Lo Iacono, Luigi
634  results:
Search for persons X
?
1

A Privacy Measure Turned Upside Down? Investigating the Use..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
2

Expert Perspectives on Information Security Awareness Progr..:

, In: HCI for Cybersecurity, Privacy and Trust; Lecture Notes in Computer Science,
Tolsdorf, Jan ; Lo Iacono, Luigi - p. 98-117 , 2024
 
?
4

Is It Really You Who Forgot the Password? When Account Reco..:

, In: Communications in Computer and Information Science; Ubiquitous Security,
 
?
5

Datenökonomie trifft Datenschutz:

Feth, Denis ; Schmitt, Hartmut ; Lo Iacono, Luigi
Datenschutz und Datensicherheit - DuD.  48 (2024)  2 - p. 73-73 , 2024
 
?
6

Internet Users' Willingness to Disclose Biometric Data for ..:

Dehling, Florian ; Tolsdorf, Jan ; Federrath, Hannes.
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  2 - p. 479-508 , 2024
 
?
7

Risk-Based Authentication for OpenStack: A Fully Functional..:

, In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy,
 
?
8

Analysing the Safety and Security of a UV-C Disinfection Ro..:

, In: 2023 IEEE International Conference on Robotics and Automation (ICRA),
 
?
9

Data Protection Officers' Perspectives on Privacy Challenge..:

, In: Computer Security. ESORICS 2022 International Workshops; Lecture Notes in Computer Science,
 
?
10

Data cart – designing a tool for the GDPR-compliant handlin..:

Tolsdorf, Jan ; Dehling, Florian ; Lo Iacono, Luigi
Behaviour & Information Technology.  41 (2022)  10 - p. 2084-2119 , 2022
 
?
12

Less is Often More: Header Whitelisting as Semantic Gap Mit..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
13

What's in Score for Website Users: A Data-Driven Long-Term ..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
 
?
15

A Case Study on the Implementation of the Right of Access i..:

, In: Privacy Technologies and Policy; Lecture Notes in Computer Science,
 
1-15