default search action
Leonardo A. Martucci
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Mahdi Akil, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs. SECRYPT 2024: 114-127 - 2023
- [j8]Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund:
Designing for privacy: Exploring the influence of affect and individual characteristics on users' interactions with privacy policies. Comput. Secur. 134: 103468 (2023) - [c30]Leonardo A. Martucci, Jonathan Magnusson, Mahdi Akil:
On-Campus Hands-On Ethical Hacking Course - Design, Deployment and Lessons Learned. HAISA 2023: 76-90 - [c29]Mahdi Akil, Sujash Naskar, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs. Privacy and Identity Management 2023: 192-210 - 2020
- [j7]Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund:
Psychological Effects and Their Role in Online Privacy Interactions: A Review. IEEE Access 8: 21236-21260 (2020) - [j6]Artem Voronkov, Leonardo A. Martucci, Stefan Lindskog:
Measuring the Usability of Firewall Rule Sets. IEEE Access 8: 27106-27121 (2020) - [j5]Mahdi Akil, Lejla Islami, Simone Fischer-Hübner, Leonardo A. Martucci, Albin Zuccato:
Privacy-Preserving Identifiers for IoT: A Systematic Literature Review. IEEE Access 8: 168470-168485 (2020) - [c28]Artem Voronkov, Leonardo A. Martucci:
Natural vs. Technical Language Preference and Their Impact on Firewall Configuration. HCI (30) 2020: 261-270 - [c27]Agnieszka Kitkowska, Erik Wästlund, Leonardo A. Martucci:
(In)escapable Affect? Exploring Factors Influencing Privacy-Related Behavioral Intentions. HICSS 2020: 1-10 - [c26]Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund:
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design. SEC 2020: 109-123 - [c25]Agnieszka Kitkowska, Mark Warner, Yefim Shulman, Erik Wästlund, Leonardo A. Martucci:
Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect. SOUPS @ USENIX Security Symposium 2020: 437-456
2010 – 2019
- 2019
- [c24]Leonardo H. Iwaya, Jane Li, Simone Fischer-Hübner, Rose-Mharie Åhlfeldt, Leonardo A. Martucci:
E-Consent for Data Privacy: Consent Management for Mobile Health Technologies in Public Health Surveys and Disease Surveillance. MedInfo 2019: 1223-1227 - [c23]Artem Voronkov, Leonardo A. Martucci, Stefan Lindskog:
System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces. SOUPS @ USENIX Security Symposium 2019 - [i1]Artem Voronkov, Leonardo A. Martucci, Stefan Lindskog:
System Administrators Are Parting Ways With Command Line Interfaces: An Exploratory Study of Firewall Interfaces. CoRR abs/1905.13582 (2019) - 2018
- [j4]Artem Voronkov, Leonardo H. Iwaya, Leonardo A. Martucci, Stefan Lindskog:
Systematic Literature Review on Usability of Firewall Configuration. ACM Comput. Surv. 50(6): 87:1-87:35 (2018) - [c22]Leonardo H. Iwaya, Simone Fischer-Hübner, Rose-Mharie Åhlfeldt, Leonardo A. Martucci:
mHealth: A Privacy Threat Analysis for Public Health Surveillance Systems. CBMS 2018: 42-47 - [c21]Simone Fischer-Hübner, Leonardo A. Martucci, Lothar Fritsch, Tobias Pulls, Sebastian Herold, Leonardo H. Iwaya, Stefan Alfredsson, Albin Zuccato:
A MOOC on Privacy by Design and the GDPR. World Conference on Information Security Education 2018: 95-107 - 2017
- [c20]Agnieszka Kitkowska, Erik Wästlund, Joachim Meyer, Leonardo A. Martucci:
Is It Harmful? Re-examining Privacy Concerns. Privacy and Identity Management 2017: 59-75 - 2016
- [c19]Jenni Reuben, Leonardo A. Martucci, Simone Fischer-Hübner, Heather S. Packer, Hans Hedbom, Luc Moreau:
Privacy Impact Assessment Template for Provenance. ARES 2016: 653-660 - 2015
- [c18]Artem Voronkov, Stefan Lindskog, Leonardo A. Martucci:
Challenges in Managing Firewalls. NordSec 2015: 191-196 - [c17]Jenni Reuben, Leonardo A. Martucci, Simone Fischer-Hübner:
Automated Log Audits for Privacy Compliance Validation: A Literature Survey. Privacy and Identity Management 2015: 312-326 - [c16]Leonardo H. Iwaya, Fausto Giunchiglia, Leonardo A. Martucci, Alethia Hume, Simone Fischer-Hübner, Ronald Chenu-Abente:
Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare. Privacy and Identity Management 2015: 343-358 - 2014
- [c15]Fábio Borges, Leonardo A. Martucci:
iKUP keeps users' privacy in the Smart Grid. CNS 2014: 310-318 - [c14]Mark Hartswood, Marina Jirotka, Ronald Chenu-Abente, Alethia Hume, Fausto Giunchiglia, Leonardo A. Martucci, Simone Fischer-Hübner:
Privacy for Peer Profiling in Collective Adaptive Systems. Privacy and Identity Management 2014: 237-252 - [c13]Fábio Borges, Leonardo A. Martucci, Filipe Beato, Max Mühlhäuser:
Secure and Privacy-Friendly Public Key Generation and Certification. TrustCom 2014: 114-121 - 2013
- [j3]Delphine Christin, Christian Roßkopf, Matthias Hollick, Leonardo A. Martucci, Salil S. Kanhere:
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications. Pervasive Mob. Comput. 9(3): 353-371 (2013) - [c12]Matthias Beckerle, Leonardo A. Martucci:
Formal definitions for usable access control rule sets from goals to metrics. SOUPS 2013: 2:1-2:11 - 2012
- [c11]Delphine Christin, Christian Rosskopf, Matthias Hollick, Leonardo A. Martucci, Salil S. Kanhere:
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications. PerCom 2012: 135-143 - [c10]Fábio Borges, Leonardo A. Martucci, Max Mühlhäuser:
Analysis of privacy-enhancing protocols based on anonymity networks. SmartGridComm 2012: 378-383 - [c9]Leonardo A. Martucci, Albin Zuccato, Ben J. M. Smeets, Sheikh Mahbub Habib, Thomas Johansson, Nahid Shahmehri:
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry. UIC/ATC 2012: 627-632 - 2011
- [j2]Leonardo A. Martucci, Sebastian Ries, Max Mühlhäuser:
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services. Inf. Media Technol. 6(3): 1001-1015 (2011) - [j1]Leonardo A. Martucci, Sebastian Ries, Max Mühlhäuser:
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services. J. Inf. Process. 19: 317-331 (2011) - [c8]Patrick Hein, Debmalya Biswas, Leonardo A. Martucci, Max Mühlhäuser:
Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems. HASE 2011: 104-111 - [c7]Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser:
Learning Whom to Trust in a Privacy-Friendly Way. TrustCom 2011: 214-225
2000 – 2009
- 2009
- [b1]Leonardo A. Martucci:
Identity and Anonymity in Ad Hoc Networks. Karlstad University, Sweden, 2009 - [c6]Ge Zhang, Simone Fischer-Hübner, Leonardo A. Martucci, Sven Ehlert:
Revealing the Calling History of SIP VoIP Systems by Timing Attacks. ARES 2009: 135-142 - 2008
- [c5]Leonardo A. Martucci, Markulf Kohlweiss, Christer Andersson, Andriy Panchenko:
Self-certified Sybil-free pseudonyms. WISEC 2008: 154-159 - [c4]Christer Andersson, Markulf Kohlweiss, Leonardo A. Martucci, Andriy Panchenko:
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup. WISTP 2008: 64-77 - [e1]Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato, Leonardo A. Martucci:
The Future of Identity in the Information Society - Proceedings of the Third IFIP WG 9.2, 9.6/ 11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4-10, 2007. IFIP Advances in Information and Communication Technology 262, Springer 2008, ISBN 978-0-387-79025-1 [contents] - 2007
- [c3]Stefan Lindskog, Hans Hedbom, Leonardo A. Martucci, Simone Fischer-Hübner:
Experiences from Educating Practitioners in Vulnerability Analysis. World Conference on Information Security Education 2007: 73-80 - [c2]Leonardo A. Martucci, Albin Zuccato, Simone Fischer-Hübner:
Identity Deployment and Management in Wireless Mesh Networks. FIDIS 2007: 223-233 - 2005
- [c1]Christer Andersson, Leonardo A. Martucci, Simone Fischer-Hübner:
Requirements for Privacy-Enhancements in Mobile Ad Hoc Networks. GI Jahrestagung (2) 2005: 344-348
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint