![]() ![]() | CHEN, X., DOUBLET, S., SERGEEVA, A., LENZINI, G., KOENIG, V., & DISTLER, V. (2024). What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2024). United States: USENIX. ![]() |
![]() ![]() | TANG, H., LENZINI, G., GREIFF, S., ROHLES, B.* , & SERGEEVA, A.*. (01 July 2024). "Who Knows? Maybe it Really Works": Analyzing Users' Perceptions of Health Misinformation on Social Media [Paper presentation]. ACM Conference on Designing Interactive Systems 2024, Copenhagen, Denmark. doi:10.1145/3643834.3661510 ![]() * These authors have contributed equally to this work. |
![]() ![]() | CHEN, X., SACRE, M., LENZINI, G., GREIFF, S., Distler Verena* , & SERGEEVA, A.*. (2024). The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment. In CHI 2024 - Proceedings of the 2024 CHI Conference on Human Factors in Computing Sytems (pp. 21). Honolulu, United States: Association for Computing Machinery. doi:10.1145/3613904.3641943 ![]() * These authors have contributed equally to this work. |
![]() ![]() | EL MESTARI, S. Z., LENZINI, G., & DEMIRCI, H. (February 2024). Preserving data privacy in machine learning systems. Computers and Security, 137, 103605. doi:10.1016/j.cose.2023.103605 ![]() |
![]() ![]() | MUKHERJEE, S., Rohles, B., DISTLER, V., LENZINI, G., & KOENIG, V. (15 September 2023). The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study. Computers and Education, 207, 104925. doi:10.1016/j.compedu.2023.104925 ![]() |
![]() ![]() | CHUAI, Y., ROSSI, A., & LENZINI, G. (2023). Using Emotions and Topics to Understand Online Misinformation. In Web Engineering. ICWE 2023. Lecture Notes in Computer Science, vol 13893. Springer, Cham (pp. 395–400). doi:10.1007/978-3-031-34444-2_34 ![]() |
![]() ![]() | KOCYIGIT, E., ROSSI, A., & LENZINI, G. (2023). Towards Assessing Features of Dark Patterns in Cookie Consent Processes. In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland. doi:10.1007/978-3-031-31971-6_13 ![]() |
![]() ![]() | DISTLER, V., Fassl, M., Habib, H., Krombholz, K., LENZINI, G., LALLEMAND, C., KOENIG, V., & Cranor, L. F. (2023). Empirical Research Methods in Usable Privacy and Security. In Human Factors in Privacy Research. Springer International Publishing. doi:10.1007/978-3-031-28643-8_3 ![]() |
CHUAI, Y., TIAN, H., Pröllochs, N., & LENZINI, G. (2023). The Roll-Out of Community Notes Did Not Reduce Engagement With Misinformation on Twitter. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/59462. |
![]() ![]() | ARENAS CORREA, M. P., Bingol, M. A., DEMIRCI, H., FOTIADIS, G., & LENZINI, G. (06 October 2022). A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption. Lecture Notes in Computer Science, 13503, 23. doi:10.1007/978-3-031-17433-9_18 ![]() |
![]() ![]() | BOTES, W. M., & LENZINI, G. (10 June 2022). When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers [Paper presentation]. The 1st International Workshop on Ethics in Computer Security (EthiCS 2022) Co-located with the 7th IEEE European Symposium on Security and Privacy, Genoa, Italy. |
![]() ![]() | DOAN, X. C., Selzer, A., ROSSI, A., BOTES, W. M., & LENZINI, G. (2022). Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent. Web Conference Companion Volume (ACM). doi:10.1145/3487553.3524632 ![]() |
![]() ![]() | DISTLER, V., Gutfleisch, T., LALLEMAND, C., LENZINI, G., & KOENIG, V. (March 2022). Complex, but in a good way? How to represent encryption to non-experts through text and visuals – Evidence from expert co-creation and a vignette experiment. Computers in Human Behavior Reports, 4. doi:10.1016/j.chbr.2021.100161 ![]() |
![]() ![]() | ARENAS CORREA, M. P., DEMIRCI, H., & LENZINI, G. (24 February 2022). An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification. Machine Learning and Knowledge Extraction, 4 (1), 222-239. doi:10.3390/make4010010 ![]() |
