Gabriele LENZINI
|
|||||
Faculté ou Centre | Interdisciplinary Centre for Security, Reliability and Trust | ||||
Unité de recherche | SnT | ||||
Adresse postale |
Université du Luxembourg 29, avenue JF Kennedy L-1855 Luxembourg |
||||
Bureau sur le campus | JFK Building, E02-229 | ||||
![]() |
|||||
Téléphone | (+352) 46 66 44 5778 | ||||
Dr. Gabriele Lenzini expertise is about modelling, analysis and design of secure and trustworthy systems. He a PhD, in Computer Science (2005, University of Twente, The Netherlands) and two MSc, respectively in Computer Science and in Information Technologies (University of Pisa, Italy).
He has worked at the University of Pisa and at the Italian National Council of Research (CNR), in Italy, and at the University of Twente, and at Telematica Institute, in the Netherlands. He participated in the development and execution of numerous national and international projects, most of them with a strong industrial participation.
In February 2010 he joined the SnT. He is now a member of the Applied Security and Information Assurance (APSIA) research group. He works on electronic voting security, and on location and privacy assurance, and in socio-technical security: he is chair of one of the few workshops in this area (www.stast.uni.lu)
Last updated on: mercredi 19 juillet 2017

2018

; ;
in Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings (2018)

; ;
in Giuffrida, Cristiano; Bardin, Sébastien; Blanc, Gregory (Eds.) Proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2018) (2018)

; ;
in Advances in Cybersecurity 2018 (2018)

; ; ;
in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

; ; ; ; ;
in Advanced Materials (2018)

;
in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (2018, June)

; ;
in Emerging Technologies for Authorization and Authentication - ESORICS 2018 International Workshops (2018)
2017

; ; ;
in Bosse, Tibor; Bredeweg, Bert (Eds.) Communications in Computer and Information Science (2017)

; ;
in Advances in Cybersecurity 2017 (2017)

; ;
in Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele (Eds.) Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol (2017)

;
in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

; ; ; ; ; ;
in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)

; ;
in Proceedings of TrustBus 2017 (2017, July)

; ;
in IEEE Systems Journal (2017), 11(2),
2016

; ; ;
in Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN) (2016, November)

; ;
in Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC) (2016, November)

;
in Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP) (2016)

; ; ; ; ;
in Scientific Reports (2016), 6(26840), 1-8

; ;
in Barthe, Gilles; Markatos, Evangelos (Eds.) Security and Trust Management - STM 2016 (2016)

;
in Proceedings of the 4th World Conference on Information Systems and Technologies (2016)
2015

; ;
in JOURNAL OF COMPUTER SECURITY (2015), 23(5), 563-585

; ; ;
in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

;
Scientific Conference (2015, July 13)

; ; ; ; ; ; ; ; ; ;
in Socio-Technical Security Metrics (2015)

; ; ; ;
in Proc. of the New Security Paradigm Workshop (2015)

; ; ; ;
in Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (2015)

; ; ; ;
in Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 (2015)

; ; ; ; ;
in Communications in Computer and Information Science (2015), 554

; ; ;
in Foresti, Sara (Ed.) Security and Trust Management (2015)

; ; ; ;
in Lecture Notes in Computer Science (2015), 9190

;
in Proc. of the 5th International Workshop on Socio-Technical Security and Trust (2015)

; ;
in T. Tryfonas, I. Askoxylakis (Ed.) Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (2015)

;
in Advances in Intelligent Systems and Computing (2015)

; ;
in Computers electrical engineering (2015)

;
in Journal of Ambient Intelligence and Humanized Computing (2015), 6(3), 361-373
2014

; ; ;
in IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden (2014)

; ;
in Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014 (2014)

;
Scientific Conference (2014)

; ; ; ; ;
in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

; ; ;
in Lecture Notes in Computer Science (2014)

; ; ;
in Lecture Notes in Computer Science (2014)

; ; ; ;
in IEEE 3rd International Conference on Serious Games and Applications in Healthcare (2014, May)

; ;
in Security Protocols XXII - Lecture Notes in Computer Science (2014)
2013

; ; ; ; ;
in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

; ; ; ;
in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

; ; ; ;
in IEEE TrustCom (2013)

; ; ; ;
in Lecture Notes in Computer Science (2013), 8203

; ;
in 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013 (2013)
2012

; ; ; ; ;
in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

; ; ;
in Proc. 7th International Conference on Availability, Reliability and Security (2012)

;
Book published by IEEE (2012)

; ;
in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2012), 6573 LNAI

; ; ;
in SECURITY AND COMMUNICATION NETWORKS (2012), 5(8), 831-833
2011

; ; ;
Book published by IEEE (2011)

; ;
in Proc. 19th International Workshop on Security Protocols (2011)

; ;
in Serugendo, Giovanna Di Marzo; Gleizes, Marie-Pierre; Karageorgos, Anthony (Eds.) Self-Organizing Software - From Natural to Artificial Adaptation (2011)
2010

; ;
in Proc. of the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010) (2010)
Undated

; ;
Learning material (n.d.)