Arenas, M. P., FOTIADIS, G., LENZINI, G., & RAKEEI, M. (January 2025). Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols. Computers and Security, 148, 104131. doi:10.1016/j.cose.2024.104131 Peer Reviewed verified by ORBi |
CHEN, X., DOUBLET, S., SERGEEVA, A., LENZINI, G., KOENIG, V., & DISTLER, V. (2024). What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2024). United States: USENIX. Peer reviewed |
TANG, H., LENZINI, G., GREIFF, S., ROHLES, B.* , & SERGEEVA, A.*. (01 July 2024). "Who Knows? Maybe it Really Works": Analyzing Users' Perceptions of Health Misinformation on Social Media [Paper presentation]. ACM Conference on Designing Interactive Systems 2024, Copenhagen, Denmark. doi:10.1145/3643834.3661510 Peer reviewed * These authors have contributed equally to this work. |
CHEN, X., SACRE, M., LENZINI, G., GREIFF, S., Distler Verena* , & SERGEEVA, A.*. (2024). The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment. In CHI 2024 - Proceedings of the 2024 CHI Conference on Human Factors in Computing Sytems (pp. 21). Honolulu, United States: Association for Computing Machinery. doi:10.1145/3613904.3641943 Peer reviewed * These authors have contributed equally to this work. |
EL MESTARI, S. Z., LENZINI, G., & DEMIRCI, H. (February 2024). Preserving data privacy in machine learning systems. Computers and Security, 137, 103605. doi:10.1016/j.cose.2023.103605 Peer Reviewed verified by ORBi |
NEGRI RIBALTA, C. S., Geraud-Stewart, R., SERGEEVA, A., & LENZINI, G. (2024). A systematic literature review on the impact of AI models on the security of code generation. Frontiers in Big Data, 7, 1386720. doi:10.3389/fdata.2024.1386720 Peer Reviewed verified by ORBi |
Arenas, M. P., LENZINI, G., RAKEEI, M., RYAN, P. Y. A., SKROBOT, M., & ZHEKOVA, M. (2024). Verifying Artifact Authenticity with Unclonable Optical Tags. In S. D. C. Di Vimercati (Ed.), Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024. Science and Technology Publications, Lda. doi:10.5220/0012746500003767 Peer reviewed |
MUKHERJEE, S., Rohles, B., DISTLER, V., LENZINI, G., & KOENIG, V. (15 September 2023). The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study. Computers and Education, 207, 104925. doi:10.1016/j.compedu.2023.104925 Peer Reviewed verified by ORBi |
CHUAI, Y., ROSSI, A., & LENZINI, G. (2023). Using Emotions and Topics to Understand Online Misinformation. In Web Engineering. ICWE 2023. Lecture Notes in Computer Science, vol 13893. Springer, Cham (pp. 395–400). doi:10.1007/978-3-031-34444-2_34 Peer reviewed |
KOCYIGIT, E., ROSSI, A., & LENZINI, G. (2023). Towards Assessing Features of Dark Patterns in Cookie Consent Processes. In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland. doi:10.1007/978-3-031-31971-6_13 Editorial reviewed |
RAKEEI, M., GIUSTOLISI, R., & LENZINI, G. (2023). Secure Internet Exams Despite Coercion. In J. Garcia-Alfaro (Ed.), Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-031-25734-6_6 Peer reviewed |
CHUAI, Y., TIAN, H., Pröllochs, N., & LENZINI, G. (2023). The Roll-Out of Community Notes Did Not Reduce Engagement With Misinformation on Twitter. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/59462. |
DISTLER, V., Fassl, M., Habib, H., Krombholz, K., LENZINI, G., LALLEMAND, C., KOENIG, V., & Cranor, L. F. (2023). Empirical Research Methods in Usable Privacy and Security. In Human Factors in Privacy Research. Springer International Publishing. doi:10.1007/978-3-031-28643-8_3 Editorial reviewed |
ARENAS CORREA, M. P., Bingol, M. A., DEMIRCI, H., FOTIADIS, G., & LENZINI, G. (06 October 2022). A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption. Lecture Notes in Computer Science, 13503, 23. doi:10.1007/978-3-031-17433-9_18 Peer reviewed |
