PUBLICATIONS


COPYRIGHT NOTICE

Copyrights for some of the papers below have been transfered to various publisher of journals, conference proceedings, etc. This material is presented to ensure timely dissemination of scholarly and technical work. Copyrights and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.

Tools

[1to] P. Adão, Claudio Bozzato, Gian-Luca Dei Rossi, R. Focardi, F.L. Luccio, Mignis - A semantic based tool for firewall configuration. url:http://github.com/secgroup/Mignis, 2014.


Theses

[1t] F.L. Luccio, Approssimazione numerica di zeri di polinomi: analisi e sviluppo di alcuni metodi basati sull'algoritmo euclideo. Tesi di Laurea in Scienze dell'Informazione, Universita' degli Studi di Pisa, Luglio 1993.

[2t] F.L. Luccio, Distributed Algorithms for Routing and String Recognition. Master Thesis in Computer Science, Carleton University, Canada, April 1995.

[3t] F.L. Luccio, Communication in Distributed Systems. PhD Thesis in Computer Science, University of Milan, Italy, December 1998.


Journals

[1j] F.L. Luccio, Almost Exact Minumum Feedback Vertex Set in Meshes and Butterflies. Information Processing Letters (IPL), p. 59-64, ISSN 0020-0190, 66 (2), 29 April 1998.

[2j] R. Focardi, F.L. Luccio, D. Peleg, Feedback Vertex Set in Hypercubes. Information Processing Letters (IPL), p. 1-5, ISSN 0020-0190, 76 (1-2), 13 November 2000.

[3j] E. Kranakis, D. Krizanc, F.L. Luccio, On recognizing a string on an anonymous ring. Theory of Computing Systems (TOCS), p. 3-12, ISSN 1432-4350, 34 (1), 2001.

[4j] P. Flocchini, F.L. Luccio, Routing in Series Parallel Networks. Theory of Computing Systems (TOCS), p. 137-157, ISSN 1432-4350, 36 (2), 2003.

[5j] P. Flocchini, E. Kranakis, D. Krizanc, F.L. Luccio, N. Santoro, Sorting and Election in Anonymous Asynchronous Rings. Journal of Parallel and Distributed Computing (JPDC), p. 254-265, ISSN 0743-7315, 64 (2), 2004.

[6j] G. Anastasi, A. Bartoli, F.L. Luccio Fault-Tolerant Support for Reliable Multicast in Mobile Wireless Systems: Design and Evaluation, Kluwer Wireless Networks Journal (WINET), p. 259-269, ISSN 1022-0038, 10 (3), 2004.

[7j] C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza, Nesting Analysis of Mobile Ambients, Computer Languages, Systems and Structures, vol. 30 (3-4), Oct.-Dec. 2004, p. 207-230 Elsevier Science, ISSN: 1477-8424.

[8j] D. Krizanc, F.L. Luccio, R. Raman, Compact Routing Schemes for Dynamic Ring Networks, in Theory of Computing Systems (TOCS), ISSN 1432-4350, vol. 37 (5) pp. 585-607, 2004.

[9j] R. Focardi, F.L. Luccio, A modular approach to Sprouts, in Discrete Applied Mathematics (DAM), ISSN 0166-218X, vol. 144 (3) pp. 303-319, 2004, Elsevier Science.

[10j] P. Flocchini, M.J. Huang, F.L. Luccio, Decontaminating chordal rings and tori using mobile agents. In International Journal of Foundations of Computer Science (IJFCS), World Scientific Publishing Company, Vol. 18, No. 3, pp. 547-563, ISSN 0129-0541, 2007.

[11j] F.L. Luccio, Jop F. Sibeyn, Feedback Vertex Sets in Mesh-based Networks. Theoretical Computer Science (TCS), Vol. 383, No. 1, pp. 86-101, 2007, ISSN 0304-3975, Elsevier.

[12j] P. Flocchini, M.J. Huang, F.L. Luccio, Decontamination of Hypercubes by Mobile Agents. Networks, Vol. 52, No. 3, pp.167-178, ISSN 0028-3045, 2008.

[13j] F.L. Luccio, Contiguous search problem in Sierpinski graphs. Theory of Computing Systems (TOCS), Vol 44, pp.186-204, ISSN 1432-4350, 2009.

[14j] R. Focardi, F.L. Luccio, Guessing Bank PINs by Winning a Mastermind Game. Theory of Computing Systems (TOCS), ISSN 1432-4350, 50(1), 52-71, 2012.

[15j] M. Centenaro, R. Focardi, F.L. Luccio, Type-based Analysis of Key Management in PKCS#11 cryptographic devices Journal of Computer Security, Vol. 21, Number 6, pp. 971-1007, 2013, ISSN:0926-227X, DOI 10.3233/JCS-130479 .

[16j] A. Dattolo, F.L. Luccio, E. Pirone Web Accessibility Recommendations for the Design of Tourism Websites for People with Autism Spectrum Disorders. In the International Journal On Advances in Life Sciences, Vol. 8 n. 3 & 4, pp. 297-308, 2016.

[17j] A. Dattolo, F.L. Luccio. Accessible and Usable Websites and Mobile Applications for People with Autism Spectrum Disorders: a Comparative Study in EAI Endorsed Transactions on Ambient Systems, vol. 4, 2017 (ISSN 2032-927X).

[18j] A. Dattolo, C. De March, E. De Riu, F.L. Luccio. Designing Tourism Websites for Children: Guidelines and Experimental Results. in EAI Endorsed Transactions on Serious Games, 18 (16), 2018.

[19j] S. Das, R. Focardi, F.L. Luccio, E. Markou, M. Squarcina. Gathering of Robots in a Ring with Mobile Faults Theoretical Computer Science (TCS), 2019, vol. 764, pp. 42-60 (ISSN 0304-3975), https://doi.org/10.1016/j.tcs.2018.05.002.

[20j] F.L. Luccio. Learning distributed algorithms by programming robots, Journal of e-Learning and Knowledge Society, 2019, vol. 15, n.2, pp. 89-100. (ISSN: 1826-6223), https://doi.org/10.20368/1971-8829/1625.

[21j] R. Focardi, F.L. Luccio, H.A.M. Wahsheh Usable security for QR code, Journal of Information Security and Applications, vol. 48, October 2019, (ISSN: 22142134), DOI: 10.1016/j.jisa.2019.102369.

[22j] H.A.M. Wahsheh, F.L. Luccio, Security an Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions. Information 2020, vol. 11(4), 217, April 2020, (ISSN: 2078-2489), DOI: 10.3390/info11040217.

[23j] C. Bodei, L. Ceragioli, P. Degano, R. Focardi, L. Galletta, F. Luccio, M. Tempesta, L. Veronese FWS: Analyzing, maintaining and transcompiling firewalls". . Journal of Computer Security, IOS Press, vol. 29, n. 1, pp. 77-134, 2021.

[23j] L. Veronese F. Palmarini, R. Focardi, F.L. Luccio, Design and implementation of fast and cost-effective FPGA-based fuzzy rainbow tradeoffs. SN Computer Science, 4, 330 (2023), https://doi.org/10.1007/s42979-023-01762-9.


Electronic Journals

[1ej] C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza, Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients. Electronic Notes in Theoretical Computer Science, volume dedicated to the Mefisto Project 2003, Formal Methods for Security and Time, 6 August 2004, vol. 99 pp.319-337, ISSN: 1571-0661.


Books

[1b] A. Dattolo, F.L. Luccio, ``A New Concept Map Model for E-learning Environments''. In Lecture Notes in Business Information Processing, ISSN 1865-1348, ISBN 978-3-642-01343-0, LNBIP 18, p. 404-417, Springer, 2009.

[2b] A. Dattolo, F.L. Luccio, ``A Formal Model for Supporting the Adaptive Access to Virtual Museums''. In Advances in Soft Computing, ISSN 1615-3871, ASC 60, p. 481-492, Springer, 2009.

[3b] R. Focardi, F.L. Luccio, and G. Steel, ``An Introduction to Security API Analysis''. In A. Aldini and R. Gorrieri (Eds.): FOSAD VI Tutorial Lectures, LNCS 6858, pp. 35--65. Springer, Heidelberg, (2011), ISBN 978-3-642-23081-3.

[4b] R. Focardi, F.L. Luccio, H. Wahsheh. Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study in K. Daimi, G.A. Francia, L. Ertaul, L. H. Encinas, E. El-Sheikh, Computer and Network Security Essentials, Springer (ISBN 978-3-319-58423-2), pp 207-219, online 2017, print 2018.


Books Edited

[1be] A. Cortesi, F.L. Luccio (Eds.), Informatics Education Europe III. 3rd ACM-IFIP International Conference, IEEIII08, Venice, Italy, December 4-5, 2008, ISBN 978-88-903433-0-8.

[2be] R. Prasad, K. Farkas, A.U. Schmidt, A. Lioy, G. Russello, F.L. Luccio (Eds.), Security and Privacy in Mobile Information and Communication Systems. Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Volume 94, 2012, ISSN 1867-8211, ISBN 978-3-642-30243-5.

[3be] E. Kranakis, D. Krizanc, F.L. Luccio (Eds.), Fun with Algorithms. 6th International Conference, FUN 2012, Venice, Italy, June 4-6, 2012. Lecture Notes in Computer Science 7288 Springer 2012, ISBN 978-3-642-30346-3.

[4be] E. Kranakis, D. Krizanc, F.L. Luccio (Eds.), Editorial: Fun with Algorithms. Theory of Computing Systems, vol 54, n. 4, 2014, pp. 529-530, Springer US, ISSN: 1432-4350, DOI: 10.1007/s00224-013-9503-y.


Conferences

[1c] F.L. Luccio, On the convergence of a parallel algorithm for finding polynomial zeros. Proceedings of the 6-th IEEE Symposium on Parallel and Distributed Processing (SPDP), Dallas, U.S.A., October 26-29, 1994, ISBN: 0-8186-6427-4, ISSN: 1063-6374.

[2c] D. Krizanc, F.L. Luccio, Boolean Routing on Chordal Rings. Proceedings of the 2nd Colloquium on Structural Information and Communication Complexity, Olympia, Greece, June 12-14, 1995, ISBN 0-88629-276-X.

[3c] E. Kranakis, D. Krizanc, F.L. Luccio, String Recognition on Anonymous Rings. Proceedings of the 20-th International Symposium, MFCS'95, Prague, Czech Rep., LNCS, Springer Verlag, Series Volume 969, August 28-Sept 1, 1995, Series ISSN: 0302-9743, ISBN:3-540-60246-1.

[4c] P. Flocchini, F.L. Luccio, Distance Routing on Series Parallel Networks. Proceedings of the IEEE International Conference on Distributed Computing Systems, Hong-Kong, March 27-30, 1996, ISBN 0-8186-7398-2.

[5c] C. Gavoille, F.L. Luccio, Interval Routing in Series Parallel Graphs. Abstract in the proceedings of WSDAAL, Italian Workshop on Sistemi Distribuiti: Algoritmi, Architetture, e Linguaggi, Bertinoro (Forli'), Italy, 23-25 September 1997.

[6c] D. Krizanc, F.L. Luccio, R. Raman. Dynamic Interval Routing on Asynchronous Rings. Proceedings of the IEEE 13-th International Parallel Processing Symposium and 10-th Symposium on Parallel and Distributed Processing (IPPS/SPDP'99)", Puerto Rico, April 1999, pages 225-232, Series ISSN: 1063-7133, ISBN 0-7695-0143-5.

[7c] P. Flocchini, E. Kranakis, D. Krizanc, F.L. Luccio, N. Santoro, Sorting Multisets in Anonymous Rings, in the Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS 2000), Cancun, Mexico, May 1-5, pages 275-280, 2000, ISBN 0-7695-0574-0.

[8c] F.L. Luccio, A. Bartoli, G. Anastasi, A Fault-Tolerant Support for Mobile Wireless Systems, in the proceedings of WSDAAL, Italian Workshop on Sistemi Distribuiti: Algoritmi, Architetture, e Linguaggi, Ischia (Napoli), Italy, 18-20 September 2000.

[9c] R. Focardi, F.L. Luccio, A new analysis technique for the Sprouts Game, in the proceedings of the International Conference Fun with Algorithms 2 (FUN 2001), Isola d'Elba, Italy, May 29-31, pages 117-132, 2001, ISBN: 1-894145-09-7.

[10c] G. Anastasi, A. Bartoli, F.L. Luccio Fault-Tolerant Support for Reliable Multicast in Mobile Wireless Systems, in the proceedings of Networking 2002, Pisa, Italy, May 19-24, 2002. Lecture Notes in Computer Science (LNCS) number 2345. Volume editors Enrico Gregori, Marco Conti, Andrew T. Campbell, Guy Omidyar, Moshe Zukerman, ISBN:3-540-43709-6.

[11c] F.L. Luccio, A. Sgarro Fuzzy Graphs and Error-proof Keyboards, in the proceedings of The 9th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU'02), Annecy, Francia, 1-5 July 2002, ISBN: 2-9516453-1-7.

[12c] C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza Complexity of Nesting Analysis in Mobile Ambients, in the proceedings of the 4-th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'03), New York University, New York, U.S.A., 9-11 January 2003, ISBN 3-540-00348-7.

[13c] C. Braghin, A. Cortesi, S. Filippone, R. Focardi, F.L. Luccio, C. Piazza BANANA: A tool for Boundary Ambients Nesting ANAlysis, in the proceedings of the Ninth International Conference on Tools and Algorithms for the Construction and analysis of Systems (TACAS'03), pp. 437-441, Lecture Notes in Computer Science 2619 Springer, Warsaw, Poland 7-11 April 2003, ISBN 3-540-00898-5.

[14c] F.L. Luccio, Minumum Feedback Vertex Set in Pyramid and Mesh of Trees Networks. In the proceedings of the 10th Colloquium on Structural Information and Communication Complexity (SIROCCO'03), June 18-20 2003 Umea, Sweden, ISBN 1-894145-16-X.

[15c] R. Focardi, F.L. Luccio, How tasty is a cannibal? A strategy for the mesh cannibal game. In the proceedings of the 3rd International Conference on Fun with Algorithms (FUN 2004), Isola d'Elba, Italy, May 26-28, 2004, p. 171-183, ISBN: 88-8492-150-3.

[16c] F.L. Luccio and J.F. Sibeyn, Tighter Bounds on Feedback Vertex Sets in Mesh-based Networks. In the proceedings of the 11th Colloquium on Structural Information and Communication Complexity (SIROCCO'04), Smolenice Castle, Slovakia, 21-23 giugno 2004, p. 209-220, Lecture Notes in Computer Science 3104 Springer, ISBN: 3-540-22230-8, ISSN: 0302-9743.

[17c] P. Flocchini, E. Kranakis, D. Krizanc, F.L. Luccio, N. Santoro, C. Sawchuk, Mobile Agent Rendezvous When Tokens Fail. In the proceedings of the 11th Colloquium on Structural Information and Communication Complexity (SIROCCO'04), Smolenice Castle, Slovakia, 21-23 giugno 2004, p. 161-172, Lecture Notes in Computer Science 3104 Springer, ISBN: 3-540-22230-8, ISSN: 0302-9743.

[18c] P. Flocchini, M. Jun Huang, F.L. Luccio, Continuous Search in the Hypercube for Capturing an Intruder. In the proceedings of the IEEE 19th International Parallel and Distributed Processing Symposium (IPDPS05), April 4-8, 2005 Denver, Colorado, U.S.A. p. 62- , ISBN 0-7695-2312-9.

[19c] P. Flocchini, F.L. Luccio, L.X. Song, Size Optimal Strategies for Capturing an Intruder in Mesh Networks. In the proceedings of the 2005 International Conference on Communications in Computing (CIC 2005), June 27-30, 2005, Las Vegas, Nevada, U.S.A., p. 200-206, ISBN 1-932415-56-4.

[20c] P. Flocchini, M. Jun Huang, F.L. Luccio, Decontamination of Chordal Rings and Tori. In the proceedings of the 8th Workshop on Advances in Parallel and Distributed Computational Models April 25, 2006, Rhodes Island, Greece, ISBN:1-4244-0054-6.

[21c] F.L. Luccio, Intruder Capture in Sierpinski Graphs. In the proceedings of the of Fourth International Conference on Fun with algorithms (FUN07), June 3-5, 2007, Castiglioncello (LI), Tuscany, Italy, p. 249-261, Lecture Notes in Computer Science 4475 Springer, ISBN 978-3-540-72913-6.

[22c] A. Dattolo, F.L. Luccio, A New Actor-Based Structure for Distributed Systems. In the proceedings of the MIPRO conference on Hypermedia and Grid Systems (HGS07), May 21-25, 2007, Opatija, Croatia, p. 195-201, ISBN 978-953-233-032-8.

[23c] A. Dattolo, F.L. Luccio, Formalizing a model to represent and visualize concept spaces in e-learning environments. In the proceedings of the 4th International Conference on Web Information Systems and Technologies (WEBIST), May 4-7 2008, Funchal-Madeira, Portugal, vol. 1 p.339-346, ISBN: 978-989-8111-26-5, 2008.

[24c] A. Dattolo, F.L. Luccio, Visualizing Personalized Views in Virtual Museum Tours. In the proceedings of the International Conference on Human System Interaction HIS'08, Krakow Poland, May 25-27, p.109-114, ISBN 978-1-4244-1542-7, 2008.

[25c] M. Centenaro, R. Focardi, F.L. Luccio, G. Steel, Type-based Analysis of Financial APIs. Presented at the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), York, UK, March 28-29, 2009.

[26c] A. Dattolo, F.L. Luccio, ``A formal description of ZigZag-structures''. In the proceedings of the Workshop on New Forms of Xanalogical Storage and Function, p. 7-11, F. Vitali, A. Di Iorio, J. Blustein eds., CEUR, vol 508, ISSN 1613-0073, June 29th, Turin, Italy, 2009.

[27c] R. Focardi, F.L. Luccio, G. Steel, Improving PIN Processing API Security. In the proceedings of the 3rd International Workshop on Analysis of Security APIs, July 10-11 2009, Port Jefferson, New York, USA, 2009.

[28c] A. Dattolo, F.L. Luccio, ``A State of Art Survey on ZigZag Structures''. In the proceedings of the Workshop on New Forms of Xanalogical Storage and Function, p. 1-6, F. Vitali, A. Di Iorio, J. Blustein eds., CEUR, vol 508, ISSN 1613-0073, June 29th, Turin, Italy, 2009.

[29c] M. Centenaro, R. Focardi, F.L. Luccio, G. Steel, Type-based Analysis of PIN Processing APIs. In the proceedings of the 14th European Symposium on Research in Computer Security (Esorics), Saint Malo, France, September 21-25, Lecture Notes in Computer Science 5789 Springer, ISSN 0302-9743, ISBN: 978-3-642-04443-4, p. 53-68, 2009.

[30c] R. Focardi, F.L. Luccio, G. Steel, Blunting Differential Attacks on PIN Processing APIs. In the proceedings of the 14th Nordic Conference on Secure IT Systems (Nordsec), 14-16 October 2009 Oslo, Norway, p. 88-103, Lecture Notes in Computer Science 5838 Springer, ISSN 0302-9743, ISBN: 978-3-642-04765-7, 2009.

[31c] R. Focardi, F.L. Luccio, Secure upgrade of hardware security modules in bank networks. In the proceedings of Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10), Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers, Lecture Notes in Computer Science 6186 Springer, ISBN 978-3-642-16073-8, 2011.

[32c] R. Focardi, F.L. Luccio, Cracking bank PINs by playing Mastermind. In the proceedings of the Fifth International Conference on Fun with algorithms (FUN'10), June 2-4, 2010 Ischia Island, Italy, Lecture Notes in Computer Science 6099 Springer, ISBN 978-3-642-13121-9, 2010.

[33c] R. Focardi, F.L. Luccio, Analysis and development of Security APIs for disposable RFID tickets. In the proceedings of the 5th International Workshop on Analysis of Security APIs (ASA'11), Paris, France, June 30 2011.

[34c] R. Focardi, F.L. Luccio, Secure recharge of disposable RFID tickets. In the proceedings of the 8th International Workshop on Formal Aspects of Security & Trust (FAST2011) Leuven, Belgium, September 15-16, 2011, pages 85-99. Revised Selected Papers. Lecture Notes in Computer Science 7140 Springer 2012, ISBN 978-3-642-29419-8.

[35c] M. Centenaro, R. Focardi, F.L. Luccio, Type-Based Analysis of PKCS#11 Key Management. (Best paper award nominee.) In the proceedings of the 1st Conference on Principles of Security and Trust (POST2012), 26-27 March 2012, Tallinn, Estonia, LNCS 7215, pp. 349--368, Springer 2012, ISBN 978-3-642-28640-7.

[36c] R. Focardi, F.L. Luccio, Towards a type-based analysis of real PKCS#11 devices. In the proceedings of the 6th International Workshop on Analysis of Security APIs (ASA'12), Harvard University, Cambridge MA, USA, June 28 2012.

[37c] R. Focardi, F.L. Luccio, Type-based analysis of real PKCS#11 devices. 5 minutes talk at the 25th IEEE Computer Security Foundations SymposiumCSF 2012, Harvard University, Cambridge MA, USA, June 25-27 2012.

[38c] R. Focardi, F.L. Luccio, M. Squarcina, Fast SQL Blind Injections in High Latency Networks. Security and Privacy Special Track, IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL'12) Rome, Italy, October 2-5, 2012, ISBN: 978-1-4673-4687-0.

[38c] P. Adão, R. Focardi, F.L. Luccio. Type-Based Analysis of Generic Key Management APIs. IEEE 26th Computer Security Foundations Symposium (CSF'13), 97-111, June 26-28, 2013, New Orleans, Louisiana, USA.

[39c] Pedro Adão, Claudio Bozzato, Gian-Luca Dei Rossi, R. Focardi, F.L. Luccio. A semantic based tool for firewall configuration. Presented at, Hot Issues in Security Principles and Trust (HotSpot 2014), 5th April 2014 in Grenoble, France.

[40c] Pedro Adão, Claudio Bozzato, Gian-Luca Dei Rossi, R. Focardi, F.L. Luccio, Mignis: A semantic based tool for firewall configuration. In the proceedings of the IEEE 27th Computer Security Foundations Symposium (CSF'14), July 19-22 2014, Vienna, Austria, pp. 351-365, ISBN: 9781479942909.

[41c] Antonina Dattolo, Flaminia L. Luccio, Modelling Volo, an Augmentative and Alternative Communication application. In the proceedings of the Eighth International Conference on Advances in Computer-Human Interactions (ACHI 2015), pp. 14-19, February 22 - 27, 2015, Lisbon, Portugal, IARIA, ISSN: 2308-4138, ISBN: 978-1-61208-382-7.

[42c] Evangelos Kranakis, Danny Krizanc, Flaminia Luccio and Brett Smith. Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors. In the proceedings of the 11th International Symposium on Algorithms and Experiments for Wireless Sensor Networks (Algosensors 2015), 17 -18 September 2015, Patras, Greece, LNCS 9536, pp. 27-40, ISBN 978-3-319-28471-2.

[43c] Shantanu Das, Flaminia L. Luccio and Euripides Markou. Mobile Agents Rendezvous in spite of a Malicious Agent. In the proceedings of the 11th International Symposium on Algorithms and Experiments for Wireless Sensor Networks (Algosensors 2015), 17 -18 September 2015, Patras, Greece, LNCS 9536, pp. 211-224, ISBN 978-3-319-28471-2.

[44c] Pedro Adão, Riccardo Focardi, Joshua Guttman and Flaminia Luccio Localizing Security for Distributed Firewalls. Presented at the 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016), Eindhoven, The Netherlands April 3rd, 2016.

[45c] Antonina Dattolo, Flaminia L. Luccio, Elisa Pirone, Webpage Accessibility and Usability for Autistic Users: a Case Study on a Tourism Website (Awarded as one of the best papers). In the proceedings of the Ninth International Conference on Advances in Computer-Human Interactions (ACHI 2016), April 24-28, 2016 - Venice, Italy, pp. 145-152, ISSN: 2308-4138, ISBN: 978-1-61208-468-8. The related Webpage is now here.

[46c] Pedro Adão, Riccardo Focardi, Joshua Guttman and Flaminia Luccio. Localizing Firewall Security Policies. In the proceedings of the 29th IEEE Computer Security Foundations Symposium, June 27-July 1, 2016, Lisboa, Portugal, pp. 194-209.

[47c] S. Das, R. Focardi, F.L. Luccio, E. Markou, M. Squarcina. Gathering of Robots in a Ring with Mobile Faults. In the proceedings of the 17th Italian Conference on Theoretical Computer Science (ICTCS 2016). Ceur, Vol-1720, pp. 122-135, ISSN 1613-0073. Lecce, Italy, September 7-9th 2016.

[48c] A. Dattolo, F.L. Luccio. A review of Websites and Mobile Applications for People with Autism Spectrum Disorders: Towards Shared Guidelines. In the proceedings of the 2nd EAI International Conference on Smart Objects and Technologies for Social Good. November 30 - December 1, 2016, Venice, Italy, Volume 195 LNICST, 2017, Pages 264-273.

[49c] A. Dattolo, C. De March, F.L. Luccio. Usable and Accessible Tourism Websites for Children: a Case Study of a Naturalistic Oasis (Pre-print). In the proceedings of the 3rd EAI International Conference on Smart Objects and Technologies for Social Good. November 29-30, 2017, LNICST, Pisa, Italy.

[50c] R. Focardi, F.L. Luccio, H. Wahsheh. Usable Cryptographic QR Codes . In the proceedings of the IEEE International Conference on Industrial Technology (ICIT - IEEE 2018), IEEE, pp. 1664-1669, Lyon, France, February 20-22, 2018. ISBN 978-1-5090-5948-5.

[51c] R. Focardi, F.L. Luccio. Neural-Cryptanalysis of Classical Ciphers. In the proceedings of the 19th Italian Conference on Theoretical Computer Science (ICTCS 2018). Ceur Volume 2243, pp. 104-115. 18-20 September 2018, Urbino, Italy.

[52c] F.L. Luccio, L. Beltrame. Accessible Tourism for Users with Hearing Loss. In the proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good. November 28-30, 2018, ACM, pp. 243-248, Bologna, Italy, ISBN: 978-1-4503-6581-9 doi:10.1145/3284869.3284909.

[53c] S. Das, N. Giachoudis, F.L. Luccio and E. Markou. Gathering of Robots in a Grid with Mobile Faults. In the proceedings of the 45th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM19), LNCS 11376, p. 164-178, Novy Smokovec, Slovakia, January 27-30, 2019.

[54c] H. Wahsheh, F.L. Luccio. Evaluating Security, Privacy and Usability Features of QR Code Readers . In the proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019), February 23-25, 2019, Prague, Czech Republic, p. 266-273, doi:10.5220/0007346202660273.

[55c] M. Carisi, A. Albarelli, F.L. Luccio. Design and implementation of an airport chatbot. In the proceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good. September 25-27, 2019 Valencia, Spain, ACM.

[56c] R. Focardi, F.L. Luccio. Automated Analysis of PUF-based Protocols. In the proceedings of the 33rd IEEE Computer Security Foundations Symposium June 22-26, 2020 - Virtual Conference, p. 304-317, IEEE.

[57c] F.L. Luccio; D. Gaspari Learning Sign Language from a Sanbot Robot. 6th EAI International Conference on Smart Objects and Technologies for Social Good - Serious Games to Improve Quality of Life, September 14-16, 2020, p. 138-143, ACM.

[58c] S. Das, N. Giachoudis, F.L. Luccio, E. Markou. Broadcasting with mobile agents in dynamic networks 24th Conference on Principles of Distributed Systems (OPODIS 2020) 14-16 December 2020 Online, Volume 184, p. 24:1--24:16, LIPIcs, 2021.

[59c] F. Benvenuto, F. Palmarini, R. Focardi, F.L. Luccio. Firmware extraction from real IoT devices through power analysis of AES. In the proceedings of the Italian Conference on CyberSecurity (ITASEC'21), online, April 7-9, 2021.

[60c] R. Focardi, F.L. Luccio. "A formally verified configuration for Hardware Security Modules in the cloud". In the proceedings of the ACM Conference on Computer and Communications Security (CCS) pages 412-428, November 15-19, 2021, Virtual conference.

[61c] R. Focardi, F.L. Luccio. ``Secure Key Management Policies in Strand Spaces". In Dougherty D., Meseguer J., Modersheim S.A., Rowe P., Protocols, Strands, and Logic, Springer, Cham, vol. 13066, pp. 175-197, Protocols, Strands, and Logic, 2021.

[62c] L. Veronese, F. Palmarini, R. Focardi, F.L. Luccio. ``A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs". In the proceedings of the 8th International Conference on Information Systems Security and Privacy. SCITEPRESS, p. 165-176, online, 9-11 February 2022.

[63c] A.M. Di Campi, R. Focardi, F.L. Luccio. ``The Revenge of Password Crackers: Automated Training of Password Cracking Tools". In the proceedings of the 27th European Symposium on Research in Computer Security (ESORICS22), Copenhagen, Denmark, September 26-30, 2022, pp 317-336, Springer, Chan, Proceedings Part II.

[64c] M. Busi, R. Focardi, F.L. Luccio. ``Automated Learning and Verification of Embedded Security Architectures''. In Proceedings of the 7th Workshop on Principles of Secure Compilation (co-located with POPL 2023) (PriSC 2023), 21 January 2023, Boston, Massachusetts, United States.

[65c] M. Busi, R. Focardi, F.L. Luccio. ``Don't Get Stranded: Secure and Dynamic Key Management Policies with Strand Spaces'' . In Marco Patrignani, Ethan Cecchetti, Workshop on Foundations of Computer Security (FCS'23), 9th July 2023.

[66c] F. Palmarini, L. Veronese, M. Busi, R. Focardi, F.L. Luccio. ``A Recipe for Cost-Effective Secure IoT: the SAFE PLACE Project Case Study". In the proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience (IEEE CSR'23), Venice July 31 - August 2, 2023.

[67c] M. Busi, R. Focardi, F.L. Luccio. ``Bridging the Gap: Automated Analysis of Sancus", 37th IEEE Computer Security Foundations Symposium July 8-12, 2024 - Enschede, The Netherlands (accepted).


Invited talks

[i1] F.L. Luccio (joint work with P.Flocchini). Mobile Agents. Workshop on Computations by Mobile Entities (Agents, Robots, Sensors)}, Invited talk, scuola di dottorato Galileo Galilei, Dipartimento di Informatica, University of Pisa, Italy, 11-15 June 2007.

[i2] F.L. Luccio (joint work with R. Focardi). Cracking bank PINs by playing Mastermind. Invited talk, WSOFT Meeting, Pisa, Italy, giugno 25-26, 2010.

[i3] F.L. Luccio (joint work with R. Focardi). PIN Cracking is a Guessing Game. Invited talk, Santa's Crypto Get-Together 2013, Prague, Czech Republic, November 28-29, 2013.

[i4] F.L.Luccio. La codifica dell'informazione nel calcolatore. Invited seminar, Gorizia, Italy, February 10, 2015.

[i5] F.L.Luccio. La struttura hardware del calcolatore e la sicurezza informatica. Invited seminar, Gorizia, Italy, February 10, 2015.

[i6] F.L.Luccio. The role of adaptive mobile dedicated applications in the learning process of users with Autism Spectrum Disorders (ASD). Invited panelist at the 9nth International Conference on Advances in Computer-Human Interactions (ACHI 2016), Venice, Italy.

[i7] F.L.Luccio. Gathering of Robots in a Ring with Mobile Faults: From theory to practice. Invited talk, presented at ``Moving and Computing (MAC), 6th Research Meeting on Distributed Computing by Mobile Robots'', September 26th, 2016, Paris, France.

[i8] F.L.Luccio. Graph Exploration with Deadlines. Invited talk, presented at ``Moving and Computing (MAC), The 8th Research Meeting and School on Distributed Computing by Mobile Robots'', September 19-22, 2012, Pisa, Italy.


e-print Archives

[1a] P. Adão, R. Focardi, F.L. Luccio. Type-Based Analysis of Generic Key Management APIs (Long Version). IACR Cryptology ePrint Archive, pages 237-, 2013, url:http://eprint.iacr.org/2013/237.

[2a] Flaminia L. Luccio, Euripides Markou. Mobile Agents Rendezvous in spite of a Malicious Agent. CoRR abs, arXiv.org, 2014, arXiv:1410.4772v2, https://arxiv.org/abs/1410.4772


Technical Reports

[1tr] E. Kranakis, D. Krizanc, F.L. Luccio, String Recognition on Anonymous Rings. Technical Report # 256, School of Computer Science, Carleton University, Ottawa, Canada, November 1994.

[2tr] P. Flocchini, F.L. Luccio, Distance Routing on Series Parallel Networks. Technical Report # 96-15, School of Computer Science, Carleton University, Ottawa, Canada, April 1996.

[3tr] F.L. Luccio, Almost Exact Minumum Feedback Vertex Set in Meshes and Butterflies. Technical Report # 207-97, Universita' degli Studi di Milano, Dipartimento di Scienze dell'Informazione, Italy, October 1997.

[4tr] R. Focardi, F.L. Luccio, Minumum Feedback Vertex Set in k-Dimensional Hypercubes. Technical Report # CS-99-21, Universita' Ca' Foscari di Venezia, Dipartimento di Informatica, Italy October 1999.

[5tr] P. Flocchini, E. Kranakis, D. Krizanc, F.L. Luccio, N. Santoro, Sorting Multisets and Electing a Leader in Anonymous Rings, Quaderni Matematici (Technical Report) 463, Universita' degli Studi di Trieste, Dipartimento di Scienze Matematiche, Italy, Gennaio 2000.

[6tr] F.L. Luccio, A. Bartoli, G. Anastasi, Fault-Tolerant Support for Totally Ordered Muliticast in Mobile Wireless Systems, Quaderni Matematici (Technical Report) 469, Universita' degli Studi di Trieste, Dipartimento di Scienze Matematiche, Italy, Giugno 2000.

[7tr] R. Focardi, F.L. Luccio, Analysing Sprouts. Technical Report # CS-2002-9, Universita' Ca' Foscari Venezia, Dipartimento di Informatica, Italy, June 2002.

[8tr] G. Anastasi, A. Bartoli, F.L.Luccio, Fault-Tolerant Support for Reliable Muliticast in Mobile Wireless Systems: Design and Evaluation, Quaderni Matematici (Technical Report) 526, Universita' degli Studi di Trieste, Dipartimento di Scienze Matematiche, Italy, July 2002.

[9tr] D. Krizanc, F.L. Luccio, R. Raman, Compact Routing Schemes fo Dynamic Ring Networks, Technical Report 2002/26 Department of Mathematics & Computer Science, University of Leichester, 2002.

[10tr] F.L. Luccio, J.F. Sibeyn, Minimum Feedback Vertex Set in Mesh-based Networks. Reports on Computer Science 04.11 Fachbereich Mathematik und Informatik, Martin-Luther University, Halle, Germany, 2004.

[11tr] P. Flocchini, M.J. Huang, F.L. Luccio, Capturing an Intruder in the Hypercube by Mobile Agents, Technical Report TR-2005-2, School of Information Technology & Engineering University of Ottawa Ottawa, Ontario, CANADA, 2005.

[tr12] M. Centenaro, R. Focardi, F.L. Luccio, G. Steel, Type-based Analysis of Financial APIs. Technical Report # CS-2009-2, Universita' Ca' Foscari Venezia, Dipartimento di Informatica, Italy, January 2009.