![]() ![]() | Arenas, M. P., FOTIADIS, G., LENZINI, G., & RAKEEI, M. (January 2025). Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols. Computers and Security, 148, 104131. doi:10.1016/j.cose.2024.104131 ![]() |
![]() ![]() | CHUAI, Y., TIAN, H., Pröllochs, N., & LENZINI, G. (08 November 2024). Did the Roll-Out of Community Notes Reduce Engagement With Misinformation on X/Twitter? Proceedings of the ACM on Human-Computer Interaction, 8 (CSCW2), 1-52. doi:10.1145/3686967 ![]() |
![]() ![]() | CHEN, X., DOUBLET, S., SERGEEVA, A., LENZINI, G., KOENIG, V., & DISTLER, V. (2024). What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2024). United States: USENIX. ![]() |
![]() ![]() | TANG, H., LENZINI, G., GREIFF, S., ROHLES, B.* , & SERGEEVA, A.*. (01 July 2024). "Who Knows? Maybe it Really Works": Analyzing Users' Perceptions of Health Misinformation on Social Media [Paper presentation]. ACM Conference on Designing Interactive Systems 2024, Copenhagen, Denmark. doi:10.1145/3643834.3661510 ![]() * These authors have contributed equally to this work. |
![]() ![]() | CHEN, X., SACRE, M., LENZINI, G., GREIFF, S., Distler Verena* , & SERGEEVA, A.*. (2024). The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment. In CHI 2024 - Proceedings of the 2024 CHI Conference on Human Factors in Computing Sytems (pp. 21). Honolulu, United States: Association for Computing Machinery. doi:10.1145/3613904.3641943 ![]() * These authors have contributed equally to this work. |
![]() ![]() | EL MESTARI, S. Z., LENZINI, G., & DEMIRCI, H. (February 2024). Preserving data privacy in machine learning systems. Computers and Security, 137, 103605. doi:10.1016/j.cose.2023.103605 ![]() |
![]() ![]() | Arenas, M. P., LENZINI, G., RAKEEI, M., RYAN, P. Y. A., SKROBOT, M., & ZHEKOVA, M. (2024). Verifying Artifact Authenticity with Unclonable Optical Tags. In S. D. C. Di Vimercati (Ed.), Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024. Science and Technology Publications, Lda. doi:10.5220/0012746500003767 ![]() |
![]() ![]() | MUKHERJEE, S., DISTLER, V., LENZINI, G., & CARDOSO LEITE, P. (2024). Balancing The Perception of Cheating Detection, Privacy and Fairness: A Mixed-Methods Study of Visual Data Obfuscation in Remote Proctoring. In Proceedings of the 2024 European Symposium on Usable Security. New York, United States: Association for Computing Machinery. doi:10.1145/3688459.3688474 ![]() |
![]() ![]() | NEGRI RIBALTA, C. S., Geraud-Stewart, R., SERGEEVA, A., & LENZINI, G. (2024). A systematic literature review on the impact of AI models on the security of code generation. Frontiers in Big Data, 7, 1386720. doi:10.3389/fdata.2024.1386720 ![]() |
![]() ![]() | MUKHERJEE, S., Rohles, B., DISTLER, V., LENZINI, G., & KOENIG, V. (15 September 2023). The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study. Computers and Education, 207, 104925. doi:10.1016/j.compedu.2023.104925 ![]() |
![]() ![]() | CHUAI, Y., ROSSI, A., & LENZINI, G. (2023). Using Emotions and Topics to Understand Online Misinformation. In Web Engineering. ICWE 2023. Lecture Notes in Computer Science, vol 13893. Springer, Cham (pp. 395–400). doi:10.1007/978-3-031-34444-2_34 ![]() |
![]() ![]() | KOCYIGIT, E., ROSSI, A., & LENZINI, G. (2023). Towards Assessing Features of Dark Patterns in Cookie Consent Processes. In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland. doi:10.1007/978-3-031-31971-6_13 ![]() |
![]() ![]() | RAKEEI, M., GIUSTOLISI, R., & LENZINI, G. (2023). Secure Internet Exams Despite Coercion. In J. Garcia-Alfaro (Ed.), Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-031-25734-6_6 ![]() |
![]() ![]() | DISTLER, V., Fassl, M., Habib, H., Krombholz, K., LENZINI, G., LALLEMAND, C., KOENIG, V., & Cranor, L. F. (2023). Empirical Research Methods in Usable Privacy and Security. In Human Factors in Privacy Research. Springer International Publishing. doi:10.1007/978-3-031-28643-8_3 ![]() |
![]() ![]() | ARENAS CORREA, M. P., Bingol, M. A., DEMIRCI, H., FOTIADIS, G., & LENZINI, G. (06 October 2022). A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption. Lecture Notes in Computer Science, 13503, 23. doi:10.1007/978-3-031-17433-9_18 ![]() |
![]() ![]() | BOTES, W. M., & LENZINI, G. (10 June 2022). When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers [Paper presentation]. The 1st International Workshop on Ethics in Computer Security (EthiCS 2022) Co-located with the 7th IEEE European Symposium on Security and Privacy, Genoa, Italy. |
![]() ![]() | DOAN, X. C., Selzer, A., ROSSI, A., BOTES, W. M., & LENZINI, G. (2022). Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent. Web Conference Companion Volume (ACM). doi:10.1145/3487553.3524632 ![]() |
![]() ![]() | DISTLER, V., Gutfleisch, T., LALLEMAND, C., LENZINI, G., & KOENIG, V. (March 2022). Complex, but in a good way? How to represent encryption to non-experts through text and visuals – Evidence from expert co-creation and a vignette experiment. Computers in Human Behavior Reports, 4. doi:10.1016/j.chbr.2021.100161 ![]() |
![]() ![]() | ARENAS CORREA, M. P., DEMIRCI, H., & LENZINI, G. (24 February 2022). An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification. Machine Learning and Knowledge Extraction, 4 (1), 222-239. doi:10.3390/make4010010 ![]() |
![]() ![]() | ROSSI, A., Kumari, A., & LENZINI, G. (2022). Unwinding a Legal and Ethical Ariadne’s Thread Out of the Twitter Scraping Maze. In S. Schiffner, S. Ziegler, ... A. Quesada Rodriguez (Eds.), Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) (pp. 179-203). Springer. doi:10.1007/978-3-031-09901-4_10 ![]() |
![]() ![]() | DEMIRCI, H., & LENZINI, G. (2022). Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption [Paper presentation]. 15th International Joint Conference on Biomedical Engineering Systems and Technologies - Scale-IT-up. doi:10.5220/0011012400003123 |
![]() ![]() | STOJKOVSKI, B., LENZINI, G., KOENIG, V., & RIVAS, S. (2021). What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. In Annual Computer Security Applications Conference (ACSAC ’21) (pp. 385–398). New York, NY, United States: ACM. doi:10.1145/3485832.3488030 ![]() |
![]() ![]() | DISTLER, V., Fassl, M., Habib, H., Krombholz, K., LENZINI, G., LALLEMAND, C., Cranor, L. F., & KOENIG, V. (December 2021). A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Transactions on Computer-Human Interaction, 28 (6), 50. doi:10.1145/3469845 ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., Atashpendar, A., LENZINI, G., & RYAN, P. Y. A. (2021). PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In M. S. Obaidat & J. Ben-Othman (Eds.), E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (pp. 102-128). Springer. doi:10.1007/978-3-030-90428-9_5 ![]() |
![]() ![]() | ARENAS CORREA, M. P., DEMIRCI, H., & LENZINI, G. (17 August 2021). Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. Journal of the Association for Computing Machinery, 16, 11. doi:10.1145/3465481.3465766 ![]() |
![]() ![]() | STOJKOVSKI, B., Abu-Salma, R., Triquet, K., & LENZINI, G. (2021). "Unless One Does the Research, It May Seem as Just a Useless Battery-Consuming App" - Field Notes on COVID-19 Contact Tracing Applications. Digital Threats: Research and Practice. doi:10.1145/3480466 ![]() |
![]() ![]() | Schwartz, M., GENG, Y., AGHA, H., KIZHAKIDATHAZHATH, R., Liu, D., LENZINI, G., & LAGERWALL, J. (04 June 2021). Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans. Multifunctional Materials, 4 (2), 022002. doi:10.1088/2399-7532/ac0060 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (February 2021). Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. Digital Threats: Research and Practice, 2 (1). doi:10.1145/3431286 ![]() |
LENZINI, G., Srba, Pikuliak, M., & Pecar, S. (2021). Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46821. |
![]() ![]() | STOJKOVSKI, B., & LENZINI, G. (2021). A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 324-330). IEEE. doi:10.1109/CSR51186.2021.9527903 ![]() |
![]() ![]() | BONGARD-BLANCHY, K., ROSSI, A., RIVAS, S., DOUBLET, S., KOENIG, V., & LENZINI, G. (2021). "I am definitely manipulated, even when I am aware of it. It’s ridiculous!" - Dark Patterns from the End-User Perspective. In Proceedings of ACM DIS Conference on Designing Interactive Systems. New York, United States - New York: ACM. doi:10.1145/3461778.3462086 ![]() |
![]() ![]() | STOJKOVSKI, B., LENZINI, G., & KOENIG, V. (2021). "I Personally Relate It to the Traffic Light": A User Study on Security & Privacy Indicators in a Secure Email System Committed to Privacy by Default. In Proceedings of the 36th Annual ACM Symposium on Applied Computing (pp. 1235–1246). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3412841.3441998 ![]() |
![]() ![]() | ROSSI, A., & LENZINI, G. (2021). Which Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography. In Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST). Springer. ![]() |
![]() ![]() | POILLOT, E., & LENZINI, G. (2021). The French National Framework of Tracing Applications. In E. POILLOT, G. LENZINI, ... G. Resta, Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (pp. 40-57). RomaTrE-Press. ![]() |
POILLOT, E., LENZINI, G., Resta, G., & Zeno-Zencovich, V. (Eds.). (2021). Data protection in the context of covid-19. A short (hi)story of tracing applications. RomaTrE-Press. doi:10.13134/979-12-5977-055-4 |
POILLOT, E., Resta, G., Zeno-Zencovich, V., & LENZINI, G. (2021). Lessons to be learnt from the crisis. The Rise and Fall (and Rise?) of Tracing Application. In E. POILLOT, G. Resta, V. Zeno-Zencovich, ... G. LENZINI, Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (pp. 145-150). RomaTrE-Press. ![]() |
![]() ![]() | DISTLER, V., LENZINI, G., LALLEMAND, C., & KOENIG, V. (2020). The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. New Security Paradigms Workshop. doi:10.1145/3442167.3442173 ![]() |
![]() ![]() | ROSSI, A., & LENZINI, G. (July 2020). Transparency by Design in Data-Informed Research: a Collection of Information Design Patterns. Computer Law & Security Review, 37 (105402). doi:10.1016/j.clsr.2020.105402 ![]() |
![]() ![]() | SYMEONIDIS, I., & LENZINI, G. (2020). Systematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant messaging. In International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020. ![]() |
![]() ![]() | ROSSI, A., & LENZINI, G. (February 2020). Making the Case for Evidence-based Standardization of Data Privacy and Data Protection Visual Indicators. Journal of Open Access to Law, 8 (1). ![]() |
![]() ![]() | GENÇ, Z. A., & LENZINI, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp. 585-592). Setúbal, Portugal: SciTePress. doi:10.5220/0009000505850592 ![]() |
![]() ![]() | Spagnuelo, D., BARTOLINI, C., & LENZINI, G. (2020). Qualifying and Measuring Transparency: A Medical Data System Case Study. Computers and Security. doi:10.1016/j.cose.2020.101717 ![]() |
![]() ![]() | STOJKOVSKI, B., & LENZINI, G. (2020). Evaluating ambiguity of privacy indicators in a secure email app. In M. Loreti & L. Spalazzi (Eds.), Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (pp. 223--234). CEUR-WS.org. ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., Atashpendar, A., & LENZINI, G. (2020). Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications. doi:10.5220/0009834001670179 ![]() |
![]() ![]() | BARTOLINI, C., LENZINI, G., & ROBALDO, L. (December 2019). The DAta Protection REgulation COmpliance Model. IEEE Security and Privacy, 17 (6), 37-45. doi:10.1109/MSEC.2019.2937756 ![]() |
LENZINI, G., & Petrocchi, M. (2019). Modelling of Railways Signalling System Requirements by Controlled Natural Languages: A Case Study. In From Software Engineering to Formal Methods and Tools, and Back (pp. 502-518). Springer, Cham. doi:10.1007/978-3-030-30985-5_29 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7 ![]() |
![]() ![]() | STOJKOVSKI, B., VAZQUEZ SANDOVAL, I., & LENZINI, G. (2019). Detecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system. In 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops. ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs. In Proceedings of the 35th Annual Computer Security Applications Conference (pp. 456-465). New York, United States: ACM. doi:10.1145/3359789.3359844 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). On Deception-Based Protection Against Cryptographic Ransomware. In Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (pp. 219-239). Cham, Switzerland: Springer. doi:10.1007/978-3-030-22038-9_11 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5 ![]() |
![]() ![]() | BARTOLINI, C., & LENZINI, G. (2019). Sistemi Medici e Conformità Legale. Rivista Italiana di Medicina Legale: Dottrina, Casistica, Ricerca Sperimentale, Giurisprudenza e Legislazione, XLI (1/2019), 225-242. ![]() |
![]() ![]() | ROBALDO, L., BARTOLINI, C., LENZINI, G., ROSSI, A., Palmirani, M., & Martoni, M. (2019). Formalizing GDPR provisions in reified I/O logic: the DAPRECO knowledge base. Journal of Logic, Language and Information. doi:10.1007/s10849-019-09309-z ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. In Proceedings of the Third Central European Cybersecurity Conference. New York, United States: ACM. doi:10.1145/3360664.3360673 ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., & LENZINI, G. (2019). A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. In Emerging Technologies for Authorization and Authentication. Springer. doi:10.1007/978-3-030-39749-4_11 ![]() |
![]() ![]() | BARTOLINI, C., LENZINI, G., & Santos, C. (2019). An Agile Approach to Validate a Formal Representation of the GDPR. JSAI International Symposium on Artificial Intelligence, 11717. doi:10.1007/978-3-030-31605-1_13 ![]() |
![]() ![]() | ROSSI, A., LENZINI, G., KOENIG, V., & BONGARD-BLANCHY, K. (2019). Dark Patterns: Deception or Simply Bad Design? [Poster presentation]. ESORICS. |
![]() ![]() | BARTOLINI, C., LENZINI, G., & Santos, C. (12 November 2018). An Interdisciplinary Methodology to Validate Formal Representations of Legal Text Applied to the GDPR [Paper presentation]. Twelfth International Workshop on Juris-informatics (JURISIN 2018), Yokohama, Japan. |
![]() ![]() | VAZQUEZ SANDOVAL, I., LENZINI, G., & STOJKOVSKI, B. (2018). A Protocol to Strengthen Password-Based Authentication. In Emerging Technologies for Authorization and Authentication (pp. 38-46). doi:10.1007/978-3-030-04372-8 ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., & LENZINI, G. (2018). Experience report: How to extract security protocols’ specifications from C libraries. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (pp. 719-724). IEEE. doi:10.1109/COMPSAC.2018.10325 ![]() |
![]() ![]() | Schwartz, M., LENZINI, G., GENG, Y., ROENNE, P., RYAN, P., & LAGERWALL, J. (2018). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382. doi:10.1002/adma.201707382 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018. ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24 ![]() |
![]() ![]() | BARTOLINI, C., & LENZINI, G. (25 November 2017). Law and the software development life cycle [Paper presentation]. IALT Annual Conference, Dunboyne, Ireland. |
![]() ![]() | LENZINI, G., Samir, O., ROENNE, P., RYAN, P., Geng, Y., NOH, J., & LAGERWALL, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. In Proc. of the 9th IEEE Workshop on Information Forensics and Security. ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., BARTOLINI, C., & LENZINI, G. (2017). Modelling Metrics for Transparency in Medical Systems. In Proceedings of TrustBus 2017. ![]() |
![]() ![]() | You, I., LENZINI, G., & De Santis, A. (Eds.). (June 2017). Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Systems Journal, 11 (2). doi:10.1109/JSYST.2017.2658258 ![]() |
![]() ![]() | Bella, G., Giustolisi, R., LENZINI, G., & RYAN, P. (01 June 2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307. doi:10.1016/j.cose.2016.12.005 ![]() |
![]() ![]() | BARTOLINI, C., & LENZINI, G. (2017). Human Rights in the era of Information and Communication Technology. |
![]() ![]() | HUYNEN, J.-L., & LENZINI, G. (2017). From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy. doi:10.5220/0006211302130224 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press. ![]() |
![]() ![]() | BARTOLINI, C., GIURGIU, A., LENZINI, G., & ROBALDO, L. (2017). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In T. Bosse & B. Bredeweg (Eds.), Communications in Computer and Information Science (pp. 47-62). Springer International Publishing. doi:10.1007/978-3-319-67468-1_4 ![]() |
![]() ![]() | Giustolisi, R., IOVINO, V., & LENZINI, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R. Giustolisi, V. IOVINO, ... G. LENZINI, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS. ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2016). Transparent Medical Data Systems. Journal of Medical Systems. doi:10.1007/s10916-016-0653-8 ![]() |
![]() ![]() | BARTOLINI, C., LENZINI, G., & ROBALDO, L. (2016). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC). ![]() |
![]() ![]() | BARTOLINI, C., GIURGIU, A., LENZINI, G., & ROBALDO, L. (2016). A Framework to Reason about the Legal Compliance of Security Standards. In Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN). ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., BARTOLINI, C., & LENZINI, G. (2016). Metrics for Transparency. In Proceedings of DPM 2016 and QASA 2016. ![]() |
![]() ![]() | GENG, Y., NOH, J., Drevensek-Olenik, I., Rupp, R., LENZINI, G., & LAGERWALL, J. (27 March 2016). High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication. Scientific Reports, 6 (26840), 1-8. doi:10.1038/srep26840 ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2016). Patient-Centred Transparency Requirements for Medical Data Sharing Systems. Proceedings of the 4th World Conference on Information Systems and Technologies. ![]() |
![]() ![]() | Ferreira, A., & LENZINI, G. (2016). Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. In Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP). Springer. ![]() |
![]() ![]() | LENZINI, G., MAUW, S., & OUCHANI, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G. Barthe & E. Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag. doi:10.1007/978-3-319-46598-2_12 ![]() |
![]() ![]() | Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., LENZINI, G., & RYAN, P. (30 December 2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318. doi:10.1007/978-3-319-25915-4_16 ![]() |
![]() ![]() | Ferreira, A., Huynen, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2015). Do graphical cues effectively inform users? A Socio-Technical Security Study in Accessing Wifi Networks. In Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 323-334). Springer, Cham. ![]() |
Bella, G., & LENZINI, G. (13 July 2015). 2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015 [Paper presentation]. Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy. |
![]() ![]() | LENZINI, G., MAUW, S., & OUCHANI, S. (2015). Security analysis of socio-technical physical systems. Computers electrical engineering. doi:10.1016/j.compeleceng.2015.02.019 ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2015). Security on medical data sharing (a literature review). Luxembourg, Luxembourg: SNT. https://orbilu.uni.lu/handle/10993/23241 |
![]() ![]() | Ferreira, A., & LENZINI, G. (2015). An Analysis of Social Engineering Principles in Effective Phishing. In Proc. of the 5th International Workshop on Socio-Technical Security and Trust. CSP. ![]() |
![]() ![]() | OUCHANI, S., & LENZINI, G. (2015). Generating attacks in SysML activity diagrams by detecting attack surfaces. Journal of Ambient Intelligence and Humanized Computing, 6 (3), 361-373. doi:10.1007/s12652-015-0269-8 ![]() |
![]() ![]() | FERREIRA, A., LENZINI, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4 ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S. Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer. doi:10.1007/978-3-319-24858-5_16 ![]() |
![]() ![]() | Dreier, J., GIUSTOLISI, R., Kassem, A., Lafourcade, P., & LENZINI, G. (2015). A Framework for Analyzing Verifiability in Traditional and Electronic Exams. In Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., LENZINI, G., & RYAN, P. (2015). A Secure Exam Protocol Without Trusted Parties. In ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334. doi:10.1007/978-3-319-20376-8_29 ![]() |
![]() ![]() | Beneson, Z., LENZINI, G., Oliveira, D., Parkin, S., & Uebelacker, S. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. In Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (pp. 85-99). ACM. doi:10.1145/2841113.2841120 ![]() |
![]() ![]() | LENZINI, G., & FERREIRA, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? In Advances in Intelligent Systems and Computing. Springer. doi:10.1007/978-3-319-16486-1_111 ![]() |
![]() ![]() | Benenson, Z., Bleikertz, S., Foley, S. N., Harpes, C., Kowalski, S., LENZINI, G., Oliveira, D., Parkin, S., Pfleeger, S. L., & Smith, P. (2015). 4.2 Social Dynamics Metrics-Working Group Report. Socio-Technical Security Metrics, 17-19. ![]() |
![]() ![]() | Bella, G., Curzon, P., & LENZINI, G. (2015). Service security and privacy as a socio-technical problem. Journal of Computer Security, 23 (5), 563-585. doi:10.3233/JCS-150536 ![]() |
![]() ![]() | Benenson, Z., LENZINI, G., Oliveira, D., Parkin, S., & Uebelacker. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. Proceedings of the New Security Paradigm Workshop. ![]() |
![]() ![]() | FERREIRA, A., LENZINI, G., Santos-Pereira, C., Augusto, A., & Correia, M. (2014). Envisioning secure and usable access control for patients. In IEEE 3rd International Conference on Serious Games and Applications in Healthcare. ![]() |
![]() ![]() | Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & LENZINI, G. (2014). On the verifiability of (electronic) exams. Technical Report TR-2014-2, Verimag. https://orbilu.uni.lu/handle/10993/25413 |
Bella, G., & LENZINI, G. (2014). Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014 [Paper presentation]. 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014, Vienna, Austria. |
![]() ![]() | GIUSTOLISI, R., LENZINI, G., & RYAN, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science. doi:10.1007/978-3-319-12400-1_5 ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., & LENZINI, G. (2014). Secure exams despite malicious management. In Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014. doi:10.1109/PST.2014.6890949 ![]() |
![]() ![]() | Bella, G., Curzon, P., GIUSTOLISI, R., & LENZINI, G. (2014). A Socio-Technical Methodology for the Security and Privacy Analysis of Services. In IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden. doi:10.1109/COMPSACW.2014.69 ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2014). A Conceptual Framework to Study Socio-Technical Security. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_28 ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_27 ![]() |
![]() ![]() | Dreier, J., GIUSTOLISI, R., Kassem, A., Lafourcade, P., LENZINI, G., & RYAN, P. (2014). Formal Analysis of Electronic Exams. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. doi:10.5220/0005050901010112 ![]() |
![]() ![]() | CHEN, X., Harpes, C., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2013). DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity. In Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (pp. 1329-1332). ACM. ![]() |
![]() ![]() | FERREIRA, A., GIUSTOLISI, R., HUYNEN, J.-L., & LENZINI, G. (12 April 2013). On Tools for Socio-Technical Security Analysis [Paper presentation]. Grande Region Security and Reliability Day 2013, Luxembourg, Luxembourg. |
![]() ![]() | FERREIRA, A., GIUSTOLISI, R., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2013). Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. IEEE TrustCom. doi:10.1109/TrustCom.2013.190 ![]() |
![]() ![]() | Chen, X., Harpes, C., LENZINI, G., MAUW, S., & PANG, J. (2013). Location Assurance and Privacy in GNSS Navigation. ERCIM News, 2013 (94). ![]() |
![]() ![]() | CHEN, X., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2013). A trust framework for evaluating GNSS signal integrity. In Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (pp. 179-192). IEEE CS. ![]() |
![]() ![]() | CHEN, X., LENZINI, G., MAUW, S., & PANG, J. (2013). Design and formal analysis of a group signature based electronic toll pricing system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (1), 55-75. ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2013). Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names. Lecture Notes in Computer Science, 8203, 131-143. doi:10.1007/978-3-642-41098-7_9 ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., & LENZINI, G. (2013). Socio-technical formal analysis of TLS certificate validation in modern browsers. In PST (pp. 309-316). doi:10.1109/PST.2013.6596067 ![]() |
![]() ![]() | GIUSTOLISI, R., LENZINI, G., & Bella, G. (2013). What Security for Electronic Exams? In 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013. doi:10.1109/CRiSIS.2013.6766348 ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., & LENZINI, G. (2013). A Socio-technical Understanding of TLS Certificate Validation. In Trust Management VII (pp. 281-288). ![]() |
![]() ![]() | CHEN, X., LENZINI, G., MAUW, S., & PANG, J. (2012). A group signature based electronic toll pricing system. In Proc. 7th International Conference on Availability, Reliability and Security (pp. 85-93). IEEE Computer Society. doi:10.1109/ARES.2012.67 ![]() |
![]() ![]() | CHEN, X., Harpes, C., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2012). Implementation and Validation of a Localisation Assurance Service Provider. In Proc. 6th ESA Workshop on Satellite Navigation Technologies (pp. 1-7). doi:10.1109/NAVITEC.2012.6423097 ![]() |
LENZINI, G., & Bella, G. (Eds.). (2012). STAST 2012 Proc. of the 2nd Int. Workshop on Socio-Technical Aspects in Security and Trust. IEEE. |
![]() ![]() | Sahli, N., LENZINI, G., & Eertink, H. (2012). Trustworthy agent-based recommender system in a mobile P2P environment. Lecture Notes in Computer Science, 6573 LNAI, 59-70. doi:10.1007/978-3-642-31809-2_6 ![]() |
![]() ![]() | You, I., LENZINI, G., Ogiela, M. R., & Bertino, E. (2012). Defending against insider threats and internal data leakage. Security and Communication Networks, 5 (8), 831-833. doi:10.1002/sec.598 ![]() |
![]() ![]() | LENZINI, G., MAUW, S., & PANG, J. (2011). Selective location blinding using hash chains. In Proc. 19th International Workshop on Security Protocols (pp. 132-141). Springer-Verlag. ![]() |
Seigneur, J.-M., LENZINI, G., & Hulsebosch, B. (2011). Adaptive Trust Management. In G. D. M. Serugendo, M.-P. Gleizes, ... A. Karageorgos (Eds.), Self-Organizing Software - From Natural to Artificial Adaptation (pp. 362-383). Springer. ![]() |
Coles-Kemp, L., LENZINI, G., RYAN, P., & Bella, G. (2011). STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust. IEEE. |
![]() ![]() | Buhan, I., LENZINI, G., & RADOMIROVIC, S. (2010). Contextual biometric-based authentication for ubiquitous services. In Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (pp. 680-693). Springer. doi:10.1007/978-3-642-16355-5_51 ![]() |
![]() ![]() | Hulsebosch, B., LENZINI, G., & Eertink, H. (2009). Quality Authenticator Scheme. (STORK Deliverable D2.3). European Community under the ICT Policy Support Programme. https://orbilu.uni.lu/handle/10993/61564 |
LENZINI, G. (2009). Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. In R. de Lemos, J. C. Fabre, C. Gacek, F. Gadducci, ... M. H. ~ter Beek (Eds.), Architecting Dependable Systems VI 2018-09-18 22:51:18 +0000 2019-06-15 18:11:00 +0200 (pp. 284-307). Springer, Berlin, Heidelberg. ![]() |
Gnesi, S., Latella, D., LENZINI, G., Amendola, A., Abbaneo, C., & Marmo, P. (2000). A Formal Specification and Validation of a Control System in Presence of Byzantine Errors. In Proc.~of the 6th Int. Conference Tool and Algorithms for the Construction and Analysis of Systems (TACAS 2000), in ETAPS 2000 -- March 25 - April 2, 2000, Berlin, Germany (pp. 535-549). Springer. ![]() |
Gnesi, S., Latella, D., & LENZINI, G. (1999). Model Checking of Cryptographic Protocols using HD-Automata. In 4th Italian Workshop on Sistemi Distribuiti: Algoritmi, Architetture e Linguaggi (WSDAAL'99), June 13-15, 1999, Fonte Cerreto (L'Aquila), Italy 2018-09-18 22:51:18 +0000 2019-06-15 18:31:23 +0200 (pp. 74-77). Informal Proceedings. ![]() |
LENZINI, G. (1998). Sequence Comparison: Close and Open problems. In Proc.~of Workshop ``La matematizzazione della Biologia: storia e problematiche attuali'', Arcidosso (GR), Italy (pp. 161-170). Quattro Venti, Urbino (Italy). ![]() |
LENZINI, G., & Marianelli, S. (1997). Algorithms For Phylogeny Reconstruction In a New Mathematical Model. Calcolo, 1-4 (34), 1-24. ![]() |
LENZINI, G., Marianelli, S., Luccio, F., Cerrai, P., & Galleni, L. (1996). Automatic Phylogeny Reconstruction Under a New Hypothesis [Paper presentation]. 1st Meeting in Theoretical Biology. |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., Ferreira, A., & LENZINI, G. (n.d.). Accomplishing transparency within the General Data Protection Regulation (Auxiliary material). |