BOTES, W. M., & LENZINI, G. (10 June 2022). When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers [Paper presentation]. The 1st International Workshop on Ethics in Computer Security (EthiCS 2022) Co-located with the 7th IEEE European Symposium on Security and Privacy, Genoa, Italy. |
DOAN, X. C., Selzer, A., ROSSI, A., BOTES, W. M., & LENZINI, G. (2022). Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent. Web Conference Companion Volume (ACM). doi:10.1145/3487553.3524632 Peer reviewed |
DISTLER, V., Gutfleisch, T., LALLEMAND, C., LENZINI, G., & KOENIG, V. (March 2022). Complex, but in a good way? How to represent encryption to non-experts through text and visuals – Evidence from expert co-creation and a vignette experiment. Computers in Human Behavior Reports, 4. doi:10.1016/j.chbr.2021.100161 Peer reviewed |
ARENAS CORREA, M. P., DEMIRCI, H., & LENZINI, G. (24 February 2022). An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification. Machine Learning and Knowledge Extraction, 4 (1), 222-239. doi:10.3390/make4010010 Peer Reviewed verified by ORBi |
ROSSI, A., Kumari, A., & LENZINI, G. (2022). Unwinding a Legal and Ethical Ariadne’s Thread Out of the Twitter Scraping Maze. In S. Schiffner, S. Ziegler, ... A. Quesada Rodriguez (Eds.), Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) (pp. 179-203). Springer. doi:10.1007/978-3-031-09901-4_10 Peer reviewed |
DEMIRCI, H., & LENZINI, G. (2022). Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption [Paper presentation]. 15th International Joint Conference on Biomedical Engineering Systems and Technologies - Scale-IT-up. doi:10.5220/0011012400003123 |
STOJKOVSKI, B., LENZINI, G., KOENIG, V., & RIVAS, S. (2021). What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. In Annual Computer Security Applications Conference (ACSAC ’21) (pp. 385–398). New York, NY, United States: ACM. doi:10.1145/3485832.3488030 Peer reviewed |
DISTLER, V., Fassl, M., Habib, H., Krombholz, K., LENZINI, G., LALLEMAND, C., Cranor, L. F., & KOENIG, V. (December 2021). A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Transactions on Computer-Human Interaction, 28 (6), 50. doi:10.1145/3469845 Peer Reviewed verified by ORBi |
VAZQUEZ SANDOVAL, I., Atashpendar, A., LENZINI, G., & RYAN, P. Y. A. (2021). PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In M. S. Obaidat & J. Ben-Othman (Eds.), E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (pp. 102-128). Springer. doi:10.1007/978-3-030-90428-9_5 Peer reviewed |
ARENAS CORREA, M. P., DEMIRCI, H., & LENZINI, G. (17 August 2021). Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. Journal of the Association for Computing Machinery, 16, 11. doi:10.1145/3465481.3465766 Peer reviewed |
STOJKOVSKI, B., Abu-Salma, R., Triquet, K., & LENZINI, G. (2021). "Unless One Does the Research, It May Seem as Just a Useless Battery-Consuming App" - Field Notes on COVID-19 Contact Tracing Applications. Digital Threats: Research and Practice. doi:10.1145/3480466 Peer reviewed |
Schwartz, M., GENG, Y., AGHA, H., KIZHAKIDATHAZHATH, R., Liu, D., LENZINI, G., & LAGERWALL, J. (04 June 2021). Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans. Multifunctional Materials, 4 (2), 022002. doi:10.1088/2399-7532/ac0060 Peer reviewed |
LENZINI, G., Srba, Pikuliak, M., & Pecar, S. (2021). Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46821. |
GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (February 2021). Cut-and-Mouse and Ghost Control: Exploiting Antivirus Software with Synthesized Inputs. Digital Threats: Research and Practice, 2 (1). doi:10.1145/3431286 Peer Reviewed verified by ORBi |
