Follow
Luigi Lo Iacono
Luigi Lo Iacono
H-BRS University of Applied Sciences
Verified email at h-brs.de - Homepage
Title
Cited by
Cited by
Year
On technical security issues in cloud computing
M Jensen, J Schwenk, N Gruschka, LL Iacono
2009 IEEE international conference on cloud computing, 109-116, 2009
11182009
All your clouds are belong to us: security analysis of cloud management interfaces
J Somorovsky, M Heiderich, M Jensen, J Schwenk, N Gruschka, ...
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 3-14, 2011
2382011
Security and privacy-enhancing multicloud architectures
JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau
IEEE Transactions on dependable and secure computing 10 (4), 212-224, 2013
2182013
Vulnerable cloud: Soap message security validation revisited
N Gruschka, LL Iacono
2009 IEEE International Conference on Web Services, 625-631, 2009
2002009
Strategies for health data exchange for secondary, cross-institutional clinical research
BS Elger, J Iavindrasana, LL Iacono, H Müller, N Roduit, P Summers, ...
Computer methods and programs in biomedicine 99 (3), 230-251, 2010
1362010
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 265-281, 2018
1152018
Security prospects through cloud computing by adopting multiple clouds
M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono
2011 IEEE 4th international conference on cloud computing, 565-572, 2011
862011
Is this really you? An empirical study on risk-based authentication applied in the wild
S Wiefling, L Lo Iacono, M Dürmuth
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
782019
Listen to developers! a participatory design study on security warnings for cryptographic apis
PL Gorski, Y Acar, L Lo Iacono, S Fahl
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
522020
Guidelines for adopting frontend architectures and patterns in microservices-based systems
H Harms, C Rogowski, L Lo Iacono
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
492017
Towards the usability evaluation of security APIs.
PL Gorski, LL Iacono
HAISA 10, 252-265, 2016
482016
@ neurIST: infrastructure for advanced disease management through integration of heterogeneous data, computing, and complex processing services
S Benkner, A Arbona, G Berti, A Chiarini, R Dunlop, G Engelbrecht, ...
IEEE transactions on information technology in biomedicine 14 (6), 1365-1377, 2010
482010
Server-side streaming processing of ws-security
N Gruschka, M Jensen, LL Iacono, N Luttenberger
IEEE Transactions on Services Computing 4 (4), 272-285, 2011
472011
Multi-centric universal pseudonymisation for secondary use of the EHR.
LL Iacono
Studies in health technology and informatics 126, 239, 2007
442007
More than just good passwords? A study on usability and security perceptions of risk-based authentication
S Wiefling, M Dürmuth, L Lo Iacono
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
412020
I do and i understand. not yet true for security apis. so sad
LL Iacono, PL Gorski
European Workshop on Usable Security 4, 40, 2017
402017
Your cache has fallen: Cache-poisoned denial-of-service attack
HV Nguyen, LL Iacono, H Federrath
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
372019
Security challenges of the 3gpp 5g service based architecture
HC Rudolph, A Kunz, LL Iacono, HV Nguyen
IEEE Communications Standards Magazine 3 (1), 60-65, 2019
332019
Evaluation of account recovery strategies with FIDO2-based passwordless authentication
J Kunke, S Wiefling, M Ullmann, LL Iacono
arXiv preprint arXiv:2105.12477, 2021
312021
Method and system for user authentication
N Gruschka, LL Iacono, GA Kohring, H Rajasekaran
US Patent App. 13/500,503, 2012
312012
The system can't perform the operation now. Try again later.
Articles 1–20