default search action
Gabriele Lenzini
Person information
- affiliation: Université du Luxembourg
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j25]Mónica P. Arenas, Georgios Fotiadis, Gabriele Lenzini, Mohammadamin Rakeei:
Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols. Comput. Secur. 148: 104131 (2025) - 2024
- [j24]Soumia Zohra El Mestari, Gabriele Lenzini, Hüseyin Demirci:
Preserving data privacy in machine learning systems. Comput. Secur. 137: 103605 (2024) - [j23]Claudia Negri Ribalta, Rémi Géraud-Stewart, Anastasia Sergeeva, Gabriele Lenzini:
A systematic literature review on the impact of AI models on the security of code generation. Frontiers Big Data 7 (2024) - [j22]Yuwei Chuai, Haoye Tian, Nicolas Pröllochs, Gabriele Lenzini:
Did the Roll-Out of Community Notes Reduce Engagement With Misinformation on X/Twitter? Proc. ACM Hum. Comput. Interact. 8(CSCW2): 1-52 (2024) - [c108]Huiyun Tang, Gabriele Lenzini, Samuel Greiff, Björn Rohles, Anastasia Sergeeva:
"Who Knows? Maybe it Really Works": Analysing Users' Perceptions of Health Misinformation on Social Media. Conference on Designing Interactive Systems 2024 - [c107]Xiaowei Chen, Margault Sacré, Gabriele Lenzini, Samuel Greiff, Verena Distler, Anastasia Sergeeva:
The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment. CHI 2024: 829:1-829:21 - [c106]Emre Kocyigit, Arianna Rossi, Gabriele Lenzini:
A Systematic Approach for A Reliable Detection of Deceptive Design Patterns Through Measurable HCI Features. EuroUSEC 2024: 290-308 - [c105]Suvadeep Mukherjee, Verena Distler, Gabriele Lenzini, Pedro Cardoso-Leite:
Balancing The Perception of Cheating Detection, Privacy and Fairness: A Mixed-Methods Study of Visual Data Obfuscation in Remote Proctoring. EuroUSEC 2024: 337-353 - [c104]Maurice H. ter Beek, Alessandro Fantechi, Stefania Gnesi, Gabriele Lenzini, Marinella Petrocchi:
Can AI Help with the Formalization of Railway Cybersecurity Requirements? ISoLA (1) 2024: 186-203 - [c103]Mónica P. Arenas, Gabriele Lenzini, Mohammadamin Rakeei, Peter Y. A. Ryan, Marjan Skrobot, Maria Zhekova:
Verifying Artifact Authenticity with Unclonable Optical Tags. SECRYPT 2024: 64-77 - [c102]Xiaowei Chen, Sophie Doublet, Anastasia Sergeeva, Gabriele Lenzini, Vincent Koenig, Verena Distler:
What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. SOUPS @ USENIX Security Symposium 2024: 487-506 - [e12]Gabriele Lenzini, Paolo Mori, Steven Furnell:
Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024. SCITEPRESS 2024, ISBN 978-989-758-683-5 [contents] - [i17]Yuwei Chuai, Jichang Zhao, Gabriele Lenzini:
Topic Diversity and Conspiracy Theories Shape Engagement with COVID-19 Misinformation on X/Twitter. CoRR abs/2401.08832 (2024) - [i16]Xiaowei Chen, Margault Sacré, Gabriele Lenzini, Samuel Greiff, Verena Distler, Anastasia Sergeeva:
The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment. CoRR abs/2402.11862 (2024) - [i15]Suvadeep Mukherjee, Verena Distler, Gabriele Lenzini, Pedro Cardoso-Leite:
Balancing The Perception of Cheating Detection, Privacy and Fairness: A Mixed-Methods Study of Visual Data Obfuscation in Remote Proctoring. CoRR abs/2406.15074 (2024) - [i14]Yuwei Chuai, Moritz Pilarski, Thomas Renault, David Restrepo Amariles, Aurore Clément Troussel, Gabriele Lenzini, Nicolas Pröllochs:
Community-based fact-checking reduces the spread of misleading posts on social media. CoRR abs/2409.08781 (2024) - [i13]Yuwei Chuai, Anastasia Sergeeva, Gabriele Lenzini, Nicolas Pröllochs:
Community Fact-Checks Trigger Moral Outrage in Replies to Misleading Posts on Social Media. CoRR abs/2409.08829 (2024) - 2023
- [j21]Suvadeep Mukherjee, Björn Rohles, Verena Distler, Gabriele Lenzini, Vincent Koenig:
The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study. Comput. Educ. 207: 104925 (2023) - [c101]Yuwei Chuai, Arianna Rossi, Gabriele Lenzini:
Using Emotions and Topics to Understand Online Misinformation. ICWE 2023: 395-400 - [e11]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Information Systems Security and Privacy - 7th International Conference, ICISSP 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers. Communications in Computer and Information Science 1851, Springer 2023, ISBN 978-3-031-37806-5 [contents] - [e10]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023. SciTePress 2023, ISBN 978-989-758-624-8 [contents] - [e9]Gabriele Lenzini, Weizhi Meng:
Security and Trust Management - 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings. Lecture Notes in Computer Science 13867, Springer 2023, ISBN 978-3-031-29503-4 [contents] - [i12]Yuwei Chuai, Haoye Tian, Nicolas Pröllochs, Gabriele Lenzini:
The Roll-Out of Community Notes Did Not Reduce Engagement With Misinformation on Twitter. CoRR abs/2307.07960 (2023) - [i11]Yuwei Chuai, Jichang Zhao, Nicolas Pröllochs, Gabriele Lenzini:
Political Elites in False Statements on the Internet. CoRR abs/2310.08821 (2023) - 2022
- [j20]Borce Stojkovski, Ruba Abu-Salma, Karen Triquet, Gabriele Lenzini:
"Unless One Does the Research, It May Seem as Just a Useless Battery-consuming App" - Field Notes on COVID-19 Contact Tracing Applications. DTRAP 3(3): 26:1-26:17 (2022) - [j19]Mónica P. Arenas, Hüseyin Demirci, Gabriele Lenzini:
An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification. Mach. Learn. Knowl. Extr. 4(1): 222-239 (2022) - [c100]Mónica P. Arenas, Muhammed Ali Bingöl, Hüseyin Demirci, Georgios Fotiadis, Gabriele Lenzini:
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption. AFRICACRYPT 2022: 425-447 - [c99]Hüseyin Demirci, Gabriele Lenzini:
Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption. HEALTHINF 2022: 821-831 - [c98]Mohammadamin Rakeei, Rosario Giustolisi, Gabriele Lenzini:
Secure Internet Exams Despite Coercion. DPM/CBT@ESORICS 2022: 85-100 - [c97]Marietjie Botes, Gabriele Lenzini:
When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers. EuroS&P Workshops 2022: 562-568 - [c96]Itzel Vázquez Sandoval, Gabriele Lenzini:
Can We Formally Catch Cheating in E-exams? ICISSP 2022: 648-655 - [c95]Emre Kocyigit, Arianna Rossi, Gabriele Lenzini:
Towards Assessing Features of Dark Patterns in Cookie Consent Processes. Privacy and Identity Management 2022: 165-183 - [c94]Xengie Doan, Annika Selzer, Arianna Rossi, Maria Wilhelmina Botes, Gabriele Lenzini:
Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent. WWW (Companion Volume) 2022: 534-545 - [e8]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022. SCITEPRESS 2022, ISBN 978-989-758-553-1 [contents] - [i10]Mohammadamin Rakeei, Rosario Giustolisi, Gabriele Lenzini:
Secure Internet Exams Despite Coercion. CoRR abs/2207.12796 (2022) - 2021
- [j18]Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. DTRAP 2(1): 4:1-4:23 (2021) - [j17]Verena Distler, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Lorrie Faith Cranor, Vincent Koenig:
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Trans. Comput. Hum. Interact. 28(6): 43:1-43:50 (2021) - [c93]Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, Gabriele Lenzini:
"I am Definitely Manipulated, Even When I am Aware of it. It's Ridiculous!" - Dark Patterns from the End-User Perspective. Conference on Designing Interactive Systems 2021: 763-776 - [c92]Mónica P. Arenas, Hüseyin Demirci, Gabriele Lenzini:
Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. ARES 2021: 2:1-2:11 - [c91]Borce Stojkovski, Gabriele Lenzini, Vincent Koenig, Salvador Rivas:
What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. ACSAC 2021: 385-398 - [c90]Borce Stojkovski, Gabriele Lenzini:
A workflow and toolchain proposal for analyzing users' perceptions in cyber threat intelligence sharing platforms. CSR 2021: 324-330 - [c89]Borce Stojkovski, Gabriele Lenzini, Vincent Koenig:
"I personally relate it to the traffic light": a user study on security & privacy indicators in a secure email system committed to privacy by default. SAC 2021: 1235-1246 - [e7]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021. SCITEPRESS 2021, ISBN 978-989-758-491-6 [contents] - [i9]Ivan Srba, Gabriele Lenzini, Matús Pikuliak, Samuel Pecar:
Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective. CoRR abs/2103.10489 (2021) - [i8]Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, Gabriele Lenzini:
I am Definitely Manipulated, Even When I am Aware of it. It s Ridiculous! - Dark Patterns from the End-User Perspective. CoRR abs/2104.12653 (2021) - [i7]Mathew Schwartz, Yong Geng, Hakam Agha, Rijeesh Kizhakidathazhath, Danqing Liu, Gabriele Lenzini, Jan P. F. Lagerwall:
Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans. CoRR abs/2105.05800 (2021) - [i6]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: authentication and key management in decentralized secure email and messaging via PAKE. CoRR abs/2107.06090 (2021) - 2020
- [j16]Arianna Rossi, Gabriele Lenzini:
Transparency by design in data-informed research: A collection of information design patterns. Comput. Law Secur. Rev. 37: 105402 (2020) - [j15]Dayana Spagnuelo, Cesare Bartolini, Gabriele Lenzini:
Qualifying and measuring transparency: A medical data system case study. Comput. Secur. 91: 101717 (2020) - [j14]Livio Robaldo, Cesare Bartolini, Monica Palmirani, Arianna Rossi, Michele Martoni, Gabriele Lenzini:
Formalizing GDPR Provisions in Reified I/O Logic: The DAPRECO Knowledge Base. J. Log. Lang. Inf. 29(4): 401-449 (2020) - [c88]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. ICETE (Selected Papers) 2020: 102-128 - [c87]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini:
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets. ICETE (2) 2020: 167-179 - [c86]Ziya Alper Genç, Gabriele Lenzini:
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. ICISSP 2020: 585-592 - [c85]Iraklis Symeonidis, Gabriele Lenzini:
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging. ICISSP 2020: 593-602 - [c84]Borce Stojkovski, Gabriele Lenzini:
Evaluating ambiguity of privacy indicators in a secure email app. ITASEC 2020: 223-234 - [c83]Livio Robaldo, Cesare Bartolini, Gabriele Lenzini:
The DAPRECO Knowledge Base: Representing the GDPR in LegalRuleML. LREC 2020: 5688-5697 - [c82]Verena Distler, Gabriele Lenzini, Carine Lallemand, Vincent Koenig:
The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. NSPW 2020: 45-58 - [i5]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini:
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets. CoRR abs/2005.10787 (2020) - [i4]Itzel Vázquez Sandoval, Gabriele Lenzini:
A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. CoRR abs/2008.12930 (2020)
2010 – 2019
- 2019
- [j13]Cesare Bartolini, Gabriele Lenzini, Livio Robaldo:
The DAta Protection REgulation COmpliance Model. IEEE Secur. Priv. 17(6): 37-45 (2019) - [c81]Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
A game of "Cut and Mouse": bypassing antivirus by simulating user inputs. ACSAC 2019: 456-465 - [c80]Gabriele Lenzini, Marinella Petrocchi:
Modelling of Railway Signalling System Requirements by Controlled Natural Languages: A Case Study. From Software Engineering to Formal Methods and Tools, and Back 2019: 502-518 - [c79]Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. CECC 2019: 9:1-9:4 - [c78]Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
On Deception-Based Protection Against Cryptographic Ransomware. DIMVA 2019: 219-239 - [c77]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. ETAA@ESORICS 2019: 69-85 - [c76]Itzel Vázquez Sandoval, Gabriele Lenzini:
A Formal Security Analysis of the p=uiv p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. ETAA@ESORICS 2019: 171-187 - [c75]Borce Stojkovski, Itzel Vázquez Sandoval, Gabriele Lenzini:
Detecting Misalignments between System Security and User Perceptions: A Preliminary Socio-technical Analysis of an E2E email Encryption System. EuroS&P Workshops 2019: 172-181 - [c74]Dayana Spagnuelo, Ana Ferreira, Gabriele Lenzini:
Accomplishing Transparency within the General Data Protection Regulation. ICISSP 2019: 114-125 - [c73]Dayana Spagnuelo, Ana Ferreira, Gabriele Lenzini:
Transparency Enhancing Tools and the GDPR: Do They Match? ICISSP (Revised Selected Papers) 2019: 162-185 - [c72]Cesare Bartolini, Said Daoudagh, Gabriele Lenzini, Eda Marchetti:
Towards a Lawful Authorized Access: A Preliminary GDPR-based Authorized Access. ICSOFT 2019: 331-338 - [c71]Cesare Bartolini, Said Daoudagh, Gabriele Lenzini, Eda Marchetti:
GDPR-Based User Stories in the Access Control Perspective. QUATIC 2019: 3-17 - [c70]Arianna Rossi, Gabriele Lenzini:
Which Properties Has an Icon? A Critical Discussion on Data Protection Iconography. STAST 2019: 211-229 - 2018
- [j12]Rosario Giustolisi, Giampaolo Bella, Gabriele Lenzini:
Invalid certificates in modern browsers: A socio-technical analysis. J. Comput. Secur. 26(4): 509-541 (2018) - [c69]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. CECC 2018: 7:1-7:6 - [c68]Itzel Vázquez Sandoval, Gabriele Lenzini:
Experience Report: How to Extract Security Protocols' Specifications from C Libraries. COMPSAC (2) 2018: 719-724 - [c67]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
No Random, No Ransom: A Key to Stop Cryptographic Ransomware. DIMVA 2018: 234-255 - [c66]Itzel Vázquez Sandoval, Borce Stojkovski, Gabriele Lenzini:
A Protocol to Strengthen Password-Based Authentication. ETAA@ESORICS 2018: 38-46 - [c65]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval:
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. ICISSP 2018: 83-95 - [c64]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval:
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. ICISSP (Revised Selected Papers) 2018: 125-151 - [c63]Cesare Bartolini, Gabriele Lenzini, Cristiana Santos:
An Agile Approach to Validate a Formal Representation of the GDPR. JSAI-isAI Workshops 2018: 160-176 - [c62]Cesare Bartolini, Gabriele Lenzini, Cristiana Santos:
A Legal Validation of a Formal Representation of Articles of the GDPR. TERECOM@JURIX 2018: 111-124 - [c61]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
Next Generation Cryptographic Ransomware. NordSec 2018: 385-401 - [e6]Giampaolo Bella, Gabriele Lenzini, Theo Tryfonas, Debi Ashenden:
STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018. ACM 2018, ISBN 978-1-4503-7285-5 [contents] - 2017
- [j11]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
Trustworthy exams without trusted parties. Comput. Secur. 67: 291-307 (2017) - [j10]Dayana Spagnuelo, Gabriele Lenzini:
Transparent Medical Data Systems. J. Medical Syst. 41(1): 8:1-8:12 (2017) - [j9]Ilsun You, Gabriele Lenzini, Alfredo De Santis:
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Syst. J. 11(2): 371-372 (2017) - [c60]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. CECC 2017: 89-102 - [c59]Jean-Louis Huynen, Gabriele Lenzini:
From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis. ICISSP 2017: 213-224 - [c58]Jean-Louis Huynen, Gabriele Lenzini:
An Information Security Management for Socio-Technical Analysis of System Security. ICISSP (Revised Selected Papers) 2017: 222-251 - [c57]Rosario Giustolisi, Vincenzo Iovino, Gabriele Lenzini:
Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol. SECRYPT 2017: 139-150 - [c56]Dayana Spagnuelo, Cesare Bartolini, Gabriele Lenzini:
Modelling Metrics for Transparency in Medical Systems. TrustBus 2017: 81-95 - [c55]Gabriele Lenzini, Samir Ouchani, Peter B. Rønne, Peter Y. A. Ryan, Yong Geng, Jan Lagerwall, JungHyun Noh:
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals. WIFS 2017: 1-6 - [e5]Giampaolo Bella, Gabriele Lenzini:
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2017, Orlando, FL, USA, December 5, 2017. ACM 2017, ISBN 978-1-4503-6357-0 [contents] - 2016
- [c54]Cesare Bartolini, Andra Giurgiu, Gabriele Lenzini, Livio Robaldo:
Towards Legal Compliance by Correlating Standards and Laws with a Semi-automated Methodology. BNCAI 2016: 47-62 - [c53]Dayana Spagnuelo, Cesare Bartolini, Gabriele Lenzini:
Metrics for Transparency. DPM/QASA@ESORICS 2016: 3-18 - [c52]Ana Ferreira, Gabriele Lenzini:
Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. ICISSP 2016: 63-73 - [c51]Gabriele Lenzini, Sjouke Mauw, Samir Ouchani:
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. STM 2016: 170-178 - [c50]Dayana Spagnuelo, Gabriele Lenzini:
Patient-Centred Transparency Requirements for Medical Data Sharing Systems. WorldCIST (1) 2016: 1073-1083 - [e4]Gabriele Lenzini, Giampaolo Bella, Zinaida Benenson, Carrie E. Gates:
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2016, Los Angeles, CA, USA, December 5, 2016. ACM 2016, ISBN 978-1-4503-4826-3 [contents] - 2015
- [j8]Gabriele Lenzini, Sjouke Mauw, Samir Ouchani:
Security analysis of socio-technical physical systems. Comput. Electr. Eng. 47: 258-274 (2015) - [j7]Samir Ouchani, Gabriele Lenzini:
Generating attacks in SysML activity diagrams by detecting attack surfaces. J. Ambient Intell. Humaniz. Comput. 6(3): 361-373 (2015) - [j6]Giampaolo Bella, Paul Curzon, Gabriele Lenzini:
Service security and privacy as a socio-technical problem. J. Comput. Secur. 23(5): 563-585 (2015) - [c49]Ana Ferreira, Lynne M. Coventry, Gabriele Lenzini:
Principles of Persuasion in Social Engineering and Their Use in Phishing. HCI (22) 2015: 36-47 - [c48]Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas:
Do Graphical Cues Effectively Inform Users? - A Socio-Technical Security Study in Accessing Wifi Networks. HCI (22) 2015: 323-334 - [c47]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini:
A Framework for Analyzing Verifiability in Traditional and Electronic Exams. ISPEC 2015: 514-529 - [c46]Zinaida Benenson, Gabriele Lenzini, Daniela Oliveira, Simon Parkin, Sven Uebelacker:
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security. NSPW 2015: 85-99 - [c45]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
A Secure Exam Protocol Without Trusted Parties. SEC 2015: 495-509 - [c44]Ana Ferreira, Gabriele Lenzini:
An Analysis of Social Engineering Principles in Effective Phishing. STAST 2015: 9-16 - [c43]Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security. STM 2015: 255-264 - [c42]Ana Ferreira, Gabriele Lenzini:
Can Transparency Enhancing Tools Support Patient's Accessing Electronic Health Records? WorldCIST (1) 2015: 1121-1132 - [e3]Giampaolo Bella, Gabriele Lenzini:
2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0178-1 [contents] - 2014
- [c41]Samir Ouchani, Gabriele Lenzini:
Attacks Generation by Detecting Attack Surfaces. ANT/SEIT 2014: 529-536 - [c40]Giampaolo Bella, Paul Curzon, Rosario Giustolisi, Gabriele Lenzini:
A Socio-technical Methodology for the Security and Privacy Analysis of Services. COMPSAC Workshops 2014: 401-406 - [c39]Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
Socio-technical Security Analysis of Wireless Hotspots. HCI (24) 2014: 306-317 - [c38]Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
A Conceptual Framework to Study Socio-Technical Security. HCI (24) 2014: 318-329 - [c37]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Security Analysis of Traditional and Electronic Exams. ICETE (Selected Papers) 2014: 294-318 - [c36]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
Secure exams despite malicious management. PST 2014: 274-281 - [c35]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. SECRYPT 2014: 101-112 - [c34]Ana Ferreira, Gabriele Lenzini, Cátia Santos-Pereira, Alexandre B. Augusto, Manuel Eduardo Correia:
Envisioning secure and usable access control for patients. SeGAH 2014: 1-8 - [c33]Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
Remark!: A Secure Protocol for Remote Exams. Security Protocols Workshop 2014: 38-48 - [e2]Giampaolo Bella, Gabriele Lenzini:
2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7901-1 [contents] - 2013
- [j5]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 55-75 (2013) - [c32]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang:
Demonstrating a trust framework for evaluating GNSS signal integrity. CCS 2013: 1329-1332 - [c31]Rosario Giustolisi, Gabriele Lenzini, Giampaolo Bella:
What security for electronic exams? CRiSIS 2013: 1-5 - [c30]Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang:
A Trust Framework for Evaluating GNSS Signal Integrity. CSF 2013: 179-192 - [c29]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
A Socio-technical Understanding of TLS Certificate Validation. IFIPTM 2013: 281-288 - [c28]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
Socio-technical formal analysis of TLS certificate validation in modern browsers. PST 2013: 309-316 - [c27]Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas:
Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names. STM 2013: 131-143 - [c26]Ana Ferreira, Rosario Giustolisi, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates. TrustCom/ISPA/IUCC 2013: 1553-1558 - [i3]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Location Assurance and Privacy in GNSS Navigation. ERCIM News 2013(94) (2013) - 2012
- [j4]Ilsun You, Gabriele Lenzini, Marek R. Ogiela, Elisa Bertino:
Defending against insider threats and internal data leakage. Secur. Commun. Networks 5(8): 831-833 (2012) - [c25]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. ARES 2012: 85-93 - [c24]Giampaolo Bella, Gabriele Lenzini:
Foreword from the Workshop Chairs - STAST 2012. STAST 2012 - 2011
- [c23]Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Selective Location Blinding Using Hash Chains. Security Protocols Workshop 2011: 132-141 - [p1]Jean-Marc Seigneur, Gabriele Lenzini, Bob Hulsebosch:
Adaptive Trust Management. Self-organising Software 2011: 379-403 - [i2]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. CoRR abs/1108.0574 (2011) - 2010
- [c22]Ileana Buhan, Gabriele Lenzini, Sasa Radomirovic:
Contextual Biometric-Based Authentication for Ubiquitous Services. UIC 2010: 680-693
2000 – 2009
- 2009
- [c21]Gabriele Lenzini, Ynze van Houten, Wolf Huijsen, Mark S. Melenhorst:
Shall I Trust a Recommendation? Towards an Evaluation of the Trustworthiness of Recommender Sites. ADBIS (Workshops) 2009: 121-128 - 2008
- [c20]Nabil Sahli, Gabriele Lenzini, Henk Eertink:
Trustworthy Agent-Based Recommender System in a Mobile P2P Environment. AP2PC 2008: 59-70 - [c19]Gabriele Lenzini, Nabil Sahli, Henk Eertink:
Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities. AAMAS-TRUST 2008: 182-204 - [c18]Gabriele Lenzini, Fabio Martinelli, Ilaria Matteucci, Stefania Gnesi:
A Uniform Approach to Security and Fault-Tolerance Specification and Analysis. WADS 2008: 172-201 - [c17]Gabriele Lenzini:
Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. WADS 2008: 284-307 - [c16]Gabriele Lenzini, Nabil Sahli, Henk Eertink:
Trust Model for High Quality Recommendation. SECRYPT 2008: 518-528 - [c15]Gabriele Lenzini:
Design of Architectures for Proximity-aware Services: Experiments in Context-based Authentication with Subjective Logic. VODCA@FOSAD 2008: 47-64 - 2007
- [j3]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini:
Audit-based compliance control. Int. J. Inf. Sec. 6(2-3): 133-151 (2007) - [c14]R. J. Hulsebosch, Mortaza S. Bargh, Gabriele Lenzini, P. W. G. Ebben, Sorin M. Iacob:
Context Sensitive Adaptive Authentication. EuroSSC 2007: 93-109 - [c13]Ricardo Neisse, Maarten Wegdam, Marten van Sinderen, Gabriele Lenzini:
Trust Management Model and Architecture for Context-Aware Service Platforms. OTM Conferences (2) 2007: 1803-1820 - [c12]Gabriele Lenzini, Mortaza S. Bargh, Bob Hulsebosch:
Trust-enhanced Security in Location-based Adaptive Authentication. STM@ESORICS 2007: 105-119 - [e1]Bob Hulsebosch, Gabriele Lenzini, Santtu Toivonen, Maarten Wegdam:
First International Workshop on Combining Context with Trust, Security and Privacy In conjunction with IFIPTM, CAT@IFIPTM 2007, Moncton, New Brunswick, Canada, July 30, 2007. CEUR Workshop Proceedings 269, CEUR-WS.org 2007 [contents] - [i1]Gabriele Lenzini, Bob Hulsebosch:
Context-Based Adaptive and Responsive Authentication. ERCIM News 2007(71) (2007) - 2006
- [j2]Maurice H. ter Beek, Gabriele Lenzini, Marinella Petrocchi:
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols. J. Autom. Lang. Comb. 11(4): 345-374 (2006) - [c11]Santtu Toivonen, Gabriele Lenzini, Ilkka Uusitalo:
Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems. MTW 2006 - [c10]Gabriele Lenzini, Andrew Tokmakoff, Johan Muskens:
Managing Trustworthiness in Component-based Embedded Systems. STM 2006: 143-155 - 2005
- [j1]Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli:
Relating multiset rewriting and process algebras for security protocol analysis. J. Comput. Secur. 13(1): 3-47 (2005) - [c9]Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso:
A Formal Security Analysis of an OSA/Parlay Authentication Interface. FMOODS 2005: 131-146 - 2004
- [c8]Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu:
A Logic for Auditing Accountability in Decentralized Systems. Formal Aspects in Security and Trust 2004: 187-201 - [c7]Maurice H. ter Beek, Gabriele Lenzini, Marinella Petrocchi:
Team Automata for Security: - A Survey -. SecCo 2004: 105-119 - 2003
- [c6]Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Roberto Marangoni, Fabio Martinelli:
On Representing Biological Systems through Multiset Rewriting. EUROCAST 2003: 415-426 - [c5]Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli:
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. MMM-ACNS 2003: 86-99 - [c4]Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli:
Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking. SVV@ICLP 2003: 57-70 - [c3]Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli:
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. MEFISTO 2003: 111-126 - 2000
- [c2]Stefania Gnesi, Diego Latella, Gabriele Lenzini, C. Abbaneo, Arturo M. Amendola, P. Marmo:
An Automatic SPIN Validation of a Safety Critical Railway Control System. DSN 2000: 119-124 - [c1]Stefania Gnesi, Diego Latella, Gabriele Lenzini, C. Abbaneo, Arturo M. Amendola, P. Marmo:
A Formal Specification and Validation of a Critical System in Presence of Byzantine Errors. TACAS 2000: 535-549
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint