BibTeX records: Stefanos Gritzalis

download as .bib file

@proceedings{DBLP:conf/esorics/2023w1,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Pantaleone Nespoli and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14398},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54204-6},
  doi          = {10.1007/978-3-031-54204-6},
  isbn         = {978-3-031-54203-9},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2023w1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChatzoglouKKKG23,
  author       = {Efstratios Chatzoglou and
                  Vasileios Kouliaridis and
                  Georgios Kambourakis and
                  Georgios Karopoulos and
                  Stefanos Gritzalis},
  title        = {A hands-on gaze on {HTTP/3} security through the lens of {HTTP/2}
                  and a public dataset},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103051},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103051},
  doi          = {10.1016/J.COSE.2022.103051},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChatzoglouKKKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TsohouDGL23,
  author       = {Aggeliki Tsohou and
                  Vasiliki Diamantopoulou and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  title        = {Cyber insurance: state of the art, trends and future directions},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {3},
  pages        = {737--748},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-023-00660-8},
  doi          = {10.1007/S10207-023-00660-8},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/TsohouDGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MollaRG23,
  author       = {Eirini Molla and
                  Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  title        = {Efficient searchable symmetric encryption supporting range queries},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {4},
  pages        = {785--798},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-023-00667-1},
  doi          = {10.1007/S10207-023-00667-1},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MollaRG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/VgenaKKG22,
  author       = {Katerina Vgena and
                  Angeliki Kitsiou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  title        = {Determining the Role of Social Identity Attributes to the Protection
                  of Users' Privacy in Social Media},
  journal      = {Future Internet},
  volume       = {14},
  number       = {9},
  pages        = {249},
  year         = {2022},
  url          = {https://doi.org/10.3390/fi14090249},
  doi          = {10.3390/FI14090249},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/VgenaKKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KitsiouDKG22,
  author       = {Angeliki Kitsiou and
                  Charikleia Despotidi and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  title        = {The Role of Users' Demographic and Social Attributes for Accepting
                  Biometric Systems: {A} Greek Case Study},
  journal      = {Future Internet},
  volume       = {14},
  number       = {11},
  pages        = {328},
  year         = {2022},
  url          = {https://doi.org/10.3390/fi14110328},
  doi          = {10.3390/FI14110328},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/KitsiouDKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/ParaskevasKG22,
  author       = {Diamantatos Paraskevas and
                  Ergina Kavallieratou and
                  Stefanos Gritzalis},
  title        = {Directional Hinge Features for Writer Identification: The Importance
                  of the Skeleton and the Effects of Character Size and Pixel Intensity},
  journal      = {{SN} Comput. Sci.},
  volume       = {3},
  number       = {1},
  pages        = {56},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42979-021-00950-9},
  doi          = {10.1007/S42979-021-00950-9},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sncs/ParaskevasKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/22/DiamantopoulouLKG22,
  author       = {Vasiliki Diamantopoulou and
                  Costas Lambrinoudakis and
                  Jennifer King and
                  Stefanos Gritzalis},
  title        = {{EU} {GDPR:} Toward a Regulatory Initiative for Deploying a Private
                  Digital Era},
  booktitle    = {Modern Socio-Technical Perspectives on Privacy},
  pages        = {427--448},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-82786-1\_18},
  doi          = {10.1007/978-3-030-82786-1\_18},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/22/DiamantopoulouLKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-06722,
  author       = {Efstratios Chatzoglou and
                  Vasileios Kouliaridis and
                  Georgios Kambourakis and
                  Georgios Karopoulos and
                  Stefanos Gritzalis},
  title        = {A hands-on gaze on {HTTP/3} security through the lens of {HTTP/2}
                  and a public dataset},
  journal      = {CoRR},
  volume       = {abs/2208.06722},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.06722},
  doi          = {10.48550/ARXIV.2208.06722},
  eprinttype    = {arXiv},
  eprint       = {2208.06722},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-06722.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computation/SkarkalaMGM21,
  author       = {Maria Eleni Skarkala and
                  Manolis Maragoudakis and
                  Stefanos Gritzalis and
                  Lilian Mitrou},
  title        = {{PPDM-TAN:} {A} Privacy-Preserving Multi-Party Classifier},
  journal      = {Comput.},
  volume       = {9},
  number       = {1},
  pages        = {6},
  year         = {2021},
  url          = {https://doi.org/10.3390/computation9010006},
  doi          = {10.3390/COMPUTATION9010006},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computation/SkarkalaMGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/KalloniatisLMKG21,
  author       = {Christos Kalloniatis and
                  Costas Lambrinoudakis and
                  Mathias Musahl and
                  Athanasios G. Kanatas and
                  Stefanos Gritzalis},
  title        = {Incorporating privacy by design in body sensor networks for medical
                  applications: {A} privacy and data protection framework},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {323--347},
  year         = {2021},
  url          = {https://doi.org/10.2298/CSIS200922057K},
  doi          = {10.2298/CSIS200922057K},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsis/KalloniatisLMKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KitsiouTKG21,
  author       = {Angeliki Kitsiou and
                  Eleni Tzortzaki and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  title        = {Identifying Privacy Related Requirements for the Design of Self-Adaptive
                  Privacy Protections Schemes in Social Networks},
  journal      = {Future Internet},
  volume       = {13},
  number       = {2},
  pages        = {23},
  year         = {2021},
  url          = {https://doi.org/10.3390/fi13020023},
  doi          = {10.3390/FI13020023},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/KitsiouTKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icegov/RoutzouniVKGP21,
  author       = {Athanasia Routzouni and
                  Nikolaos Dimitrios (Nikos) Vasilakis and
                  Spiros Kapetanakis and
                  Stefanos Gritzalis and
                  Athanasia Pouloudi},
  editor       = {Euripides N. Loukis and
                  Marie Anne Macadar and
                  Morten Meyerhoff Nielsen and
                  M{\'{a}}rio Peixoto},
  title        = {Public sector innovation through design thinking: Applying a participatory
                  policy design practice to support the formulation of a national digital
                  transformation strategy},
  booktitle    = {{ICEGOV} 2021: 14th International Conference on Theory and Practice
                  of Electronic Governance, Athens, Greece, October 6 - 8, 2021},
  pages        = {104--110},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3494193.3494208},
  doi          = {10.1145/3494193.3494208},
  timestamp    = {Tue, 21 Nov 2023 14:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icegov/RoutzouniVKGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-12384,
  author       = {Georgia Frantzeskou and
                  Stephen G. MacDonell and
                  Efstathios Stamatatos and
                  Stelios Georgiou and
                  Stefanos Gritzalis},
  title        = {The significance of user-defined identifiers in Java source code authorship
                  identification},
  journal      = {CoRR},
  volume       = {abs/2101.12384},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.12384},
  eprinttype    = {arXiv},
  eprint       = {2101.12384},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-12384.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/DiamantopoulouA20,
  author       = {Vasiliki Diamantopoulou and
                  Aggeliki Androutsopoulou and
                  Stefanos Gritzalis and
                  Yannis Charalabidis},
  title        = {Preserving Digital Privacy in e-Participation Environments: Towards
                  {GDPR} Compliance},
  journal      = {Inf.},
  volume       = {11},
  number       = {2},
  pages        = {117},
  year         = {2020},
  url          = {https://doi.org/10.3390/info11020117},
  doi          = {10.3390/INFO11020117},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/DiamantopoulouA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KitsiouTKG20,
  author       = {Angeliki Kitsiou and
                  Eleni Tzortzaki and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Weizhi Meng and
                  Steven Furnell},
  title        = {Self Adaptive Privacy in Cloud Computing Environments: Identifying
                  the Major Socio-Technical Concepts},
  booktitle    = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS,
                  SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12501},
  pages        = {117--132},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64330-0\_8},
  doi          = {10.1007/978-3-030-64330-0\_8},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KitsiouTKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/SideriG20,
  author       = {Maria Sideri and
                  Stefanos Gritzalis},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Are We Really Informed on the Rights {GDPR} Guarantees?},
  booktitle    = {Human Aspects of Information Security and Assurance - 14th {IFIP}
                  {WG} 11.12 International Symposium, {HAISA} 2020, Mytilene, Lesbos,
                  Greece, July 8-10, 2020, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {593},
  pages        = {315--326},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57404-8\_24},
  doi          = {10.1007/978-3-030-57404-8\_24},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/haisa/SideriG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seeda/SkarkalaMGM20,
  author       = {Maria Eleni Skarkala and
                  Manolis Maragoudakis and
                  Stefanos Gritzalis and
                  Lilian Mitrou},
  title        = {{PP-TAN:} a Privacy Preserving Multi-party Tree Augmented Naive Bayes
                  Classifier},
  booktitle    = {5th South-East Europe Design Automation, Computer Engineering, Computer
                  Networks and Social Media Conference, {SEEDA-CECNSM} 2020, Corfu,
                  Greece, September 25-27, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SEEDA-CECNSM49515.2020.9221844},
  doi          = {10.1109/SEEDA-CECNSM49515.2020.9221844},
  timestamp    = {Sun, 14 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seeda/SkarkalaMGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KitsiouTKG20,
  author       = {Angeliki Kitsiou and
                  Eleni Tzortzaki and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy
                  Within Cloud-Computing Environments},
  booktitle    = {Trust, Privacy and Security in Digital Business - 17th International
                  Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12395},
  pages        = {140--155},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58986-8\_10},
  doi          = {10.1007/978-3-030-58986-8\_10},
  timestamp    = {Mon, 26 Jun 2023 16:42:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/KitsiouTKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-42048-2},
  doi          = {10.1007/978-3-030-42048-2},
  isbn         = {978-3-030-42047-5},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2019cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2020cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Weizhi Meng and
                  Steven Furnell},
  title        = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS,
                  SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12501},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64330-0},
  doi          = {10.1007/978-3-030-64330-0},
  isbn         = {978-3-030-64329-4},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2020cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pci/2020,
  editor       = {Nikitas N. Karanikolas and
                  Athanasios Voulodimos and
                  Cleo Sgouropoulou and
                  Mara Nikolaidou and
                  Stefanos Gritzalis},
  title        = {{PCI} 2020: 24th Pan-Hellenic Conference on Informatics, Athens, Greece,
                  20-22 November, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3437120},
  doi          = {10.1145/3437120},
  isbn         = {978-1-4503-8897-9},
  timestamp    = {Sat, 10 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2020,
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Trust, Privacy and Security in Digital Business - 17th International
                  Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12395},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58986-8},
  doi          = {10.1007/978-3-030-58986-8},
  isbn         = {978-3-030-58985-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/MavroeidiKKG19,
  author       = {Aikaterini{-}Georgia Mavroeidi and
                  Angeliki Kitsiou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  title        = {Gamification vs. Privacy: Identifying and Analysing the Major Concerns},
  journal      = {Future Internet},
  volume       = {11},
  number       = {3},
  pages        = {67},
  year         = {2019},
  url          = {https://doi.org/10.3390/fi11030067},
  doi          = {10.3390/FI11030067},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/MavroeidiKKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/VgenaKKKG19,
  author       = {Katerina Vgena and
                  Angeliki Kitsiou and
                  Christos Kalloniatis and
                  Dimitris Kavroudakis and
                  Stefanos Gritzalis},
  title        = {Toward Addressing Location Privacy Issues: New Affiliations with Social
                  and Location Attributes},
  journal      = {Future Internet},
  volume       = {11},
  number       = {11},
  pages        = {234},
  year         = {2019},
  url          = {https://doi.org/10.3390/fi11110234},
  doi          = {10.3390/FI11110234},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/VgenaKKKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijagr/KalloniatisKPG19,
  author       = {Christos Kalloniatis and
                  Dimitris Kavroudakis and
                  Amalia Polidoropoulou and
                  Stefanos Gritzalis},
  title        = {Designing Privacy-Aware Intelligent Transport Systems: {A} Roadmap
                  for Identifying the Major Privacy Concepts},
  journal      = {Int. J. Appl. Geospat. Res.},
  volume       = {10},
  number       = {1},
  pages        = {73--91},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJAGR.2019010104},
  doi          = {10.4018/IJAGR.2019010104},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijagr/KalloniatisKPG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/SideriKFKG19,
  author       = {Maria Sideri and
                  Angeliki Kitsiou and
                  Ariadni Filippopoulou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  title        = {E-Governance in educational settings},
  journal      = {Internet Res.},
  volume       = {29},
  number       = {4},
  pages        = {818--845},
  year         = {2019},
  url          = {https://doi.org/10.1108/IntR-05-2017-0178},
  doi          = {10.1108/INTR-05-2017-0178},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/SideriKFKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GiannakasPKG19,
  author       = {Filippos Giannakas and
                  Andreas Papasalouros and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {A comprehensive cybersecurity learning platform for elementary education},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {28},
  number       = {3},
  pages        = {81--106},
  year         = {2019},
  url          = {https://doi.org/10.1080/19393555.2019.1657527},
  doi          = {10.1080/19393555.2019.1657527},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GiannakasPKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/SimouKGK19,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis and
                  Vasilios Katos},
  title        = {A framework for designing cloud forensic-enabled services (CFeS)},
  journal      = {Requir. Eng.},
  volume       = {24},
  number       = {3},
  pages        = {403--430},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00766-018-0289-y},
  doi          = {10.1007/S00766-018-0289-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/SimouKGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RizomiliotisG19,
  author       = {Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  editor       = {Radu Sion and
                  Charalampos Papamanthou},
  title        = {Simple Forward and Backward Private Searchable Symmetric Encryption
                  Schemes with Constant Number of Roundtrips},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing
                  Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019},
  pages        = {141--152},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338466.3358921},
  doi          = {10.1145/3338466.3358921},
  timestamp    = {Thu, 12 Oct 2023 12:32:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RizomiliotisG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/SideriFG19,
  author       = {Maria Sideri and
                  Athanasios Fontaras and
                  Stefanos Gritzalis},
  editor       = {Sokratis K. Katsikas and
                  Vasilios Zorkadis},
  title        = {What Do We Know About Our Rights to Data Protection? {A} Greek Case
                  Study},
  booktitle    = {E-Democracy - Safeguarding Democracy and Human Rights in the Digital
                  Age - 8th International Conference, e-Democracy 2019, Athens, Greece,
                  December 12-13, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1111},
  pages        = {18--33},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37545-4\_2},
  doi          = {10.1007/978-3-030-37545-4\_2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edemocracy/SideriFG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/SimouKGK19,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis and
                  Vasilis Katos},
  editor       = {Sokratis K. Katsikas and
                  Vasilios Zorkadis},
  title        = {A Revised Forensic Process for Aligning the Investigation Process
                  with the Design of Forensic-Enabled Cloud Services},
  booktitle    = {E-Democracy - Safeguarding Democracy and Human Rights in the Digital
                  Age - 8th International Conference, e-Democracy 2019, Athens, Greece,
                  December 12-13, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1111},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37545-4\_11},
  doi          = {10.1007/978-3-030-37545-4\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edemocracy/SimouKGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/RoutzouniDPG19,
  author       = {Athanasia Routzouni and
                  Athanasios P. Deligiannis and
                  Vassilios Peristeras and
                  Stefanos Gritzalis},
  editor       = {Ida Lindgren and
                  Marijn Janssen and
                  Habin Lee and
                  Andrea Polini and
                  Manuel Pedro Rodr{\'{\i}}guez Bol{\'{\i}}var and
                  Hans Jochen Scholl and
                  Efthimios Tambouris},
  title        = {An Intercountry Survey of Participatory Practices Used for Open Government
                  Partnership National Action Plan Development},
  booktitle    = {Electronic Government - 18th {IFIP} {WG} 8.5 International Conference,
                  {EGOV} 2019, San Benedetto Del Tronto, Italy, September 2-4, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11685},
  pages        = {82--93},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27325-5\_7},
  doi          = {10.1007/978-3-030-27325-5\_7},
  timestamp    = {Fri, 08 Sep 2023 14:38:15 +0200},
  biburl       = {https://dblp.org/rec/conf/egov/RoutzouniDPG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcis/RoutzouniDG19,
  author       = {Athanasia Routzouni and
                  Athanasios P. Deligiannis and
                  Stefanos Gritzalis},
  title        = {A generalised Co-Evaluation Model of Public Policies},
  booktitle    = {13th Mediterranean Conference on Information Systems, {MCIS} 2019,
                  Naples, Italy, 27-28 September 2019, joint conference with the 16th
                  conference of the Italian Chapter of AIS, ItAIS 2019},
  pages        = {29},
  publisher    = {AISeL},
  year         = {2019},
  url          = {https://aisel.aisnet.org/mcis2019/29},
  timestamp    = {Thu, 17 Jun 2021 09:18:17 +0200},
  biburl       = {https://dblp.org/rec/conf/mcis/RoutzouniDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  John Mylopoulos and
                  Christos Kalloniatis},
  title        = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS
                  2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11387},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12786-2},
  doi          = {10.1007/978-3-030-12786-2},
  isbn         = {978-3-030-12785-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2018cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2019,
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Sokratis K. Katsikas and
                  Gabriele Anderst{-}Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Trust, Privacy and Security in Digital Business - 16th International
                  Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11711},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27813-7},
  doi          = {10.1007/978-3-030-27813-7},
  isbn         = {978-3-030-27812-0},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CastroLG18,
  author       = {Rodrigo Roman Castro and
                  Javier L{\'{o}}pez and
                  Stefanos Gritzalis},
  title        = {Evolution and Trends in IoT Security},
  journal      = {Computer},
  volume       = {51},
  number       = {7},
  pages        = {16--25},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.3011051},
  doi          = {10.1109/MC.2018.3011051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CastroLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/IslamOKMG18,
  author       = {Shareeful Islam and
                  Moussa Ouedraogo and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  title        = {Assurance of Security and Privacy Requirements for Cloud Deployment
                  Models},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {2},
  pages        = {387--400},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2015.2511719},
  doi          = {10.1109/TCC.2015.2511719},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/IslamOKMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/TsekourasTKG18,
  author       = {George E. Tsekouras and
                  John V. Tsimikas and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  title        = {Interpretability Constraints for Fuzzy Modeling Implemented by Constrained
                  Particle Swarm Optimization},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {26},
  number       = {4},
  pages        = {2348--2361},
  year         = {2018},
  url          = {https://doi.org/10.1109/TFUZZ.2017.2774187},
  doi          = {10.1109/TFUZZ.2017.2774187},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/TsekourasTKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ChooGP18,
  author       = {Kim{-}Kwang Raymond Choo and
                  Stefanos Gritzalis and
                  Jong Hyuk Park},
  title        = {Cryptographic Solutions for Industrial Internet-of-Things: Research
                  Challenges and Opportunities},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {14},
  number       = {8},
  pages        = {3567--3569},
  year         = {2018},
  url          = {https://doi.org/10.1109/TII.2018.2841049},
  doi          = {10.1109/TII.2018.2841049},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ChooGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcis/RoutzouniG18,
  author       = {Athanasia Routzouni and
                  Stefanos Gritzalis},
  title        = {The Civil Society as an Innovation Partner in Public Policy Making:
                  Co-Creating the Greek National Action Plan on Open Government},
  booktitle    = {12th Mediterranean Conference on Information Systems, {MCIS} 2018,
                  Corfu, Greece, 28-30 September 2018},
  pages        = {25},
  publisher    = {AISeL},
  year         = {2018},
  url          = {https://aisel.aisnet.org/mcis2018/25},
  timestamp    = {Fri, 13 Dec 2019 13:24:11 +0100},
  biburl       = {https://dblp.org/rec/conf/mcis/RoutzouniG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/Anagnostopoulos18,
  author       = {Marios Anagnostopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis and
                  David K. Y. Yau},
  title        = {Never say never: Authoritative {TLD} nameserver-powered {DNS} amplification},
  booktitle    = {2018 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2018, Taipei, Taiwan, April 23-27, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NOMS.2018.8406224},
  doi          = {10.1109/NOMS.2018.8406224},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/Anagnostopoulos18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/DiamantopoulouA18,
  author       = {Vasiliki Diamantopoulou and
                  Aggeliki Androutsopoulou and
                  Stefanos Gritzalis and
                  Yannis Charalabidis},
  title        = {An assessment of privacy preservation in crowdsourcing approaches:
                  Towards {GDPR} compliance},
  booktitle    = {12th International Conference on Research Challenges in Information
                  Science, {RCIS} 2018, Nantes, France, May 29-31, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/RCIS.2018.8406643},
  doi          = {10.1109/RCIS.2018.8406643},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rcis/DiamantopoulouA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/PattakouMDKG18,
  author       = {Argyri Pattakou and
                  Aikaterini{-}Georgia Mavroeidi and
                  Vasiliki Diamantopoulou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Kristian Beckers and
                  Shamal Faily and
                  Seok{-}Won Lee and
                  Nancy R. Mead},
  title        = {Towards the Design of Usable Privacy by Design Methodologies},
  booktitle    = {5th {IEEE} International Workshop on Evolving Security {\&} Privacy
                  Requirements Engineering, ESPRE@RE 2018, Banff, AB, Canada, August
                  20, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ESPRE.2018.00007},
  doi          = {10.1109/ESPRE.2018.00007},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/PattakouMDKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/SimouTKKG18,
  author       = {Stavros Simou and
                  Ioannis Troumpis and
                  Christos Kalloniatis and
                  Dimitris Kavroudakis and
                  Stefanos Gritzalis},
  editor       = {Steven Furnell and
                  Haralambos Mouratidis and
                  G{\"{u}}nther Pernul},
  title        = {A Decision-Making Approach for Improving Organizations' Cloud Forensic
                  Readiness},
  booktitle    = {Trust, Privacy and Security in Digital Business - 15th International
                  Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11033},
  pages        = {150--164},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98385-1\_11},
  doi          = {10.1007/978-3-319-98385-1\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/SimouTKKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-72817-9},
  doi          = {10.1007/978-3-319-72817-9},
  isbn         = {978-3-319-72816-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2017cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pci/2018,
  editor       = {Nikitas N. Karanikolas and
                  Basilis Mamalis and
                  John Kontos and
                  Grammati E. Pantziou and
                  Stefanos Gritzalis and
                  Christos Douligeris},
  title        = {Proceedings of the 22nd Pan-Hellenic Conference on Informatics, {PCI}
                  2018, Athens, Greece, November 29 - December 01, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3291533},
  isbn         = {978-1-4503-6610-6},
  timestamp    = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KalloniatisPKG17,
  author       = {Christos Kalloniatis and
                  Argyri Pattakou and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  title        = {Designing Secure and Privacy-Aware Information Systems},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {1--25},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSSE.2017040101},
  doi          = {10.4018/IJSSE.2017040101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/KalloniatisPKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/DiamantopoulouT17,
  author       = {Vasiliki Diamantopoulou and
                  Aggeliki Tsohou and
                  Euripidis N. Loukis and
                  Stefanos Gritzalis},
  title        = {Does the Development of Information Systems Resources Lead to the
                  Development of Information Security Resources? An Empirical Investigation},
  booktitle    = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
                  MA, USA, August 10-12, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/28},
  timestamp    = {Tue, 23 May 2017 14:16:12 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/DiamantopoulouT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RizomiliotisMG17,
  author       = {Panagiotis Rizomiliotis and
                  Eirini Molla and
                  Stefanos Gritzalis},
  editor       = {Bhavani Thuraisingham and
                  Ghassan Karame and
                  Angelos Stavrou},
  title        = {{REX:} {A} Searchable Symmetric Encryption Scheme Supporting Range
                  Queries},
  booktitle    = {Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS
                  2017, Dallas, TX, USA, November 3, 2017},
  pages        = {29--37},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140649.3140653},
  doi          = {10.1145/3140649.3140653},
  timestamp    = {Thu, 12 Oct 2023 12:32:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RizomiliotisMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/SideriKTKG17,
  author       = {Maria Sideri and
                  Angeliki Kitsiou and
                  Eleni Tzortzaki and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Sokratis K. Katsikas and
                  Vasilios Zorkadis},
  title        = {"I Have Learned that {I} Must Think Twice Before...". An
                  Educational Intervention for Enhancing Students' Privacy Awareness
                  in Facebook},
  booktitle    = {E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government
                  Services - 7th International Conference, E-Democracy 2017, Athens,
                  Greece, December 14-15, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {792},
  pages        = {79--94},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71117-1\_6},
  doi          = {10.1007/978-3-319-71117-1\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edemocracy/SideriKTKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ZagourasKG17,
  author       = {Panagiotis Zagouras and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Theo Tryfonas},
  title        = {Managing User Experience: Usability and Security in a New Era of Software
                  Supremacy},
  booktitle    = {Human Aspects of Information Security, Privacy and Trust - 5th International
                  Conference, {HAS} 2017, Held as Part of {HCI} International 2017,
                  Vancouver, BC, Canada, July 9-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10292},
  pages        = {174--188},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58460-7\_12},
  doi          = {10.1007/978-3-319-58460-7\_12},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ZagourasKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ArgyropoulosSKM17,
  author       = {Nikolaos Argyropoulos and
                  Shaun Shei and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Aidan J. Delaney and
                  Andrew Fish and
                  Stefanos Gritzalis},
  editor       = {Tung Bui},
  title        = {A Semi-Automatic Approach for Eliciting Cloud Security and Privacy
                  Requirements},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41749},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/ArgyropoulosSKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SideriFRKG17,
  author       = {Maria Sideri and
                  Ariadni Filippopoulou and
                  George Rouvalis and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Tung Bui},
  title        = {Social Media Use for Decision Making Process in Educational Settings:
                  The Greek Case for Leadership's Views and Attitude in Secondary and
                  Tertiary Education},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41503},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/SideriFRKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SpiliotopoulouD17,
  author       = {Lefkothea Spiliotopoulou and
                  Dimitrios Damopoulos and
                  Yannis Charalabidis and
                  Manolis Maragoudakis and
                  Stefanos Gritzalis},
  editor       = {Tung Bui},
  title        = {Europe in the shadow of financial crisis: Policy Making via Stance
                  Classification},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41499},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/SpiliotopoulouD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/ChalarisCGS17,
  author       = {Manolis Chalaris and
                  Ioannis Chalaris and
                  Stefanos Gritzalis and
                  Cleo Sgouropoulou},
  editor       = {Vasileios Vlachos and
                  Ilias K. Savvas and
                  Cleo Sgouropoulou and
                  Vassilis P. Plagianakos and
                  Christos Douligeris and
                  Ioannis Voyiatzis and
                  Vassilis Tampakas and
                  George Soultis},
  title        = {Maturity Level of the Quality Assurance Evaluation Procedures in Higher
                  Education: {A} qualitative research},
  booktitle    = {Proceedings of the 21st Pan-Hellenic Conference on Informatics, Larissa,
                  Greece, September 28-30, 2017},
  pages        = {63:1--63:2},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139367.3139438},
  doi          = {10.1145/3139367.3139438},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/ChalarisCGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/DiamantopoulouA17,
  author       = {Vasiliki Diamantopoulou and
                  Nikolaos Argyropoulos and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Sa{\"{\i}}d Assar and
                  Oscar Pastor and
                  Haralambos Mouratidis},
  title        = {Supporting the design of privacy-aware business processes via privacy
                  process patterns},
  booktitle    = {11th International Conference on Research Challenges in Information
                  Science, {RCIS} 2017, Brighton, United Kingdom, May 10-12, 2017},
  pages        = {187--198},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/RCIS.2017.7956536},
  doi          = {10.1109/RCIS.2017.7956536},
  timestamp    = {Mon, 18 Jan 2021 08:56:35 +0100},
  biburl       = {https://dblp.org/rec/conf/rcis/DiamantopoulouA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DiamantopoulouK17,
  author       = {Vasiliki Diamantopoulou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis and
                  Haralambos Mouratidis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {Supporting Privacy by Design Using Privacy Process Patterns},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {491--505},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_33},
  doi          = {10.1007/978-3-319-58469-0\_33},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DiamantopoulouK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/SimouKG17,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Javier L{\'{o}}pez and
                  Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis},
  title        = {Modelling Cloud Forensic-Enabled Services},
  booktitle    = {Trust, Privacy and Security in Digital Business - 14th International
                  Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10442},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64483-7\_10},
  doi          = {10.1007/978-3-319-64483-7\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/SimouKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-09420,
  author       = {Eirini Molla and
                  Theodoros Tzouramanis and
                  Stefanos Gritzalis},
  title        = {{SOPE:} {A} Spatial Order Preserving Encryption Model for Multi-dimensional
                  Data},
  journal      = {CoRR},
  volume       = {abs/1710.09420},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.09420},
  eprinttype    = {arXiv},
  eprint       = {1710.09420},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-09420.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KoliasKSG16,
  author       = {Constantinos Kolias and
                  Georgios Kambourakis and
                  Angelos Stavrou and
                  Stefanos Gritzalis},
  title        = {Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats
                  and a Public Dataset},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {1},
  pages        = {184--208},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2015.2402161},
  doi          = {10.1109/COMST.2015.2402161},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KoliasKSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijait/ParaskevasKG16,
  author       = {Diamantatos Paraskevas and
                  Ergina Kavallieratou and
                  Stefanos Gritzalis},
  title        = {Skeleton Hinge Distribution for Writer Identification},
  journal      = {Int. J. Artif. Intell. Tools},
  volume       = {25},
  number       = {3},
  pages        = {1650015:1--1650015:14},
  year         = {2016},
  url          = {https://doi.org/10.1142/S0218213016500159},
  doi          = {10.1142/S0218213016500159},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijait/ParaskevasKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/GiannakasKPG16,
  author       = {Filippos Giannakas and
                  Georgios Kambourakis and
                  Andreas Papasalouros and
                  Stefanos Gritzalis},
  title        = {Security Education and Awareness for {K-6} Going Mobile},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {10},
  number       = {2},
  pages        = {41--48},
  year         = {2016},
  url          = {https://doi.org/10.3991/ijim.v10i2.5473},
  doi          = {10.3991/IJIM.V10I2.5473},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/GiannakasKPG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Anagnostopoulos16,
  author       = {Marios Anagnostopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {New facets of mobile botnet: architecture and evaluation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {5},
  pages        = {455--473},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0310-0},
  doi          = {10.1007/S10207-015-0310-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Anagnostopoulos16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ParkGCZ16,
  author       = {Jong Hyuk Park and
                  Stefanos Gritzalis and
                  Bo{-}Chao Cheng and
                  Ning Zhang},
  title        = {Challenges and opportunities in next-generation cyberspace security},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {6},
  pages        = {455--456},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1468},
  doi          = {10.1002/SEC.1468},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ParkGCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SimouKGM16,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis and
                  Haralambos Mouratidis},
  title        = {A survey on cloud forensics challenges and solutions},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {6285--6314},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1688},
  doi          = {10.1002/SEC.1688},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SimouKGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/PattakouKG16,
  author       = {Argyri Pattakou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Reasoning About Security and Privacy in Cloud Computing Under a Unified
                  Meta-Model},
  booktitle    = {Tenth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2016, Frankfurt, Germany, July 19-21,
                  2016, Proceedings},
  pages        = {56--66},
  publisher    = {University of Plymouth},
  year         = {2016},
  url          = {http://www.cscan.org/openaccess/?paperid=288},
  timestamp    = {Tue, 06 Jul 2021 12:22:19 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/PattakouKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TsiatsikasGKG16,
  author       = {Zisis Tsiatsikas and
                  Dimitris Geneiatakis and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {Realtime DDoS Detection in {SIP} Ecosystems: Machine Learning Tools
                  of the Trade},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {126--139},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_9},
  doi          = {10.1007/978-3-319-46298-1\_9},
  timestamp    = {Thu, 23 Jun 2022 19:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/TsiatsikasGKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/TzortzakiKSG16,
  author       = {Eleni Tzortzaki and
                  Angeliki Kitsiou and
                  Maria Sideri and
                  Stefanos Gritzalis},
  title        = {Self-disclosure, Privacy concerns and Social Capital benefits interaction
                  in {FB:} {A} case study},
  booktitle    = {Proceedings of the 20th Pan-Hellenic Conference on Informatics, Patras,
                  Greece, November 10-12, 2016},
  pages        = {32},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3003733.3003781},
  doi          = {10.1145/3003733.3003781},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/TzortzakiKSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/KitsiouTSG16,
  author       = {Angeliki Kitsiou and
                  Eleni Tzortzaki and
                  Maria Sideri and
                  Stefanos Gritzalis},
  editor       = {Gabriele Lenzini and
                  Giampaolo Bella and
                  Zinaida Benenson and
                  Carrie E. Gates},
  title        = {Digital privacy and social capital on social network sites. friends
                  or foes?},
  booktitle    = {Proceedings of the 6th Workshop on Socio-Technical Aspects in Security
                  and Trust, {STAST} 2016, Los Angeles, CA, USA, December 5, 2016},
  pages        = {3--16},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3046055.3046060},
  doi          = {10.1145/3046055.3046060},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/KitsiouTSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/SimouKMG16,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Steven Furnell},
  title        = {Towards a Model-Based Framework for Forensic-Enabled Cloud Information
                  Systems},
  booktitle    = {Trust, Privacy and Security in Digital Business - 13th International
                  Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9830},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44341-6\_3},
  doi          = {10.1007/978-3-319-44341-6\_3},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/SimouKMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KavakliKMG15,
  author       = {Evangelia Kavakli and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  title        = {Privacy as an Integral Part of the Implementation of Cloud Solutions},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2213--2224},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu118},
  doi          = {10.1093/COMJNL/BXU118},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KavakliKMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/DrogkarisGKL15,
  author       = {Prokopios Drogkaris and
                  Stefanos Gritzalis and
                  Christos Kalloniatis and
                  Costas Lambrinoudakis},
  title        = {A Hierarchical Multitier Approach for Privacy Policies in e-Government
                  Environments},
  journal      = {Future Internet},
  volume       = {7},
  number       = {4},
  pages        = {500--515},
  year         = {2015},
  url          = {https://doi.org/10.3390/fi7040500},
  doi          = {10.3390/FI7040500},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/DrogkarisGKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LianG15,
  author       = {Shiguo Lian and
                  Stefanos Gritzalis},
  title        = {Innovations in emerging multimedia communication systems},
  journal      = {Telecommun. Syst.},
  volume       = {59},
  number       = {3},
  pages        = {289--290},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11235-014-9935-y},
  doi          = {10.1007/S11235-014-9935-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/LianG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SimouKMG15,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  editor       = {Anne Persson and
                  Janis Stirna},
  title        = {Towards the Development of a Cloud Forensics Methodology: {A} Conceptual
                  Model},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2015 International
                  Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {215},
  pages        = {470--481},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19243-7\_43},
  doi          = {10.1007/978-3-319-19243-7\_43},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/SimouKMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RizomiliotisG15,
  author       = {Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Florian Kerschbaum and
                  Cristina Nita{-}Rotaru},
  title        = {{ORAM} Based Forward Privacy Preserving Dynamic Searchable Symmetric
                  Encryption Schemes},
  booktitle    = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
                  Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808425.2808429},
  doi          = {10.1145/2808425.2808429},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RizomiliotisG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/SimouKMG15,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  editor       = {Costas Lambrinoudakis and
                  Alban Gabillon},
  title        = {A Meta-model for Assisting a Cloud Forensics Process},
  booktitle    = {Risks and Security of Internet and Systems - 10th International Conference,
                  CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9572},
  pages        = {177--187},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31811-0\_11},
  doi          = {10.1007/978-3-319-31811-0\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/SimouKMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/SideriKKG15,
  author       = {Maria Sideri and
                  Angeliki Kitsiou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  editor       = {Sokratis K. Katsikas and
                  Alexander B. Sideridis},
  title        = {Privacy and Facebook Universities Students' Communities for Confessions
                  and Secrets: The Greek Case},
  booktitle    = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
                  - 6th International Conference, E-Democracy 2015, Athens, Greece,
                  December 10-11, 2015, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {570},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27164-4\_6},
  doi          = {10.1007/978-3-319-27164-4\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edemocracy/SideriKKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pci/2015,
  editor       = {Nikitas N. Karanikolas and
                  Demosthenes Akoumianakis and
                  Mara Nikolaidou and
                  Dimitrios D. Vergados and
                  Michalis Xenos and
                  George M. Giaglis and
                  Stefanos Gritzalis and
                  Lazaros F. Merakos and
                  Panagiotis Tsanakas and
                  Cleo Sgouropoulou},
  title        = {Proceedings of the 19th Panhellenic Conference on Informatics, {PCI}
                  2015, Athens, Greece, October 1-3, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2801948},
  isbn         = {978-1-4503-3551-5},
  timestamp    = {Wed, 23 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/KalloniatisMMIGK14,
  author       = {Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Vassilis Manousakis and
                  Shareeful Islam and
                  Stefanos Gritzalis and
                  Evangelia Kavakli},
  title        = {Towards the design of secure and privacy-oriented information systems
                  in the cloud: Identifying the major concepts},
  journal      = {Comput. Stand. Interfaces},
  volume       = {36},
  number       = {4},
  pages        = {759--775},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.csi.2013.12.010},
  doi          = {10.1016/J.CSI.2013.12.010},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KalloniatisMMIGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijait/PanteliMG14,
  author       = {Alexandros Panteli and
                  Manolis Maragoudakis and
                  Stefanos Gritzalis},
  title        = {Privacy Preserving Data Mining Using Radial Basis Functions on Horizontally
                  Partitioned Databases in the Malicious Model},
  journal      = {Int. J. Artif. Intell. Tools},
  volume       = {23},
  number       = {5},
  year         = {2014},
  url          = {https://doi.org/10.1142/S0218213014500079},
  doi          = {10.1142/S0218213014500079},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijait/PanteliMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/DamopoulosKGP14,
  author       = {Dimitrios Damopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis and
                  Sang Oh Park},
  title        = {Exposing mobile malware from the inside (or what is your mobile app
                  really doing?)},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {7},
  number       = {4},
  pages        = {687--697},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12083-012-0179-x},
  doi          = {10.1007/S12083-012-0179-X},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/DamopoulosKGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ClarkeGZR14,
  author       = {James Clarke and
                  Stefanos Gritzalis and
                  Jianying Zhou and
                  Rodrigo Roman},
  title        = {Protecting the internet of things},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2637--2638},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.1174},
  doi          = {10.1002/SEC.1174},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ClarkeGZR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RekleitisRG14,
  author       = {Evangelos Rekleitis and
                  Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  title        = {How to protect security and privacy in the IoT: a policy-based {RFID}
                  tag management protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2669--2683},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.400},
  doi          = {10.1002/SEC.400},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RekleitisRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ClarkeGZR14a,
  author       = {James Clarke and
                  Stefanos Gritzalis and
                  Jianying Zhou and
                  Rodrigo Roman},
  title        = {Security in a completely interconnected world},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2726--2727},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.1175},
  doi          = {10.1002/SEC.1175},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ClarkeGZR14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SimouKKG14,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  editor       = {Matthias Jarke and
                  John Mylopoulos and
                  Christoph Quix and
                  Colette Rolland and
                  Yannis Manolopoulos and
                  Haralambos Mouratidis and
                  Jennifer Horkoff},
  title        = {Cloud Forensics: Identifying the Major Issues and Challenges},
  booktitle    = {Advanced Information Systems Engineering - 26th International Conference,
                  CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8484},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07881-6\_19},
  doi          = {10.1007/978-3-319-07881-6\_19},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/SimouKKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SimouKKG14a,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  editor       = {Lazaros S. Iliadis and
                  Michael P. Papazoglou and
                  Klaus Pohl},
  title        = {Cloud Forensics Solutions: {A} Review},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2014 International
                  Workshops, Thessaloniki, Greece, June 16-20, 2014. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {178},
  pages        = {299--309},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07869-4\_28},
  doi          = {10.1007/978-3-319-07869-4\_28},
  timestamp    = {Sun, 02 Oct 2022 15:55:56 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/SimouKKG14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfhr/ParaskevasSK14,
  author       = {Diamantatos Paraskevas and
                  Stefanos Gritzalis and
                  Ergina Kavallieratou},
  title        = {Writer Identification Using a Statistical and Model Based Approach},
  booktitle    = {14th International Conference on Frontiers in Handwriting Recognition,
                  {ICFHR} 2014, Crete, Greece, September 1-4, 2014},
  pages        = {589--594},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICFHR.2014.104},
  doi          = {10.1109/ICFHR.2014.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfhr/ParaskevasSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/ChalarisCG14,
  author       = {Ioannis Chalaris and
                  Manolis Chalaris and
                  Stefanos Gritzalis},
  editor       = {Sokratis K. Katsikas and
                  Michael Hatzopoulos and
                  Theodoros Apostolopoulos and
                  Dimosthenis Anagnostopoulos and
                  Elias Carayiannis and
                  Theodora A. Varvarigou and
                  Mara Nikolaidou},
  title        = {A holistic approach for quality assurance and advanced decision making
                  for academic institutions using the balanced scorecard technique},
  booktitle    = {18th Panhellenic Conference on Informatics, {PCI} '14, Athens, Greece,
                  October 2-4, 2014},
  pages        = {44:1--44:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2645791.2645820},
  doi          = {10.1145/2645791.2645820},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/ChalarisCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BeckersFGHKM14,
  author       = {Kristian Beckers and
                  Stephan Fa{\ss}bender and
                  Stefanos Gritzalis and
                  Maritta Heisel and
                  Christos Kalloniatis and
                  Rene Meis},
  editor       = {Claudia Eckert and
                  Sokratis K. Katsikas and
                  G{\"{u}}nther Pernul},
  title        = {Privacy-Aware Cloud Deployment Scenario Selection},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 11th International
                  Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8647},
  pages        = {94--105},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09770-1\_9},
  doi          = {10.1007/978-3-319-09770-1\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/BeckersFGHKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DamopoulosKG13,
  author       = {Dimitrios Damopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {From keyloggers to touchloggers: Take the rough with the smooth},
  journal      = {Comput. Secur.},
  volume       = {32},
  pages        = {102--114},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2012.10.002},
  doi          = {10.1016/J.COSE.2012.10.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DamopoulosKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnagnostopoulosKKLG13,
  author       = {Marios Anagnostopoulos and
                  Georgios Kambourakis and
                  Panagiotis Kopanos and
                  Georgios Louloudakis and
                  Stefanos Gritzalis},
  title        = {{DNS} amplification attack revisited},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {475--485},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.10.001},
  doi          = {10.1016/J.COSE.2013.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AnagnostopoulosKKLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KoliasKG13,
  author       = {Constantinos Kolias and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {Attacks and Countermeasures on 802.16: Analysis and Assessment},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {15},
  number       = {1},
  pages        = {487--514},
  year         = {2013},
  url          = {https://doi.org/10.1109/SURV.2012.021312.00138},
  doi          = {10.1109/SURV.2012.021312.00138},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KoliasKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecr/GritzalisZJ13,
  author       = {Stefanos Gritzalis and
                  Justin Z. Zhan and
                  Kitae Jeong},
  title        = {{IT} convergence and security},
  journal      = {Electron. Commer. Res.},
  volume       = {13},
  number       = {3},
  pages        = {237--241},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10660-013-9114-3},
  doi          = {10.1007/S10660-013-9114-3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ecr/GritzalisZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijapuc/BelsisSG13,
  author       = {Petros Belsis and
                  Christos Skourlas and
                  Stefanos Gritzalis},
  title        = {A Wireless System for Secure Electronic Healthcare Records Management},
  journal      = {Int. J. Adv. Pervasive Ubiquitous Comput.},
  volume       = {5},
  number       = {4},
  pages        = {16--32},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijapuc.2013100102},
  doi          = {10.4018/IJAPUC.2013100102},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijapuc/BelsisSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/RizomiliotisG13,
  author       = {Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  title        = {On the security of AUTH, a provably secure authentication protocol
                  based on the subspace {LPN} problem},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {151--154},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0188-z},
  doi          = {10.1007/S10207-012-0188-Z},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/RizomiliotisG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Pereniguez-GarciaLKRGG13,
  author       = {Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez and
                  Georgios Kambourakis and
                  Antonio Ruiz{-}Mart{\'{\i}}nez and
                  Stefanos Gritzalis and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {{KAMU:} providing advanced user privacy in Kerberos multi-domain scenarios},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {6},
  pages        = {505--525},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0201-1},
  doi          = {10.1007/S10207-013-0201-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Pereniguez-GarciaLKRGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/MouratidisIKG13,
  author       = {Haralambos Mouratidis and
                  Shareeful Islam and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  title        = {A framework to support selection of cloud providers based on security
                  and privacy requirements},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {9},
  pages        = {2276--2293},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2013.03.011},
  doi          = {10.1016/J.JSS.2013.03.011},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/MouratidisIKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/GritzalisL13,
  author       = {Stefanos Gritzalis and
                  Shiguo Lian},
  title        = {Mathematical and Computer Modelling in Information System Security},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {11-12},
  pages        = {2581--2582},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.04.001},
  doi          = {10.1016/J.MCM.2013.04.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/GritzalisL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/DamopoulosKAGP13,
  author       = {Dimitrios Damopoulos and
                  Georgios Kambourakis and
                  Marios Anagnostopoulos and
                  Stefanos Gritzalis and
                  J. H. Park},
  title        = {User privacy and modern mobile services: are they on the same path?},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {17},
  number       = {7},
  pages        = {1437--1448},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00779-012-0579-1},
  doi          = {10.1007/S00779-012-0579-1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/DamopoulosKAGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/GritzalisL13,
  author       = {Stefanos Gritzalis and
                  Lin Liu},
  title        = {Requirements Engineering for Security, Privacy and Services in Cloud
                  Environments},
  journal      = {Requir. Eng.},
  volume       = {18},
  number       = {4},
  pages        = {297--298},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00766-013-0177-4},
  doi          = {10.1007/S00766-013-0177-4},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/GritzalisL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/ManousakisKKG13,
  author       = {Vassilis Manousakis and
                  Christos Kalloniatis and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  editor       = {Xavier Franch and
                  Pnina Soffer},
  title        = {Privacy in the Cloud: Bridging the Gap between Design and Implementation},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2013 International
                  Workshops, Valencia, Spain, June 17-21, 2013. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {148},
  pages        = {455--465},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38490-5\_41},
  doi          = {10.1007/978-3-642-38490-5\_41},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/ManousakisKKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/KalloniatisMMG13,
  author       = {Christos Kalloniatis and
                  Vassilis Manousakis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  editor       = {Christos Douligeris and
                  Nineta Polemi and
                  Athanasios Karantjias and
                  Winfried Lamersdorf},
  title        = {Migrating into the Cloud: Identifying the Major Security and Privacy
                  Concerns},
  booktitle    = {Collaborative, Trusted and Privacy-Aware e/m-Services - 12th {IFIP}
                  {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E}
                  2013, Athens, Greece, April 25-26, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {399},
  pages        = {73--87},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37437-1\_7},
  doi          = {10.1007/978-3-642-37437-1\_7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/KalloniatisMMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PavlidisMKIG13,
  author       = {Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Christos Kalloniatis and
                  Shareeful Islam and
                  Stefanos Gritzalis},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {Trustworthy Selection of Cloud Providers Based on Security and Privacy
                  Requirements: Justifying Trust Assumptions},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 10th International
                  Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8058},
  pages        = {185--198},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40343-9\_16},
  doi          = {10.1007/978-3-642-40343-9\_16},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/PavlidisMKIG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RizomiliotisG13,
  author       = {Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Revisiting lightweight authentication protocols based on hard learning
                  problems},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462118},
  doi          = {10.1145/2462096.2462118},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RizomiliotisG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/LianMGH12,
  author       = {Shiguo Lian and
                  Jean{-}Henry Morin and
                  Stefanos Gritzalis and
                  Gregory L. Heileman},
  title        = {Special issue on ubiquitous multimedia services},
  journal      = {Inf. Syst. Frontiers},
  volume       = {14},
  number       = {3},
  pages        = {477--479},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10796-010-9263-z},
  doi          = {10.1007/S10796-010-9263-Z},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/LianMGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/LoukasDMSKG12,
  author       = {Athanasios Loukas and
                  Dimitrios Damopoulos and
                  Sofia{-}Anna Menesidou and
                  Maria Eleni Skarkala and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {{MILC:} {A} secure and privacy-preserving mobile instant locator with
                  chatting},
  journal      = {Inf. Syst. Frontiers},
  volume       = {14},
  number       = {3},
  pages        = {481--497},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10796-010-9254-0},
  doi          = {10.1007/S10796-010-9254-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/LoukasDMSKG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenLYG12,
  author       = {Xi Chen and
                  Shiguo Lian and
                  Chu{-}Sing Yang and
                  Stefanos Gritzalis},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {7},
  number       = {2},
  pages        = {219--221},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.2.219-221},
  doi          = {10.4304/JNW.7.2.219-221},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenLYG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/MouratidisKIHG12,
  author       = {Haralambos Mouratidis and
                  Christos Kalloniatis and
                  Shareeful Islam and
                  Marc{-}Philippe Huget and
                  Stefanos Gritzalis},
  title        = {Aligning Security and Privacy to Support the Development of Secure
                  Information Systems},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {18},
  number       = {12},
  pages        = {1608--1627},
  year         = {2012},
  url          = {https://doi.org/10.3217/jucs-018-12-1608},
  doi          = {10.3217/JUCS-018-12-1608},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/MouratidisKIHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinLG12,
  author       = {Xiaodong Lin and
                  Jianwei Liu and
                  Stefanos Gritzalis},
  title        = {Security and privacy in emerging information technologies},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {1},
  pages        = {1--2},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.394},
  doi          = {10.1002/SEC.394},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LinLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DamopoulosMKPCG12,
  author       = {Dimitrios Damopoulos and
                  Sofia{-}Anna Menesidou and
                  Georgios Kambourakis and
                  Maria Papadaki and
                  Nathan L. Clarke and
                  Stefanos Gritzalis},
  title        = {Evaluation of anomaly-based {IDS} for mobile devices using machine
                  learning classifiers},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {1},
  pages        = {3--14},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.341},
  doi          = {10.1002/SEC.341},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DamopoulosMKPCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TsakountakisKG12,
  author       = {Alexandros Tsakountakis and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {{SIPA:} generic and secure accounting for {SIP}},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {9},
  pages        = {1006--1027},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.387},
  doi          = {10.1002/SEC.387},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TsakountakisKG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/RizomiliotisG12,
  author       = {Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {{GHB} {\#}: {A} Provably Secure HB-Like Lightweight Authentication
                  Protocol},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {489--506},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_29},
  doi          = {10.1007/978-3-642-31284-7\_29},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/RizomiliotisG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/SkarkalaMGMTM12,
  author       = {Maria Eleni Skarkala and
                  Manolis Maragoudakis and
                  Stefanos Gritzalis and
                  Lilian Mitrou and
                  Hannu Toivonen and
                  Pirjo Moen},
  title        = {Privacy Preservation by k-Anonymization of Weighted Social Networks},
  booktitle    = {International Conference on Advances in Social Networks Analysis and
                  Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012},
  pages        = {423--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ASONAM.2012.75},
  doi          = {10.1109/ASONAM.2012.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/SkarkalaMGMTM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/KalloniatisBKG12,
  author       = {Christos Kalloniatis and
                  Petros Belsis and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  editor       = {Marko Bajec and
                  Johann Eder},
  title        = {Applying Soft Computing Technologies for Implementing Privacy-Aware
                  Systems},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2012 International
                  Workshops, Gda{\'{n}}sk, Poland, June 25-26, 2012. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {112},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31069-0\_3},
  doi          = {10.1007/978-3-642-31069-0\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/KalloniatisBKG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/BelsisGMSV12,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Catherine Marinagi and
                  Christos Skourlas and
                  Dimitris Vassis},
  title        = {Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing
                  Students},
  booktitle    = {16th Panhellenic Conference on Informatics, {PCI} 2012, Piraeus, Greece,
                  October 5-7, 2012},
  pages        = {369--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PCi.2012.66},
  doi          = {10.1109/PCI.2012.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/BelsisGMSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/LianGNL11,
  author       = {Shiguo Lian and
                  Stefanos Gritzalis and
                  Nadia Nedjah and
                  Iuon{-}Chang Lin},
  title        = {Special issue on soft computing for information system security},
  journal      = {Appl. Soft Comput.},
  volume       = {11},
  number       = {7},
  pages        = {4257--4259},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.asoc.2011.05.040},
  doi          = {10.1016/J.ASOC.2011.05.040},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/LianGNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/KalloniatisBG11,
  author       = {Christos Kalloniatis and
                  Petros Belsis and
                  Stefanos Gritzalis},
  title        = {A soft computing approach for privacy requirements engineering: The
                  PriS framework},
  journal      = {Appl. Soft Comput.},
  volume       = {11},
  number       = {7},
  pages        = {4341--4348},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.asoc.2010.10.012},
  doi          = {10.1016/J.ASOC.2010.10.012},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/KalloniatisBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KambourakisKGP11,
  author       = {Georgios Kambourakis and
                  Constantinos Kolias and
                  Stefanos Gritzalis and
                  Jong Hyuk Park},
  title        = {DoS attacks exploiting signaling in {UMTS} and {IMS}},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {3},
  pages        = {226--235},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.02.010},
  doi          = {10.1016/J.COMCOM.2010.02.010},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/KambourakisKGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pereniguez-GarciaLKGG11,
  author       = {Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez and
                  Georgios Kambourakis and
                  Stefanos Gritzalis and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {PrivaKERB: {A} user privacy framework for Kerberos},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {6-7},
  pages        = {446--463},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.04.001},
  doi          = {10.1016/J.COSE.2011.04.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pereniguez-GarciaLKGG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KlaoudatouKKG11,
  author       = {Eleni Klaoudatou and
                  Elisavet Konstantinou and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {A Survey on Cluster-Based Group Key Agreement Protocols for WSNs},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {13},
  number       = {3},
  pages        = {429--442},
  year         = {2011},
  url          = {https://doi.org/10.1109/SURV.2011.061710.00109},
  doi          = {10.1109/SURV.2011.061710.00109},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KlaoudatouKKG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/KaropoulosKG11,
  author       = {Giorgos Karopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {PrivaSIP: Ad-hoc identity privacy in {SIP}},
  journal      = {Comput. Stand. Interfaces},
  volume       = {33},
  number       = {3},
  pages        = {301--314},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.csi.2010.07.002},
  doi          = {10.1016/J.CSI.2010.07.002},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KaropoulosKG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/FrantzeskouMSGG11,
  author       = {Georgia Frantzeskou and
                  Stephen G. MacDonell and
                  Efstathios Stamatatos and
                  Stelios Georgiou and
                  Stefanos Gritzalis},
  title        = {The significance of user-defined identifiers in Java source code authorship
                  identification},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {26},
  number       = {2},
  year         = {2011},
  timestamp    = {Thu, 23 Aug 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/FrantzeskouMSGG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitr/BelsisSG11,
  author       = {Petros Belsis and
                  Christos Skourlas and
                  Stefanos Gritzalis},
  title        = {Secure Electronic Healthcare Records Management in Wireless Environments},
  journal      = {J. Inf. Technol. Res.},
  volume       = {4},
  number       = {4},
  pages        = {1--17},
  year         = {2011},
  url          = {https://doi.org/10.4018/jitr.2011100101},
  doi          = {10.4018/JITR.2011100101},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitr/BelsisSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmm2/LianLGC11,
  author       = {Shiguo Lian and
                  Zhu Li and
                  Stefanos Gritzalis and
                  Xi Chen},
  title        = {Guest Editorial},
  journal      = {J. Multim.},
  volume       = {6},
  number       = {4},
  pages        = {317--319},
  year         = {2011},
  url          = {https://doi.org/10.4304/jmm.6.4.317-319},
  doi          = {10.4304/JMM.6.4.317-319},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmm2/LianLGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/LuoLLYG11,
  author       = {Xiangyang Luo and
                  Fenlin Liu and
                  Shiguo Lian and
                  Chunfang Yang and
                  Stefanos Gritzalis},
  title        = {On the Typical Statistic Features for Image Blind Steganalysis},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {29},
  number       = {7},
  pages        = {1404--1422},
  year         = {2011},
  url          = {https://doi.org/10.1109/JSAC.2011.110807},
  doi          = {10.1109/JSAC.2011.110807},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/LuoLLYG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/AntonBGM11,
  author       = {Annie I. Ant{\'{o}}n and
                  Travis D. Breaux and
                  Stefanos Gritzalis and
                  John Mylopoulos},
  title        = {Digital privacy: theory, policies and technologies},
  journal      = {Requir. Eng.},
  volume       = {16},
  number       = {1},
  pages        = {1--2},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00766-011-0117-0},
  doi          = {10.1007/S00766-011-0117-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/AntonBGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ParkGJW11,
  author       = {Jong Hyuk Park and
                  Stefanos Gritzalis and
                  Hai Jin and
                  Jenlong Wang},
  title        = {Network security and digital forensics in next generation communications},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {143--145},
  year         = {2011},
  url          = {https://doi.org/10.1002/wcm.1091},
  doi          = {10.1002/WCM.1091},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/ParkGJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/RizomiliotisRG11,
  author       = {Panagiotis Rizomiliotis and
                  Evangelos Rekleitis and
                  Stefanos Gritzalis},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Designing secure {RFID} authentication protocols is (still) a non-trivial
                  task},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {73--80},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6059962},
  doi          = {10.1109/ICNSS.2011.6059962},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/RizomiliotisRG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DamopoulosKG11,
  author       = {Dimitrios Damopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {iSAM: An iPhone Stealth Airborne Malware},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_2},
  doi          = {10.1007/978-3-642-21424-0\_2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DamopoulosKG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/SkarkalaMGM11,
  author       = {Maria Eleni Skarkala and
                  Manolis Maragoudakis and
                  Stefanos Gritzalis and
                  Lilian Mitrou},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {Privacy Preserving Tree Augmented Na{\"{\i}}ve Bayesian Multi-party
                  Implementation on Horizontally Partitioned Databases},
  booktitle    = {Trust, Privacy and Security in Digital Business - 8th International
                  Conference, TrustBus 2011, Toulouse, France, August 29 - September
                  2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6863},
  pages        = {62--73},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22890-2\_6},
  doi          = {10.1007/978-3-642-22890-2\_6},
  timestamp    = {Mon, 03 Jan 2022 22:15:13 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/SkarkalaMGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/KambourakisKG10,
  author       = {Georgios Kambourakis and
                  Elisavet Konstantinou and
                  Stefanos Gritzalis},
  title        = {Revisiting WiMAX {MBS} security},
  journal      = {Comput. Math. Appl.},
  volume       = {60},
  number       = {2},
  pages        = {217--223},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.camwa.2009.12.032},
  doi          = {10.1016/J.CAMWA.2009.12.032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/KambourakisKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChenGLL10,
  author       = {Chang Wen Chen and
                  Stefanos Gritzalis and
                  Pascal Lorenz and
                  Shiguo Lian},
  title        = {Special issue on multimedia networking and security in convergent
                  networks},
  journal      = {Comput. Commun.},
  volume       = {33},
  number       = {14},
  pages        = {1575--1577},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comcom.2010.07.003},
  doi          = {10.1016/J.COMCOM.2010.07.003},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChenGLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PereniguezKLGG10,
  author       = {Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and
                  Georgios Kambourakis and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez and
                  Stefanos Gritzalis and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {Privacy-enhanced fast re-authentication for EAP-based next generation
                  network},
  journal      = {Comput. Commun.},
  volume       = {33},
  number       = {14},
  pages        = {1682--1694},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comcom.2010.02.021},
  doi          = {10.1016/J.COMCOM.2010.02.021},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/PereniguezKLGG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ThuraisinghamG10,
  author       = {Bhavani Thuraisingham and
                  Stefanos Gritzalis},
  title        = {Information and communications security, privacy and trust: Standards
                  and regulations},
  journal      = {Comput. Stand. Interfaces},
  volume       = {32},
  number       = {5-6},
  pages        = {229},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.csi.2010.04.001},
  doi          = {10.1016/J.CSI.2010.04.001},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/ThuraisinghamG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iasc/KambourakisGP10,
  author       = {Georgios Kambourakis and
                  Stefanos Gritzalis and
                  Jong Hyuk Park},
  title        = {Device Authentication In Wireless And Pervasive Environments},
  journal      = {Intell. Autom. Soft Comput.},
  volume       = {16},
  number       = {3},
  pages        = {399--418},
  year         = {2010},
  url          = {https://doi.org/10.1080/10798587.2010.10643089},
  doi          = {10.1080/10798587.2010.10643089},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iasc/KambourakisGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KaropoulosKGK10,
  author       = {Giorgos Karopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis and
                  Elisavet Konstantinou},
  title        = {A framework for identity privacy in {SIP}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {33},
  number       = {1},
  pages        = {16--28},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jnca.2009.07.004},
  doi          = {10.1016/J.JNCA.2009.07.004},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KaropoulosKGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/MitsevaAMPSGWBP10,
  author       = {Anelia Mitseva and
                  Efthimia Aivaloglou and
                  Maria Marchitti and
                  Neeli Rashmi Prasad and
                  Charalabos Skianis and
                  Stefanos Gritzalis and
                  Adrian Waller and
                  Timothy Baug{\'{e}} and
                  Sarah Pennington},
  title        = {Towards adaptive security for convergent wireless sensor networks
                  in beyond 3G environments},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {10},
  number       = {9},
  pages        = {1193--1207},
  year         = {2010},
  url          = {https://doi.org/10.1002/wcm.678},
  doi          = {10.1002/WCM.678},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/MitsevaAMPSGWBP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/AivaloglouG10,
  author       = {Efthimia Aivaloglou and
                  Stefanos Gritzalis},
  title        = {Hybrid trust and reputation management for sensor networks},
  journal      = {Wirel. Networks},
  volume       = {16},
  number       = {5},
  pages        = {1493--1510},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11276-009-0216-8},
  doi          = {10.1007/S11276-009-0216-8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/AivaloglouG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/DrogkarisGL10,
  author       = {Prokopios Drogkaris and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  editor       = {Kim Normann Andersen and
                  Enrico Francesconi and
                  {\AA}ke Gr{\"{o}}nlund and
                  Tom M. van Engers},
  title        = {Transforming the Greek e-Government Environment towards the e-Gov
                  2.0 Era},
  booktitle    = {Electronic Government and the Information Systems Perspective, First
                  International Conference, {EGOVIS} 2010, Bilbao, Spain, August 31
                  - September 2, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6267},
  pages        = {142--149},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15172-9\_14},
  doi          = {10.1007/978-3-642-15172-9\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/egov/DrogkarisGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/DrogkarisG10,
  author       = {Prokopios Drogkaris and
                  Stefanos Gritzalis},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {Attaching Multiple Personal Identifiers in {X.509} Digital Certificates},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {171--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_12},
  doi          = {10.1007/978-3-642-22633-5\_12},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/DrogkarisG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/TsohouKLG10,
  author       = {Aggeliki Tsohou and
                  Spyros Kokolakis and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis},
  editor       = {Nathan L. Clarke and
                  Steven Furnell and
                  Rossouw von Solms},
  title        = {Unifying {ISO} Security Standards Practices into a Single Security
                  Framework},
  booktitle    = {South African Information Security Multi-Conference, {SAISMC} 2010,
                  Port Elizabeth, South Africa, May 17-18, 2010. Proceedings},
  pages        = {188--203},
  publisher    = {University of Plymouth},
  year         = {2010},
  url          = {http://www.cscan.org/openaccess/?paperid=196},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/TsohouKLG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/HogbenG10,
  author       = {Giles Hogben and
                  Stefanos Gritzalis},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {IS'10 - {PC} Co-chairs Message},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2010 - Confederated
                  International Conferences: CoopIS, IS, {DOA} and ODBASE, Hersonissos,
                  Crete, Greece, October 25-29, 2010, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6426},
  pages        = {582},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16934-2\_43},
  doi          = {10.1007/978-3-642-16934-2\_43},
  timestamp    = {Thu, 14 Oct 2021 10:28:29 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/HogbenG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/RekleitisRG10,
  author       = {Evangelos Rekleitis and
                  Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Miguel Soriano},
  title        = {An Agent Based Back-End {RFID} Tag Management System},
  booktitle    = {Trust, Privacy and Security in Digital Business, 7th International
                  Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6264},
  pages        = {165--176},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15152-1\_15},
  doi          = {10.1007/978-3-642-15152-1\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/RekleitisRG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/TsakountakisKG09,
  author       = {Alexandros Tsakountakis and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {A generic accounting scheme for next generation networks},
  journal      = {Comput. Networks},
  volume       = {53},
  number       = {14},
  pages        = {2408--2426},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comnet.2009.04.009},
  doi          = {10.1016/J.COMNET.2009.04.009},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/TsakountakisKG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/MagkosMCG09,
  author       = {Emmanouil Magkos and
                  Manolis Maragoudakis and
                  Vassilios Chrissikopoulos and
                  Stefanos Gritzalis},
  title        = {Accurate and large-scale privacy-preserving data mining using the
                  election paradigm},
  journal      = {Data Knowl. Eng.},
  volume       = {68},
  number       = {11},
  pages        = {1224--1236},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.datak.2009.06.003},
  doi          = {10.1016/J.DATAK.2009.06.003},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/MagkosMCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/RizomiliotisRG09,
  author       = {Panagiotis Rizomiliotis and
                  Evangelos Rekleitis and
                  Stefanos Gritzalis},
  title        = {Security analysis of the song-mitchell authentication protocol for
                  low-cost {RFID} tags},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {13},
  number       = {4},
  pages        = {274--276},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCOMM.2009.082117},
  doi          = {10.1109/LCOMM.2009.082117},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/RizomiliotisRG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/KarydaGPK09,
  author       = {Maria Karyda and
                  Stefanos Gritzalis and
                  Jong Hyuk Park and
                  Spyros Kokolakis},
  title        = {Privacy and fair information practices in ubiquitous environments:
                  Research challenges and future directions},
  journal      = {Internet Res.},
  volume       = {19},
  number       = {2},
  pages        = {194--208},
  year         = {2009},
  url          = {https://doi.org/10.1108/10662240910952346},
  doi          = {10.1108/10662240910952346},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/KarydaGPK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BelsisFGS09,
  author       = {Petros Belsis and
                  Kostas Fragos and
                  Stefanos Gritzalis and
                  Christos Skourlas},
  title        = {Applying effective feature selection techniques with hierarchical
                  mixtures of experts for spam classification},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {239--268},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0377},
  doi          = {10.3233/JCS-2009-0377},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BelsisFGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BoukasKG09,
  author       = {Lambros Boukas and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {Pandora: An SMS-oriented m-informational system for educational realms},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {32},
  number       = {3},
  pages        = {684--702},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jnca.2008.07.002},
  doi          = {10.1016/J.JNCA.2008.07.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/BoukasKG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/LianZGC09,
  author       = {Shiguo Lian and
                  Yan Zhang and
                  Stefanos Gritzalis and
                  Yu Chen},
  title        = {Multimedia Security in Communication {(MUSIC)}},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {15},
  number       = {2},
  pages        = {398--400},
  year         = {2009},
  url          = {http://www.jucs.org/jucs\_15\_2/multimedia\_security\_in\_communication},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/LianZGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/KohDGH09,
  author       = {Byoung{-}Soo Koh and
                  Mieso K. Denko and
                  Stefanos Gritzalis and
                  Ching{-}Hsien Hsu},
  title        = {Data Security and Privacy Protection in Pervasive Computing Environments},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {15},
  number       = {5},
  pages        = {967--969},
  year         = {2009},
  url          = {http://www.jucs.org/jucs\_15\_5/data\_security\_and\_privacy},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/KohDGH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/TsohouKLG09,
  author       = {Aggeliki Tsohou and
                  Spyros Kokolakis and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis},
  editor       = {Alexander B. Sideridis and
                  Charalampos Z. Patrikakis},
  title        = {Information Systems Security Management: {A} Review and a Classification
                  of the {ISO} Standards},
  booktitle    = {Next Generation Society. Technological and Legal Issues - Third International
                  Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {26},
  pages        = {220--235},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11631-5\_21},
  doi          = {10.1007/978-3-642-11631-5\_21},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edemocracy/TsohouKLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AivaloglouG09,
  author       = {Efthimia Aivaloglou and
                  Stefanos Gritzalis},
  title        = {Trust-Based Data Disclosure in Sensor Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199546},
  doi          = {10.1109/ICC.2009.5199546},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/AivaloglouG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/GeneiatakisLG09,
  author       = {Dimitris Geneiatakis and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {A Hierarchical Model for Cross-Domain Communication of Health Care
                  Units},
  booktitle    = {Third International Conference on Network and System Security, {NSS}
                  2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  pages        = {123--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NSS.2009.84},
  doi          = {10.1109/NSS.2009.84},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/GeneiatakisLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/GritzalisC09,
  author       = {Stefanos Gritzalis and
                  Xueqi Cheng},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {{IS} 2009 - {PC} Co-chairs' Message},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated
                  International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura,
                  Portugal, November 1-6, 2009, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5871},
  pages        = {797},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05151-7\_3},
  doi          = {10.1007/978-3-642-05151-7\_3},
  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/GritzalisC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/KalloniatisKG09,
  author       = {Christos Kalloniatis and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  editor       = {Vassilios Chrissikopoulos and
                  Nikolaos Alexandris and
                  Christos Douligeris and
                  Spyros Sioutas},
  title        = {Methods for Designing Privacy Aware Information Systems: {A} Review},
  booktitle    = {{PCI} 2009, 13th Panhellenic Conference on Informatics, 10-12 September
                  2009, Corfu, Greece},
  pages        = {185--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PCI.2009.45},
  doi          = {10.1109/PCI.2009.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/KalloniatisKG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/petra/VassisBSG09,
  author       = {Dimitris Vassis and
                  Petros Belsis and
                  Christos Skourlas and
                  Stefanos Gritzalis},
  title        = {End to end secure communication in ad-hoc assistive medical environments
                  using secure paths},
  booktitle    = {Proceedings of the 2nd International Conference on Pervasive Technologies
                  Related to Assistive Environments, {PETRA} 2009, Corfu, Greece, June
                  9-13, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1579114.1579184},
  doi          = {10.1145/1579114.1579184},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/petra/VassisBSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/KambourakisKGP09,
  author       = {Georgios Kambourakis and
                  Constantinos Kolias and
                  Stefanos Gritzalis and
                  Jong Hyuk Park},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Signaling-Oriented DoS Attacks in {UMTS} Networks},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {280--289},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_29},
  doi          = {10.1007/978-3-642-02617-1\_29},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/KambourakisKGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KlaoudatouKKG09,
  author       = {Eleni Klaoudatou and
                  Elisavet Konstantinou and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {A Cluster-Based Framework for the Security of Medical Sensor Environments},
  booktitle    = {Trust, Privacy and Security in Digital Business, 6th International
                  Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5695},
  pages        = {52--62},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03748-1\_6},
  doi          = {10.1007/978-3-642-03748-1\_6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/KlaoudatouKKG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/RomanLG08,
  author       = {Rodrigo Roman and
                  Javier L{\'{o}}pez and
                  Stefanos Gritzalis},
  title        = {Situation awareness mechanisms for wireless sensor networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {46},
  number       = {4},
  pages        = {102--107},
  year         = {2008},
  url          = {https://doi.org/10.1109/MCOM.2008.4481348},
  doi          = {10.1109/MCOM.2008.4481348},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/RomanLG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/AntoniouSGU08,
  author       = {Giannakis Antoniou and
                  Leon Sterling and
                  Stefanos Gritzalis and
                  Parampalli Udaya},
  title        = {Privacy and forensics investigation process: The {ERPINA} protocol},
  journal      = {Comput. Stand. Interfaces},
  volume       = {30},
  number       = {4},
  pages        = {229--236},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.csi.2007.10.008},
  doi          = {10.1016/J.CSI.2007.10.008},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/AntoniouSGU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BalopoulosGK08,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Specifying and implementing privacy-preserving cryptographic protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {395--420},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0057-y},
  doi          = {10.1007/S10207-008-0057-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BalopoulosGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsose/AivaloglouGS08,
  author       = {Efthimia Aivaloglou and
                  Stefanos Gritzalis and
                  Charalabos Skianis},
  title        = {Trust establishment in sensor networks: behaviour-based, certificate-based
                  and a combinational approach},
  journal      = {Int. J. Syst. Syst. Eng.},
  volume       = {1},
  number       = {1/2},
  pages        = {128--148},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSSE.2008.018135},
  doi          = {10.1504/IJSSE.2008.018135},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsose/AivaloglouGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BelsisFGS08,
  author       = {Petros Belsis and
                  Kostas Fragos and
                  Stefanos Gritzalis and
                  Christos Skourlas},
  title        = {Applying effective feature selection techniques with hierarchical
                  mixtures of experts for spam classification},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {761--790},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2008-0319},
  doi          = {10.3233/JCS-2008-0319},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BelsisFGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/FrantzeskouMSG08,
  author       = {Georgia Frantzeskou and
                  Stephen G. MacDonell and
                  Efstathios Stamatatos and
                  Stefanos Gritzalis},
  title        = {Examining the significance of high-level programming features in source
                  code author classification},
  journal      = {J. Syst. Softw.},
  volume       = {81},
  number       = {3},
  pages        = {447--460},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jss.2007.03.004},
  doi          = {10.1016/J.JSS.2007.03.004},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/FrantzeskouMSG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/KalloniatisKG08,
  author       = {Christos Kalloniatis and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  title        = {Addressing privacy requirements in system design: the PriS method},
  journal      = {Requir. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {241--255},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00766-008-0067-3},
  doi          = {10.1007/S00766-008-0067-3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/KalloniatisKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/VouyioukasKMRKG08,
  author       = {Demosthenes Vouyioukas and
                  Georgios Kambourakis and
                  Ilias Maglogiannis and
                  Angelos N. Rouskas and
                  Constantinos Kolias and
                  Stefanos Gritzalis},
  title        = {Enabling the provision of secure web based m-health services utilizing
                  {XML} based security models},
  journal      = {Secur. Commun. Networks},
  volume       = {1},
  number       = {5},
  pages        = {375--388},
  year         = {2008},
  url          = {https://doi.org/10.1002/sec.46},
  doi          = {10.1002/SEC.46},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/VouyioukasKMRKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KlaoudatouKKG08,
  author       = {Eleni Klaoudatou and
                  Elisavet Konstantinou and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {Clustering Oriented Architectures in Medical Sensor Environments},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {929--934},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.145},
  doi          = {10.1109/ARES.2008.145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KlaoudatouKKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YannacopoulosLGXK08,
  author       = {Athanasios N. Yannacopoulos and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis and
                  Stylianos Z. Xanthopoulos and
                  Sokratis K. Katsikas},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Modeling Privacy Insurance Contracts and Their Utilization in Risk
                  Management for {ICT} Firms},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_14},
  doi          = {10.1007/978-3-540-88313-5\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YannacopoulosLGXK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/KaropoulosKG08,
  author       = {Giorgos Karopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {Caller identity privacy in {SIP} heterogeneous realms: {A} practical
                  solution},
  booktitle    = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2008), July 6-9, Marrakech, Morocco},
  pages        = {37--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCC.2008.4625770},
  doi          = {10.1109/ISCC.2008.4625770},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/KaropoulosKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iswcs/KambourakisKG08,
  author       = {Georgios Kambourakis and
                  Elisavet Konstantinou and
                  Stefanos Gritzalis},
  title        = {Binary tree based public-key management for Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the 2008 5th International Symposium on Wireless Communication
                  Systems, {ISWCS} 2008, 21-24 October 2008, Reykjav{\'{\i}}k,
                  Iceland},
  pages        = {687--692},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISWCS.2008.4726144},
  doi          = {10.1109/ISWCS.2008.4726144},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iswcs/KambourakisKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KaropoulosKG08,
  author       = {Giorgos Karopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {Privacy Protection in Context Transfer Protocol},
  booktitle    = {16th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing {(PDP} 2008), 13-15 February 2008, Toulouse,
                  France},
  pages        = {590--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PDP.2008.60},
  doi          = {10.1109/PDP.2008.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KaropoulosKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psd/MagkosMCG08,
  author       = {Emmanouil Magkos and
                  Manolis Maragoudakis and
                  Vassilios Chrissikopoulos and
                  Stefanos Gritzalis},
  editor       = {Josep Domingo{-}Ferrer and
                  Y{\"{u}}cel Saygin},
  title        = {Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic
                  Elections},
  booktitle    = {Privacy in Statistical Databases, {UNESCO} Chair in Data Privacy International
                  Conference, {PSD} 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5262},
  pages        = {284--297},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87471-3\_24},
  doi          = {10.1007/978-3-540-87471-3\_24},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/psd/MagkosMCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TsakountakisKG08,
  author       = {Alexandros Tsakountakis and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {A new Accounting Mechanism for Modern and Future {AAA} Services},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {693--697},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_47},
  doi          = {10.1007/978-0-387-09699-5\_47},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TsakountakisKG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/MuellerNGL08,
  author       = {Peter Mueller and
                  Kaisa Nyberg and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  title        = {Message from the SecPri Workshop Organizing Technical Co-chairs},
  booktitle    = {{IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2008, Avignon, France, 12-14
                  October 2008, Proceedings},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WiMob.2008.129},
  doi          = {10.1109/WIMOB.2008.129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/MuellerNGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/GritzalisL08,
  author       = {Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  title        = {{IEEE} 802.11 Wireless LANs (WLANs): Security},
  booktitle    = {Encyclopedia of Wireless and Mobile Communications},
  year         = {2008},
  url          = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043913},
  doi          = {10.1081/E-EWMC-120043913},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/GritzalisL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/KambourakisKRG07,
  author       = {Georgios Kambourakis and
                  Denise{-}Penelope N. Kontoni and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis},
  title        = {A {PKI} approach for deploying modern secure distributed e-learning
                  and m-learning environments},
  journal      = {Comput. Educ.},
  volume       = {48},
  number       = {1},
  pages        = {1--16},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.compedu.2004.10.017},
  doi          = {10.1016/J.COMPEDU.2004.10.017},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ce/KambourakisKRG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/GeneiatakisKLDG07,
  author       = {Dimitris Geneiatakis and
                  Georgios Kambourakis and
                  Costas Lambrinoudakis and
                  Tasos Dagiuklas and
                  Stefanos Gritzalis},
  title        = {A framework for protecting a SIP-based infrastructure against malformed
                  message attacks},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {10},
  pages        = {2580--2593},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2006.11.014},
  doi          = {10.1016/J.COMNET.2006.11.014},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/GeneiatakisKLDG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/KaropoulosKG07,
  author       = {Giorgos Karopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  title        = {Survey of secure handoff optimization schemes for multimedia services
                  over all-IP wireless heterogeneous networks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {9},
  number       = {1-4},
  pages        = {18--28},
  year         = {2007},
  url          = {https://doi.org/10.1109/COMST.2007.4317619},
  doi          = {10.1109/COMST.2007.4317619},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/KaropoulosKG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/FrantzeskouSGCH07,
  author       = {Georgia Frantzeskou and
                  Efstathios Stamatatos and
                  Stefanos Gritzalis and
                  Carole E. Chaski and
                  Blake Stephen Howald},
  title        = {Identifying Authorship by Byte-Level N-Grams: The Source Code Author
                  Profile {(SCAP)} Method},
  journal      = {Int. J. Digit. EVid.},
  volume       = {6},
  number       = {1},
  year         = {2007},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C829-0387-009D214D2170C321.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/FrantzeskouSGCH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijeh/BelsisDGBG07,
  author       = {Meletis A. Belsis and
                  Ashish N. Dwivedi and
                  Stefanos Gritzalis and
                  Rajeev K. Bali and
                  Raouf N. Gorgui{-}Naguib},
  title        = {Providing secure mAccess to medical information},
  journal      = {Int. J. Electron. Heal.},
  volume       = {3},
  number       = {1},
  pages        = {51--71},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJEH.2007.011480},
  doi          = {10.1504/IJEH.2007.011480},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijeh/BelsisDGBG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GritzalisYLHK07,
  author       = {Stefanos Gritzalis and
                  Athanasios N. Yannacopoulos and
                  Costas Lambrinoudakis and
                  Petros Hatzopoulos and
                  Sokratis K. Katsikas},
  title        = {A probabilistic model for optimal insurance contracts against security
                  risks and privacy violation in {IT} outsourcing environments},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {4},
  pages        = {197--211},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0010-x},
  doi          = {10.1007/S10207-006-0010-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GritzalisYLHK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesGP07,
  author       = {Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {359--360},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0034-x},
  doi          = {10.1007/S10207-007-0034-X},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/OnievaLRZG07,
  author       = {Jose Antonio Onieva and
                  Javier L{\'{o}}pez and
                  Rodrigo Roman and
                  Jianying Zhou and
                  Stefanos Gritzalis},
  title        = {Integration of non-repudiation services in mobile {DRM} scenarios},
  journal      = {Telecommun. Syst.},
  volume       = {35},
  number       = {3-4},
  pages        = {161--176},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11235-007-9050-4},
  doi          = {10.1007/S11235-007-9050-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/OnievaLRZG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/AivaloglouGS07,
  author       = {Efthimia Aivaloglou and
                  Stefanos Gritzalis and
                  Charalabos Skianis},
  title        = {Towards a flexible trust establishment framework for sensor networks},
  journal      = {Telecommun. Syst.},
  volume       = {35},
  number       = {3-4},
  pages        = {207--213},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11235-007-9049-x},
  doi          = {10.1007/S11235-007-9049-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/AivaloglouGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KambourakisKG07,
  author       = {Georgios Kambourakis and
                  Eleni Klaoudatou and
                  Stefanos Gritzalis},
  title        = {Securing Medical Sensor Environments: The CodeBlue Framework Case},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {637--643},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.135},
  doi          = {10.1109/ARES.2007.135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KambourakisKG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KalloniatisKG07,
  author       = {Christos Kalloniatis and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  title        = {Using Privacy Process Patterns for Incorporating Privacy Requirements
                  into the System Design Process},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {1009--1017},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.156},
  doi          = {10.1109/ARES.2007.156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KalloniatisKG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/BelsisGST07,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Christos Skourlas and
                  Vassilis Tsoukalas},
  editor       = {Iliano Cervesato},
  title        = {Managing Uncertainty in Access Control Decisions in Distributed Autonomous
                  Collaborative Environments},
  booktitle    = {Advances in Computer Science - {ASIAN} 2007. Computer and Network
                  Security, 12th Asian Computing Science Conference, Doha, Qatar, December
                  9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4846},
  pages        = {261--267},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76929-3\_25},
  doi          = {10.1007/978-3-540-76929-3\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/BelsisGST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/KambourakisMGG07,
  author       = {Georgios Kambourakis and
                  Tassos Moschos and
                  Dimitris Geneiatakis and
                  Stefanos Gritzalis},
  editor       = {Javier L{\'{o}}pez and
                  Bernhard M. H{\"{a}}mmerli},
  title        = {Detecting {DNS} Amplification Attacks},
  booktitle    = {Critical Information Infrastructures Security, Second International
                  Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5141},
  pages        = {185--196},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-89173-4\_16},
  doi          = {10.1007/978-3-540-89173-4\_16},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/KambourakisMGG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/KarydaGP07,
  author       = {Maria Karyda and
                  Stefanos Gritzalis and
                  Jong Hyuk Park},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {A Critical Approach to Privacy Research in Ubiquitous Environments
                  - Issues and Underlying Assumptions},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {12--21},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_2},
  doi          = {10.1007/978-3-540-77090-9\_2},
  timestamp    = {Wed, 22 Jun 2022 09:02:26 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/KarydaGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/KaropoulosKG07,
  author       = {Giorgos Karopoulos and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Hsiao{-}Hwa Chen and
                  Luciano Bononi},
  title        = {Two privacy enhanced context transfer schemes},
  booktitle    = {Q2SWinet'07 - Proceedings of the Third {ACM} Workshop on {Q2S} and
                  Security for Wireless and Mobile Networks, Chania, Crete Island, Greece,
                  October 22, 2007},
  pages        = {172--175},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1298239.1298272},
  doi          = {10.1145/1298239.1298272},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mswim/KaropoulosKG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/TsakountakisKG07,
  author       = {Alexandros Tsakountakis and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {On RSN-Oriented Wireless Intrusion Detection},
  booktitle    = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE,
                  GADA, and IS, {OTM} Confederated International Conferences CoopIS,
                  DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30,
                  2007, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4804},
  pages        = {1601--1615},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76843-2\_34},
  doi          = {10.1007/978-3-540-76843-2\_34},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/TsakountakisKG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secperu/TsakountakisKG07,
  author       = {Alexandros Tsakountakis and
                  Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Panagiotis Georgiadis and
                  Javier L{\'{o}}pez and
                  Stefanos Gritzalis and
                  Giannis F. Marias},
  title        = {Towards effective Wireless Intrusion Detection in {IEEE} 802.11i},
  booktitle    = {Third International Workshop on Security, Privacy and Trust in Pervasive
                  and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19,
                  2007},
  pages        = {37--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECPERU.2007.18},
  doi          = {10.1109/SECPERU.2007.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secperu/TsakountakisKG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BelsisGST07,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Christos Skourlas and
                  Vassilis Tsoukalas},
  editor       = {Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  title        = {Design and Implementation of Distributed Access Control Infrastructures
                  for Federations of Autonomous Domains},
  booktitle    = {Trust, Privacy and Security in Digital Business, 4th International
                  Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4657},
  pages        = {125--134},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74409-2\_15},
  doi          = {10.1007/978-3-540-74409-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/BelsisGST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KambourakisG07,
  author       = {Georgios Kambourakis and
                  Stefanos Gritzalis},
  editor       = {Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  title        = {On Device Authentication in Wireless Networks: Present Issues and
                  Future Challenges},
  booktitle    = {Trust, Privacy and Security in Digital Business, 4th International
                  Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4657},
  pages        = {135--144},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74409-2\_16},
  doi          = {10.1007/978-3-540-74409-2\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/KambourakisG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secperu/2007,
  editor       = {Panagiotis Georgiadis and
                  Javier L{\'{o}}pez and
                  Stefanos Gritzalis and
                  Giannis F. Marias},
  title        = {Third International Workshop on Security, Privacy and Trust in Pervasive
                  and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19,
                  2007},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4279756/proceeding},
  isbn         = {0-7695-2863-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secperu/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KambourakisRGG06,
  author       = {Georgios Kambourakis and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis and
                  Dimitris Geneiatakis},
  title        = {Support of subscribers' certificates in a hybrid {WLAN-3G} environment},
  journal      = {Comput. Networks},
  volume       = {50},
  number       = {11},
  pages        = {1843--1859},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comnet.2005.08.007},
  doi          = {10.1016/J.COMNET.2005.08.007},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KambourakisRGG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FotakisG06,
  author       = {Dimitris Fotakis and
                  Stefanos Gritzalis},
  title        = {Efficient heuristic algorithms for correcting the Cascade Vulnerability
                  Problem for interconnected networks},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {11},
  pages        = {2109--2122},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2006.01.007},
  doi          = {10.1016/J.COMCOM.2006.01.007},
  timestamp    = {Thu, 24 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/FotakisG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/GeneiatakisDKLGES06,
  author       = {Dimitris Geneiatakis and
                  Tasos Dagiuklas and
                  Georgios Kambourakis and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis and
                  Sven Ehlert and
                  Dorgham Sisalem},
  title        = {Survey of security vulnerabilities in session initiation protocol},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {8},
  number       = {1-4},
  pages        = {68--81},
  year         = {2006},
  url          = {https://doi.org/10.1109/COMST.2006.253270},
  doi          = {10.1109/COMST.2006.253270},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/GeneiatakisDKLGES06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Gritzalis06,
  author       = {Stefanos Gritzalis},
  title        = {Public Key Infrastructure: Research and Applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {1},
  pages        = {1--2},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-005-0075-y},
  doi          = {10.1007/S10207-005-0075-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Gritzalis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/KavakliKLG06,
  author       = {Evangelia Kavakli and
                  Christos Kalloniatis and
                  Pericles Loucopoulos and
                  Stefanos Gritzalis},
  title        = {Incorporating privacy requirements into the system design process:
                  The PriS conceptual framework},
  journal      = {Internet Res.},
  volume       = {16},
  number       = {2},
  pages        = {140--158},
  year         = {2006},
  url          = {https://doi.org/10.1108/10662240610656483},
  doi          = {10.1108/10662240610656483},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/KavakliKLG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tele/Gritzalis06,
  author       = {Stefanos Gritzalis},
  title        = {Developing a culture of privacy in the Global Village},
  journal      = {Telematics Informatics},
  volume       = {23},
  number       = {3},
  pages        = {157--163},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tele.2005.07.002},
  doi          = {10.1016/J.TELE.2005.07.002},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tele/Gritzalis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KarydaBGKLGD06,
  author       = {Maria Karyda and
                  Theodoros Balopoulos and
                  Lazaros Gymnopoulos and
                  Spyros Kokolakis and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis and
                  Stelios Dritsas},
  title        = {An ontology for secure e-government applications},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {1033--1037},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.28},
  doi          = {10.1109/ARES.2006.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KarydaBGKLGD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/PapapanagiotouM06,
  author       = {Konstantinos Papapanagiotou and
                  Giannis F. Marias and
                  Panagiotis Georgiadis and
                  Stefanos Gritzalis},
  title        = {Performance evaluation of a distributed {OCSP} protocol over MANETs},
  booktitle    = {3rd {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2006, Las Vegas, NV, USA, February 13, 2006},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CCNC.2006.1592976},
  doi          = {10.1109/CCNC.2006.1592976},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/PapapanagiotouM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/AivaloglouGS06,
  author       = {Efthimia Aivaloglou and
                  Stefanos Gritzalis and
                  Charalabos Skianis},
  editor       = {Javier L{\'{o}}pez},
  title        = {Trust Establishment in Ad Hoc and Sensor Networks},
  booktitle    = {Critical Information Infrastructures Security, First International
                  Workshop, {CRITIS} 2006, Samos, Greece, August 31 - September 1, 2006,
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4347},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11962977\_15},
  doi          = {10.1007/11962977\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/AivaloglouGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AivaloglouGS06,
  author       = {Efthimia Aivaloglou and
                  Stefanos Gritzalis and
                  Charalabos Skianis},
  title        = {Requirements and Challenges in the Design of Privacy-aware Sensor
                  Networks},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.234},
  doi          = {10.1109/GLOCOM.2006.234},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/AivaloglouGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/FrantzeskouSGK06,
  author       = {Georgia Frantzeskou and
                  Efstathios Stamatatos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Leon J. Osterweil and
                  H. Dieter Rombach and
                  Mary Lou Soffa},
  title        = {Effective identification of source code authors using byte-level information},
  booktitle    = {28th International Conference on Software Engineering {(ICSE} 2006),
                  Shanghai, China, May 20-28, 2006},
  pages        = {893--896},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134285.1134445},
  doi          = {10.1145/1134285.1134445},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/FrantzeskouSGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/BelsisGK06,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Ilias Maglogiannis and
                  Kostas Karpouzis and
                  Max Bramer},
  title        = {Optimized Multi-Domain Secure Interoperation using Soft Constraints},
  booktitle    = {Artificial Intelligence Applications and Innovations, 3rd {IFIP} Conference
                  on Artificial Intelligence Applications and Innovations {(AIAI)} 2006,
                  June 7-9, 2006, Athens, Greece},
  series       = {{IFIP}},
  volume       = {204},
  pages        = {78--85},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-34224-9\_10},
  doi          = {10.1007/0-387-34224-9\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/BelsisGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/FrantzeskouSGK06,
  author       = {Georgia Frantzeskou and
                  Efstathios Stamatatos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Ilias Maglogiannis and
                  Kostas Karpouzis and
                  Max Bramer},
  title        = {Source Code Author Identification Based on N-gram Author Profiles},
  booktitle    = {Artificial Intelligence Applications and Innovations, 3rd {IFIP} Conference
                  on Artificial Intelligence Applications and Innovations {(AIAI)} 2006,
                  June 7-9, 2006, Athens, Greece},
  series       = {{IFIP}},
  volume       = {204},
  pages        = {508--515},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-34224-9\_59},
  doi          = {10.1007/0-387-34224-9\_59},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/FrantzeskouSGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BelsisFGS06,
  author       = {Petros Belsis and
                  Kostas Fragos and
                  Stefanos Gritzalis and
                  Christos Skourlas},
  editor       = {Hisham Haddad},
  title        = {{SF-HME} system: a hierarchical mixtures-of-experts classification
                  system for spam filtering},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {354--360},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141360},
  doi          = {10.1145/1141277.1141360},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BelsisFGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BalopoulosGKKGK06,
  author       = {Theodoros Balopoulos and
                  Lazaros Gymnopoulos and
                  Maria Karyda and
                  Spyros Kokolakis and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Steven Furnell and
                  Costas Lambrinoudakis},
  title        = {A Framework for Exploiting Security Expertise in Application Development},
  booktitle    = {Trust and Privacy in Digital Business, Third International Conference,
                  TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4083},
  pages        = {62--70},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11824633\_7},
  doi          = {10.1007/11824633\_7},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/BalopoulosGKKGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BelsisGK07,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {75--86},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.032},
  doi          = {10.1016/J.ENTCS.2006.08.032},
  timestamp    = {Tue, 24 Jan 2023 13:29:56 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BelsisGK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2006,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810},
  doi          = {10.1007/11836810},
  isbn         = {3-540-38341-7},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/GousiosAG05,
  author       = {Giorgos Gousios and
                  Efthimia Aivaloglou and
                  Stefanos Gritzalis},
  title        = {Distributed component architectures security issues},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {3},
  pages        = {269--284},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2004.08.003},
  doi          = {10.1016/J.CSI.2004.08.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/GousiosAG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/BalopoulosGK05,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Specifying Privacy-Preserving Protocols in Typed {MSR}},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {5},
  pages        = {501--512},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2005.01.008},
  doi          = {10.1016/J.CSI.2005.01.008},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/BalopoulosGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LambrinoudakisGHYK05,
  author       = {Costas Lambrinoudakis and
                  Stefanos Gritzalis and
                  Petros Hatzopoulos and
                  Athanasios N. Yannacopoulos and
                  Sokratis K. Katsikas},
  title        = {A formal model for pricing information systems insurance contracts},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {5},
  pages        = {521--532},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2005.01.010},
  doi          = {10.1016/J.CSI.2005.01.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LambrinoudakisGHYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/MalatrasPBGSC05,
  author       = {Apostolos Malatras and
                  George Pavlou and
                  Petros Belsis and
                  Stefanos Gritzalis and
                  Christos Skourlas and
                  Ioannis Chalaris},
  title        = {Deploying pervasive secure knowledge management infrastructures},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {1},
  number       = {4},
  pages        = {265--276},
  year         = {2005},
  url          = {https://doi.org/10.1108/17427370580000130},
  doi          = {10.1108/17427370580000130},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpcc/MalatrasPBGSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gritzalis05,
  author       = {Stefanos Gritzalis},
  title        = {A good-practice guidance on the use of {PKI} services in the public
                  sector of the European Union member states},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {5},
  pages        = {379--398},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510627278},
  doi          = {10.1108/09685220510627278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gritzalis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/LekkasGM05,
  author       = {Dimitrios Lekkas and
                  Stefanos Gritzalis and
                  Lilian Mitrou},
  title        = {Withdrawing a declaration of will: Towards a framework for digital
                  signature revocation},
  journal      = {Internet Res.},
  volume       = {15},
  number       = {4},
  pages        = {400--420},
  year         = {2005},
  url          = {https://doi.org/10.1108/10662240510615173},
  doi          = {10.1108/10662240510615173},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/LekkasGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/GymnopoulosTSG05,
  author       = {Lazaros Gymnopoulos and
                  Vassilis Tsoumas and
                  Yannis Soupionis and
                  Stefanos Gritzalis},
  title        = {A generic Grid security policy reconciliation framework},
  journal      = {Internet Res.},
  volume       = {15},
  number       = {5},
  pages        = {508--517},
  year         = {2005},
  url          = {https://doi.org/10.1108/10662240510629457},
  doi          = {10.1108/10662240510629457},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/GymnopoulosTSG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/BalopoulosDGKKG05,
  author       = {Theodoros Balopoulos and
                  Stelios Dritsas and
                  Lazaros Gymnopoulos and
                  Maria Karyda and
                  Spyros Kokolakis and
                  Stefanos Gritzalis},
  title        = {Incorporating Security Requirements Into the Software Development
                  Process},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {21--28},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eciw/BalopoulosDGKKG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/GymnopoulosG05,
  author       = {Lazaros Gymnopoulos and
                  Stefanos Gritzalis},
  title        = {Introducing Ontology-based Security Policy Management in the Grid},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {107--116},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/GymnopoulosG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/DritsasGKBKLG05,
  author       = {Stelios Dritsas and
                  Lazaros Gymnopoulos and
                  Maria Karyda and
                  Theodoros Balopoulos and
                  Spyros Kokolakis and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis},
  editor       = {Matohisa Funabashi and
                  Adam Grzech},
  title        = {Employing Ontologies for the Development of Security Critical Applications},
  booktitle    = {Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government,
                  5th {IFIP} Conference e-Commerce, e-Business, and e-Government (I3E'2OO5),
                  October 28-30, 2005, Poznan, Poland},
  series       = {{IFIP}},
  volume       = {189},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-29773-1\_13},
  doi          = {10.1007/0-387-29773-1\_13},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/i3e/DritsasGKBKLG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/FrantzeskouSG05a,
  author       = {Georgia Frantzeskou and
                  Efstathios Stamatatos and
                  Stefanos Gritzalis},
  editor       = {Joaquim Filipe and
                  Helder Coelhas and
                  M{\'{o}}nica Saramago},
  title        = {Supporting the Cybercrime Investigation Process: Effective Discrimination
                  of Source Code Authors Based on Byte-Level Information},
  booktitle    = {E-business and Telecommunication Networks - Second International Conference,
                  {ICETE} 2005, Reading, UK, October 3-7, 2005. Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {3},
  pages        = {163--173},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-75993-5\_14},
  doi          = {10.1007/978-3-540-75993-5\_14},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/FrantzeskouSG05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/FrantzeskouSG05,
  author       = {Georgia Frantzeskou and
                  Efstathios Stamatatos and
                  Stefanos Gritzalis},
  editor       = {Joaquim Filipe and
                  Luminita Vasiu},
  title        = {Supporting the cybercrime investigation process: Effective discrimination
                  of source code authors based on byte-level information},
  booktitle    = {{ICETE} 2005 - Proceedings of the Second International Conference
                  on e-Business and Telecommunication Networks, Reading, UK, October
                  3-7, 2005},
  pages        = {283--290},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Tue, 07 Nov 2006 14:13:57 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/FrantzeskouSG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icps/MalatrasPBGSC05,
  author       = {Apostolos Malatras and
                  George Pavlou and
                  Petros Belsis and
                  Stefanos Gritzalis and
                  Christos Skourlas and
                  Ioannis Chalaris},
  title        = {Secure and distributed knowledge management in pervasive environments},
  booktitle    = {Proceedings of the International Conference on Pervasive Services
                  2005, {ICPS} '05, Santorini, Greece, July 11-14, 2005},
  pages        = {79--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PERSER.2005.1506393},
  doi          = {10.1109/PERSER.2005.1506393},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icps/MalatrasPBGSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwuc/BelsisMGSC05,
  author       = {Petros Belsis and
                  Apostolos Malatras and
                  Stefanos Gritzalis and
                  Christos Skourlas and
                  Ioannis Chalaris},
  editor       = {Soraya Kouadri Most{\'{e}}faoui and
                  Zakaria Maamar},
  title        = {Pervasive Secure Electronic Healthcare Records Management},
  booktitle    = {Ubiquitous Computing, Proceedings of the 2nd International Workshop
                  on Ubiquitous Computing, {IWUC} 2005, In conjunction with {ICEIS}
                  2005, Miami, USA, May 2005},
  pages        = {101--109},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Tue, 05 Jul 2005 15:02:30 +0200},
  biburl       = {https://dblp.org/rec/conf/iwuc/BelsisMGSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lanman/DoukasKKRG05,
  author       = {Nikolaos Doukas and
                  Eleni Klaoudatou and
                  Georgios Kambourakis and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis},
  title        = {Evaluation of digital certificates acquisition in large-scale 802.11-3GPP
                  hybrid environments},
  booktitle    = {The 14th {IEEE} Workshop on Local and Metropolitan Area Networks,
                  {LANMAN} 2005, Chania, Crete, Greece, September 18, 2005},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/LANMAN.2005.1541544},
  doi          = {10.1109/LANMAN.2005.1541544},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lanman/DoukasKKRG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lanman/GeneiatakisKDLG05,
  author       = {Dimitris Geneiatakis and
                  Georgios Kambourakis and
                  Tasos Dagiuklas and
                  Costas Lambrinoudakis and
                  Stefanos Gritzalis},
  title        = {A framework for detecting malformed messages in {SIP} networks},
  booktitle    = {The 14th {IEEE} Workshop on Local and Metropolitan Area Networks,
                  {LANMAN} 2005, Chania, Crete, Greece, September 18, 2005},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/LANMAN.2005.1541543},
  doi          = {10.1109/LANMAN.2005.1541543},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lanman/GeneiatakisKDLG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/BelsisSG05,
  author       = {Meletis A. Belsis and
                  Alkis Simitsis and
                  Stefanos Gritzalis},
  editor       = {Panayiotis Bozanis and
                  Elias N. Houstis},
  title        = {Workflow Based Security Incident Management},
  booktitle    = {Advances in Informatics, 10th Panhellenic Conference on Informatics,
                  {PCI} 2005, Volos, Greece, November 11-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3746},
  pages        = {684--694},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11573036\_65},
  doi          = {10.1007/11573036\_65},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pci/BelsisSG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/BelsisGMSC05,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Apostolos Malatras and
                  Christos Skourlas and
                  Ioannis Chalaris},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Sec-Shield: Security Preserved Distributed Knowledge Management Between
                  Autonomous Domains},
  booktitle    = {Trust, Privacy and Security in Digital Business: Second International
                  Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3592},
  pages        = {10--19},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11537878\_2},
  doi          = {10.1007/11537878\_2},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/BelsisGMSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BalopoulosGK05,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Specifying electronic voting protocols in typed {MSR}},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {35--39},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102207},
  doi          = {10.1145/1102199.1102207},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BalopoulosGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/KambourakisRG04,
  author       = {Georgios Kambourakis and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis},
  title        = {Performance Evaluation of Public Key Based Authentication in Future
                  Mobile Communication Systems},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2004},
  number       = {1},
  pages        = {184--197},
  year         = {2004},
  url          = {https://doi.org/10.1155/S1687147204403016},
  doi          = {10.1155/S1687147204403016},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/KambourakisRG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gritzalis04a,
  author       = {Stefanos Gritzalis},
  title        = {Enhancing Web privacy and anonymity in the digital era},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {255--287},
  year         = {2004},
  url          = {https://doi.org/10.1108/09685220410542615},
  doi          = {10.1108/09685220410542615},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gritzalis04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/AngelisGL04,
  author       = {George Angelis and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  title        = {Mechanisms for controlling access in the global grid environment},
  journal      = {Internet Res.},
  volume       = {14},
  number       = {5},
  pages        = {347--352},
  year         = {2004},
  url          = {https://doi.org/10.1108/10662240410566935},
  doi          = {10.1108/10662240410566935},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/AngelisGL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KambourakisRG04,
  author       = {Georgios Kambourakis and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis},
  title        = {Experimental Analysis of an SSL-Based {AKA} Mechanism in 3G-and-Beyond
                  Wireless Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {29},
  number       = {3-4},
  pages        = {303--321},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:WIRE.0000047068.20203.57},
  doi          = {10.1023/B:WIRE.0000047068.20203.57},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KambourakisRG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/BalopoulosGK04,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {David Chadwick and
                  Bart Preneel},
  title        = {An Extension of Typed {MSR} for Specifying Esoteric Protocols and
                  Their Dolev-Yao Intruder},
  booktitle    = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11}
                  Conference on Communications and Multimedia Security, Sept. 15-18,
                  2004, Windermere, The Lake District, United Kingdom},
  series       = {{IFIP}},
  volume       = {175},
  pages        = {209--221},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24486-7\_16},
  doi          = {10.1007/0-387-24486-7\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/BalopoulosGK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/KalloniatisKG04,
  author       = {Christos Kalloniatis and
                  Evangelia Kavakli and
                  Stefanos Gritzalis},
  editor       = {Roland Traunm{\"{u}}ller},
  title        = {Security Requirements Engineering for e-Government Applications: Analysis
                  of Current Frameworks},
  booktitle    = {Electronic Government: Third International Conference, {EGOV} 2004,
                  Zaragoza, Spain, August 30 - September 3, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3183},
  pages        = {66--71},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30078-6\_11},
  doi          = {10.1007/978-3-540-30078-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/egov/KalloniatisKG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/KabourakiGM04,
  author       = {Konstantina Kabouraki and
                  Stefanos Gritzalis and
                  Konstantinos Moulinos},
  editor       = {Roland Traunm{\"{u}}ller},
  title        = {Towards a Privacy Audit Programmes Comparison Framework},
  booktitle    = {Electronic Government: Third International Conference, {EGOV} 2004,
                  Zaragoza, Spain, August 30 - September 3, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3183},
  pages        = {328--331},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30078-6\_54},
  doi          = {10.1007/978-3-540-30078-6\_54},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/egov/KabourakiGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/BelsisGSD04,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Christos Skourlas and
                  Ioannis Drakopoulos},
  title        = {Implementing Knowledge Management Techniques for Security Purposes},
  booktitle    = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise
                  Information Systems, Porto, Portugal, April 14-17, 2004},
  pages        = {535--540},
  year         = {2004},
  timestamp    = {Thu, 02 Feb 2017 12:56:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/BelsisGSD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/FrantzeskouG04,
  author       = {Georgia Frantzeskou and
                  Stefanos Gritzalis},
  editor       = {Jo{\~{a}}o Ascenso and
                  Carlos Belo and
                  Luminita Vasiu and
                  M{\'{o}}nica Saramago and
                  Helder Coelhas},
  title        = {Source Code Authorship Analysis for Supporting the Cybercrime Investigation
                  Process},
  booktitle    = {{ICETE} 2004, 1st International Conference on E-Business and Telecommunication
                  Networks, Set{\'{u}}bal, Portugal, August 24-28, 2004, Proceedings},
  pages        = {85--92},
  publisher    = {{INSTICC} Press},
  year         = {2004},
  timestamp    = {Mon, 25 Oct 2004 15:24:15 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/FrantzeskouG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KambourakisRG04,
  author       = {Georgios Kambourakis and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis},
  editor       = {Nikolas Mitrou and
                  Kimon P. Kontovasilis and
                  George N. Rouskas and
                  Ilias Iliadis and
                  Lazaros F. Merakos},
  title        = {Inter/Intra Core Network Security with {PKI} for 3G-and-Beyond Systems},
  booktitle    = {{NETWORKING} 2004, Networking Technologies, Services, and Protocols;
                  Performance of Computer and Communication Networks; Mobile and Wireless
                  Communication, Third International {IFIP-TC6} Networking Conference,
                  Athens, Greece, May 9-14, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3042},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24693-0\_2},
  doi          = {10.1007/978-3-540-24693-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/KambourakisRG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakm/BelsisGMSC04,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Apostolos Malatras and
                  Christos Skourlas and
                  Ioannis Chalaris},
  editor       = {Dimitris Karagiannis and
                  Ulrich Reimer},
  title        = {Enhancing Knowledge Management Through the Use of {GIS} and Multimedia},
  booktitle    = {Practical Aspects of Knowledge Management, 5th International Conference,
                  {PAKM} 2004, Vienna, Austria, December 2-3, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3336},
  pages        = {319--329},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30545-3\_30},
  doi          = {10.1007/978-3-540-30545-3\_30},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/pakm/BelsisGMSC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KambourakisRG04,
  author       = {Georgios Kambourakis and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis},
  editor       = {Hisham Haddad and
                  Andrea Omicini and
                  Roger L. Wainwright and
                  Lorie M. Liebrock},
  title        = {Delivering Attribute Certificates over {GPRS}},
  booktitle    = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),
                  Nicosia, Cyprus, March 14-17, 2004},
  pages        = {1166--1170},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/967900.968137},
  doi          = {10.1145/967900.968137},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/KambourakisRG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/KatsikasYGLH04,
  author       = {Sokratis K. Katsikas and
                  Athanasios N. Yannacopoulos and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis and
                  Petros Hatzopoulos},
  editor       = {Paul Dowland and
                  Steven Furnell and
                  Bhavani Thuraisingham and
                  Xiaoyang Sean Wang},
  title        = {How Much Should We Pay for Security? (Invited Paper)},
  booktitle    = {Security Management, Integrity, and Internal Control in Information
                  Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working
                  Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}},
  series       = {{IFIP}},
  volume       = {193},
  pages        = {59--69},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-31167-X\_4},
  doi          = {10.1007/0-387-31167-X\_4},
  timestamp    = {Tue, 16 May 2023 22:42:09 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/KatsikasYGLH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2004,
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98201},
  doi          = {10.1007/B98201},
  isbn         = {3-540-22216-2},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/IliadisGSCPG03,
  author       = {John Iliadis and
                  Stefanos Gritzalis and
                  Diomidis Spinellis and
                  Danny De Cock and
                  Bart Preneel and
                  Dimitris Gritzalis},
  title        = {Towards a framework for evaluating certificate status information
                  mechanisms},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {16},
  pages        = {1839--1850},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00079-3},
  doi          = {10.1016/S0140-3664(03)00079-3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/IliadisGSCPG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/IliadisGG03,
  author       = {John Iliadis and
                  Stefanos Gritzalis and
                  Dimitris Gritzalis},
  title        = {ADoCSI: towards a transparent mechanism for disseminating Certificate
                  Status Information},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {16},
  pages        = {1851--1862},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00080-X},
  doi          = {10.1016/S0140-3664(03)00080-X},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/IliadisGG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LambrinoudakisGDP03,
  author       = {Costas Lambrinoudakis and
                  Stefanos Gritzalis and
                  Fredj Dridi and
                  G{\"{u}}nther Pernul},
  title        = {Security requirements for e-government services: a methodological
                  approach for developing a common PKI-based security policy},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {16},
  pages        = {1873--1883},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00082-3},
  doi          = {10.1016/S0140-3664(03)00082-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LambrinoudakisGDP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/BalopoulosG03,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis},
  title        = {Towards a Logic of Privacy-Preserving Selective Disclosure Credential
                  Protocols},
  booktitle    = {14th International Workshop on Database and Expert Systems Applications
                  (DEXA'03), September 1-5, 2003, Prague, Czech Republic},
  pages        = {396--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/DEXA.2003.1232054},
  doi          = {10.1109/DEXA.2003.1232054},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/BalopoulosG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egov/ArgyrakisGK03,
  author       = {John Argyrakis and
                  Stefanos Gritzalis and
                  Chris Kioulafas},
  editor       = {Roland Traunm{\"{u}}ller},
  title        = {Privacy Enhancing Technologies: {A} Review},
  booktitle    = {Electronic Government, Second International Conference, {EGOV} 2003,
                  Prague, Czech Republic, September 1-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2739},
  pages        = {282--287},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10929179\_51},
  doi          = {10.1007/10929179\_51},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/egov/ArgyrakisGK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GymnopoulosDGL03,
  author       = {Lazaros Gymnopoulos and
                  Stelios Dritsas and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {{GRID} Security Review},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {100--111},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_8},
  doi          = {10.1007/978-3-540-45215-7\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GymnopoulosDGL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/AngelisGL03,
  author       = {George Angelis and
                  Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  editor       = {Stuart Anderson and
                  Massimo Felici and
                  Bev Littlewood},
  title        = {Security Policy Configuration Issues in Grid Computing Environments},
  booktitle    = {Computer Safety, Reliability, and Security, 22nd International Conference,
                  {SAFECOMP} 2003, Edinburgh, UK, September 23-26, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2788},
  pages        = {331--341},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39878-3\_26},
  doi          = {10.1007/978-3-540-39878-3\_26},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safecomp/AngelisGL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KambourakisRG03,
  author       = {Georgios Kambourakis and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {Introducing {PKI} to Enhance Security in Future Mobile Networks},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {109--120},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Thu, 24 Aug 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KambourakisRG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/LekkasGK02,
  author       = {Dimitrios Lekkas and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Quality assured trusted third parties for deploying secure internet-based
                  healthcare applications},
  journal      = {Int. J. Medical Informatics},
  volume       = {65},
  number       = {2},
  pages        = {79--96},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1386-5056(02)00006-0},
  doi          = {10.1016/S1386-5056(02)00006-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/LekkasGK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwcn/KambourakisRG02,
  author       = {Georgios Kambourakis and
                  Angelos N. Rouskas and
                  Stefanos Gritzalis},
  title        = {Using {SSL/TLS} in authentication and key agreement procedures of
                  future mobile networks},
  booktitle    = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless
                  Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm,
                  Sweden},
  pages        = {152--156},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/MWCN.2002.1045713},
  doi          = {10.1109/MWCN.2002.1045713},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwcn/KambourakisRG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/GritzalisL02,
  author       = {Stefanos Gritzalis and
                  Costas Lambrinoudakis},
  editor       = {Hamid R. Arabnia},
  title        = {Security Requirements of e-Government Services: An Organizational
                  Framework},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} '02, June 24 - 27,
                  2002, Las Vegas, Nevada, USA, Volume 1},
  pages        = {127--131},
  publisher    = {{CSREA} Press},
  year         = {2002},
  timestamp    = {Fri, 05 Dec 2003 09:23:58 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/GritzalisL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GritzalisG01,
  author       = {Stefanos Gritzalis and
                  Dimitris Gritzalis},
  title        = {A digital seal solution for deploying trust on commercial transactions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {71--79},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110388836},
  doi          = {10.1108/09685220110388836},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GritzalisG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/or/NikitakosG01,
  author       = {Nikitas V. Nikitakos and
                  Stefanos Gritzalis},
  title        = {Risk management for new information technology insertion in a shipping
                  company},
  journal      = {Oper. Res.},
  volume       = {1},
  number       = {1},
  pages        = {7--16},
  year         = {2001},
  url          = {https://doi.org/10.1007/BF02936396},
  doi          = {10.1007/BF02936396},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/or/NikitakosG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hercma/LekkasGK01,
  author       = {Dimitrios Lekkas and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Elias A. Lipitakis},
  title        = {Towards an {ISO-9000} compliant certification service provider},
  booktitle    = {Proceedings of the 5th Hellenic-European Conference on Computer Mathematics
                  and its Applications (HERCMA-01), Athens, Greece, September 20-22,
                  2001},
  pages        = {390--397},
  publisher    = {{LEA} Press, Athens, Hellas},
  year         = {2001},
  timestamp    = {Wed, 20 Jun 2018 09:48:24 +0200},
  biburl       = {https://dblp.org/rec/conf/hercma/LekkasGK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisKLMP00,
  author       = {Stefanos Gritzalis and
                  Sokratis K. Katsikas and
                  Dimitrios Lekkas and
                  Konstantinos Moulinos and
                  Eleni Polydoro},
  title        = {Securing The Electronic Market: The {KEYSTONE} Public Key Infrastructure
                  Architecture},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {8},
  pages        = {731--746},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)08022-6},
  doi          = {10.1016/S0167-4048(00)08022-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisKLMP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GritzalisIO00,
  author       = {Stefanos Gritzalis and
                  John Iliadis and
                  Spyros Oikonomopoulos},
  title        = {Distributed component software security issues on deploying a secure
                  electronic marketplace},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {5--13},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312290},
  doi          = {10.1108/09685220010312290},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GritzalisIO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/GritzalisSG99,
  author       = {Stefanos Gritzalis and
                  Diomidis Spinellis and
                  Panagiotis Georgiadis},
  title        = {Security protocols over open networks and distributed systems: formal
                  methods for their analysis, design, and verification},
  journal      = {Comput. Commun.},
  volume       = {22},
  number       = {8},
  pages        = {697--709},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0140-3664(99)00030-4},
  doi          = {10.1016/S0140-3664(99)00030-4},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/GritzalisSG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpinellisGIGK99,
  author       = {Diomidis Spinellis and
                  Stefanos Gritzalis and
                  John Iliadis and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Trusted third party services for deploying secure telemedical applications
                  over the {WWW}},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {627--639},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82041-0},
  doi          = {10.1016/S0167-4048(99)82041-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpinellisGIGK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SpinellisKG99,
  author       = {Diomidis Spinellis and
                  Spyros Kokolakis and
                  Stefanos Gritzalis},
  title        = {Security requirements, risks and recommendations for small enterprise
                  and home-office environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {121--128},
  year         = {1999},
  url          = {https://doi.org/10.1108/09685229910371071},
  doi          = {10.1108/09685229910371071},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SpinellisKG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/GritzalisAS99,
  author       = {Stefanos Gritzalis and
                  George Aggelis and
                  Diomidis Spinellis},
  title        = {Architectures for secure portable executable content},
  journal      = {Internet Res.},
  volume       = {9},
  number       = {1},
  pages        = {16--24},
  year         = {1999},
  url          = {https://doi.org/10.1108/10662249910251273},
  doi          = {10.1108/10662249910251273},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/GritzalisAS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/GritzalisS98,
  author       = {Stefanos Gritzalis and
                  Diomidis Spinellis},
  title        = {The Cascade Vulnerability Problem: the detection problem and a simulated
                  annealing approach for its correction},
  journal      = {Microprocess. Microsystems},
  volume       = {21},
  number       = {10},
  pages        = {621--627},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0141-9331(98)00064-7},
  doi          = {10.1016/S0141-9331(98)00064-7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/GritzalisS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/GritzalisA98,
  author       = {Stefanos Gritzalis and
                  George Aggelis},
  title        = {Security Issues Surrounding Programming Languages for Mobile Code:
                  Java vs. Safe-Tcl},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {32},
  number       = {2},
  pages        = {16--32},
  year         = {1998},
  url          = {https://doi.org/10.1145/506133.506137},
  doi          = {10.1145/506133.506137},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/GritzalisA98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/GritzalisI98,
  author       = {Stefanos Gritzalis and
                  John Iliadis},
  editor       = {Roland R. Wagner},
  title        = {Addressing Security Issues in Programming Languages for Mobile Code},
  booktitle    = {Ninth International Workshop on Database and Expert Systems Applications,
                  Vienna, Austria, August 24-28, 1998, Proceedings},
  pages        = {288--293},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/DEXA.1998.707415},
  doi          = {10.1109/DEXA.1998.707415},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/GritzalisI98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/IliadisGO98,
  author       = {John Iliadis and
                  Stefanos Gritzalis and
                  V. Oikonomou},
  editor       = {Wolfgang D. Ehrenberger},
  title        = {Towards Secure Downloadable Executable Content: The Java Paradigm},
  booktitle    = {Computer Safety, Reliability and Security, 17th International Conference,
                  SAFECOMP'98, Heidelberg, Germany, October 5-7, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1516},
  pages        = {117--127},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49646-7\_9},
  doi          = {10.1007/3-540-49646-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/IliadisGO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/GritzalisS97,
  author       = {Stefanos Gritzalis and
                  Diomidis Spinellis},
  editor       = {Peter Daniel},
  title        = {Cryptographic Protocols over Open Distributed Systems: {A} Taxonomy
                  of Flaws and related Protocol Analysis Tools},
  booktitle    = {16th International Conference on Computer Safety, Reliability and
                  Security, Safe Comp 1997, York, UK, September 7-10, 1997},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/978-1-4471-0997-6\_10},
  doi          = {10.1007/978-1-4471-0997-6\_10},
  timestamp    = {Wed, 26 Jun 2019 14:32:32 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/GritzalisS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NikitakosGG96,
  author       = {Nikitas V. Nikitakos and
                  Stefanos Gritzalis and
                  Panagiotis Georgiadis},
  editor       = {Sokratis K. Katsikas and
                  Dimitris Gritzalis},
  title        = {Security profile for interconnected open distributed systems with
                  varying vulnerability},
  booktitle    = {Information Systems Security, Facing the information society of the
                  21st Century},
  series       = {{IFIP} Conference Proceedings},
  volume       = {54},
  pages        = {428--437},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/NikitakosGG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisKG92,
  author       = {Dimitris Gritzalis and
                  Sokratis K. Katsikas and
                  Stefanos Gritzalis},
  title        = {A zero knowledge probabilistic login protocol},
  journal      = {Comput. Secur.},
  volume       = {11},
  number       = {8},
  pages        = {733--745},
  year         = {1992},
  url          = {https://doi.org/10.1016/0167-4048(92)90129-F},
  doi          = {10.1016/0167-4048(92)90129-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisKG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics