Profil

LENZINI Gabriele

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > IRiSC

Main Referenced Co-authors
KOENIG, Vincent  (16)
RYAN, Peter Y A  (16)
BARTOLINI, Cesare  (13)
Bella, Giampaolo (12)
GENÇ, Ziya Alper  (12)
Main Referenced Keywords
GDPR (8); Transparency (7); Ransomware (6); Socio-Technical Security (5); Data protection (4);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA) (17)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Other (8)
Interdisciplinary Centre for Security, Reliability and Trust - SnT (6)
SnT (6)
EU's Horizon 2020 Research and Innovation Programme (1)
Main Referenced Disciplines
Computer science (100)
Engineering, computing & technology: Multidisciplinary, general & others (14)
Law, criminology & political science: Multidisciplinary, general & others (8)
European & international law (5)
Social & behavioral sciences, psychology: Multidisciplinary, general & others (5)

Publications (total 127)

The most downloaded
3295 downloads
Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4 https://hdl.handle.net/10993/20301

The most cited

116 citations (WOS)

Geng, Y., Noh, J., Drevensek-Olenik, I., Rupp, R., Lenzini, G., & Lagerwall, J. (27 March 2016). High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication. Scientific Reports, 6 (26840), 1-8. doi:10.1038/srep26840 https://hdl.handle.net/10993/27540

EL MESTARI, S. Z., LENZINI, G., & DEMIRCI, H. (February 2024). Preserving data privacy in machine learning systems. Computers and Security, 137, 103605. doi:10.1016/j.cose.2023.103605
Peer reviewed

MUKHERJEE, S., Rohles, B., DISTLER, V., LENZINI, G., & KOENIG, V. (15 September 2023). The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study. Computers and Education, 207, 104925. doi:10.1016/j.compedu.2023.104925
Peer Reviewed verified by ORBi

Chuai, Y., Rossi, A., & Lenzini, G. (2023). Using Emotions and Topics to Understand Online Misinformation. In Web Engineering. ICWE 2023. Lecture Notes in Computer Science, vol 13893. Springer, Cham (pp. 395–400). doi:10.1007/978-3-031-34444-2_34
Peer reviewed

KOCYIGIT, E., ROSSI, A., & LENZINI, G. (2023). Towards Assessing Features of Dark Patterns in Cookie Consent Processes. In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland. doi:10.1007/978-3-031-31971-6_13
Editorial reviewed

CHUAI, Y., TIAN, H., Pröllochs, N., & LENZINI, G. (2023). The Roll-Out of Community Notes Did Not Reduce Engagement With Misinformation on Twitter. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/59462.

DISTLER, V., Fassl, M., Habib, H., Krombholz, K., LENZINI, G., LALLEMAND, C., KOENIG, V., & Cranor, L. F. (2023). Empirical Research Methods in Usable Privacy and Security. In Human Factors in Privacy Research. Springer International Publishing. doi:10.1007/978-3-031-28643-8_3
Editorial reviewed

Arenas Correa, M. P., Bingol, M. A., Demirci, H., Fotiadis, G., & Lenzini, G. (06 October 2022). A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption. Lecture Notes in Computer Science, 13503, 23. doi:10.1007/978-3-031-17433-9_18
Peer reviewed

Botes, W. M., & Lenzini, G. (10 June 2022). When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers [Paper presentation]. The 1st International Workshop on Ethics in Computer Security (EthiCS 2022) Co-located with the 7th IEEE European Symposium on Security and Privacy, Genoa, Italy.

Doan, X. C., Selzer, A., Rossi, A., Botes, W. M., & Lenzini, G. (2022). Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent. Web Conference Companion Volume (ACM). doi:10.1145/3487553.3524632
Peer reviewed

Distler, V., Gutfleisch, T., Lallemand, C., Lenzini, G., & Koenig, V. (March 2022). Complex, but in a good way? How to represent encryption to non-experts through text and visuals – Evidence from expert co-creation and a vignette experiment. Computers in Human Behavior Reports, 4. doi:10.1016/j.chbr.2021.100161
Peer reviewed

Arenas Correa, M. P., Demirci, H., & Lenzini, G. (24 February 2022). An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification. Machine Learning and Knowledge Extraction, 4 (1), 222-239. doi:10.3390/make4010010
Peer Reviewed verified by ORBi

Rossi, A., Kumari, A., & Lenzini, G. (2022). Unwinding a Legal and Ethical Ariadne’s Thread Out of the Twitter Scraping Maze. In S. Schiffner, S. Ziegler, ... A. Quesada Rodriguez (Eds.), Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) (pp. 179-203). Springer. doi:10.1007/978-3-031-09901-4_10
Peer reviewed

Demirci, H., & Lenzini, G. (2022). Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption [Paper presentation]. 15th International Joint Conference on Biomedical Engineering Systems and Technologies - Scale-IT-up. doi:10.5220/0011012400003123

Stojkovski, B., Lenzini, G., Koenig, V., & Rivas, S. (2021). What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. In Annual Computer Security Applications Conference (ACSAC ’21) (pp. 385–398). New York, NY, United States: ACM. doi:10.1145/3485832.3488030
Peer reviewed

Distler, V., Fassl, M., Habib, H., Krombholz, K., Lenzini, G., Lallemand, C., Cranor, L. F., & Koenig, V. (December 2021). A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Transactions on Computer-Human Interaction, 28 (6), 50. doi:10.1145/3469845
Peer Reviewed verified by ORBi

Vazquez Sandoval, I., Atashpendar, A., Lenzini, G., & Ryan, P. Y. A. (2021). PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In M. S. Obaidat & J. Ben-Othman (Eds.), E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (pp. 102-128). Springer. doi:10.1007/978-3-030-90428-9_5
Peer reviewed

Arenas Correa, M. P., Demirci, H., & Lenzini, G. (17 August 2021). Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. Journal of the Association for Computing Machinery, 16, 11. doi:10.1145/3465481.3465766
Peer reviewed

Stojkovski, B., Abu-Salma, R., Triquet, K., & Lenzini, G. (2021). "Unless One Does the Research, It May Seem as Just a Useless Battery-Consuming App" - Field Notes on COVID-19 Contact Tracing Applications. Digital Threats: Research and Practice. doi:10.1145/3480466
Peer reviewed

Schwartz, M., Geng, Y., Agha, H., Kizhakidathazhath, R., Liu, D., Lenzini, G., & Lagerwall, J. (04 June 2021). Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans. Multifunctional Materials, 4 (2), 022002. doi:10.1088/2399-7532/ac0060
Peer reviewed

Lenzini, G., Srba, Pikuliak, M., & Pecar, S. (2021). Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46821.

Genç, Z. A., Lenzini, G., & Sgandurra, D. (February 2021). Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. Digital Threats: Research and Practice, 2 (1). doi:10.1145/3431286
Peer reviewed

Stojkovski, B., Lenzini, G., & Koenig, V. (2021). "I Personally Relate It to the Traffic Light": A User Study on Security & Privacy Indicators in a Secure Email System Committed to Privacy by Default. In Proceedings of the 36th Annual ACM Symposium on Applied Computing (pp. 1235–1246). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3412841.3441998
Peer reviewed

Bongard-Blanchy, K., Rossi, A., Rivas, S., Doublet, S., Koenig, V., & Lenzini, G. (2021). "I am definitely manipulated, even when I am aware of it. It’s ridiculous!" - Dark Patterns from the End-User Perspective. In Proceedings of ACM DIS Conference on Designing Interactive Systems. New York, United States - New York: ACM. doi:10.1145/3461778.3462086
Peer reviewed

Stojkovski, B., & Lenzini, G. (2021). A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 324-330). IEEE. doi:10.1109/CSR51186.2021.9527903
Peer reviewed

Poillot, E., Lenzini, G., Resta, G., & Zeno-Zencovich, V. (Eds.). (2021). Data protection in the context of covid-19. A short (hi)story of tracing applications. RomaTrE-Press. doi:10.13134/979-12-5977-055-4

Poillot, E., Resta, G., Zeno-Zencovich, V., & Lenzini, G. (2021). Lessons to be learnt from the crisis. The Rise and Fall (and Rise?) of Tracing Application. In E. Poillot, G. Resta, V. Zeno-Zencovich, ... G. Lenzini, Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (pp. 145-150). RomaTrE-Press.
Peer reviewed

Rossi, A., & Lenzini, G. (2021). Which Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography. In Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST). Springer.
Peer reviewed

Poillot, E., & Lenzini, G. (2021). The French National Framework of Tracing Applications. In E. Poillot, G. Lenzini, ... G. Resta, Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (pp. 40-57). RomaTrE-Press.
Peer reviewed

Distler, V., Lenzini, G., Lallemand, C., & Koenig, V. (2020). The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. New Security Paradigms Workshop. doi:10.1145/3442167.3442173
Peer reviewed

Rossi, A., & Lenzini, G. (July 2020). Transparency by Design in Data-Informed Research: a Collection of Information Design Patterns. Computer Law & Security Review, 37 (105402). doi:10.1016/j.clsr.2020.105402
Peer reviewed

Symeonidis, I., & Lenzini, G. (2020). Systematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant messaging. In International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020.
Peer reviewed

Rossi, A., & Lenzini, G. (February 2020). Making the Case for Evidence-based Standardization of Data Privacy and Data Protection Visual Indicators. Journal of Open Access to Law, 8 (1).
Peer reviewed

Genç, Z. A., & Lenzini, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp. 585-592). Setúbal, Portugal: SciTePress. doi:10.5220/0009000505850592
Peer reviewed

Spagnuelo, D., Bartolini, C., & Lenzini, G. (2020). Qualifying and Measuring Transparency: A Medical Data System Case Study. Computers and Security. doi:10.1016/j.cose.2020.101717
Peer Reviewed verified by ORBi

Stojkovski, B., & Lenzini, G. (2020). Evaluating ambiguity of privacy indicators in a secure email app. In M. Loreti & L. Spalazzi (Eds.), Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (pp. 223--234). CEUR-WS.org.
Peer reviewed

Vazquez Sandoval, I., Atashpendar, A., & Lenzini, G. (2020). Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications. doi:10.5220/0009834001670179
Peer reviewed

Bartolini, C., Lenzini, G., & Robaldo, L. (December 2019). The DAta Protection REgulation COmpliance Model. IEEE Security and Privacy, 17 (6), 37-45. doi:10.1109/MSEC.2019.2937756
Peer Reviewed verified by ORBi

Lenzini, G., & Petrocchi, M. (2019). Modelling of Railways Signalling System Requirements by Controlled Natural Languages: A Case Study. In From Software Engineering to Formal Methods and Tools, and Back (pp. 502-518). Springer, Cham. doi:10.1007/978-3-030-30985-5_29
Peer reviewed

Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7
Peer reviewed

Stojkovski, B., Vazquez Sandoval, I., & Lenzini, G. (2019). Detecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system. In 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops.
Peer reviewed

Bartolini, C., & Lenzini, G. (2019). Sistemi Medici e Conformità Legale. Rivista Italiana di Medicina Legale: Dottrina, Casistica, Ricerca Sperimentale, Giurisprudenza e Legislazione, XLI (1/2019), 225-242.
Peer reviewed

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). On Deception-Based Protection Against Cryptographic Ransomware. In Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (pp. 219-239). Cham, Switzerland: Springer. doi:10.1007/978-3-030-22038-9_11
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5
Peer reviewed

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs. In Proceedings of the 35th Annual Computer Security Applications Conference (pp. 456-465). New York, United States: ACM. doi:10.1145/3359789.3359844
Peer reviewed

Vazquez Sandoval, I., & Lenzini, G. (2019). A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. In Emerging Technologies for Authorization and Authentication. Springer. doi:10.1007/978-3-030-39749-4_11
Peer reviewed

Robaldo, L., Bartolini, C., Lenzini, G., Rossi, A., Palmirani, M., & Martoni, M. (2019). Formalizing GDPR provisions in reified I/O logic: the DAPRECO knowledge base. Journal of Logic, Language and Information. doi:10.1007/s10849-019-09309-z
Peer reviewed

Bartolini, C., Lenzini, G., & Santos, C. (2019). An Agile Approach to Validate a Formal Representation of the GDPR. JSAI International Symposium on Artificial Intelligence, 11717. doi:10.1007/978-3-030-31605-1_13
Peer reviewed

Genç, Z. A., Lenzini, G., & Sgandurra, D. (2019). Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. In Proceedings of the Third Central European Cybersecurity Conference. New York, United States: ACM. doi:10.1145/3360664.3360673
Peer reviewed

Rossi, A., Lenzini, G., Koenig, V., & Bongard-Blanchy, K. (2019). Dark Patterns: Deception or Simply Bad Design? [Poster presentation]. ESORICS.

Bartolini, C., Lenzini, G., & Santos, C. (12 November 2018). An Interdisciplinary Methodology to Validate Formal Representations of Legal Text Applied to the GDPR [Paper presentation]. Twelfth International Workshop on Juris-informatics (JURISIN 2018), Yokohama, Japan.

Vazquez Sandoval, I., Lenzini, G., & Stojkovski, B. (2018). A Protocol to Strengthen Password-Based Authentication. In Emerging Technologies for Authorization and Authentication (pp. 38-46). doi:10.1007/978-3-030-04372-8
Peer reviewed

Vazquez Sandoval, I., & Lenzini, G. (2018). Experience report: How to extract security protocols’ specifications from C libraries. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (pp. 719-724). IEEE. doi:10.1109/COMPSAC.2018.10325
Peer reviewed

Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382. doi:10.1002/adma.201707382
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018.
Peer reviewed

Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095
Peer reviewed

Bartolini, C., & Lenzini, G. (25 November 2017). Law and the software development life cycle [Paper presentation]. IALT Annual Conference, Dunboyne, Ireland.

Lenzini, G., Samir, O., Roenne, P., Ryan, P., Geng, Y., Noh, J., & Lagerwall, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. In Proc. of the 9th IEEE Workshop on Information Forensics and Security.
Peer reviewed

Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2017). Modelling Metrics for Transparency in Medical Systems. In Proceedings of TrustBus 2017.
Peer reviewed

Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (01 June 2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307. doi:10.1016/j.cose.2016.12.005
Peer reviewed

You, I., Lenzini, G., & De Santis, A. (Eds.). (June 2017). Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Systems Journal, 11 (2). doi:10.1109/JSYST.2017.2658258
Peer Reviewed verified by ORBi

Bartolini, C., & Lenzini, G. (2017). Human Rights in the era of Information and Communication Technology.

Giustolisi, R., Iovino, V., & Lenzini, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R. Giustolisi, V. Iovino, ... G. Lenzini, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS.
Peer reviewed

Huynen, J.-L., & Lenzini, G. (2017). From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy. doi:10.5220/0006211302130224
Peer reviewed

Bartolini, C., Giurgiu, A., Lenzini, G., & Robaldo, L. (2017). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In T. Bosse & B. Bredeweg (Eds.), Communications in Computer and Information Science (pp. 47-62). Springer International Publishing. doi:10.1007/978-3-319-67468-1_4
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press.
Peer reviewed

Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016). Transparent Medical Data Systems. Journal of Medical Systems. doi:10.1007/s10916-016-0653-8
Peer Reviewed verified by ORBi

Bartolini, C., Lenzini, G., & Robaldo, L. (2016). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC).
Peer reviewed

Bartolini, C., Giurgiu, A., Lenzini, G., & Robaldo, L. (2016). A Framework to Reason about the Legal Compliance of Security Standards. In Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN).
Peer reviewed

Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2016). Metrics for Transparency. In Proceedings of DPM 2016 and QASA 2016.
Peer reviewed

Geng, Y., Noh, J., Drevensek-Olenik, I., Rupp, R., Lenzini, G., & Lagerwall, J. (27 March 2016). High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication. Scientific Reports, 6 (26840), 1-8. doi:10.1038/srep26840
Peer Reviewed verified by ORBi

Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016). Patient-Centred Transparency Requirements for Medical Data Sharing Systems. Proceedings of the 4th World Conference on Information Systems and Technologies.
Peer reviewed

Ferreira, A., & Lenzini, G. (2016). Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. In Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP). Springer.
Peer reviewed

Lenzini, G., Mauw, S., & Ouchani, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G. Barthe & E. Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag. doi:10.1007/978-3-319-46598-2_12
Peer reviewed

Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (30 December 2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318. doi:10.1007/978-3-319-25915-4_16
Peer reviewed

Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2015). Do graphical cues effectively inform users? A Socio-Technical Security Study in Accessing Wifi Networks. In Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 323-334). Springer, Cham.
Peer reviewed

Bella, G., & Lenzini, G. (13 July 2015). 2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015 [Paper presentation]. Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy.

Lenzini, G., Mauw, S., & Ouchani, S. (2015). Security analysis of socio-technical physical systems. Computers electrical engineering. doi:10.1016/j.compeleceng.2015.02.019
Peer reviewed

Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2015). Security on medical data sharing (a literature review). Luxembourg, Luxembourg: SNT.

Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & Lenzini, G. (2015). A Framework for Analyzing Verifiability in Traditional and Electronic Exams. In Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015.
Peer reviewed

Ouchani, S., & Lenzini, G. (2015). Generating attacks in SysML activity diagrams by detecting attack surfaces. Journal of Ambient Intelligence and Humanized Computing, 6 (3), 361-373. doi:10.1007/s12652-015-0269-8
Peer reviewed

Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2015). A Secure Exam Protocol Without Trusted Parties. In ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015.
Peer reviewed

Ferreira, A., & Lenzini, G. (2015). An Analysis of Social Engineering Principles in Effective Phishing. In Proc. of the 5th International Workshop on Socio-Technical Security and Trust. CSP.
Peer reviewed

Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4
Peer reviewed

Lenzini, G., & Ferreira, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? In Advances in Intelligent Systems and Computing. Springer. doi:10.1007/978-3-319-16486-1_111
Peer reviewed

Benenson, Z., Bleikertz, S., Foley, S. N., Harpes, C., Kowalski, S., Lenzini, G., Oliveira, D., Parkin, S., Pfleeger, S. L., & Smith, P. (2015). 4.2 Social Dynamics Metrics-Working Group Report. Socio-Technical Security Metrics, 17-19.
Peer reviewed

Bella, G., Curzon, P., & Lenzini, G. (2015). Service security and privacy as a socio-technical problem. Journal of Computer Security, 23 (5), 563-585. doi:10.3233/JCS-150536
Peer Reviewed verified by ORBi

Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334. doi:10.1007/978-3-319-20376-8_29
Peer reviewed

Beneson, Z., Lenzini, G., Oliveira, D., Parkin, S., & Uebelacker, S. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. In Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (pp. 85-99). ACM. doi:10.1145/2841113.2841120
Peer reviewed

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S. Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer. doi:10.1007/978-3-319-24858-5_16
Peer reviewed

Benenson, Z., Lenzini, G., Oliveira, D., Parkin, S., & Uebelacker. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. Proceedings of the New Security Paradigm Workshop.
Peer reviewed

Ferreira, A., Lenzini, G., Santos-Pereira, C., Augusto, A., & Correia, M. (2014). Envisioning secure and usable access control for patients. In IEEE 3rd International Conference on Serious Games and Applications in Healthcare.
Peer reviewed

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). A Conceptual Framework to Study Socio-Technical Security. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_28
Peer reviewed

Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_27
Peer reviewed

Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & Lenzini, G. (2014). On the verifiability of (electronic) exams. Technical Report TR-2014-2, Verimag.

Bella, G., & Lenzini, G. (2014). Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014 [Paper presentation]. 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014, Vienna, Austria.

Bella, G., Curzon, P., Giustolisi, R., & Lenzini, G. (2014). A Socio-Technical Methodology for the Security and Privacy Analysis of Services. In IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden. doi:10.1109/COMPSACW.2014.69
Peer reviewed

Giustolisi, R., Lenzini, G., & Ryan, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science. doi:10.1007/978-3-319-12400-1_5
Peer reviewed

Bella, G., Giustolisi, R., & Lenzini, G. (2014). Secure exams despite malicious management. In Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014. doi:10.1109/PST.2014.6890949
Peer reviewed

Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2014). Formal Analysis of Electronic Exams. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. doi:10.5220/0005050901010112
Peer reviewed

CHEN, X., Harpes, C., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2013). DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity. In Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (pp. 1329-1332). ACM.
Peer reviewed

Ferreira, A., Giustolisi, R., Huynen, J.-L., & Lenzini, G. (12 April 2013). On Tools for Socio-Technical Security Analysis [Paper presentation]. Grande Region Security and Reliability Day 2013, Luxembourg, Luxembourg.

Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2013). Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names. Lecture Notes in Computer Science, 8203, 131-143. doi:10.1007/978-3-642-41098-7_9
Peer reviewed

Ferreira, A., Giustolisi, R., Huynen, J.-L., Koenig, V., & Lenzini, G. (2013). Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. IEEE TrustCom. doi:10.1109/TrustCom.2013.190
Peer reviewed

Chen, X., Harpes, C., Lenzini, G., Mauw, S., & Pang, J. (2013). Location Assurance and Privacy in GNSS Navigation. ERCIM News, 2013 (94).
Peer reviewed

CHEN, X., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2013). A trust framework for evaluating GNSS signal integrity. In Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (pp. 179-192). IEEE CS.
Peer reviewed

CHEN, X., Lenzini, G., Mauw, S., & Pang, J. (2013). Design and formal analysis of a group signature based electronic toll pricing system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (1), 55-75.
Peer reviewed

Bella, G., Giustolisi, R., & Lenzini, G. (2013). Socio-technical formal analysis of TLS certificate validation in modern browsers. In PST (pp. 309-316). doi:10.1109/PST.2013.6596067
Peer reviewed

Giustolisi, R., Lenzini, G., & Bella, G. (2013). What Security for Electronic Exams? In 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013. doi:10.1109/CRiSIS.2013.6766348
Peer reviewed

Bella, G., Giustolisi, R., & Lenzini, G. (2013). A Socio-technical Understanding of TLS Certificate Validation. In Trust Management VII (pp. 281-288).
Peer reviewed

Lenzini, G., & Bella, G. (Eds.). (2012). STAST 2012 Proc. of the 2nd Int. Workshop on Socio-Technical Aspects in Security and Trust. IEEE.

