Gabriele Lenzini
Orcid: 0000-0001-8229-3270Affiliations:
- Université du Luxembourg
According to our database1,
Gabriele Lenzini
authored at least 140 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on wwwen.uni.lu
-
on wwwde.uni.lu
On csauthors.net:
Bibliography
2025
Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols.
Comput. Secur., 2025
2024
A systematic literature review on the impact of AI models on the security of code generation.
Frontiers Big Data, 2024
Community Fact-Checks Trigger Moral Outrage in Replies to Misleading Posts on Social Media.
CoRR, 2024
Community-based fact-checking reduces the spread of misleading posts on social media.
CoRR, 2024
Balancing The Perception of Cheating Detection, Privacy and Fairness: A Mixed-Methods Study of Visual Data Obfuscation in Remote Proctoring.
CoRR, 2024
Topic Diversity and Conspiracy Theories Shape Engagement with COVID-19 Misinformation on X/Twitter.
CoRR, 2024
What Motivates and Discourages Employees in Phishing Interventions: An Exploration of Expectancy-Value Theory.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. REoCAS Colloquium in Honor of Rocco De Nicola, 2024
The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
"Who Knows? Maybe it Really Works": Analysing Users' Perceptions of Health Misinformation on Social Media.
Proceedings of the Designing Interactive Systems Conference, 2024
2023
The effects of privacy-non-invasive interventions on cheating prevention and user experience in unproctored online assessments: An empirical study.
Comput. Educ., December, 2023
The Roll-Out of Community Notes Did Not Reduce Engagement With Misinformation on Twitter.
CoRR, 2023
Proceedings of the Web Engineering - 23rd International Conference, 2023
2022
An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification.
Mach. Learn. Knowl. Extr., 2022
Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies, 2022
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption.
Proceedings of the Progress in Cryptology, 2022
2021
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Trans. Comput. Hum. Interact., 2021
Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans.
CoRR, 2021
Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective.
CoRR, 2021
"I personally relate it to the traffic light": a user study on security & privacy indicators in a secure email system committed to <i>privacy by default</i>.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
A workflow and toolchain proposal for analyzing users' perceptions in cyber threat intelligence sharing platforms.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
"I am Definitely Manipulated, Even When I am Aware of it. It's Ridiculous!" - Dark Patterns from the End-User Perspective.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021
2020
J. Log. Lang. Inf., 2020
A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
CoRR, 2020
Comput. Secur., 2020
Transparency by design in data-informed research: A collection of information design patterns.
Comput. Law Secur. Rev., 2020
The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020
Proceedings of The 12th Language Resources and Evaluation Conference, 2020
Proceedings of the Fourth Italian Conference on Cyber Security, 2020
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.
Proceedings of the E-Business and Telecommunications, 2020
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019
Proceedings of the Quality of Information and Communications Technology, 2019
Proceedings of the 14th International Conference on Software Technologies, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Detecting Misalignments between System Security and User Perceptions: A Preliminary Socio-technical Analysis of an E2E email Encryption System.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
A Formal Security Analysis of the p=uiv p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Modelling of Railway Signalling System Requirements by Controlled Natural Languages: A Case Study.
Proceedings of the From Software Engineering to Formal Methods and Tools, and Back, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
J. Comput. Secur., 2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Proceedings of the 2nd Workshop on Technologies for Regulatory Compliance co-located with the 31st International Conference on Legal Knowledge and Information Systems (JURIX 2018), 2018
Proceedings of the New Frontiers in Artificial Intelligence, 2018
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Experience Report: How to Extract Security Protocols' Specifications from C Libraries.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the Central European Cybersecurity Conference 2018, 2018
2017
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence.
IEEE Syst. J., 2017
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Information Systems Security and Privacy, 2017
From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Advances in Cybersecurity, 2017
2016
Proceedings of the New Advances in Information Systems and Technologies, 2016
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Data Privacy Management and Security Assurance, 2016
Towards Legal Compliance by Correlating Standards and Laws with a Semi-automated Methodology.
Proceedings of the BNAIC 2016: Artificial Intelligence, 2016
2015
J. Ambient Intell. Humaniz. Comput., 2015
Can Transparency Enhancing Tools Support Patient's Accessing Electronic Health Records?
Proceedings of the New Contributions in Information Systems and Technologies, 2015
In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Proceedings of the Information Security Practice and Experience, 2015
Do Graphical Cues Effectively Inform Users? - A Socio-Technical Security Study in Accessing Wifi Networks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 3nd IEEE International Conference on Serious Games and Applications for Health, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Proceedings of the 5th International Conference on Ambient Systems, 2014
2013
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Trust Management - 9th International Workshop, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Secur. Commun. Networks, 2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Self-organising Software - From Natural to Artificial Adaptation, 2011
Proceedings of the Security Protocols XIX, 2011
2010
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010
2009
Shall I Trust a Recommendation? Towards an Evaluation of the Trustworthiness of Recommender Sites.
Proceedings of the Advances in Databases and Information Systems, 2009
2008
Design of Architectures for Proximity-aware Services: Experiments in Context-based Authentication with Subjective Logic.
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008
Trust Model for High Quality Recommendation.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Architecting Dependable Systems VI, 2008
Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services.
Proceedings of the Architecting Dependable Systems VI, 2008
Proceedings of the Trust in Agent Societies, 2008
Proceedings of the Agents and Peer-to-Peer Computing, 2008
2007
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Smart Sensing and Context, 2007
2006
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols.
J. Autom. Lang. Comb., 2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006
Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), 2006
2005
J. Comput. Secur., 2005
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2005
2004
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
2003
Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking.
Proceedings of the International Workshop on Software Verification and Validation, 2003
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer Aided Systems Theory, 2003
2000
A Formal Specification and Validation of a Critical System in Presence of Byzantine Errors.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000