Gabriele Lenzini
Gabriele Lenzini
Interdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of Luxembourg
Verified email at
Cited by
Cited by
High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication
Y Geng, JH Noh, I Drevensek-Olenik, R Rupp, G Lenzini, JPF Lagerwall
Scientific reports 6 (1), 1-9, 2016
Audit-based compliance control
JG Cederquist, R Corin, MAC Dekker, S Etalle, JI den Hartog, G Lenzini
International Journal of Information Security 6, 133-151, 2007
Principles of persuasion in social engineering and their use in phishing
A Ferreira, L Coventry, G Lenzini
Human Aspects of Information Security, Privacy, and Trust: Thirdá…, 2015
A Logic for Auditing Accountability in Decentralized Systems.
R Corin, S Etalle, JI Den Hartog, G Lenzini, I Staicu
Formal Aspects in Security and Trust, 187-201, 2004
Cholesteric liquid crystal shells as enabling material for information‐rich design and architecture
M Schwartz, G Lenzini, Y Geng, PB R°nne, PYA Ryan, JPF Lagerwall
Advanced Materials 30 (30), 1707382, 2018
Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems.
S Toivonen, G Lenzini, I Uusitalo
MTW 190, 2006
” I am Definitely Manipulated, Even When I am Aware of it. It’s Ridiculous!”-Dark Patterns from the End-User Perspective
K Bongard-Blanchy, A Rossi, S Rivas, S Doublet, V Koenig, G Lenzini
Designing Interactive Systems Conference 2021, 763-776, 2021
An analysis of social engineering principles in effective phishing
A Ferreira, G Lenzini
2015 Workshop on Socio-Technical Aspects in Security and Trust, 9-16, 2015
Context sensitive adaptive authentication
RJ Hulsebosch, MS Bargh, G Lenzini, PWG Ebben, SM Iacob
Smart Sensing and Context: Second European Conference, EuroSSC 2007, Kendalá…, 2007
An automatic SPIN validation of a safety critical railway control system
S Gnesi, G Lenzini, D Latella, C Abbaneo, A Amendola, P Marmo
Proceeding International Conference on Dependable Systems and Networks. DSNá…, 2000
A group signature based electronic toll pricing system
X Chen, G Lenzini, S Mauw, J Pang
2012 Seventh International Conference on Availability, Reliability andá…, 2012
Trust management model and architecture for context-aware service platforms
R Neisse, M Wegdam, M Van Sinderen, G Lenzini
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADAá…, 2007
Trust-enhanced security in location-based adaptive authentication
G Lenzini, MS Bargh, B Hulsebosch
Electronic Notes in Theoretical Computer Science 197 (2), 105-119, 2008
No random, no ransom: a key to stop cryptographic ransomware
ZA Genš, G Lenzini, PYA Ryan
Detection of Intrusions and Malware, and Vulnerability Assessment: 15thá…, 2018
Managing trustworthiness in component-based embedded systems
G Lenzini, A Tokmakoff, J Muskens
Electronic Notes in Theoretical Computer Science 179, 143-155, 2007
Formalizing GDPR provisions in reified I/O logic: the DAPRECO knowledge base
L Robaldo, C Bartolini, M Palmirani, A Rossi, M Martoni, G Lenzini
Journal of Logic, Language and Information 29, 401-449, 2020
GDPR-based user stories in the access control perspective
C Bartolini, S Daoudagh, G Lenzini, E Marchetti
Quality of Information and Communications Technology: 12th Internationalá…, 2019
Towards legal compliance by correlating standards and laws with a semi-automated methodology
C Bartolini, A Giurgiu, G Lenzini, L Robaldo
BNAIC 2016: Artificial Intelligence: 28th Benelux Conference on Artificialá…, 2017
On representing biological systems through multiset rewriting
S Bistarelli, I Cervesato, G Lenzini, R Marangoni, F Martinelli
Computer Aided Systems Theory-EUROCAST 2003: 9th International Workshop oná…, 2003
Relating multiset rewriting and process algebras for security protocol analysis
S Bistarelli, I Cervesato, G Lenzini, F Martinelli
Journal of Computer Security 13 (1), 3-47, 2005
The system can't perform the operation now. Try again later.
Articles 1–20