


Остановите войну!
for scientists:


default search action
Gabriele Lenzini
Person information

- affiliation: Université du Luxembourg
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c101]Yuwei Chuai, Arianna Rossi, Gabriele Lenzini:
Using Emotions and Topics to Understand Online Misinformation. ICWE 2023: 395-400 - [e11]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Information Systems Security and Privacy - 7th International Conference, ICISSP 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers. Communications in Computer and Information Science 1851, Springer 2023, ISBN 978-3-031-37806-5 [contents] - [e10]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023. SciTePress 2023, ISBN 978-989-758-624-8 [contents] - [e9]Gabriele Lenzini
, Weizhi Meng
:
Security and Trust Management - 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings. Lecture Notes in Computer Science 13867, Springer 2023, ISBN 978-3-031-29503-4 [contents] - [i11]Yuwei Chuai, Haoye Tian, Nicolas Pröllochs, Gabriele Lenzini:
The Roll-Out of Community Notes Did Not Reduce Engagement With Misinformation on Twitter. CoRR abs/2307.07960 (2023) - 2022
- [j18]Mónica P. Arenas
, Hüseyin Demirci
, Gabriele Lenzini
:
An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification. Mach. Learn. Knowl. Extr. 4(1): 222-239 (2022) - [c100]Mónica P. Arenas
, Muhammed Ali Bingöl
, Hüseyin Demirci
, Georgios Fotiadis
, Gabriele Lenzini
:
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption. AFRICACRYPT 2022: 425-447 - [c99]Hüseyin Demirci, Gabriele Lenzini:
Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption. HEALTHINF 2022: 821-831 - [c98]Mohammadamin Rakeei, Rosario Giustolisi, Gabriele Lenzini:
Secure Internet Exams Despite Coercion. DPM/CBT@ESORICS 2022: 85-100 - [c97]Marietjie Botes, Gabriele Lenzini:
When Cryptographic Ransomware Poses Cyber Threats: Ethical Challenges and Proposed Safeguards for Cybersecurity Researchers. EuroS&P Workshops 2022: 562-568 - [c96]Itzel Vázquez Sandoval, Gabriele Lenzini:
Can We Formally Catch Cheating in E-exams? ICISSP 2022: 648-655 - [c95]Emre Kocyigit
, Arianna Rossi
, Gabriele Lenzini
:
Towards Assessing Features of Dark Patterns in Cookie Consent Processes. Privacy and Identity Management 2022: 165-183 - [c94]Xengie Doan
, Annika Selzer, Arianna Rossi
, Maria Wilhelmina Botes, Gabriele Lenzini:
Context, Prioritization, and Unexpectedness: Factors Influencing User Attitudes About Infographic and Comic Consent. WWW (Companion Volume) 2022: 534-545 - [e8]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022. SCITEPRESS 2022, ISBN 978-989-758-553-1 [contents] - [i10]Mohammadamin Rakeei, Rosario Giustolisi, Gabriele Lenzini:
Secure Internet Exams Despite Coercion. CoRR abs/2207.12796 (2022) - 2021
- [j17]Verena Distler
, Matthias Fassl
, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand
, Lorrie Faith Cranor
, Vincent Koenig:
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Trans. Comput. Hum. Interact. 28(6): 43:1-43:50 (2021) - [c93]Kerstin Bongard-Blanchy, Arianna Rossi
, Salvador Rivas, Sophie Doublet, Vincent Koenig, Gabriele Lenzini:
"I am Definitely Manipulated, Even When I am Aware of it. It's Ridiculous!" - Dark Patterns from the End-User Perspective. Conference on Designing Interactive Systems 2021: 763-776 - [c92]Mónica P. Arenas
, Hüseyin Demirci, Gabriele Lenzini:
Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. ARES 2021: 2:1-2:11 - [c91]Borce Stojkovski
, Gabriele Lenzini, Vincent Koenig, Salvador Rivas:
What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. ACSAC 2021: 385-398 - [c90]Borce Stojkovski
, Gabriele Lenzini:
