Prof. Dr. Gabriele Lenzini
![]() |
|
||||
Faculté ou Centre | Interdisciplinary Centre for Security, Reliability and Trust | ||||
Department | IRiSC | ||||
Adresse postale |
Université du Luxembourg Maison du Nombre 6, Avenue de la Fonte L-4364 Esch-sur-Alzette |
||||
Bureau sur le campus | MNO, E02 0215-100 | ||||
![]() |
|||||
Téléphone | (+352) 46 66 44 5778 | ||||
Prof. Dr. Gabriele Lenzini has decennial expertise in the design of security and privacy for socio-technical systems, studying how security and privacy can be achieved beyond the technical dimension and when systems are deployed in an environment where human factors, user experience, and legal compliance also contribute to the system’s security and privacy.
He has a PhD, in Computer Science (2005, University of Twente, The Netherlands) and two MSc, respectively in Computer Science and in Information Technologies (University of Pisa, Italy).
He has worked at the University of Pisa and at the Italian National Council of Research (CNR), in Italy, and at the University of Twente, and at Telematica Institute, in the Netherlands. He participated in the development and execution of numerous national and international projects, most of them with a strong industrial participation.
In February 2010 he joined the SnT. He is now Head of the IRiSC research group (Interdisciplinary Research in Socio-Technical Cybersecurity).
He works on electronic voting security, and on location and privacy assurance, and in socio-technical security: he is chair of one of the few workshops in this area (www.stast.uni.lu)
Last updated on: lundi 21 septembre 2020

2022

; ; ; ;
in Lecture Notes in Computer Science (2022, October 06), 13503

; ;
in Machine Learning and Knowledge Extraction (2022), 4(1), 222-239

;
Scientific Conference (2022, June 10)

;
Scientific Conference (2022)

; ; ; ;
in Computers in Human Behavior Reports (2022), 4

; ; ; ;
in Web Conference Companion Volume (ACM) (2022, April 26)

; ;
in Schiffner, Stefan; Ziegler, Sebastien; Quesada Rodriguez, Adrian (Eds.) Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT) (2022)
2021

; ;
in Journal of the Association for Computing Machinery (2021, August 17), 16

; ; ; ; ;
in Proceedings of ACM DIS Conference on Designing Interactive Systems (2021)

; ; ; ; ; ; ;
in ACM Transactions on Computer-Human Interaction (2021), 28(6), 50

; ;
in Digital Threats: Research and Practice (2021), 2(1),

; ; ;
E-print/Working paper (2021)

;
in Poillot, Elise; Lenzini, Gabriele; Resta, Giorgio (Eds.) Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (2021)

; ; ;
Book published by RomaTrE-Press (2021)

; ; ;
in Poillot, Elise; Resta, Giorgio; Zeno-Zencovich, Vincenzo; Lenzini, Gabriele (Eds.) Data Protection in the Context of Covid-19. A Short (Hi)story of Tracing Applications (2021)

;
in Proceedings of the 8th Workshop on Socio-Technical Aspects in Security and Trust (STAST) (2021)

; ; ; ; ; ;
in Multifunctional Materials (2021), 4(2), 022002

; ; ;
in Digital Threats: Research and Practice (2021)

;
in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021)

; ;
in Proceedings of the 36th Annual ACM Symposium on Applied Computing (2021)

; ; ;
in Annual Computer Security Applications Conference (ACSAC ’21) (2021, December)

; ; ;
in Obaidat, Mohammad S.; Ben-Othman, Jalel (Eds.) E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers. (2021, October)
2020

; ; ;
in New Security Paradigms Workshop (2020, October 26)

;
in Proceedings of the 6th International Conference on Information Systems Security and Privacy (2020)

;
in Computer Law & Security Review (2020), 37(105402),

;
in Journal of Open Access to Law (2020), 8(1),

; ;
in Computers and Security (2020)

;
in Loreti, Michele; Spalazzi, Luca (Eds.) Proceedings of the Fourth Italian Conference on Cyber Security, Ancona Italy, February 4th to 7th, 2020 (2020)

;
in International Conference on Information Systems Security and Privacy, Malta 25-27 February 2020 (2020, February)

; ;
in Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (2020)
2019

;
in Rivista Italiana di Medicina Legale: Dottrina, Casistica, Ricerca Sperimentale, Giurisprudenza e Legislazione (2019), XLI(1/2019), 225-242

; ;
in IEEE Security and Privacy (2019), 17(6), 37-45

; ;
in JSAI International Symposium on Artificial Intelligence (2019), 11717

; ;
in Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (2019)

; ; ;
in Information Systems Security and Privacy (2019, July)

; ;
in Proceedings of the 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (2019)

; ;
in Proceedings of the Third Central European Cybersecurity Conference (2019)

; ;
in Proceedings of the 35th Annual Computer Security Applications Conference (2019)

;
in From Software Engineering to Formal Methods and Tools, and Back (2019)

; ; ; ; ;
in Journal of Logic, Language and Information (2019)

; ;
in 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops (2019)

;
in Emerging Technologies for Authorization and Authentication (2019)
2018

; ;
Scientific Conference (2018, November 12)

; ;
in Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (2018)

; ;
in Advances in Cybersecurity 2018 (2018)

; ; ;
in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

; ; ; ; ;
in Advanced Materials (2018)

;
in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (2018, June)

; ;
in Emerging Technologies for Authorization and Authentication (2018, November)
2017

; ; ;
in Bosse, Tibor; Bredeweg, Bert (Eds.) Communications in Computer and Information Science (2017)

; ;
in Advances in Cybersecurity 2017 (2017)

; ;
in Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele (Eds.) Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol (2017)

;
in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

; ; ; ; ; ;
in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)

; ;
in Proceedings of TrustBus 2017 (2017, July)

; ;
in IEEE Systems Journal (2017), 11(2),
2016

; ; ;
in Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN) (2016, November)

; ;
in Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC) (2016, November)

;
in Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP) (2016)

; ; ; ; ;
in Scientific Reports (2016), 6(26840), 1-8

; ;
in Barthe, Gilles; Markatos, Evangelos (Eds.) Security and Trust Management - STM 2016 (2016)

;
in Proceedings of the 4th World Conference on Information Systems and Technologies (2016)
2015

; ;
in JOURNAL OF COMPUTER SECURITY (2015), 23(5), 563-585

; ; ;
in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

;
Scientific Conference (2015, July 13)

; ; ; ; ; ; ; ; ; ;
in Socio-Technical Security Metrics (2015)

; ; ; ;
in Proceedings of the New Security Paradigm Workshop (2015)

; ; ; ;
in Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (2015)

; ; ; ;
in Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 (2015)

; ; ; ; ;
in Communications in Computer and Information Science (2015), 554

; ; ;
in Foresti, Sara (Ed.) Security and Trust Management (2015)

; ; ; ;
in Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015, July 21)

; ; ; ;
in Lecture Notes in Computer Science (2015), 9190

;
in Proc. of the 5th International Workshop on Socio-Technical Security and Trust (2015)

; ;
in T. Tryfonas, I. Askoxylakis (Ed.) Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (2015)

;
in Advances in Intelligent Systems and Computing (2015)

; ;
in Computers electrical engineering (2015)

;
in Journal of Ambient Intelligence and Humanized Computing (2015), 6(3), 361-373
2014

; ; ;
in IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden (2014)

; ;
in Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014 (2014)

;
Scientific Conference (2014)

; ; ; ; ;
in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

; ; ;
in Lecture Notes in Computer Science (2014)

; ; ;
in Lecture Notes in Computer Science (2014)

; ; ; ;
in IEEE 3rd International Conference on Serious Games and Applications in Healthcare (2014, May)

; ;
in Security Protocols XXII - Lecture Notes in Computer Science (2014)
2013

; ; ; ; ;
in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

; ; ; ;
in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

; ; ; ;
in IEEE TrustCom (2013)

; ; ; ;
in Lecture Notes in Computer Science (2013), 8203

; ;
in 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013 (2013)
2012

; ; ; ; ;
in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

; ; ;
in Proc. 7th International Conference on Availability, Reliability and Security (2012)

;
Book published by IEEE (2012)

; ;
in Lecture Notes in Computer Science (2012), 6573 LNAI

; ; ;
in Security and Communication Networks (2012), 5(8), 831-833
2011

; ; ;
Book published by IEEE (2011)

; ;
in Proc. 19th International Workshop on Security Protocols (2011)

; ;
in Serugendo, Giovanna Di Marzo; Gleizes, Marie-Pierre; Karageorgos, Anthony (Eds.) Self-Organizing Software - From Natural to Artificial Adaptation (2011)
2010

; ;
in Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (2010)
2009

in de Lemos, R.; Fabre, J. C.; Gacek, C.; Gadducci, F.; ~ter Beek, M. H. (Eds.) Architecting Dependable Systems VI 2018-09-18 22:51:18 +0000 2019-06-15 18:11:00 +0200 (2009)
2000

; ; ; ; ;
in Proc.~of the 6th Int. Conference Tool and Algorithms for the Construction and Analysis of Systems (TACAS 2000), in ETAPS 2000 -- March 25 - April 2, 2000, Berlin, Germany (2000)
1999

; ;
in 4th Italian Workshop on Sistemi Distribuiti: Algoritmi, Architetture e Linguaggi (WSDAAL'99), June 13-15, 1999, Fonte Cerreto (L'Aquila), Italy 2018-09-18 22:51:18 +0000 2019-06-15 18:31:23 +0200 (1999)
1998

in Proc.~of Workshop ``La matematizzazione della Biologia: storia e problematiche attuali'', Arcidosso (GR), Italy (1998)
1997

;
in Calcolo (1997), 1-4(34), 1-24
1996
Undated

; ;
Learning material (n.d.)