Philippe Bijlenga, Jimison Iavindrasana, Henning Müller, Rod D. Hose, Robert Dunlop, Alejandro F. Frangi:
@neurIST - Towards a System Architecture for Advanced Disease Management through Integration of Heterogeneous Data, Computing, and Complex Processing Services. CBMS 2008: 361-366 - [c11]Luigi Lo Iacono, Hariharan Rajasekaran:
Security Architecture for Distributed Medical Information Systems. GI Jahrestagung (1) 2008: 110-116 - [c10]Gregory Allen Kohring, Luigi Lo Iacono:
Non-Blocking Signature of very large SOAP Messages. GI Jahrestagung (1) 2008: 129-136 - [c9]Jimison Iavindrasana, Luigi Lo Iacono, Henning Müller, Ivan Periz, Paul E. Summers, Jessica Wright, Christoph M. Friedrich, Holger Dach, Tobias Gattermayer, Gerhard Engelbrecht, Siegfried Benkner, Martin Hofmann-Apitius, Robert Dunlop, Antonio Arbona, Hariharan Rajasekaran, Jochen Fingberg, Alessandro Chiarini, Bob Moore, Philippe Bijlenga, Rod D. Hose, Alejandro F. Frangi:
The @neurIST project. HealthGrid 2008: 161-164 - [c8]Robert Dunlop, Antonio Arbona, Hariharan Rajasekaran, Luigi Lo Iacono, Jochen Fingberg, Paul E. Summers, Siegfried Benkner, Gerhard Engelbrecht, Alessandro Chiarini, Christoph M. Friedrich, Bob Moore, Philippe Bijlenga, Jimison Iavindrasana, Rod D. Hose, Alejandro F. Frangi:
@neurIST - Chronic Disease Management through Integration of Heterogeneous Data and Computer-interpretable Guideline Services. HealthGrid 2008: 173-177 - [c7]Sibylle Hick, Luigi Lo Iacono:
Elliptic Curve Cryptography in x.509-based PKI. Sicherheit 2008: 137-147 - 2007
- [c6]Luigi Lo Iacono:
Multi-centric Universal Pseudonymisation for Secondary Use of the EHR. HealthGrid 2007: 239-247 - [c5]Jun Wang, Luigi Lo Iacono:
Intrusion Detection and tolerance in Grid-based applications. SecureComm 2007: 177-185 - [i1]Gregory Allen Kohring, Luigi Lo Iacono:
Non-Blocking Signature of very large SOAP Messages. CoRR abs/0709.2635 (2007) - 2006
- [j2]Luigi Lo Iacono, Christoph Ruland, Norbert Zisky:
Secure transfer of measurement data in open systems. Comput. Stand. Interfaces 28(3): 311-326 (2006) - [j1]Luigi Lo Iacono, Sibylle Müller, Christoph Ruland, Norbert Zisky:
Sicherheitslösung für die automatisierte Messdatenkommunikation - Best-Practice Lösung im liberalisierten Energiemarkt. Datenschutz und Datensicherheit 30(6): 347-352 (2006) - [c4]Jochen Fingberg, Marit Hansen, Markus Hansen, Henry Krasemann, Luigi Lo Iacono, Thomas Probst, Jessica Wright:
Integrating Data Custodians in eHealth Grids - A Digest of Security and Privacy Aspects. GI Jahrestagung (1) 2006: 695-701 - 2005
- [c3]Lars Dietze, Bernd Holznagel, Luigi Lo Iacono, Christoph Ruland:
Qualifizierte Signatur im eletronischeen Messdatenaustausch. Sicherheit 2005: 335-348 - 2004
- [c2]Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland:
Impacts of Security Protocols on Real-Time Multimedia Communications. WISA 2004: 1-13 - 2003
- [c1]Luigi Lo Iacono, Christoph Ruland:
Vertrauliche Video-Konferenzen im Internet. DFN-Arbeitstagung über Kommunikationsnetze 2003: 167-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint