Publications
In press

; ; ; ; ;
in 2022 7th IEEE European Symposium on Security and Privacy Workshops (EuroSPW) (in press)
2022

; ; ; ;
in Lecture Notes in Computer Science (2022, October 06), 13503

; ;
in Machine Learning and Knowledge Extraction (2022), 4(1), 222-239

;
Scientific Conference (2022, June 10)

; ;
in 2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA) (2022, October 13)

;
Scientific Conference (2022)

; ; ; ;
in Computers in Human Behavior Reports (2022), 4

; ; ; ;
in Web Conference Companion Volume (ACM) (2022, April 26)

; ; ; ; ; ; ; ;
in IEEE eXplore (2022, June 06)

; ; ;
in 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (2022)

; ; ; ;
in DRS2022: Bilbao (2022)

; ;
in Schiffner, Stefan; Ziegler, Sebastien; Quesada Rodriguez, Adrian (Eds.) Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) (2022)
2021

; ;
in Journal of the Association for Computing Machinery (2021, August 17), 16

; ; ; ; ;
in Proceedings of ACM DIS Conference on Designing Interactive Systems (2021)

;
in Ducato, Rossana; Strowel, Alain (Eds.) Legal Design Perspectives. Theoretical and Practical Insights from the Field (2021)

;
in 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (2021)

;
in Process Biochemistry (2021), 101

; ; ; ; ; ; ;
in ACM Transactions on Computer-Human Interaction (2021), 28(6), 50

; ;
in Digital Threats: Research and Practice (2021), 2(1),

; ; ;
E-print/Working paper (2021)

;
in Poillot, Elise; Lenzini, Gabriele; Resta, Giorgio (Eds.) Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (2021)

; ; ;
Book published by RomaTrE-Press (2021)

; ; ;
in Poillot, Elise; Resta, Giorgio; Zeno-Zencovich, Vincenzo; Lenzini, Gabriele (Eds.) Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (2021)

;
in Corrales Compagnucci, Marcelo; Fenwick, Mark; Wrbka, Stefan (Eds.) Smart Contracts. Technological, Business and Legal Perspectives (2021)

;
in Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST) (2021)

; ; ; ;
in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21) (2021, November 15)

; ; ; ; ; ;
in Multifunctional Materials (2021), 4(2), 022002

; ; ;
in Digital Threats: Research and Practice (2021)

;
in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021)

; ;
in Proceedings of the 36th Annual ACM Symposium on Applied Computing (2021)

; ; ;
in Annual Computer Security Applications Conference (ACSAC ’21) (2021, December)

; ; ;
in Obaidat, Mohammad S.; Ben-Othman, Jalel (Eds.) E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers. (2021, October)
2020

; ; ;
in New Security Paradigms Workshop (2020, October 26)

; ;
in Information Processing Letters (2020)

;
in Proceedings of the 6th International Conference on Information Systems Security and Privacy (2020)

;
in Journal of Open Access to Law (2020), 8(1),

;
in Computer Law & Security Review (2020), 37(105402),

;
in Design Issues (2020), 36(3), 82-96

;
in Leenes, Ronald; Hallinan, Dara; Gutwirth, Serge; de Hert, Paul (Eds.) Data Protection and Privacy: Data Protection and Democracy (2020)

; ;
in Computers and Security (2020)

;
in Loreti, Michele; Spalazzi, Luca (Eds.) Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (2020)

;
in International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020 (2020, February)

; ;
in Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (2020)
2019

; ; ; ;
in International Conference on Information Systems Security and Privacy (ICISSP) (2019, January 24)

;
in Rivista Italiana di Medicina Legale: Dottrina, Casistica, Ricerca Sperimentale, Giurisprudenza e Legislazione (2019), XLI(1/2019), 225-242

; ;
in IEEE Security and Privacy (2019), 17(6), 37-45

; ;
in JSAI International Symposium on Artificial Intelligence (2019), 11717

; ;
in Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (2019)

; ; ;
in Information Systems Security and Privacy (2019, July)

; ;
in Proceedings of the Third Central European Cybersecurity Conference (2019)

; ;
in Proceedings of the 35th Annual Computer Security Applications Conference (2019)

; ;
in Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (2019)

;
in From Software Engineering to Formal Methods and Tools, and Back (2019)

Doctoral thesis (2019)

; ; ;
in E-Business and Telecommunications - 2019 (2019)

; ; ;
in An offline dictionary attack against zkPAKE protocol (2019)

; ; ; ; ;
in Journal of Logic, Language and Information (2019)

; ; ;
in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) 22nd International Legal Infomatics Symposium IRIS 2019 (2019)

; ; ;
in Droit de la Consommation (2019), (1),

;
in Schweighofer, Erich; Kummer, Franz; Saarenpää, Ahti (Eds.) International Legal Infomatics Symposium IRIS 2019 (2019)

;
in Peruginelli, Ginevra; Faro, Sebastiano (Eds.) Knowledge of the Law in the Big Data Age (2019)

; ;
in 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops (2019)

; ; ;
in Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Services (2019, May)

;
in Emerging Technologies for Authorization and Authentication (2019)
2018

; ;
Scientific Conference (2018, November 12)

; ;
in Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (2018)

; ;
in Advances in Cybersecurity 2018 (2018)

; ; ;
in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

; ; ;
in Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018 (2018)

;
in Wireless Personal Communications (2018), 98(1), 1135-1154

; ;
in Baek, Joonsang; Willy, Susilo (Eds.) Provable Security (2018, October 25)

; ; ; ;
in International Conference on Electronic Government and the Information Systems Perspective (2018)

; ; ;
in Schweighofer, Erich (Ed.) Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018 (2018)

;
in Pagallo, Ugo; Palmirani, Monica; Casanovas, Pompeu; Sartor, Giovanni; Villata, Serena (Eds.) AI Approaches to the Complexity of Legal Systems: AICOL International Workshops 2015–2017: AICOL-VI@ JURIX 2015, AICOL-VII@ EKAW 2016, AICOL-VIII@ JURIX 2016, AICOL-IX@ ICAIL 2017, and AICOL-X@ JURIX 2017, Revised Selected Papers (2018)

; ; ; ; ;
in Advanced Materials (2018)

; ; ; ; ;
in Computers and Security (2018), 77

;
in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (2018, June)

; ;
in Emerging Technologies for Authorization and Authentication (2018, November)
2017

; ; ;
in Bosse, Tibor; Bredeweg, Bert (Eds.) Communications in Computer and Information Science (2017)

; ;
in Proceedings of the 11th WISTP International Conference on Information Security Theory and Practice (2017)

; ;
in Advances in Cybersecurity 2017 (2017)

; ;
in Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele (Eds.) Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol (2017)

;
in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

; ; ; ; ; ;
in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)

; ; ;
in Proceedings of the International Conference on Security and Cryptography (2017)

; ;
in Proceedings of TrustBus 2017 (2017, July)

;
in Edelmann, Noella; Parycek, Peter (Eds.) Proceedings of the 7th International Conference for E-Democracy and Open Government (2017)

; ; ; ; ; ; ; ;
in Symeonidis, Iraklis (Ed.) Computer Security -- ESORICS 2017 (2017)

; ;
in IEEE Systems Journal (2017), 11(2),
2016

; ; ;
in Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN) (2016, November)

; ;
in Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC) (2016, November)

; ;
E-print/Working paper (2016)

;
in Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP) (2016)

; ; ; ; ;
in Scientific Reports (2016), 6(26840), 1-8

; ;
in Barthe, Gilles; Markatos, Evangelos (Eds.) Security and Trust Management - STM 2016 (2016)

;
in Proceedings of the 4th World Conference on Information Systems and Technologies (2016)

; ;
in Symeonidis, Iraklis (Ed.) IEEE International Smart Cities Conference, ISC2 2016, Trento Italy, September 12-15, 2016 (2016)

; ; ; ;
in Symeonidis, Iraklis (Ed.) ICT Systems Security and Privacy Protection (2016)

; ;
in Symeonidis, Iraklis (Ed.) Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21 2016. (2016)
2015

; ; ; ;
in Symeonidis, Iraklis (Ed.) Risks and Security of Internet and Systems - 10th International Conference CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers (2015)

; ;
in JOURNAL OF COMPUTER SECURITY (2015), 23(5), 563-585

; ; ;
in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

;
Scientific Conference (2015, July 13)

; ; ; ; ; ; ; ; ; ;
in Socio-Technical Security Metrics (2015)

; ; ; ;
in Proceedings of the New Security Paradigm Workshop (2015)

; ; ; ;
in Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (2015)

; ; ; ;
in Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 (2015)

; ; ; ; ;
in Communications in Computer and Information Science (2015), 554

; ; ;
in Foresti, Sara (Ed.) Security and Trust Management (2015)

; ; ; ;
in Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015, July 21)

; ; ; ;
in Lecture Notes in Computer Science (2015), 9190

;
in Proc. of the 5th International Workshop on Socio-Technical Security and Trust (2015)

; ;
in T. Tryfonas, I. Askoxylakis (Ed.) Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (2015)

;
in Advances in Intelligent Systems and Computing (2015)

; ;
in Computers electrical engineering (2015)

;
in Journal of Ambient Intelligence and Humanized Computing (2015), 6(3), 361-373
2014

; ; ;
in IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden (2014)

; ;
in Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014 (2014)

;
Scientific Conference (2014)

; ; ; ; ;
in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

; ; ;
in Lecture Notes in Computer Science (2014)

; ; ;
in Lecture Notes in Computer Science (2014)

; ; ; ;
in IEEE 3rd International Conference on Serious Games and Applications in Healthcare (2014, May)

; ;
in Security Protocols XXII - Lecture Notes in Computer Science (2014)
2013

; ; ; ; ;
in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

; ; ; ;
in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

; ; ; ;
in IEEE TrustCom (2013)

; ; ; ;
in Lecture Notes in Computer Science (2013), 8203

; ;
in 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013 (2013)
2012

; ; ; ; ;
in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

; ; ;
in Proc. 7th International Conference on Availability, Reliability and Security (2012)

;
Book published by IEEE (2012)

; ;
in Lecture Notes in Computer Science (2012), 6573 LNAI

; ; ;
in Security and Communication Networks (2012), 5(8), 831-833
2011

; ; ;
Book published by IEEE (2011)

; ;
in Proc. 19th International Workshop on Security Protocols (2011)

; ;
in Serugendo, Giovanna Di Marzo; Gleizes, Marie-Pierre; Karageorgos, Anthony (Eds.) Self-Organizing Software - From Natural to Artificial Adaptation (2011)
2010

; ;
in Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (2010)
2009

in de Lemos, R.; Fabre, J. C.; Gacek, C.; Gadducci, F.; ~ter Beek, M. H. (Eds.) Architecting Dependable Systems VI 2018-09-18 22:51:18 +0000 2019-06-15 18:11:00 +0200 (2009)
Undated

; ;
Learning material (n.d.)