A workflow and toolchain proposal for analyzing users' perceptions in cyber threat intelligence sharing platforms. CSR 2021: 324-330 - [c89]Borce Stojkovski
, Gabriele Lenzini, Vincent Koenig:
"I personally relate it to the traffic light": a user study on security & privacy indicators in a secure email system committed to privacy by default. SAC 2021: 1235-1246 - [e7]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021. SCITEPRESS 2021, ISBN 978-989-758-491-6 [contents] - [i9]Ivan Srba, Gabriele Lenzini
, Matús Pikuliak, Samuel Pecar:
Addressing Hate Speech with Data Science: An Overview from Computer Science Perspective. CoRR abs/2103.10489 (2021) - [i8]Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, Gabriele Lenzini:
I am Definitely Manipulated, Even When I am Aware of it. It s Ridiculous! - Dark Patterns from the End-User Perspective. CoRR abs/2104.12653 (2021) - [i7]Mathew Schwartz, Yong Geng, Hakam Agha, Rijeesh Kizhakidathazhath, Danqing Liu, Gabriele Lenzini, Jan P. F. Lagerwall:
Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans. CoRR abs/2105.05800 (2021) - [i6]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: authentication and key management in decentralized secure email and messaging via PAKE. CoRR abs/2107.06090 (2021) - 2020
- [j16]Arianna Rossi
, Gabriele Lenzini
:
Transparency by design in data-informed research: A collection of information design patterns. Comput. Law Secur. Rev. 37: 105402 (2020) - [j15]Dayana Spagnuelo
, Cesare Bartolini
, Gabriele Lenzini
:
Qualifying and measuring transparency: A medical data system case study. Comput. Secur. 91: 101717 (2020) - [j14]Livio Robaldo
, Cesare Bartolini, Monica Palmirani
, Arianna Rossi
, Michele Martoni, Gabriele Lenzini:
Formalizing GDPR Provisions in Reified I/O Logic: The DAPRECO Knowledge Base. J. Log. Lang. Inf. 29(4): 401-449 (2020) - [c88]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. ICETE (Selected Papers) 2020: 102-128 - [c87]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini:
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets. ICETE (2) 2020: 167-179 - [c86]Ziya Alper Genç, Gabriele Lenzini:
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence. ICISSP 2020: 585-592 - [c85]Iraklis Symeonidis, Gabriele Lenzini:
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging. ICISSP 2020: 593-602 - [c84]Borce Stojkovski
, Gabriele Lenzini:
Evaluating ambiguity of privacy indicators in a secure email app. ITASEC 2020: 223-234 - [c83]Livio Robaldo, Cesare Bartolini, Gabriele Lenzini:
The DAPRECO Knowledge Base: Representing the GDPR in LegalRuleML. LREC 2020: 5688-5697 - [c82]Verena Distler
, Gabriele Lenzini, Carine Lallemand
, Vincent Koenig:
The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. NSPW 2020: 45-58 - [i5]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini:
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets. CoRR abs/2005.10787 (2020) - [i4]Itzel Vázquez Sandoval, Gabriele Lenzini:
A Formal Security Analysis of the pEp Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. CoRR abs/2008.12930 (2020)
2010 – 2019
- 2019
- [j13]Cesare Bartolini
, Gabriele Lenzini
, Livio Robaldo
:
The DAta Protection REgulation COmpliance Model. IEEE Secur. Priv. 17(6): 37-45 (2019) - [c81]Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
A game of "Cut and Mouse": bypassing antivirus by simulating user inputs. ACSAC 2019: 456-465 - [c80]Gabriele Lenzini, Marinella Petrocchi:
Modelling of Railway Signalling System Requirements by Controlled Natural Languages: A Case Study. From Software Engineering to Formal Methods and Tools, and Back 2019: 502-518 - [c79]Ziya Alper Genç, Gabriele Lenzini
, Daniele Sgandurra:
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. CECC 2019: 9:1-9:4 - [c78]Ziya Alper Genç
, Gabriele Lenzini
, Daniele Sgandurra
:
On Deception-Based Protection Against Cryptographic Ransomware. DIMVA 2019: 219-239 - [c77]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. ETAA@ESORICS 2019: 69-85 - [c76]Itzel Vázquez Sandoval, Gabriele Lenzini
:
A Formal Security Analysis of the p=uiv p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. ETAA@ESORICS 2019: 171-187 - [c75]Borce Stojkovski
, Itzel Vázquez Sandoval, Gabriele Lenzini:
Detecting Misalignments between System Security and User Perceptions: A Preliminary Socio-technical Analysis of an E2E email Encryption System. EuroS&P Workshops 2019: 172-181 - [c74]Dayana Spagnuelo
, Ana Ferreira, Gabriele Lenzini:
Accomplishing Transparency within the General Data Protection Regulation. ICISSP 2019: 114-125 - [c73]Dayana Spagnuelo
, Ana Ferreira, Gabriele Lenzini:
Transparency Enhancing Tools and the GDPR: Do They Match? ICISSP (Revised Selected Papers) 2019: 162-185 - [c72]Cesare Bartolini, Said Daoudagh
, Gabriele Lenzini
, Eda Marchetti:
Towards a Lawful Authorized Access: A Preliminary GDPR-based Authorized Access. ICSOFT 2019: 331-338 - [c71]Cesare Bartolini
, Said Daoudagh
, Gabriele Lenzini
, Eda Marchetti
:
GDPR-Based User Stories in the Access Control Perspective. QUATIC 2019: 3-17 - [c70]Arianna Rossi
, Gabriele Lenzini:
Which Properties Has an Icon? A Critical Discussion on Data Protection Iconography. STAST 2019: 211-229 - 2018
- [j12]Rosario Giustolisi, Giampaolo Bella
, Gabriele Lenzini:
Invalid certificates in modern browsers: A socio-technical analysis. J. Comput. Secur. 26(4): 509-541 (2018) - [c69]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan
:
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. CECC 2018: 7:1-7:6 - [c68]Itzel Vázquez Sandoval, Gabriele Lenzini:
Experience Report: How to Extract Security Protocols' Specifications from C Libraries. COMPSAC (2) 2018: 719-724 - [c67]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
:
No Random, No Ransom: A Key to Stop Cryptographic Ransomware. DIMVA 2018: 234-255 - [c66]Itzel Vázquez Sandoval, Borce Stojkovski
, Gabriele Lenzini:
A Protocol to Strengthen Password-Based Authentication. ETAA@ESORICS 2018: 38-46 - [c65]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan, Itzel Vázquez Sandoval:
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. ICISSP 2018: 83-95 - [c64]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
, Itzel Vázquez Sandoval:
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. ICISSP (Revised Selected Papers) 2018: 125-151 - [c63]Cesare Bartolini, Gabriele Lenzini, Cristiana Santos:
An Agile Approach to Validate a Formal Representation of the GDPR. JSAI-isAI Workshops 2018: 160-176 - [c62]Cesare Bartolini, Gabriele Lenzini, Cristiana Santos:
A Legal Validation of a Formal Representation of Articles of the GDPR. TERECOM@JURIX 2018: 111-124 - [c61]Ziya Alper Genç
, Gabriele Lenzini
, Peter Y. A. Ryan
:
Next Generation Cryptographic Ransomware. NordSec 2018: 385-401 - [e6]Giampaolo Bella, Gabriele Lenzini, Theo Tryfonas, Debi Ashenden:
STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018. ACM 2018, ISBN 978-1-4503-7285-5 [contents] - 2017
- [j11]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan
:
Trustworthy exams without trusted parties. Comput. Secur. 67: 291-307 (2017) - [j10]Dayana Spagnuelo
, Gabriele Lenzini
:
Transparent Medical Data Systems. J. Medical Syst. 41(1): 8:1-8:12 (2017) - [j9]Ilsun You, Gabriele Lenzini, Alfredo De Santis
:
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Syst. J. 11(2): 371-372 (2017) - [c60]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan:
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. CECC 2017: 89-102 - [c59]Jean-Louis Huynen, Gabriele Lenzini:
From Situation Awareness to Action: An Information Security Management Toolkit for Socio-technical Security Retrospective and Prospective Analysis. ICISSP 2017: 213-224 - [c58]Jean-Louis Huynen, Gabriele Lenzini:
An Information Security Management for Socio-Technical Analysis of System Security. ICISSP (Revised Selected Papers) 2017: 222-251 - [c57]Rosario Giustolisi, Vincenzo Iovino, Gabriele Lenzini:
Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol. SECRYPT 2017: 139-150 - [c56]Dayana Spagnuelo
, Cesare Bartolini, Gabriele Lenzini
:
Modelling Metrics for Transparency in Medical Systems. TrustBus 2017: 81-95 - [c55]Gabriele Lenzini
, Samir Ouchani
, Peter B. Rønne
, Peter Y. A. Ryan
, Yong Geng, Jan Lagerwall, JungHyun Noh:
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals. WIFS 2017: 1-6 - [e5]Giampaolo Bella, Gabriele Lenzini:
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2017, Orlando, FL, USA, December 5, 2017. ACM 2017, ISBN 978-1-4503-6357-0 [contents] - 2016
- [c54]Cesare Bartolini, Andra Giurgiu, Gabriele Lenzini, Livio Robaldo
:
Towards Legal Compliance by Correlating Standards and Laws with a Semi-automated Methodology. BNCAI 2016: 47-62 - [c53]Dayana Spagnuelo
, Cesare Bartolini, Gabriele Lenzini
:
Metrics for Transparency. DPM/QASA@ESORICS 2016: 3-18 - [c52]Ana Ferreira, Gabriele Lenzini
:
Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. ICISSP 2016: 63-73 - [c51]Gabriele Lenzini, Sjouke Mauw, Samir Ouchani
:
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. STM 2016: 170-178 - [c50]Dayana Spagnuelo
, Gabriele Lenzini
:
Patient-Centred Transparency Requirements for Medical Data Sharing Systems. WorldCIST (1) 2016: 1073-1083 - [e4]Gabriele Lenzini, Giampaolo Bella, Zinaida Benenson, Carrie E. Gates:
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2016, Los Angeles, CA, USA, December 5, 2016. ACM 2016, ISBN 978-1-4503-4826-3 [contents] - 2015
- [j8]Gabriele Lenzini, Sjouke Mauw
, Samir Ouchani
:
Security analysis of socio-technical physical systems. Comput. Electr. Eng. 47: 258-274 (2015) - [j7]Samir Ouchani
, Gabriele Lenzini:
Generating attacks in SysML activity diagrams by detecting attack surfaces. J. Ambient Intell. Humaniz. Comput. 6(3): 361-373 (2015) - [j6]Giampaolo Bella
, Paul Curzon
, Gabriele Lenzini
:
Service security and privacy as a socio-technical problem. J. Comput. Secur. 23(5): 563-585 (2015) - [c49]Ana Ferreira
, Lynne M. Coventry, Gabriele Lenzini:
Principles of Persuasion in Social Engineering and Their Use in Phishing. HCI (22) 2015: 36-47 - [c48]Ana Ferreira
, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas:
Do Graphical Cues Effectively Inform Users? - A Socio-Technical Security Study in Accessing Wifi Networks. HCI (22) 2015: 323-334 - [c47]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini:
A Framework for Analyzing Verifiability in Traditional and Electronic Exams. ISPEC 2015: 514-529 - [c46]Zinaida Benenson, Gabriele Lenzini, Daniela Oliveira, Simon Parkin, Sven Uebelacker
:
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security. NSPW 2015: 85-99 - [c45]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
A Secure Exam Protocol Without Trusted Parties. SEC 2015: 495-509 - [c44]Ana Ferreira
, Gabriele Lenzini:
An Analysis of Social Engineering Principles in Effective Phishing. STAST 2015: 9-16 - [c43]Ana Ferreira
, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security. STM 2015: 255-264 - [c42]Ana Ferreira
, Gabriele Lenzini:
Can Transparency Enhancing Tools Support Patient's Accessing Electronic Health Records? WorldCIST (1) 2015: 1121-1132 - [e3]Giampaolo Bella, Gabriele Lenzini:
2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0178-1 [contents] - 2014
- [c41]Samir Ouchani
, Gabriele Lenzini:
Attacks Generation by Detecting Attack Surfaces. ANT/SEIT 2014: 529-536 - [c40]Giampaolo Bella
, Paul Curzon
, Rosario Giustolisi, Gabriele Lenzini
:
A Socio-technical Methodology for the Security and Privacy Analysis of Services. COMPSAC Workshops 2014: 401-406 - [c39]Ana Ferreira
, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
Socio-technical Security Analysis of Wireless Hotspots. HCI (24) 2014: 306-317 - [c38]Ana Ferreira
, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
A Conceptual Framework to Study Socio-Technical Security. HCI (24) 2014: 318-329 - [c37]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini, Peter Y. A. Ryan
:
Formal Security Analysis of Traditional and Electronic Exams. ICETE (Selected Papers) 2014: 294-318 - [c36]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini:
Secure exams despite malicious management. PST 2014: 274-281 - [c35]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. SECRYPT 2014: 101-112 - [c34]Ana Ferreira
, Gabriele Lenzini, Cátia Santos-Pereira
, Alexandre B. Augusto, Manuel Eduardo Correia
:
Envisioning secure and usable access control for patients. SeGAH 2014: 1-8 - [c33]Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
Remark!: A Secure Protocol for Remote Exams. Security Protocols Workshop 2014: 38-48 - [e2]Giampaolo Bella, Gabriele Lenzini:
2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7901-1 [contents] - 2013
- [j5]Xihui Chen
, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 55-75 (2013) - [c32]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw
, Jun Pang:
Demonstrating a trust framework for evaluating GNSS signal integrity. CCS 2013: 1329-1332 - [c31]Rosario Giustolisi, Gabriele Lenzini, Giampaolo Bella
:
What security for electronic exams? CRiSIS 2013: 1-5 - [c30]Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw
, Jun Pang:
A Trust Framework for Evaluating GNSS Signal Integrity. CSF 2013: 179-192 - [c29]Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
A Socio-technical Understanding of TLS Certificate Validation. IFIPTM 2013: 281-288 - [c28]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini
:
Socio-technical formal analysis of TLS certificate validation in modern browsers. PST 2013: 309-316 - [c27]Ana Ferreira
, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas:
Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names. STM 2013: 131-143 - [c26]Ana Ferreira
, Rosario Giustolisi, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini
:
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates. TrustCom/ISPA/IUCC 2013: 1553-1558 - [i3]Xihui Chen, Carlo Harpes, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Location Assurance and Privacy in GNSS Navigation. ERCIM News 2013(94) (2013) - 2012
- [j4]Ilsun You, Gabriele Lenzini, Marek R. Ogiela
, Elisa Bertino:
Defending against insider threats and internal data leakage. Secur. Commun. Networks 5(8): 831-833 (2012) - [c25]Xihui Chen, Gabriele Lenzini, Sjouke Mauw
, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. ARES 2012: 85-93 - [c24]Giampaolo Bella
, Gabriele Lenzini:
Foreword from the Workshop Chairs - STAST 2012. STAST 2012 - 2011
- [c23]Gabriele Lenzini, Sjouke Mauw
, Jun Pang:
Selective Location Blinding Using Hash Chains. Security Protocols Workshop 2011: 132-141 - [p1]Jean-Marc Seigneur
, Gabriele Lenzini, Bob Hulsebosch:
Adaptive Trust Management. Self-organising Software 2011: 379-403 - [i2]Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. CoRR abs/1108.0574 (2011) - 2010