![]() ![]() | ROSSI, A., Kumari, A., & LENZINI, G. (2022). Unwinding a Legal and Ethical Ariadne’s Thread Out of the Twitter Scraping Maze. In S. Schiffner, S. Ziegler, ... A. Quesada Rodriguez (Eds.), Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) (pp. 179-203). Springer. doi:10.1007/978-3-031-09901-4_10 ![]() |
![]() ![]() | DEMIRCI, H., & LENZINI, G. (2022). Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption [Paper presentation]. 15th International Joint Conference on Biomedical Engineering Systems and Technologies - Scale-IT-up. doi:10.5220/0011012400003123 |
![]() ![]() | STOJKOVSKI, B., LENZINI, G., KOENIG, V., & RIVAS, S. (2021). What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. In Annual Computer Security Applications Conference (ACSAC ’21) (pp. 385–398). New York, NY, United States: ACM. doi:10.1145/3485832.3488030 ![]() |
![]() ![]() | DISTLER, V., Fassl, M., Habib, H., Krombholz, K., LENZINI, G., LALLEMAND, C., Cranor, L. F., & KOENIG, V. (December 2021). A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Transactions on Computer-Human Interaction, 28 (6), 50. doi:10.1145/3469845 ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., Atashpendar, A., LENZINI, G., & RYAN, P. Y. A. (2021). PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In M. S. Obaidat & J. Ben-Othman (Eds.), E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (pp. 102-128). Springer. doi:10.1007/978-3-030-90428-9_5 ![]() |
![]() ![]() | ARENAS CORREA, M. P., DEMIRCI, H., & LENZINI, G. (17 August 2021). Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. Journal of the Association for Computing Machinery, 16, 11. doi:10.1145/3465481.3465766 ![]() |
![]() ![]() | STOJKOVSKI, B., Abu-Salma, R., Triquet, K., & LENZINI, G. (2021). "Unless One Does the Research, It May Seem as Just a Useless Battery-Consuming App" - Field Notes on COVID-19 Contact Tracing Applications. Digital Threats: Research and Practice. doi:10.1145/3480466 ![]() |
![]() ![]() | Schwartz, M., GENG, Y., AGHA, H., KIZHAKIDATHAZHATH, R., Liu, D., LENZINI, G., & LAGERWALL, J. (04 June 2021). Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans. Multifunctional Materials, 4 (2), 022002. doi:10.1088/2399-7532/ac0060 ![]() |
LENZINI, G., Srba, Pikuliak, M., & Pecar, S. (2021). Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46821. |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (February 2021). Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. Digital Threats: Research and Practice, 2 (1). doi:10.1145/3431286 ![]() |
![]() ![]() | STOJKOVSKI, B., & LENZINI, G. (2021). A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 324-330). IEEE. doi:10.1109/CSR51186.2021.9527903 ![]() |
POILLOT, E., Resta, G., Zeno-Zencovich, V., & LENZINI, G. (2021). Lessons to be learnt from the crisis. The Rise and Fall (and Rise?) of Tracing Application. In E. POILLOT, G. Resta, V. Zeno-Zencovich, ... G. LENZINI, Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (pp. 145-150). RomaTrE-Press. ![]() |
POILLOT, E., LENZINI, G., Resta, G., & Zeno-Zencovich, V. (Eds.). (2021). Data protection in the context of covid-19. A short (hi)story of tracing applications. RomaTrE-Press. doi:10.13134/979-12-5977-055-4 |
![]() ![]() | STOJKOVSKI, B., LENZINI, G., & KOENIG, V. (2021). "I Personally Relate It to the Traffic Light": A User Study on Security & Privacy Indicators in a Secure Email System Committed to Privacy by Default. In Proceedings of the 36th Annual ACM Symposium on Applied Computing (pp. 1235–1246). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3412841.3441998 ![]() |
![]() ![]() | BONGARD-BLANCHY, K., ROSSI, A., RIVAS, S., DOUBLET, S., KOENIG, V., & LENZINI, G. (2021). "I am definitely manipulated, even when I am aware of it. It’s ridiculous!" - Dark Patterns from the End-User Perspective. In Proceedings of ACM DIS Conference on Designing Interactive Systems. New York, United States - New York: ACM. doi:10.1145/3461778.3462086 ![]() |
