What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Luigi Lo Iacono
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
SoK: Continuous Authentication Beyond Error Rates: Reviewing General System Properties.
Florian Dehling
Sebastian Kawelke
Luigi Lo Iacono
2025
conf/eurosp
Right Here, Right Now: User Perceptions of In-Place Contextual Privacy Options.
Florian Dehling
Jan Tolsdorf
Luigi Lo Iacono
2022
journals/popets
Employees' privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose.
Jan Tolsdorf
Delphine Reinhardt
Luigi Lo Iacono
2022
conf/esorics
Data Protection Officers' Perspectives on Privacy Challenges in Digital Ecosystems.
Stephan Wiefling
Jan Tolsdorf
Luigi Lo Iacono
2021
journals/popets
Exploring mental models of the right to informational self-determination of office workers in Germany.
Jan Tolsdorf
Florian Dehling
Delphine Reinhardt
Luigi Lo Iacono
2021
conf/sec
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems.
Andre Büttner
Hoai Viet Nguyen
Nils Gruschka
Luigi Lo Iacono
2021
conf/sec
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany.
Paul Höller
Alexander Krumeich
Luigi Lo Iacono
2021
conf/fc
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics.
Stephan Wiefling
Markus Dürmuth
Luigi Lo Iacono
2021
conf/eurosp
Privacy Considerations for Risk-Based Authentication Systems.
Stephan Wiefling
Jan Tolsdorf
Luigi Lo Iacono
2020
conf/sec
Evaluation of Risk-Based Re-Authentication Methods.
Stephan Wiefling
Tanvi Patil
Markus Dürmuth
Luigi Lo Iacono
2020
conf/eurosp
Vision: Shred If Insecure - Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces.
Jan Tolsdorf
Luigi Lo Iacono
2020
conf/acsac
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
Stephan Wiefling
Markus Dürmuth
Luigi Lo Iacono
2019
conf/ccs
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
Hoai Viet Nguyen
Luigi Lo Iacono
Hannes Federrath
2019
conf/sec
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild.
Stephan Wiefling
Luigi Lo Iacono
Markus Dürmuth
2018
conf/soups
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
Peter Leo Gorski
Luigi Lo Iacono
Dominik Wermke
Christian Stransky
Sebastian Möller
Yasemin Acar
Sascha Fahl
2017
journals/istr
Signalling over-privileged mobile applications using passive security indicators.
Luigi Lo Iacono
Peter Leo Gorski
Josephine Grosse
Nils Gruschka
2011
conf/ccs
All your clouds are belong to us: security analysis of cloud management interfaces.
Juraj Somorovsky
Mario Heiderich
Meiko Jensen
Jörg Schwenk
Nils Gruschka
Luigi Lo Iacono
2004
conf/wisa
Impacts of Security Protocols on Real-Time Multimedia Communications.
Kihun Hong
Souhwan Jung
Luigi Lo Iacono
Christoph Ruland
Coauthors
Alexander Krumeich
(1)
Andre Büttner
(1)
Christian Stransky
(1)
Christoph Ruland
(1)
Delphine Reinhardt
(2)
Dominik Wermke
(1)
Florian Dehling
(3)
Hannes Federrath
(1)
Hoai Viet Nguyen
(2)
Jan Tolsdorf
(6)
Jörg Schwenk
(1)
Josephine Grosse
(1)
Juraj Somorovsky
(1)
Kihun Hong
(1)
Luigi Lo Iacono
(18)
Mario Heiderich
(1)
Markus Dürmuth
(4)
Meiko Jensen
(1)
Nils Gruschka
(3)
Paul Höller
(1)
Peter Leo Gorski
(2)
Sascha Fahl
(1)
Sebastian Kawelke
(1)
Sebastian Möller
(1)
Souhwan Jung
(1)
Stephan Wiefling
(6)
Tanvi Patil
(1)
Yasemin Acar
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to