STOJKOVSKI, B., LENZINI, G., & KOENIG, V. (2021). "I Personally Relate It to the Traffic Light": A User Study on Security & Privacy Indicators in a Secure Email System Committed to Privacy by Default. In Proceedings of the 36th Annual ACM Symposium on Applied Computing (pp. 1235–1246). New York, NY, USA, Unknown/unspecified: Association for Computing Machinery. doi:10.1145/3412841.3441998 Peer reviewed |
BONGARD-BLANCHY, K., ROSSI, A., RIVAS, S., DOUBLET, S., KOENIG, V., & LENZINI, G. (2021). "I am definitely manipulated, even when I am aware of it. It’s ridiculous!" - Dark Patterns from the End-User Perspective. In Proceedings of ACM DIS Conference on Designing Interactive Systems. New York, United States - New York: ACM. doi:10.1145/3461778.3462086 Peer reviewed |
STOJKOVSKI, B., & LENZINI, G. (2021). A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 324-330). IEEE. doi:10.1109/CSR51186.2021.9527903 Peer reviewed |
POILLOT, E., LENZINI, G., Resta, G., & Zeno-Zencovich, V. (Eds.). (2021). Data protection in the context of covid-19. A short (hi)story of tracing applications. RomaTrE-Press. doi:10.13134/979-12-5977-055-4 |
POILLOT, E., Resta, G., Zeno-Zencovich, V., & LENZINI, G. (2021). Lessons to be learnt from the crisis. The Rise and Fall (and Rise?) of Tracing Application. In E. POILLOT, G. Resta, V. Zeno-Zencovich, ... G. LENZINI, Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (pp. 145-150). RomaTrE-Press. Peer reviewed |
ROSSI, A., & LENZINI, G. (2021). Which Properties has an Icon? A Critical Discussion on Evaluation Methods for Standardised Data Protection Iconography. In Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST). Springer. Peer reviewed |
POILLOT, E., & LENZINI, G. (2021). The French National Framework of Tracing Applications. In E. POILLOT, G. LENZINI, ... G. Resta, Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (pp. 40-57). RomaTrE-Press. Peer reviewed |
DISTLER, V., LENZINI, G., LALLEMAND, C., & KOENIG, V. (2020). The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. New Security Paradigms Workshop. doi:10.1145/3442167.3442173 Peer reviewed |
ROSSI, A., & LENZINI, G. (July 2020). Transparency by Design in Data-Informed Research: a Collection of Information Design Patterns. Computer Law & Security Review, 37 (105402). doi:10.1016/j.clsr.2020.105402 Peer reviewed |
SYMEONIDIS, I., & LENZINI, G. (2020). Systematization of threats and requirements for private messaging with untrusted servers. The case of E-mailing and instant messaging. In International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020. Peer reviewed |
ROSSI, A., & LENZINI, G. (February 2020). Making the Case for Evidence-based Standardization of Data Privacy and Data Protection Visual Indicators. Journal of Open Access to Law, 8 (1). Peer reviewed |
Spagnuelo, D., BARTOLINI, C., & LENZINI, G. (2020). Qualifying and Measuring Transparency: A Medical Data System Case Study. Computers and Security. doi:10.1016/j.cose.2020.101717 Peer Reviewed verified by ORBi |
STOJKOVSKI, B., & LENZINI, G. (2020). Evaluating ambiguity of privacy indicators in a secure email app. In M. Loreti & L. Spalazzi (Eds.), Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (pp. 223--234). CEUR-WS.org. Peer reviewed |
GENÇ, Z. A., & LENZINI, G. (2020). Dual-Use Research In Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (pp. 585-592). Setúbal, Portugal: SciTePress. doi:10.5220/0009000505850592 Peer reviewed |
VAZQUEZ SANDOVAL, I., Atashpendar, A., & LENZINI, G. (2020). Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications. doi:10.5220/0009834001670179 Peer reviewed |
BARTOLINI, C., LENZINI, G., & ROBALDO, L. (December 2019). The DAta Protection REgulation COmpliance Model. IEEE Security and Privacy, 17 (6), 37-45. doi:10.1109/MSEC.2019.2937756 Peer Reviewed verified by ORBi |
LENZINI, G., & Petrocchi, M. (2019). Modelling of Railways Signalling System Requirements by Controlled Natural Languages: A Case Study. In From Software Engineering to Formal Methods and Tools, and Back (pp. 502-518). Springer, Cham. doi:10.1007/978-3-030-30985-5_29 Peer reviewed |
GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7 Peer reviewed |
STOJKOVSKI, B., VAZQUEZ SANDOVAL, I., & LENZINI, G. (2019). Detecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system. In 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops. Peer reviewed |
GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs. In Proceedings of the 35th Annual Computer Security Applications Conference (pp. 456-465). New York, United States: ACM. doi:10.1145/3359789.3359844 Peer reviewed |
VAZQUEZ SANDOVAL, I., & LENZINI, G. (2019). A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. In Emerging Technologies for Authorization and Authentication. Springer. doi:10.1007/978-3-030-39749-4_11 Peer reviewed |
GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). On Deception-Based Protection Against Cryptographic Ransomware. In Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (pp. 219-239). Cham, Switzerland: Springer. doi:10.1007/978-3-030-22038-9_11 Peer reviewed |
GENÇ, Z. A., LENZINI, G., & RYAN, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5 Peer reviewed |
BARTOLINI, C., & LENZINI, G. (2019). Sistemi Medici e Conformità Legale. Rivista Italiana di Medicina Legale: Dottrina, Casistica, Ricerca Sperimentale, Giurisprudenza e Legislazione, XLI (1/2019), 225-242. Peer reviewed |
BARTOLINI, C., LENZINI, G., & Santos, C. (2019). An Agile Approach to Validate a Formal Representation of the GDPR. JSAI International Symposium on Artificial Intelligence, 11717. doi:10.1007/978-3-030-31605-1_13 Peer reviewed |
ROBALDO, L., BARTOLINI, C., LENZINI, G., ROSSI, A., Palmirani, M., & Martoni, M. (2019). Formalizing GDPR provisions in reified I/O logic: the DAPRECO knowledge base. Journal of Logic, Language and Information. doi:10.1007/s10849-019-09309-z Peer reviewed |
GENÇ, Z. A., LENZINI, G., & Sgandurra, D. (2019). Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. In Proceedings of the Third Central European Cybersecurity Conference. New York, United States: ACM. doi:10.1145/3360664.3360673 Peer reviewed |
ROSSI, A., LENZINI, G., KOENIG, V., & BONGARD-BLANCHY, K. (2019). Dark Patterns: Deception or Simply Bad Design? [Poster presentation]. ESORICS. |
BARTOLINI, C., LENZINI, G., & Santos, C. (12 November 2018). An Interdisciplinary Methodology to Validate Formal Representations of Legal Text Applied to the GDPR [Paper presentation]. Twelfth International Workshop on Juris-informatics (JURISIN 2018), Yokohama, Japan. |
VAZQUEZ SANDOVAL, I., LENZINI, G., & STOJKOVSKI, B. (2018). A Protocol to Strengthen Password-Based Authentication. In Emerging Technologies for Authorization and Authentication (pp. 38-46). doi:10.1007/978-3-030-04372-8 Peer reviewed |
VAZQUEZ SANDOVAL, I., & LENZINI, G. (2018). Experience report: How to extract security protocols’ specifications from C libraries. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (pp. 719-724). IEEE. doi:10.1109/COMPSAC.2018.10325 Peer reviewed |
Schwartz, M., LENZINI, G., GENG, Y., ROENNE, P., RYAN, P., & LAGERWALL, J. (2018). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382. doi:10.1002/adma.201707382 Peer reviewed |
GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095 Peer reviewed |
GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11 Peer reviewed |
GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24 Peer reviewed |
GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018. Peer reviewed |
BARTOLINI, C., & LENZINI, G. (25 November 2017). Law and the software development life cycle [Paper presentation]. IALT Annual Conference, Dunboyne, Ireland. |
LENZINI, G., Samir, O., ROENNE, P., RYAN, P., Geng, Y., NOH, J., & LAGERWALL, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. In Proc. of the 9th IEEE Workshop on Information Forensics and Security. Peer reviewed |
PIERINA BRUSTOLIN SPAGNUELO, D., BARTOLINI, C., & LENZINI, G. (2017). Modelling Metrics for Transparency in Medical Systems. In Proceedings of TrustBus 2017. Peer reviewed |
Bella, G., Giustolisi, R., LENZINI, G., & RYAN, P. (01 June 2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307. doi:10.1016/j.cose.2016.12.005 Peer reviewed |
You, I., LENZINI, G., & De Santis, A. (Eds.). (June 2017). Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Systems Journal, 11 (2). doi:10.1109/JSYST.2017.2658258 Peer Reviewed verified by ORBi |
BARTOLINI, C., & LENZINI, G. (2017). Human Rights in the era of Information and Communication Technology. |
Giustolisi, R., IOVINO, V., & LENZINI, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R. Giustolisi, V. IOVINO, ... G. LENZINI, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS. Peer reviewed |
GENÇ, Z. A., LENZINI, G., & RYAN, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press. Peer reviewed |
HUYNEN, J.-L., & LENZINI, G. (2017). From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy. doi:10.5220/0006211302130224 Peer reviewed |
BARTOLINI, C., GIURGIU, A., LENZINI, G., & ROBALDO, L. (2017). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In T. Bosse & B. Bredeweg (Eds.), Communications in Computer and Information Science (pp. 47-62). Springer International Publishing. doi:10.1007/978-3-319-67468-1_4 Peer reviewed |
BARTOLINI, C., LENZINI, G., & ROBALDO, L. (2016). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. In Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC). Peer reviewed |
BARTOLINI, C., GIURGIU, A., LENZINI, G., & ROBALDO, L. (2016). A Framework to Reason about the Legal Compliance of Security Standards. In Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN). Peer reviewed |
PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2016). Transparent Medical Data Systems. Journal of Medical Systems. doi:10.1007/s10916-016-0653-8 Peer Reviewed verified by ORBi |
PIERINA BRUSTOLIN SPAGNUELO, D., BARTOLINI, C., & LENZINI, G. (2016). Metrics for Transparency. In Proceedings of DPM 2016 and QASA 2016. Peer reviewed |
GENG, Y., NOH, J., Drevensek-Olenik, I., Rupp, R., LENZINI, G., & LAGERWALL, J. (27 March 2016). High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication. Scientific Reports, 6 (26840), 1-8. doi:10.1038/srep26840 Peer Reviewed verified by ORBi |
PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2016). Patient-Centred Transparency Requirements for Medical Data Sharing Systems. Proceedings of the 4th World Conference on Information Systems and Technologies. Peer reviewed |
Ferreira, A., & LENZINI, G. (2016). Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. In Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP). Springer. Peer reviewed |
LENZINI, G., MAUW, S., & OUCHANI, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G. Barthe & E. Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag. doi:10.1007/978-3-319-46598-2_12 Peer reviewed |
Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., LENZINI, G., & RYAN, P. (30 December 2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318. doi:10.1007/978-3-319-25915-4_16 Peer reviewed |
Ferreira, A., Huynen, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2015). Do graphical cues effectively inform users? A Socio-Technical Security Study in Accessing Wifi Networks. In Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 323-334). Springer, Cham. Peer reviewed |
Bella, G., & LENZINI, G. (13 July 2015). 2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015 [Paper presentation]. Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy. |
LENZINI, G., MAUW, S., & OUCHANI, S. (2015). Security analysis of socio-technical physical systems. Computers electrical engineering. doi:10.1016/j.compeleceng.2015.02.019 Peer reviewed |
PIERINA BRUSTOLIN SPAGNUELO, D., & LENZINI, G. (2015). Security on medical data sharing (a literature review). Luxembourg, Luxembourg: SNT. https://orbilu.uni.lu/handle/10993/23241 |
Benenson, Z., Bleikertz, S., Foley, S. N., Harpes, C., Kowalski, S., LENZINI, G., Oliveira, D., Parkin, S., Pfleeger, S. L., & Smith, P. (2015). 4.2 Social Dynamics Metrics-Working Group Report. Socio-Technical Security Metrics, 17-19. Peer reviewed |
Bella, G., Curzon, P., & LENZINI, G. (2015). Service security and privacy as a socio-technical problem. Journal of Computer Security, 23 (5), 563-585. doi:10.3233/JCS-150536 Peer Reviewed verified by ORBi |
OUCHANI, S., & LENZINI, G. (2015). Generating attacks in SysML activity diagrams by detecting attack surfaces. Journal of Ambient Intelligence and Humanized Computing, 6 (3), 361-373. doi:10.1007/s12652-015-0269-8 Peer reviewed |
Dreier, J., GIUSTOLISI, R., Kassem, A., Lafourcade, P., & LENZINI, G. (2015). A Framework for Analyzing Verifiability in Traditional and Electronic Exams. In Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Peer reviewed |
Bella, G., GIUSTOLISI, R., LENZINI, G., & RYAN, P. (2015). A Secure Exam Protocol Without Trusted Parties. In ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. Peer reviewed |
Ferreira, A., & LENZINI, G. (2015). An Analysis of Social Engineering Principles in Effective Phishing. In Proc. of the 5th International Workshop on Socio-Technical Security and Trust. CSP. Peer reviewed |
FERREIRA, A., LENZINI, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A. T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer. doi:10.1007/978-3-319-20376-8_4 Peer reviewed |
FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S. Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer. doi:10.1007/978-3-319-24858-5_16 Peer reviewed |
Beneson, Z., LENZINI, G., Oliveira, D., Parkin, S., & Uebelacker, S. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. In Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (pp. 85-99). ACM. doi:10.1145/2841113.2841120 Peer reviewed |
FERREIRA, A., HUYNEN, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334. doi:10.1007/978-3-319-20376-8_29 Peer reviewed |
LENZINI, G., & FERREIRA, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? In Advances in Intelligent Systems and Computing. Springer. doi:10.1007/978-3-319-16486-1_111 Peer reviewed |
Benenson, Z., LENZINI, G., Oliveira, D., Parkin, S., & Uebelacker. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. Proceedings of the New Security Paradigm Workshop. Peer reviewed |
FERREIRA, A., LENZINI, G., Santos-Pereira, C., Augusto, A., & Correia, M. (2014). Envisioning secure and usable access control for patients. In IEEE 3rd International Conference on Serious Games and Applications in Healthcare. Peer reviewed |
GIUSTOLISI, R., LENZINI, G., & RYAN, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science. doi:10.1007/978-3-319-12400-1_5 Peer reviewed |
Dreier, J., GIUSTOLISI, R., Kassem, A., Lafourcade, P., LENZINI, G., & RYAN, P. (2014). Formal Analysis of Electronic Exams. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. doi:10.5220/0005050901010112 Peer reviewed |
Bella, G., GIUSTOLISI, R., & LENZINI, G. (2014). Secure exams despite malicious management. In Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014. doi:10.1109/PST.2014.6890949 Peer reviewed |
Bella, G., Curzon, P., GIUSTOLISI, R., & LENZINI, G. (2014). A Socio-Technical Methodology for the Security and Privacy Analysis of Services. In IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden. doi:10.1109/COMPSACW.2014.69 Peer reviewed |
Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & LENZINI, G. (2014). On the verifiability of (electronic) exams. Technical Report TR-2014-2, Verimag. https://orbilu.uni.lu/handle/10993/25413 |
FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2014). A Conceptual Framework to Study Socio-Technical Security. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_28 Peer reviewed |
FERREIRA, A., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. Lecture Notes in Computer Science. doi:10.1007/978-3-319-07620-1_27 Peer reviewed |
Bella, G., & LENZINI, G. (2014). Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014 [Paper presentation]. 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014, Vienna, Austria. |
CHEN, X., Harpes, C., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2013). DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity. In Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (pp. 1329-1332). ACM. Peer reviewed |
FERREIRA, A., GIUSTOLISI, R., HUYNEN, J.-L., & LENZINI, G. (12 April 2013). On Tools for Socio-Technical Security Analysis [Paper presentation]. Grande Region Security and Reliability Day 2013, Luxembourg, Luxembourg. |
FERREIRA, A., HUYNEN, J.-L., KOENIG, V., LENZINI, G., & RIVAS, S. (2013). Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names. Lecture Notes in Computer Science, 8203, 131-143. doi:10.1007/978-3-642-41098-7_9 Peer reviewed |
FERREIRA, A., GIUSTOLISI, R., HUYNEN, J.-L., KOENIG, V., & LENZINI, G. (2013). Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. IEEE TrustCom. doi:10.1109/TrustCom.2013.190 Peer reviewed |
Bella, G., GIUSTOLISI, R., & LENZINI, G. (2013). Socio-technical formal analysis of TLS certificate validation in modern browsers. In PST (pp. 309-316). doi:10.1109/PST.2013.6596067 Peer reviewed |
GIUSTOLISI, R., LENZINI, G., & Bella, G. (2013). What Security for Electronic Exams? In 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013. doi:10.1109/CRiSIS.2013.6766348 Peer reviewed |
Bella, G., GIUSTOLISI, R., & LENZINI, G. (2013). A Socio-technical Understanding of TLS Certificate Validation. In Trust Management VII (pp. 281-288). Peer reviewed |
Chen, X., Harpes, C., LENZINI, G., MAUW, S., & PANG, J. (2013). Location Assurance and Privacy in GNSS Navigation. ERCIM News, 2013 (94). Peer reviewed |
CHEN, X., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2013). A trust framework for evaluating GNSS signal integrity. In Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (pp. 179-192). IEEE CS. Peer reviewed |
CHEN, X., LENZINI, G., MAUW, S., & PANG, J. (2013). Design and formal analysis of a group signature based electronic toll pricing system. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (1), 55-75. Peer reviewed |
LENZINI, G., & Bella, G. (Eds.). (2012). STAST 2012 Proc. of the 2nd Int. Workshop on Socio-Technical Aspects in Security and Trust. IEEE. |
CHEN, X., LENZINI, G., MAUW, S., & PANG, J. (2012). A group signature based electronic toll pricing system. In Proc. 7th International Conference on Availability, Reliability and Security (pp. 85-93). IEEE Computer Society. doi:10.1109/ARES.2012.67 Peer reviewed |
CHEN, X., Harpes, C., LENZINI, G., Martins, M., MAUW, S., & PANG, J. (2012). Implementation and Validation of a Localisation Assurance Service Provider. In Proc. 6th ESA Workshop on Satellite Navigation Technologies (pp. 1-7). doi:10.1109/NAVITEC.2012.6423097 Peer reviewed |
Sahli, N., LENZINI, G., & Eertink, H. (2012). Trustworthy agent-based recommender system in a mobile P2P environment. Lecture Notes in Computer Science, 6573 LNAI, 59-70. doi:10.1007/978-3-642-31809-2_6 Peer reviewed |
You, I., LENZINI, G., Ogiela, M. R., & Bertino, E. (2012). Defending against insider threats and internal data leakage. Security and Communication Networks, 5 (8), 831-833. doi:10.1002/sec.598 Peer reviewed |
Seigneur, J.-M., LENZINI, G., & Hulsebosch, B. (2011). Adaptive Trust Management. In G. D. M. Serugendo, M.-P. Gleizes, ... A. Karageorgos (Eds.), Self-Organizing Software - From Natural to Artificial Adaptation (pp. 362-383). Springer. Peer reviewed |
Coles-Kemp, L., LENZINI, G., RYAN, P., & Bella, G. (2011). STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust. IEEE. |
LENZINI, G., MAUW, S., & PANG, J. (2011). Selective location blinding using hash chains. In Proc. 19th International Workshop on Security Protocols (pp. 132-141). Springer-Verlag. Peer reviewed |
Buhan, I., LENZINI, G., & RADOMIROVIC, S. (2010). Contextual biometric-based authentication for ubiquitous services. In Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (pp. 680-693). Springer. doi:10.1007/978-3-642-16355-5_51 Peer reviewed |
Hulsebosch, B., LENZINI, G., & Eertink, H. (2009). Quality Authenticator Scheme. (STORK Deliverable D2.3). European Community under the ICT Policy Support Programme. https://orbilu.uni.lu/handle/10993/61564 |
LENZINI, G. (2009). Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. In R. de Lemos, J. C. Fabre, C. Gacek, F. Gadducci, ... M. H. ~ter Beek (Eds.), Architecting Dependable Systems VI 2018-09-18 22:51:18 +0000 2019-06-15 18:11:00 +0200 (pp. 284-307). Springer, Berlin, Heidelberg. Peer reviewed |
Gnesi, S., Latella, D., LENZINI, G., Amendola, A., Abbaneo, C., & Marmo, P. (2000). A Formal Specification and Validation of a Control System in Presence of Byzantine Errors. In Proc.~of the 6th Int. Conference Tool and Algorithms for the Construction and Analysis of Systems (TACAS 2000), in ETAPS 2000 -- March 25 - April 2, 2000, Berlin, Germany (pp. 535-549). Springer. Peer reviewed |
Gnesi, S., Latella, D., & LENZINI, G. (1999). Model Checking of Cryptographic Protocols using HD-Automata. In 4th Italian Workshop on Sistemi Distribuiti: Algoritmi, Architetture e Linguaggi (WSDAAL'99), June 13-15, 1999, Fonte Cerreto (L'Aquila), Italy 2018-09-18 22:51:18 +0000 2019-06-15 18:31:23 +0200 (pp. 74-77). Informal Proceedings. Peer reviewed |
LENZINI, G. (1998). Sequence Comparison: Close and Open problems. In Proc.~of Workshop ``La matematizzazione della Biologia: storia e problematiche attuali'', Arcidosso (GR), Italy (pp. 161-170). Quattro Venti, Urbino (Italy). Peer reviewed |
LENZINI, G., & Marianelli, S. (1997). Algorithms For Phylogeny Reconstruction In a New Mathematical Model. Calcolo, 1-4 (34), 1-24. Peer Reviewed verified by ORBi |
LENZINI, G., Marianelli, S., Luccio, F., Cerrai, P., & Galleni, L. (1996). Automatic Phylogeny Reconstruction Under a New Hypothesis [Paper presentation]. 1st Meeting in Theoretical Biology. |
PIERINA BRUSTOLIN SPAGNUELO, D., Ferreira, A., & LENZINI, G. (n.d.). Accomplishing transparency within the General Data Protection Regulation (Auxiliary material). |