Gabriele Lenzini

Orcid: 0000-0001-8229-3270

Affiliations:
  • Université du Luxembourg


According to our database1, Gabriele Lenzini authored at least 131 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Preserving data privacy in machine learning systems.
Comput. Secur., February, 2024

The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment.
CoRR, 2024

Topic Diversity and Conspiracy Theories Shape Engagement with COVID-19 Misinformation on X/Twitter.
CoRR, 2024

2023
The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study.
Comput. Educ., December, 2023

Political Elites in False Statements on the Internet.
CoRR, 2023

The Roll-Out of Community Notes Did Not Reduce Engagement With Misinformation on Twitter.
CoRR, 2023

Using Emotions and Topics to Understand Online Misinformation.
Proceedings of the Web Engineering - 23rd International Conference, 2023

2022
An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification.
Mach. Learn. Knowl. Extr., 2022

Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Towards Assessing Features of Dark Patterns in Cookie Consent Processes.
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022

Can We Formally Catch Cheating in E-exams?
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Secure Internet Exams Despite Coercion.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption.
Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies, 2022

A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption.
Proceedings of the Progress in Cryptology, 2022

2021
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Trans. Comput. Hum. Interact., 2021

Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans.
CoRR, 2021

Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective.
CoRR, 2021

"I personally relate it to the traffic light": a user study on security & privacy indicators in a secure email system committed to <i>privacy by default</i>.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

A workflow and toolchain proposal for analyzing users' perceptions in cyber threat intelligence sharing platforms.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

"I am Definitely Manipulated, Even When I am Aware of it. It's Ridiculous!" - Dark Patterns from the End-User Perspective.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021

2020
Formalizing GDPR Provisions in Reified I/O Logic: The DAPRECO Knowledge Base.
J. Log. Lang. Inf., 2020

A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
CoRR, 2020

Qualifying and measuring transparency: A medical data system case study.
Comput. Secur., 2020

Transparency by design in data-informed research: A collection of information design patterns.
Comput. Law Secur. Rev., 2020

The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020

The DAPRECO Knowledge Base: Representing the GDPR in LegalRuleML.
Proceedings of The 12th Language Resources and Evaluation Conference, 2020

Evaluating ambiguity of privacy indicators in a secure email app.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.
Proceedings of the E-Business and Telecommunications, 2020

Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
The DAta Protection REgulation COmpliance Model.
IEEE Secur. Priv., 2019

Which Properties Has an Icon? A Critical Discussion on Data Protection Iconography.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

GDPR-Based User Stories in the Access Control Perspective.
Proceedings of the Quality of Information and Communications Technology, 2019

Towards a Lawful Authorized Access: A Preliminary GDPR-based Authorized Access.
Proceedings of the 14th International Conference on Software Technologies, 2019

Transparency Enhancing Tools and the GDPR: Do They Match?
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Accomplishing Transparency within the General Data Protection Regulation.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Detecting Misalignments between System Security and User Perceptions: A Preliminary Socio-technical Analysis of an E2E email Encryption System.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

A Formal Security Analysis of the p=uiv p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

NoCry: No More Secure Encryption Keys for Cryptographic Ransomware.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

On Deception-Based Protection Against Cryptographic Ransomware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Modelling of Railway Signalling System Requirements by Controlled Natural Languages: A Case Study.
Proceedings of the From Software Engineering to Formal Methods and Tools, and Back, 2019

A game of "Cut and Mouse": bypassing antivirus by simulating user inputs.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Invalid certificates in modern browsers: A socio-technical analysis.
J. Comput. Secur., 2018

Next Generation Cryptographic Ransomware.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

A Legal Validation of a Formal Representation of Articles of the GDPR.
Proceedings of the 2nd Workshop on Technologies for Regulatory Compliance co-located with the 31st International Conference on Legal Knowledge and Information Systems (JURIX 2018), 2018

An Agile Approach to Validate a Formal Representation of the GDPR.
Proceedings of the New Frontiers in Artificial Intelligence, 2018

A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

A Protocol to Strengthen Password-Based Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

No Random, No Ransom: A Key to Stop Cryptographic Ransomware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Experience Report: How to Extract Security Protocols' Specifications from C Libraries.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence.
IEEE Syst. J., 2017

Transparent Medical Data Systems.
J. Medical Syst., 2017

Trustworthy exams without trusted parties.
Comput. Secur., 2017

Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Modelling Metrics for Transparency in Medical Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

An Information Security Management for Socio-Technical Analysis of System Security.
Proceedings of the Information Systems Security and Privacy, 2017

From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware.
Proceedings of the Advances in Cybersecurity, 2017

2016
Patient-Centred Transparency Requirements for Medical Data Sharing Systems.
Proceedings of the New Advances in Information Systems and Technologies, 2016

Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Metrics for Transparency.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Towards Legal Compliance by Correlating Standards and Laws with a Semi-automated Methodology.
Proceedings of the BNAIC 2016: Artificial Intelligence, 2016

2015
Service security and privacy as a socio-technical problem.
J. Comput. Secur., 2015

Generating attacks in SysML activity diagrams by detecting attack surfaces.
J. Ambient Intell. Humaniz. Comput., 2015

Security analysis of socio-technical physical systems.
Comput. Electr. Eng., 2015

Can Transparency Enhancing Tools Support Patient's Accessing Electronic Health Records?
Proceedings of the New Contributions in Information Systems and Technologies, 2015

In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

An Analysis of Social Engineering Principles in Effective Phishing.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

A Secure Exam Protocol Without Trusted Parties.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

A Framework for Analyzing Verifiability in Traditional and Electronic Exams.
Proceedings of the Information Security Practice and Experience, 2015

Do Graphical Cues Effectively Inform Users? - A Socio-Technical Security Study in Accessing Wifi Networks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Principles of Persuasion in Social Engineering and Their Use in Phishing.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Remark!: A Secure Protocol for Remote Exams.
Proceedings of the Security Protocols XXII, 2014

Envisioning secure and usable access control for patients.
Proceedings of the 3nd IEEE International Conference on Serious Games and Applications for Health, 2014

Formal Analysis of Electronic Exams.
Proceedings of the SECRYPT 2014, 2014

Secure exams despite malicious management.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Formal Security Analysis of Traditional and Electronic Exams.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

A Conceptual Framework to Study Socio-Technical Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Socio-technical Security Analysis of Wireless Hotspots.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

A Socio-technical Methodology for the Security and Privacy Analysis of Services.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Attacks Generation by Detecting Attack Surfaces.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Location Assurance and Privacy in GNSS Navigation.
ERCIM News, 2013

Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Socio-technical formal analysis of TLS certificate validation in modern browsers.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

A Socio-technical Understanding of TLS Certificate Validation.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

A Trust Framework for Evaluating GNSS Signal Integrity.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

What security for electronic exams?
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Demonstrating a trust framework for evaluating GNSS signal integrity.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Defending against insider threats and internal data leakage.
Secur. Commun. Networks, 2012

Foreword from the Workshop Chairs - STAST 2012.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

A Group Signature Based Electronic Toll Pricing System.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Adaptive Trust Management.
Proceedings of the Self-organising Software - From Natural to Artificial Adaptation, 2011

Selective Location Blinding Using Hash Chains.
Proceedings of the Security Protocols XIX, 2011

2010
Contextual Biometric-Based Authentication for Ubiquitous Services.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

2009
Shall I Trust a Recommendation? Towards an Evaluation of the Trustworthiness of Recommender Sites.
Proceedings of the Advances in Databases and Information Systems, 2009

2008
Design of Architectures for Proximity-aware Services: Experiments in Context-based Authentication with Subjective Logic.
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008

Trust Model for High Quality Recommendation.
Proceedings of the SECRYPT 2008, 2008

A Uniform Approach to Security and Fault-Tolerance Specification and Analysis.
Proceedings of the Architecting Dependable Systems VI, 2008

Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services.
Proceedings of the Architecting Dependable Systems VI, 2008

Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities.
Proceedings of the Trust in Agent Societies, 2008

Trustworthy Agent-Based Recommender System in a Mobile P2P Environment.
Proceedings of the Agents and Peer-to-Peer Computing, 2008

2007
Audit-based compliance control.
Int. J. Inf. Sec., 2007

Context-Based Adaptive and Responsive Authentication.
ERCIM News, 2007

Trust-enhanced Security in Location-based Adaptive Authentication.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

Trust Management Model and Architecture for Context-Aware Service Platforms.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Context Sensitive Adaptive Authentication.
Proceedings of the Smart Sensing and Context, 2007

2006
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols.
J. Autom. Lang. Comb., 2006

Managing Trustworthiness in Component-based Embedded Systems.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems.
Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), 2006

2005
Relating multiset rewriting and process algebras for security protocol analysis.
J. Comput. Secur., 2005

A Formal Security Analysis of an OSA/Parlay Authentication Interface.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2005

2004
Team Automata for Security: - A Survey -.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004

A Logic for Auditing Accountability in Decentralized Systems.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

2003
Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking.
Proceedings of the International Workshop on Software Verification and Validation, 2003

Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.
Proceedings of the Computer Network Security, 2003

On Representing Biological Systems through Multiset Rewriting.
Proceedings of the Computer Aided Systems Theory, 2003

2000
A Formal Specification and Validation of a Critical System in Presence of Byzantine Errors.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 2000

An Automatic SPIN Validation of a Safety Critical Railway Control System.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000


  Loading...