CHEN, X., Lenzini, G., Mauw, S., & Pang, J. (2012). A group signature based electronic toll pricing system. In Proc. 7th International Conference on Availability, Reliability and Security (pp. 85-93). IEEE Computer Society. doi:10.1109/ARES.2012.67
Peer reviewed

CHEN, X., Harpes, C., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2012). Implementation and Validation of a Localisation Assurance Service Provider. In Proc. 6th ESA Workshop on Satellite Navigation Technologies (pp. 1-7). doi:10.1109/NAVITEC.2012.6423097
Peer reviewed

Sahli, N., Lenzini, G., & Eertink, H. (2012). Trustworthy agent-based recommender system in a mobile P2P environment. Lecture Notes in Computer Science, 6573 LNAI, 59-70. doi:10.1007/978-3-642-31809-2_6
Peer reviewed

You, I., Lenzini, G., Ogiela, M. R., & Bertino, E. (2012). Defending against insider threats and internal data leakage. Security and Communication Networks, 5 (8), 831-833. doi:10.1002/sec.598
Peer reviewed

Seigneur, J.-M., Lenzini, G., & Hulsebosch, B. (2011). Adaptive Trust Management. In G. D. M. Serugendo, M.-P. Gleizes, ... A. Karageorgos (Eds.), Self-Organizing Software - From Natural to Artificial Adaptation (pp. 362-383). Springer.
Peer reviewed

Coles-Kemp, L., Lenzini, G., Ryan, P., & Bella, G. (2011). STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust. IEEE.

Lenzini, G., Mauw, S., & Pang, J. (2011). Selective location blinding using hash chains. In Proc. 19th International Workshop on Security Protocols (pp. 132-141). Springer-Verlag.
Peer reviewed

Buhan, I., Lenzini, G., & Radomirovic, S. (2010). Contextual biometric-based authentication for ubiquitous services. In Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (pp. 680-693). Springer. doi:10.1007/978-3-642-16355-5_51
Peer reviewed

Lenzini, G. (2009). Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. In R. de Lemos, J. C. Fabre, C. Gacek, F. Gadducci, ... M. H. ~ter Beek (Eds.), Architecting Dependable Systems VI 2018-09-18 22:51:18 +0000 2019-06-15 18:11:00 +0200 (pp. 284-307). Springer, Berlin, Heidelberg.
Peer reviewed

Gnesi, S., Latella, D., Lenzini, G., Amendola, A., Abbaneo, C., & Marmo, P. (2000). A Formal Specification and Validation of a Control System in Presence of Byzantine Errors. In Proc.~of the 6th Int. Conference Tool and Algorithms for the Construction and Analysis of Systems (TACAS 2000), in ETAPS 2000 -- March 25 - April 2, 2000, Berlin, Germany (pp. 535-549). Springer.
Peer reviewed

Gnesi, S., Latella, D., & Lenzini, G. (1999). Model Checking of Cryptographic Protocols using HD-Automata. In 4th Italian Workshop on Sistemi Distribuiti: Algoritmi, Architetture e Linguaggi (WSDAAL'99), June 13-15, 1999, Fonte Cerreto (L'Aquila), Italy 2018-09-18 22:51:18 +0000 2019-06-15 18:31:23 +0200 (pp. 74-77). Informal Proceedings.
Peer reviewed

Lenzini, G. (1998). Sequence Comparison: Close and Open problems. In Proc.~of Workshop ``La matematizzazione della Biologia: storia e problematiche attuali'', Arcidosso (GR), Italy (pp. 161-170). Quattro Venti, Urbino (Italy).
Peer reviewed

Lenzini, G., & Marianelli, S. (1997). Algorithms For Phylogeny Reconstruction In a New Mathematical Model. Calcolo, 1-4 (34), 1-24.
Peer Reviewed verified by ORBi

Lenzini, G., Marianelli, S., Luccio, F., Cerrai, P., & Galleni, L. (1996). Automatic Phylogeny Reconstruction Under a New Hypothesis [Paper presentation]. 1st Meeting in Theoretical Biology.

Pierina Brustolin Spagnuelo, D., Ferreira, A., & Lenzini, G. (n.d.). Accomplishing transparency within the General Data Protection Regulation (Auxiliary material).

Contact ORBilu