![]() ![]() | POILLOT, E., & LENZINI, G. (2021). The French National Framework of Tracing Applications. In E. POILLOT, G. LENZINI, ... G. Resta, Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (pp. 40-57). RomaTrE-Press. ![]() |
![]() ![]() | ROSSI, A., & LENZINI, G. (2021). Which Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography. In Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST). Springer. ![]() |
![]() ![]() | DISTLER, V., LENZINI, G., LALLEMAND, C., & KOENIG, V. (2020). The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. New Security Paradigms Workshop. doi:10.1145/3442167.3442173 ![]() |
![]() ![]() | ROSSI, A., & LENZINI, G. (July 2020). Transparency by Design in Data-Informed Research: a Collection of Information Design Patterns. Computer Law & Security Review, 37 (105402). doi:10.1016/j.clsr.2020.105402 ![]() |
![]() ![]() | SYMEONIDIS, I., & LENZINI, G. (2020). Systematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant messaging. In International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020. ![]() |
![]() ![]() | ROSSI, A., & LENZINI, G. (February 2020). Making the Case for Evidence-based Standardization of Data Privacy and Data Protection Visual Indicators. Journal of Open Access to Law, 8 (1). ![]() |
![]() ![]() | Spagnuelo, D., BARTOLINI, C., & LENZINI, G. (2020). Qualifying and Measuring Transparency: A Medical Data System Case Study. Computers and Security. doi:10.1016/j.cose.2020.101717 ![]() |
![]() ![]() | STOJKOVSKI, B., & LENZINI, G. (2020). Evaluating ambiguity of privacy indicators in a secure email app. In M. Loreti & L. Spalazzi (Eds.), Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (pp. 223--234). CEUR-WS.org. ![]() |
![]() ![]() | GENÇ, Z. A., & LENZINI, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp. 585-592). Setúbal, Portugal: SciTePress. doi:10.5220/0009000505850592 ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., Atashpendar, A., & LENZINI, G. (2020). Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications. doi:10.5220/0009834001670179 ![]() |
![]() ![]() | BARTOLINI, C., LENZINI, G., & ROBALDO, L. (December 2019). The DAta Protection REgulation COmpliance Model. IEEE Security and Privacy, 17 (6), 37-45. doi:10.1109/MSEC.2019.2937756 ![]() |
LENZINI, G., & Petrocchi, M. (2019). Modelling of Railways Signalling System Requirements by Controlled Natural Languages: A Case Study. In From Software Engineering to Formal Methods and Tools, and Back (pp. 502-518). Springer, Cham. doi:10.1007/978-3-030-30985-5_29 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). On Deception-Based Protection Against Cryptographic Ransomware. In Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (pp. 219-239). Cham, Switzerland: Springer. doi:10.1007/978-3-030-22038-9_11 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs. In Proceedings of the 35th Annual Computer Security Applications Conference (pp. 456-465). New York, United States: ACM. doi:10.1145/3359789.3359844 ![]() |
![]() ![]() | BARTOLINI, C., & LENZINI, G. (2019). Sistemi Medici e Conformità Legale. Rivista Italiana di Medicina Legale: Dottrina, Casistica, Ricerca Sperimentale, Giurisprudenza e Legislazione, XLI (1/2019), 225-242. ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., & LENZINI, G. (2019). A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. In Emerging Technologies for Authorization and Authentication. Springer. doi:10.1007/978-3-030-39749-4_11 ![]() |
![]() ![]() | ROBALDO, L., BARTOLINI, C., LENZINI, G., ROSSI, A., Palmirani, M., & Martoni, M. (2019). Formalizing GDPR provisions in reified I/O logic: the DAPRECO knowledge base. Journal of Logic, Language and Information. doi:10.1007/s10849-019-09309-z ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. In Proceedings of the Third Central European Cybersecurity Conference. New York, United States: ACM. doi:10.1145/3360664.3360673 ![]() |
![]() ![]() | BARTOLINI, C., LENZINI, G., & Santos, C. (2019). An Agile Approach to Validate a Formal Representation of the GDPR. JSAI International Symposium on Artificial Intelligence, 11717. doi:10.1007/978-3-030-31605-1_13 ![]() |
![]() ![]() | STOJKOVSKI, B., VAZQUEZ SANDOVAL, I., & LENZINI, G. (2019). Detecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system. In 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops. ![]() |
![]() ![]() | ROSSI, A., LENZINI, G., KOENIG, V., & BONGARD-BLANCHY, K. (2019). Dark Patterns: Deception or Simply Bad Design? [Poster presentation]. ESORICS. |
![]() ![]() | BARTOLINI, C., LENZINI, G., & Santos, C. (12 November 2018). An Interdisciplinary Methodology to Validate Formal Representations of Legal Text Applied to the GDPR [Paper presentation]. Twelfth International Workshop on Juris-informatics (JURISIN 2018), Yokohama, Japan. |
![]() ![]() | VAZQUEZ SANDOVAL, I., LENZINI, G., & STOJKOVSKI, B. (2018). A Protocol to Strengthen Password-Based Authentication. In Emerging Technologies for Authorization and Authentication (pp. 38-46). doi:10.1007/978-3-030-04372-8 ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., & LENZINI, G. (2018). Experience report: How to extract security protocols’ specifications from C libraries. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (pp. 719-724). IEEE. doi:10.1109/COMPSAC.2018.10325 ![]() |
![]() ![]() | Schwartz, M., LENZINI, G., GENG, Y., ROENNE, P., RYAN, P., & LAGERWALL, J. (2018). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382. doi:10.1002/adma.201707382 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018. ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24 ![]() |
![]() ![]() | BARTOLINI, C., & LENZINI, G. (25 November 2017). Law and the software development life cycle [Paper presentation]. IALT Annual Conference, Dunboyne, Ireland. |
![]() ![]() | LENZINI, G., Samir, O., ROENNE, P., RYAN, P., Geng, Y., NOH, J., & LAGERWALL, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. In Proc. of the 9th IEEE Workshop on Information Forensics and Security. ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., BARTOLINI, C., & LENZINI, G. (2017). Modelling Metrics for Transparency in Medical Systems. In Proceedings of TrustBus 2017. ![]() |
![]() ![]() | Bella, G., Giustolisi, R., LENZINI, G., & RYAN, P. (01 June 2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307. doi:10.1016/j.cose.2016.12.005 ![]() |
![]() ![]() | You, I., LENZINI, G., & De Santis, A. (Eds.). (June 2017). Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Systems Journal, 11 (2). doi:10.1109/JSYST.2017.2658258 ![]() |
![]() ![]() | BARTOLINI, C., & LENZINI, G. (2017). Human Rights in the era of Information and Communication Technology. |
![]() ![]() | HUYNEN, J.-L., & LENZINI, G. (2017). From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy. doi:10.5220/0006211302130224 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press. ![]() |
![]() ![]() | BARTOLINI, C., GIURGIU, A., LENZINI, G., & ROBALDO, L. (2017). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In T. Bosse & B. Bredeweg (Eds.), Communications in Computer and Information Science (pp. 47-62). Springer International Publishing. doi:10.1007/978-3-319-67468-1_4 ![]() |
![]() ![]() | Giustolisi, R., IOVINO, V., & LENZINI, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R. Giustolisi, V. IOVINO, ... G. LENZINI, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS. ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2016). Transparent Medical Data Systems. Journal of Medical Systems. doi:10.1007/s10916-016-0653-8 ![]() |
![]() ![]() | BARTOLINI, C., GIURGIU, A., LENZINI, G., & ROBALDO, L. (2016). A Framework to Reason about the Legal Compliance of Security Standards. In Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN). ![]() |
![]() ![]() | BARTOLINI, C., LENZINI, G., & ROBALDO, L. (2016). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC). ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., BARTOLINI, C., & LENZINI, G. (2016). Metrics for Transparency. In Proceedings of DPM 2016 and QASA 2016. ![]() |
![]() ![]() | GENG, Y., NOH, J., Drevensek-Olenik, I., Rupp, R., LENZINI, G., & LAGERWALL, J. (27 March 2016). High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication. Scientific Reports, 6 (26840), 1-8. doi:10.1038/srep26840 ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2016). Patient-Centred Transparency Requirements for Medical Data Sharing Systems. Proceedings of the 4th World Conference on Information Systems and Technologies. ![]() |
![]() ![]() | Ferreira, A., & LENZINI, G. (2016). Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. In Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP). Springer. ![]() |
![]() ![]() | LENZINI, G., MAUW, S., & OUCHANI, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G. Barthe & E. Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag. doi:10.1007/978-3-319-46598-2_12 ![]() |
![]() ![]() | Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., LENZINI, G., & RYAN, P. (30 December 2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318. doi:10.1007/978-3-319-25915-4_16 ![]() |
![]() ![]() | Ferreira, A., Huynen, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2015). Do graphical cues effectively inform users? A Socio-Technical Security Study in Accessing Wifi Networks. In Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 323-334). Springer, Cham. ![]() |
Bella, G., & LENZINI, G. (13 July 2015). 2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015 [Paper presentation]. Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy. |
![]() ![]() | LENZINI, G., MAUW, S., & OUCHANI, S. (2015). Security analysis of socio-technical physical systems. Computers electrical engineering. doi:10.1016/j.compeleceng.2015.02.019 ![]() |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2015). Security on medical data sharing (a literature review). Luxembourg, Luxembourg: SNT. |
![]() ![]() | Dreier, J., GIUSTOLISI, R., Kassem, A., Lafourcade, P., & LENZINI, G. (2015). A Framework for Analyzing Verifiability in Traditional and Electronic Exams. In Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., LENZINI, G., & RYAN, P. (2015). A Secure Exam Protocol Without Trusted Parties. In ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334. doi:10.1007/978-3-319-20376-8_29 ![]() |
![]() ![]() | Beneson, Z., LENZINI, G., Oliveira, D., Parkin, S., & Uebelacker, S. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. In Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (pp. 85-99). ACM. doi:10.1145/2841113.2841120 ![]() |
![]() ![]() | LENZINI, G., & FERREIRA, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? In Advances in Intelligent Systems and Computing. Springer. doi:10.1007/978-3-319-16486-1_111 ![]() |
![]() ![]() | Benenson, Z., Bleikertz, S., Foley, S. N., Harpes, C., Kowalski, S., LENZINI, G., Oliveira, D., Parkin, S., Pfleeger, S. L., & Smith, P. (2015). 4.2 Social Dynamics Metrics-Working Group Report. Socio-Technical Security Metrics, 17-19. ![]() |
![]() ![]() | Bella, G., Curzon, P., & LENZINI, G. (2015). Service security and privacy as a socio-technical problem. Journal of Computer Security, 23 (5), 563-585. doi:10.3233/JCS-150536 ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S. Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer. doi:10.1007/978-3-319-24858-5_16 ![]() |
![]() ![]() | OUCHANI, S., & LENZINI, G. (2015). Generating attacks in SysML activity diagrams by detecting attack surfaces. Journal of Ambient Intelligence and Humanized Computing, 6 (3), 361-373. doi:10.1007/s12652-015-0269-8 ![]() |
![]() ![]() | FERREIRA, A., LENZINI, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4 ![]() |
![]() ![]() | Ferreira, A., & LENZINI, G. (2015). An Analysis of Social Engineering Principles in Effective Phishing. In Proc. of the 5th International Workshop on Socio-Technical Security and Trust. CSP. ![]() |
![]() ![]() | Benenson, Z., LENZINI, G., Oliveira, D., Parkin, S., & Uebelacker. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. Proceedings of the New Security Paradigm Workshop. ![]() |
![]() ![]() | FERREIRA, A., LENZINI, G., Santos-Pereira, C., Augusto, A., & Correia, M. (2014). Envisioning secure and usable access control for patients. In IEEE 3rd International Conference on Serious Games and Applications in Healthcare. ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2014). A Conceptual Framework to Study Socio-Technical Security. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_28 ![]() |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_27 ![]() |
![]() ![]() | Dreier, J., GIUSTOLISI, R., Kassem, A., Lafourcade, P., LENZINI, G., & RYAN, P. (2014). Formal Analysis of Electronic Exams. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. doi:10.5220/0005050901010112 ![]() |
![]() ![]() | Bella, G., Curzon, P., GIUSTOLISI, R., & LENZINI, G. (2014). A Socio-Technical Methodology for the Security and Privacy Analysis of Services. In IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden. doi:10.1109/COMPSACW.2014.69 ![]() |
![]() ![]() | GIUSTOLISI, R., LENZINI, G., & RYAN, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science. doi:10.1007/978-3-319-12400-1_5 ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., & LENZINI, G. (2014). Secure exams despite malicious management. In Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014. doi:10.1109/PST.2014.6890949 ![]() |
Bella, G., & LENZINI, G. (2014). Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014 [Paper presentation]. 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014, Vienna, Austria. |
![]() ![]() | Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & LENZINI, G. (2014). On the verifiability of (electronic) exams. Technical Report TR-2014-2, Verimag. |
![]() ![]() | CHEN, X., Harpes, C., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2013). DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity. In Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (pp. 1329-1332). ACM. ![]() |
![]() ![]() | FERREIRA, A., GIUSTOLISI, R., HUYNEN, J.-L., & LENZINI, G. (12 April 2013). On Tools for Socio-Technical Security Analysis [Paper presentation]. Grande Region Security and Reliability Day 2013, Luxembourg, Luxembourg. |
![]() ![]() | FERREIRA, A., HUYNEN, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2013). Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names. Lecture Notes in Computer Science, 8203, 131-143. doi:10.1007/978-3-642-41098-7_9 ![]() |
![]() ![]() | FERREIRA, A., GIUSTOLISI, R., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2013). Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. IEEE TrustCom. doi:10.1109/TrustCom.2013.190 ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., & LENZINI, G. (2013). Socio-technical formal analysis of TLS certificate validation in modern browsers. In PST (pp. 309-316). doi:10.1109/PST.2013.6596067 ![]() |
![]() ![]() | GIUSTOLISI, R., LENZINI, G., & Bella, G. (2013). What Security for Electronic Exams? In 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013. doi:10.1109/CRiSIS.2013.6766348 ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., & LENZINI, G. (2013). A Socio-technical Understanding of TLS Certificate Validation. In Trust Management VII (pp. 281-288). ![]() |
![]() ![]() | Chen, X., Harpes, C., LENZINI, G., MAUW, S., & PANG, J. (2013). Location Assurance and Privacy in GNSS Navigation. ERCIM News, 2013 (94). ![]() |
![]() ![]() | CHEN, X., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2013). A trust framework for evaluating GNSS signal integrity. In Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (pp. 179-192). IEEE CS. ![]() |
![]() ![]() | CHEN, X., LENZINI, G., MAUW, S., & PANG, J. (2013). Design and formal analysis of a group signature based electronic toll pricing system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (1), 55-75. ![]() |
LENZINI, G., & Bella, G. (Eds.). (2012). STAST 2012 Proc. of the 2nd Int. Workshop on Socio-Technical Aspects in Security and Trust. IEEE. |
![]() ![]() | CHEN, X., Harpes, C., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2012). Implementation and Validation of a Localisation Assurance Service Provider. In Proc. 6th ESA Workshop on Satellite Navigation Technologies (pp. 1-7). doi:10.1109/NAVITEC.2012.6423097 ![]() |
![]() ![]() | CHEN, X., LENZINI, G., MAUW, S., & PANG, J. (2012). A group signature based electronic toll pricing system. In Proc. 7th International Conference on Availability, Reliability and Security (pp. 85-93). IEEE Computer Society. doi:10.1109/ARES.2012.67 ![]() |
![]() ![]() | Sahli, N., LENZINI, G., & Eertink, H. (2012). Trustworthy agent-based recommender system in a mobile P2P environment. Lecture Notes in Computer Science, 6573 LNAI, 59-70. doi:10.1007/978-3-642-31809-2_6 ![]() |
![]() ![]() | You, I., LENZINI, G., Ogiela, M. R., & Bertino, E. (2012). Defending against insider threats and internal data leakage. Security and Communication Networks, 5 (8), 831-833. doi:10.1002/sec.598 ![]() |
Seigneur, J.-M., LENZINI, G., & Hulsebosch, B. (2011). Adaptive Trust Management. In G. D. M. Serugendo, M.-P. Gleizes, ... A. Karageorgos (Eds.), Self-Organizing Software - From Natural to Artificial Adaptation (pp. 362-383). Springer. ![]() |
Coles-Kemp, L., LENZINI, G., RYAN, P., & Bella, G. (2011). STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust. IEEE. |
![]() ![]() | LENZINI, G., MAUW, S., & PANG, J. (2011). Selective location blinding using hash chains. In Proc. 19th International Workshop on Security Protocols (pp. 132-141). Springer-Verlag. ![]() |
![]() ![]() | Buhan, I., LENZINI, G., & RADOMIROVIC, S. (2010). Contextual biometric-based authentication for ubiquitous services. In Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (pp. 680-693). Springer. doi:10.1007/978-3-642-16355-5_51 ![]() |
![]() ![]() | Hulsebosch, B., LENZINI, G., & Eertink, H. (2009). Quality Authenticator Scheme. (STORK Deliverable D2.3). European Community under the ICT Policy Support Programme. |
LENZINI, G. (2009). Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. In R. de Lemos, J. C. Fabre, C. Gacek, F. Gadducci, ... M. H. ~ter Beek (Eds.), Architecting Dependable Systems VI 2018-09-18 22:51:18 +0000 2019-06-15 18:11:00 +0200 (pp. 284-307). Springer, Berlin, Heidelberg. ![]() |
Gnesi, S., Latella, D., LENZINI, G., Amendola, A., Abbaneo, C., & Marmo, P. (2000). A Formal Specification and Validation of a Control System in Presence of Byzantine Errors. In Proc.~of the 6th Int. Conference Tool and Algorithms for the Construction and Analysis of Systems (TACAS 2000), in ETAPS 2000 -- March 25 - April 2, 2000, Berlin, Germany (pp. 535-549). Springer. ![]() |
Gnesi, S., Latella, D., & LENZINI, G. (1999). Model Checking of Cryptographic Protocols using HD-Automata. In 4th Italian Workshop on Sistemi Distribuiti: Algoritmi, Architetture e Linguaggi (WSDAAL'99), June 13-15, 1999, Fonte Cerreto (L'Aquila), Italy 2018-09-18 22:51:18 +0000 2019-06-15 18:31:23 +0200 (pp. 74-77). Informal Proceedings. ![]() |
LENZINI, G. (1998). Sequence Comparison: Close and Open problems. In Proc.~of Workshop ``La matematizzazione della Biologia: storia e problematiche attuali'', Arcidosso (GR), Italy (pp. 161-170). Quattro Venti, Urbino (Italy). ![]() |
LENZINI, G., & Marianelli, S. (1997). Algorithms For Phylogeny Reconstruction In a New Mathematical Model. Calcolo, 1-4 (34), 1-24. ![]() |
LENZINI, G., Marianelli, S., Luccio, F., Cerrai, P., & Galleni, L. (1996). Automatic Phylogeny Reconstruction Under a New Hypothesis [Paper presentation]. 1st Meeting in Theoretical Biology. |
![]() ![]() | PIERINA BRUSTOLIN SPAGNUELO, D., Ferreira, A., & LENZINI, G. (n.d.). Accomplishing transparency within the General Data Protection Regulation (Auxiliary material). |