Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Stefanos Gritzalis
@proceedings{DBLP:conf/esorics/2023w1, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Pantaleone Nespoli and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14398}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54204-6}, doi = {10.1007/978-3-031-54204-6}, isbn = {978-3-031-54203-9}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2023w1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChatzoglouKKKG23, author = {Efstratios Chatzoglou and Vasileios Kouliaridis and Georgios Kambourakis and Georgios Karopoulos and Stefanos Gritzalis}, title = {A hands-on gaze on {HTTP/3} security through the lens of {HTTP/2} and a public dataset}, journal = {Comput. Secur.}, volume = {125}, pages = {103051}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103051}, doi = {10.1016/J.COSE.2022.103051}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChatzoglouKKKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TsohouDGL23, author = {Aggeliki Tsohou and Vasiliki Diamantopoulou and Stefanos Gritzalis and Costas Lambrinoudakis}, title = {Cyber insurance: state of the art, trends and future directions}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {3}, pages = {737--748}, year = {2023}, url = {https://doi.org/10.1007/s10207-023-00660-8}, doi = {10.1007/S10207-023-00660-8}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TsohouDGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MollaRG23, author = {Eirini Molla and Panagiotis Rizomiliotis and Stefanos Gritzalis}, title = {Efficient searchable symmetric encryption supporting range queries}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {4}, pages = {785--798}, year = {2023}, url = {https://doi.org/10.1007/s10207-023-00667-1}, doi = {10.1007/S10207-023-00667-1}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MollaRG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/VgenaKKG22, author = {Katerina Vgena and Angeliki Kitsiou and Christos Kalloniatis and Stefanos Gritzalis}, title = {Determining the Role of Social Identity Attributes to the Protection of Users' Privacy in Social Media}, journal = {Future Internet}, volume = {14}, number = {9}, pages = {249}, year = {2022}, url = {https://doi.org/10.3390/fi14090249}, doi = {10.3390/FI14090249}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/VgenaKKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KitsiouDKG22, author = {Angeliki Kitsiou and Charikleia Despotidi and Christos Kalloniatis and Stefanos Gritzalis}, title = {The Role of Users' Demographic and Social Attributes for Accepting Biometric Systems: {A} Greek Case Study}, journal = {Future Internet}, volume = {14}, number = {11}, pages = {328}, year = {2022}, url = {https://doi.org/10.3390/fi14110328}, doi = {10.3390/FI14110328}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/KitsiouDKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/ParaskevasKG22, author = {Diamantatos Paraskevas and Ergina Kavallieratou and Stefanos Gritzalis}, title = {Directional Hinge Features for Writer Identification: The Importance of the Skeleton and the Effects of Character Size and Pixel Intensity}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {1}, pages = {56}, year = {2022}, url = {https://doi.org/10.1007/s42979-021-00950-9}, doi = {10.1007/S42979-021-00950-9}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/ParaskevasKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/22/DiamantopoulouLKG22, author = {Vasiliki Diamantopoulou and Costas Lambrinoudakis and Jennifer King and Stefanos Gritzalis}, title = {{EU} {GDPR:} Toward a Regulatory Initiative for Deploying a Private Digital Era}, booktitle = {Modern Socio-Technical Perspectives on Privacy}, pages = {427--448}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-82786-1\_18}, doi = {10.1007/978-3-030-82786-1\_18}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/22/DiamantopoulouLKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-06722, author = {Efstratios Chatzoglou and Vasileios Kouliaridis and Georgios Kambourakis and Georgios Karopoulos and Stefanos Gritzalis}, title = {A hands-on gaze on {HTTP/3} security through the lens of {HTTP/2} and a public dataset}, journal = {CoRR}, volume = {abs/2208.06722}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.06722}, doi = {10.48550/ARXIV.2208.06722}, eprinttype = {arXiv}, eprint = {2208.06722}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-06722.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computation/SkarkalaMGM21, author = {Maria Eleni Skarkala and Manolis Maragoudakis and Stefanos Gritzalis and Lilian Mitrou}, title = {{PPDM-TAN:} {A} Privacy-Preserving Multi-Party Classifier}, journal = {Comput.}, volume = {9}, number = {1}, pages = {6}, year = {2021}, url = {https://doi.org/10.3390/computation9010006}, doi = {10.3390/COMPUTATION9010006}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computation/SkarkalaMGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/KalloniatisLMKG21, author = {Christos Kalloniatis and Costas Lambrinoudakis and Mathias Musahl and Athanasios G. Kanatas and Stefanos Gritzalis}, title = {Incorporating privacy by design in body sensor networks for medical applications: {A} privacy and data protection framework}, journal = {Comput. Sci. Inf. Syst.}, volume = {18}, number = {1}, pages = {323--347}, year = {2021}, url = {https://doi.org/10.2298/CSIS200922057K}, doi = {10.2298/CSIS200922057K}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsis/KalloniatisLMKG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KitsiouTKG21, author = {Angeliki Kitsiou and Eleni Tzortzaki and Christos Kalloniatis and Stefanos Gritzalis}, title = {Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks}, journal = {Future Internet}, volume = {13}, number = {2}, pages = {23}, year = {2021}, url = {https://doi.org/10.3390/fi13020023}, doi = {10.3390/FI13020023}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/KitsiouTKG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icegov/RoutzouniVKGP21, author = {Athanasia Routzouni and Nikolaos Dimitrios (Nikos) Vasilakis and Spiros Kapetanakis and Stefanos Gritzalis and Athanasia Pouloudi}, editor = {Euripides N. Loukis and Marie Anne Macadar and Morten Meyerhoff Nielsen and M{\'{a}}rio Peixoto}, title = {Public sector innovation through design thinking: Applying a participatory policy design practice to support the formulation of a national digital transformation strategy}, booktitle = {{ICEGOV} 2021: 14th International Conference on Theory and Practice of Electronic Governance, Athens, Greece, October 6 - 8, 2021}, pages = {104--110}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3494193.3494208}, doi = {10.1145/3494193.3494208}, timestamp = {Tue, 21 Nov 2023 14:01:02 +0100}, biburl = {https://dblp.org/rec/conf/icegov/RoutzouniVKGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-12384, author = {Georgia Frantzeskou and Stephen G. MacDonell and Efstathios Stamatatos and Stelios Georgiou and Stefanos Gritzalis}, title = {The significance of user-defined identifiers in Java source code authorship identification}, journal = {CoRR}, volume = {abs/2101.12384}, year = {2021}, url = {https://arxiv.org/abs/2101.12384}, eprinttype = {arXiv}, eprint = {2101.12384}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-12384.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/DiamantopoulouA20, author = {Vasiliki Diamantopoulou and Aggeliki Androutsopoulou and Stefanos Gritzalis and Yannis Charalabidis}, title = {Preserving Digital Privacy in e-Participation Environments: Towards {GDPR} Compliance}, journal = {Inf.}, volume = {11}, number = {2}, pages = {117}, year = {2020}, url = {https://doi.org/10.3390/info11020117}, doi = {10.3390/INFO11020117}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/DiamantopoulouA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KitsiouTKG20, author = {Angeliki Kitsiou and Eleni Tzortzaki and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Weizhi Meng and Steven Furnell}, title = {Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts}, booktitle = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12501}, pages = {117--132}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64330-0\_8}, doi = {10.1007/978-3-030-64330-0\_8}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KitsiouTKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/SideriG20, author = {Maria Sideri and Stefanos Gritzalis}, editor = {Nathan L. Clarke and Steven Furnell}, title = {Are We Really Informed on the Rights {GDPR} Guarantees?}, booktitle = {Human Aspects of Information Security and Assurance - 14th {IFIP} {WG} 11.12 International Symposium, {HAISA} 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {593}, pages = {315--326}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57404-8\_24}, doi = {10.1007/978-3-030-57404-8\_24}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/haisa/SideriG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seeda/SkarkalaMGM20, author = {Maria Eleni Skarkala and Manolis Maragoudakis and Stefanos Gritzalis and Lilian Mitrou}, title = {{PP-TAN:} a Privacy Preserving Multi-party Tree Augmented Naive Bayes Classifier}, booktitle = {5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, {SEEDA-CECNSM} 2020, Corfu, Greece, September 25-27, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SEEDA-CECNSM49515.2020.9221844}, doi = {10.1109/SEEDA-CECNSM49515.2020.9221844}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seeda/SkarkalaMGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/KitsiouTKG20, author = {Angeliki Kitsiou and Eleni Tzortzaki and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Stefanos Gritzalis and Edgar R. Weippl and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments}, booktitle = {Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12395}, pages = {140--155}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58986-8\_10}, doi = {10.1007/978-3-030-58986-8\_10}, timestamp = {Mon, 26 Jun 2023 16:42:40 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/KitsiouTKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-42048-2}, doi = {10.1007/978-3-030-42048-2}, isbn = {978-3-030-42047-5}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2019cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Weizhi Meng and Steven Furnell}, title = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12501}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64330-0}, doi = {10.1007/978-3-030-64330-0}, isbn = {978-3-030-64329-4}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2020cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pci/2020, editor = {Nikitas N. Karanikolas and Athanasios Voulodimos and Cleo Sgouropoulou and Mara Nikolaidou and Stefanos Gritzalis}, title = {{PCI} 2020: 24th Pan-Hellenic Conference on Informatics, Athens, Greece, 20-22 November, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3437120}, doi = {10.1145/3437120}, isbn = {978-1-4503-8897-9}, timestamp = {Sat, 10 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2020, editor = {Stefanos Gritzalis and Edgar R. Weippl and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12395}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58986-8}, doi = {10.1007/978-3-030-58986-8}, isbn = {978-3-030-58985-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/MavroeidiKKG19, author = {Aikaterini{-}Georgia Mavroeidi and Angeliki Kitsiou and Christos Kalloniatis and Stefanos Gritzalis}, title = {Gamification vs. Privacy: Identifying and Analysing the Major Concerns}, journal = {Future Internet}, volume = {11}, number = {3}, pages = {67}, year = {2019}, url = {https://doi.org/10.3390/fi11030067}, doi = {10.3390/FI11030067}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/MavroeidiKKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/VgenaKKKG19, author = {Katerina Vgena and Angeliki Kitsiou and Christos Kalloniatis and Dimitris Kavroudakis and Stefanos Gritzalis}, title = {Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes}, journal = {Future Internet}, volume = {11}, number = {11}, pages = {234}, year = {2019}, url = {https://doi.org/10.3390/fi11110234}, doi = {10.3390/FI11110234}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/VgenaKKKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijagr/KalloniatisKPG19, author = {Christos Kalloniatis and Dimitris Kavroudakis and Amalia Polidoropoulou and Stefanos Gritzalis}, title = {Designing Privacy-Aware Intelligent Transport Systems: {A} Roadmap for Identifying the Major Privacy Concepts}, journal = {Int. J. Appl. Geospat. Res.}, volume = {10}, number = {1}, pages = {73--91}, year = {2019}, url = {https://doi.org/10.4018/IJAGR.2019010104}, doi = {10.4018/IJAGR.2019010104}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijagr/KalloniatisKPG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/SideriKFKG19, author = {Maria Sideri and Angeliki Kitsiou and Ariadni Filippopoulou and Christos Kalloniatis and Stefanos Gritzalis}, title = {E-Governance in educational settings}, journal = {Internet Res.}, volume = {29}, number = {4}, pages = {818--845}, year = {2019}, url = {https://doi.org/10.1108/IntR-05-2017-0178}, doi = {10.1108/INTR-05-2017-0178}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/SideriKFKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GiannakasPKG19, author = {Filippos Giannakas and Andreas Papasalouros and Georgios Kambourakis and Stefanos Gritzalis}, title = {A comprehensive cybersecurity learning platform for elementary education}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {28}, number = {3}, pages = {81--106}, year = {2019}, url = {https://doi.org/10.1080/19393555.2019.1657527}, doi = {10.1080/19393555.2019.1657527}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GiannakasPKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/SimouKGK19, author = {Stavros Simou and Christos Kalloniatis and Stefanos Gritzalis and Vasilios Katos}, title = {A framework for designing cloud forensic-enabled services (CFeS)}, journal = {Requir. Eng.}, volume = {24}, number = {3}, pages = {403--430}, year = {2019}, url = {https://doi.org/10.1007/s00766-018-0289-y}, doi = {10.1007/S00766-018-0289-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/SimouKGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RizomiliotisG19, author = {Panagiotis Rizomiliotis and Stefanos Gritzalis}, editor = {Radu Sion and Charalampos Papamanthou}, title = {Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019}, pages = {141--152}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338466.3358921}, doi = {10.1145/3338466.3358921}, timestamp = {Thu, 12 Oct 2023 12:32:09 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RizomiliotisG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/SideriFG19, author = {Maria Sideri and Athanasios Fontaras and Stefanos Gritzalis}, editor = {Sokratis K. Katsikas and Vasilios Zorkadis}, title = {What Do We Know About Our Rights to Data Protection? {A} Greek Case Study}, booktitle = {E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age - 8th International Conference, e-Democracy 2019, Athens, Greece, December 12-13, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1111}, pages = {18--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37545-4\_2}, doi = {10.1007/978-3-030-37545-4\_2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edemocracy/SideriFG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/SimouKGK19, author = {Stavros Simou and Christos Kalloniatis and Stefanos Gritzalis and Vasilis Katos}, editor = {Sokratis K. Katsikas and Vasilios Zorkadis}, title = {A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services}, booktitle = {E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age - 8th International Conference, e-Democracy 2019, Athens, Greece, December 12-13, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1111}, pages = {161--177}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37545-4\_11}, doi = {10.1007/978-3-030-37545-4\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edemocracy/SimouKGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/RoutzouniDPG19, author = {Athanasia Routzouni and Athanasios P. Deligiannis and Vassilios Peristeras and Stefanos Gritzalis}, editor = {Ida Lindgren and Marijn Janssen and Habin Lee and Andrea Polini and Manuel Pedro Rodr{\'{\i}}guez Bol{\'{\i}}var and Hans Jochen Scholl and Efthimios Tambouris}, title = {An Intercountry Survey of Participatory Practices Used for Open Government Partnership National Action Plan Development}, booktitle = {Electronic Government - 18th {IFIP} {WG} 8.5 International Conference, {EGOV} 2019, San Benedetto Del Tronto, Italy, September 2-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11685}, pages = {82--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27325-5\_7}, doi = {10.1007/978-3-030-27325-5\_7}, timestamp = {Fri, 08 Sep 2023 14:38:15 +0200}, biburl = {https://dblp.org/rec/conf/egov/RoutzouniDPG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcis/RoutzouniDG19, author = {Athanasia Routzouni and Athanasios P. Deligiannis and Stefanos Gritzalis}, title = {A generalised Co-Evaluation Model of Public Policies}, booktitle = {13th Mediterranean Conference on Information Systems, {MCIS} 2019, Naples, Italy, 27-28 September 2019, joint conference with the 16th conference of the Italian Chapter of AIS, ItAIS 2019}, pages = {29}, publisher = {AISeL}, year = {2019}, url = {https://aisel.aisnet.org/mcis2019/29}, timestamp = {Thu, 17 Jun 2021 09:18:17 +0200}, biburl = {https://dblp.org/rec/conf/mcis/RoutzouniDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12786-2}, doi = {10.1007/978-3-030-12786-2}, isbn = {978-3-030-12785-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2019, editor = {Stefanos Gritzalis and Edgar R. Weippl and Sokratis K. Katsikas and Gabriele Anderst{-}Kotsis and A Min Tjoa and Ismail Khalil}, title = {Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11711}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27813-7}, doi = {10.1007/978-3-030-27813-7}, isbn = {978-3-030-27812-0}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CastroLG18, author = {Rodrigo Roman Castro and Javier L{\'{o}}pez and Stefanos Gritzalis}, title = {Evolution and Trends in IoT Security}, journal = {Computer}, volume = {51}, number = {7}, pages = {16--25}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3011051}, doi = {10.1109/MC.2018.3011051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CastroLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/IslamOKMG18, author = {Shareeful Islam and Moussa Ouedraogo and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, title = {Assurance of Security and Privacy Requirements for Cloud Deployment Models}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {2}, pages = {387--400}, year = {2018}, url = {https://doi.org/10.1109/TCC.2015.2511719}, doi = {10.1109/TCC.2015.2511719}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/IslamOKMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/TsekourasTKG18, author = {George E. Tsekouras and John V. Tsimikas and Christos Kalloniatis and Stefanos Gritzalis}, title = {Interpretability Constraints for Fuzzy Modeling Implemented by Constrained Particle Swarm Optimization}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {26}, number = {4}, pages = {2348--2361}, year = {2018}, url = {https://doi.org/10.1109/TFUZZ.2017.2774187}, doi = {10.1109/TFUZZ.2017.2774187}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/TsekourasTKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ChooGP18, author = {Kim{-}Kwang Raymond Choo and Stefanos Gritzalis and Jong Hyuk Park}, title = {Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {8}, pages = {3567--3569}, year = {2018}, url = {https://doi.org/10.1109/TII.2018.2841049}, doi = {10.1109/TII.2018.2841049}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ChooGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcis/RoutzouniG18, author = {Athanasia Routzouni and Stefanos Gritzalis}, title = {The Civil Society as an Innovation Partner in Public Policy Making: Co-Creating the Greek National Action Plan on Open Government}, booktitle = {12th Mediterranean Conference on Information Systems, {MCIS} 2018, Corfu, Greece, 28-30 September 2018}, pages = {25}, publisher = {AISeL}, year = {2018}, url = {https://aisel.aisnet.org/mcis2018/25}, timestamp = {Fri, 13 Dec 2019 13:24:11 +0100}, biburl = {https://dblp.org/rec/conf/mcis/RoutzouniG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Anagnostopoulos18, author = {Marios Anagnostopoulos and Georgios Kambourakis and Stefanos Gritzalis and David K. Y. Yau}, title = {Never say never: Authoritative {TLD} nameserver-powered {DNS} amplification}, booktitle = {2018 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2018, Taipei, Taiwan, April 23-27, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NOMS.2018.8406224}, doi = {10.1109/NOMS.2018.8406224}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/Anagnostopoulos18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/DiamantopoulouA18, author = {Vasiliki Diamantopoulou and Aggeliki Androutsopoulou and Stefanos Gritzalis and Yannis Charalabidis}, title = {An assessment of privacy preservation in crowdsourcing approaches: Towards {GDPR} compliance}, booktitle = {12th International Conference on Research Challenges in Information Science, {RCIS} 2018, Nantes, France, May 29-31, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/RCIS.2018.8406643}, doi = {10.1109/RCIS.2018.8406643}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rcis/DiamantopoulouA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/PattakouMDKG18, author = {Argyri Pattakou and Aikaterini{-}Georgia Mavroeidi and Vasiliki Diamantopoulou and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Kristian Beckers and Shamal Faily and Seok{-}Won Lee and Nancy R. Mead}, title = {Towards the Design of Usable Privacy by Design Methodologies}, booktitle = {5th {IEEE} International Workshop on Evolving Security {\&} Privacy Requirements Engineering, ESPRE@RE 2018, Banff, AB, Canada, August 20, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ESPRE.2018.00007}, doi = {10.1109/ESPRE.2018.00007}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/PattakouMDKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SimouTKKG18, author = {Stavros Simou and Ioannis Troumpis and Christos Kalloniatis and Dimitris Kavroudakis and Stefanos Gritzalis}, editor = {Steven Furnell and Haralambos Mouratidis and G{\"{u}}nther Pernul}, title = {A Decision-Making Approach for Improving Organizations' Cloud Forensic Readiness}, booktitle = {Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11033}, pages = {150--164}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98385-1\_11}, doi = {10.1007/978-3-319-98385-1\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/SimouTKKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2017cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-72817-9}, doi = {10.1007/978-3-319-72817-9}, isbn = {978-3-319-72816-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2017cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pci/2018, editor = {Nikitas N. Karanikolas and Basilis Mamalis and John Kontos and Grammati E. Pantziou and Stefanos Gritzalis and Christos Douligeris}, title = {Proceedings of the 22nd Pan-Hellenic Conference on Informatics, {PCI} 2018, Athens, Greece, November 29 - December 01, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3291533}, isbn = {978-1-4503-6610-6}, timestamp = {Wed, 09 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KalloniatisPKG17, author = {Christos Kalloniatis and Argyri Pattakou and Evangelia Kavakli and Stefanos Gritzalis}, title = {Designing Secure and Privacy-Aware Information Systems}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {2}, pages = {1--25}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017040101}, doi = {10.4018/IJSSE.2017040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KalloniatisPKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/DiamantopoulouT17, author = {Vasiliki Diamantopoulou and Aggeliki Tsohou and Euripidis N. Loukis and Stefanos Gritzalis}, title = {Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation}, booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston, MA, USA, August 10-12, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/28}, timestamp = {Tue, 23 May 2017 14:16:12 +0200}, biburl = {https://dblp.org/rec/conf/amcis/DiamantopoulouT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RizomiliotisMG17, author = {Panagiotis Rizomiliotis and Eirini Molla and Stefanos Gritzalis}, editor = {Bhavani Thuraisingham and Ghassan Karame and Angelos Stavrou}, title = {{REX:} {A} Searchable Symmetric Encryption Scheme Supporting Range Queries}, booktitle = {Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {29--37}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140649.3140653}, doi = {10.1145/3140649.3140653}, timestamp = {Thu, 12 Oct 2023 12:32:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RizomiliotisMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/SideriKTKG17, author = {Maria Sideri and Angeliki Kitsiou and Eleni Tzortzaki and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Sokratis K. Katsikas and Vasilios Zorkadis}, title = {"I Have Learned that {I} Must Think Twice Before...". An Educational Intervention for Enhancing Students' Privacy Awareness in Facebook}, booktitle = {E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services - 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {792}, pages = {79--94}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71117-1\_6}, doi = {10.1007/978-3-319-71117-1\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edemocracy/SideriKTKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/ZagourasKG17, author = {Panagiotis Zagouras and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Theo Tryfonas}, title = {Managing User Experience: Usability and Security in a New Era of Software Supremacy}, booktitle = {Human Aspects of Information Security, Privacy and Trust - 5th International Conference, {HAS} 2017, Held as Part of {HCI} International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10292}, pages = {174--188}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58460-7\_12}, doi = {10.1007/978-3-319-58460-7\_12}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/ZagourasKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ArgyropoulosSKM17, author = {Nikolaos Argyropoulos and Shaun Shei and Christos Kalloniatis and Haralambos Mouratidis and Aidan J. Delaney and Andrew Fish and Stefanos Gritzalis}, editor = {Tung Bui}, title = {A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41749}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/ArgyropoulosSKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SideriFRKG17, author = {Maria Sideri and Ariadni Filippopoulou and George Rouvalis and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Tung Bui}, title = {Social Media Use for Decision Making Process in Educational Settings: The Greek Case for Leadership's Views and Attitude in Secondary and Tertiary Education}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41503}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/SideriFRKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SpiliotopoulouD17, author = {Lefkothea Spiliotopoulou and Dimitrios Damopoulos and Yannis Charalabidis and Manolis Maragoudakis and Stefanos Gritzalis}, editor = {Tung Bui}, title = {Europe in the shadow of financial crisis: Policy Making via Stance Classification}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41499}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/SpiliotopoulouD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/ChalarisCGS17, author = {Manolis Chalaris and Ioannis Chalaris and Stefanos Gritzalis and Cleo Sgouropoulou}, editor = {Vasileios Vlachos and Ilias K. Savvas and Cleo Sgouropoulou and Vassilis P. Plagianakos and Christos Douligeris and Ioannis Voyiatzis and Vassilis Tampakas and George Soultis}, title = {Maturity Level of the Quality Assurance Evaluation Procedures in Higher Education: {A} qualitative research}, booktitle = {Proceedings of the 21st Pan-Hellenic Conference on Informatics, Larissa, Greece, September 28-30, 2017}, pages = {63:1--63:2}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139367.3139438}, doi = {10.1145/3139367.3139438}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/ChalarisCGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/DiamantopoulouA17, author = {Vasiliki Diamantopoulou and Nikolaos Argyropoulos and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Sa{\"{\i}}d Assar and Oscar Pastor and Haralambos Mouratidis}, title = {Supporting the design of privacy-aware business processes via privacy process patterns}, booktitle = {11th International Conference on Research Challenges in Information Science, {RCIS} 2017, Brighton, United Kingdom, May 10-12, 2017}, pages = {187--198}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/RCIS.2017.7956536}, doi = {10.1109/RCIS.2017.7956536}, timestamp = {Mon, 18 Jan 2021 08:56:35 +0100}, biburl = {https://dblp.org/rec/conf/rcis/DiamantopoulouA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DiamantopoulouK17, author = {Vasiliki Diamantopoulou and Christos Kalloniatis and Stefanos Gritzalis and Haralambos Mouratidis}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {Supporting Privacy by Design Using Privacy Process Patterns}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {491--505}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_33}, doi = {10.1007/978-3-319-58469-0\_33}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DiamantopoulouK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SimouKG17, author = {Stavros Simou and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Javier L{\'{o}}pez and Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis}, title = {Modelling Cloud Forensic-Enabled Services}, booktitle = {Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10442}, pages = {147--163}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64483-7\_10}, doi = {10.1007/978-3-319-64483-7\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/SimouKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-09420, author = {Eirini Molla and Theodoros Tzouramanis and Stefanos Gritzalis}, title = {{SOPE:} {A} Spatial Order Preserving Encryption Model for Multi-dimensional Data}, journal = {CoRR}, volume = {abs/1710.09420}, year = {2017}, url = {http://arxiv.org/abs/1710.09420}, eprinttype = {arXiv}, eprint = {1710.09420}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-09420.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KoliasKSG16, author = {Constantinos Kolias and Georgios Kambourakis and Angelos Stavrou and Stefanos Gritzalis}, title = {Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {1}, pages = {184--208}, year = {2016}, url = {https://doi.org/10.1109/COMST.2015.2402161}, doi = {10.1109/COMST.2015.2402161}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KoliasKSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijait/ParaskevasKG16, author = {Diamantatos Paraskevas and Ergina Kavallieratou and Stefanos Gritzalis}, title = {Skeleton Hinge Distribution for Writer Identification}, journal = {Int. J. Artif. Intell. Tools}, volume = {25}, number = {3}, pages = {1650015:1--1650015:14}, year = {2016}, url = {https://doi.org/10.1142/S0218213016500159}, doi = {10.1142/S0218213016500159}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijait/ParaskevasKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/GiannakasKPG16, author = {Filippos Giannakas and Georgios Kambourakis and Andreas Papasalouros and Stefanos Gritzalis}, title = {Security Education and Awareness for {K-6} Going Mobile}, journal = {Int. J. Interact. Mob. Technol.}, volume = {10}, number = {2}, pages = {41--48}, year = {2016}, url = {https://doi.org/10.3991/ijim.v10i2.5473}, doi = {10.3991/IJIM.V10I2.5473}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/GiannakasKPG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Anagnostopoulos16, author = {Marios Anagnostopoulos and Georgios Kambourakis and Stefanos Gritzalis}, title = {New facets of mobile botnet: architecture and evaluation}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {5}, pages = {455--473}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0310-0}, doi = {10.1007/S10207-015-0310-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Anagnostopoulos16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ParkGCZ16, author = {Jong Hyuk Park and Stefanos Gritzalis and Bo{-}Chao Cheng and Ning Zhang}, title = {Challenges and opportunities in next-generation cyberspace security}, journal = {Secur. Commun. Networks}, volume = {9}, number = {6}, pages = {455--456}, year = {2016}, url = {https://doi.org/10.1002/sec.1468}, doi = {10.1002/SEC.1468}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ParkGCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SimouKGM16, author = {Stavros Simou and Christos Kalloniatis and Stefanos Gritzalis and Haralambos Mouratidis}, title = {A survey on cloud forensics challenges and solutions}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {6285--6314}, year = {2016}, url = {https://doi.org/10.1002/sec.1688}, doi = {10.1002/SEC.1688}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SimouKGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/PattakouKG16, author = {Argyri Pattakou and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Nathan L. Clarke and Steven Furnell}, title = {Reasoning About Security and Privacy in Cloud Computing Under a Unified Meta-Model}, booktitle = {Tenth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings}, pages = {56--66}, publisher = {University of Plymouth}, year = {2016}, url = {http://www.cscan.org/openaccess/?paperid=288}, timestamp = {Tue, 06 Jul 2021 12:22:19 +0200}, biburl = {https://dblp.org/rec/conf/haisa/PattakouKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TsiatsikasGKG16, author = {Zisis Tsiatsikas and Dimitris Geneiatakis and Georgios Kambourakis and Stefanos Gritzalis}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {Realtime DDoS Detection in {SIP} Ecosystems: Machine Learning Tools of the Trade}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {126--139}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_9}, doi = {10.1007/978-3-319-46298-1\_9}, timestamp = {Thu, 23 Jun 2022 19:57:36 +0200}, biburl = {https://dblp.org/rec/conf/nss/TsiatsikasGKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/TzortzakiKSG16, author = {Eleni Tzortzaki and Angeliki Kitsiou and Maria Sideri and Stefanos Gritzalis}, title = {Self-disclosure, Privacy concerns and Social Capital benefits interaction in {FB:} {A} case study}, booktitle = {Proceedings of the 20th Pan-Hellenic Conference on Informatics, Patras, Greece, November 10-12, 2016}, pages = {32}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3003733.3003781}, doi = {10.1145/3003733.3003781}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/TzortzakiKSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/KitsiouTSG16, author = {Angeliki Kitsiou and Eleni Tzortzaki and Maria Sideri and Stefanos Gritzalis}, editor = {Gabriele Lenzini and Giampaolo Bella and Zinaida Benenson and Carrie E. Gates}, title = {Digital privacy and social capital on social network sites. friends or foes?}, booktitle = {Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2016, Los Angeles, CA, USA, December 5, 2016}, pages = {3--16}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3046055.3046060}, doi = {10.1145/3046055.3046060}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stast/KitsiouTSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SimouKMG16, author = {Stavros Simou and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Steven Furnell}, title = {Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems}, booktitle = {Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9830}, pages = {35--47}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44341-6\_3}, doi = {10.1007/978-3-319-44341-6\_3}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/SimouKMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KavakliKMG15, author = {Evangelia Kavakli and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, title = {Privacy as an Integral Part of the Implementation of Cloud Solutions}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2213--2224}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu118}, doi = {10.1093/COMJNL/BXU118}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KavakliKMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/DrogkarisGKL15, author = {Prokopios Drogkaris and Stefanos Gritzalis and Christos Kalloniatis and Costas Lambrinoudakis}, title = {A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments}, journal = {Future Internet}, volume = {7}, number = {4}, pages = {500--515}, year = {2015}, url = {https://doi.org/10.3390/fi7040500}, doi = {10.3390/FI7040500}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/DrogkarisGKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/LianG15, author = {Shiguo Lian and Stefanos Gritzalis}, title = {Innovations in emerging multimedia communication systems}, journal = {Telecommun. Syst.}, volume = {59}, number = {3}, pages = {289--290}, year = {2015}, url = {https://doi.org/10.1007/s11235-014-9935-y}, doi = {10.1007/S11235-014-9935-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/LianG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SimouKMG15, author = {Stavros Simou and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, editor = {Anne Persson and Janis Stirna}, title = {Towards the Development of a Cloud Forensics Methodology: {A} Conceptual Model}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {215}, pages = {470--481}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19243-7\_43}, doi = {10.1007/978-3-319-19243-7\_43}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/SimouKMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RizomiliotisG15, author = {Panagiotis Rizomiliotis and Stefanos Gritzalis}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Florian Kerschbaum and Cristina Nita{-}Rotaru}, title = {{ORAM} Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes}, booktitle = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {65--76}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808425.2808429}, doi = {10.1145/2808425.2808429}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RizomiliotisG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SimouKMG15, author = {Stavros Simou and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {A Meta-model for Assisting a Cloud Forensics Process}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {177--187}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_11}, doi = {10.1007/978-3-319-31811-0\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/SimouKMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/SideriKKG15, author = {Maria Sideri and Angeliki Kitsiou and Christos Kalloniatis and Stefanos Gritzalis}, editor = {Sokratis K. Katsikas and Alexander B. Sideridis}, title = {Privacy and Facebook Universities Students' Communities for Confessions and Secrets: The Greek Case}, booktitle = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms - 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings}, series = {Communications in Computer and Information Science}, volume = {570}, pages = {77--94}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27164-4\_6}, doi = {10.1007/978-3-319-27164-4\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edemocracy/SideriKKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pci/2015, editor = {Nikitas N. Karanikolas and Demosthenes Akoumianakis and Mara Nikolaidou and Dimitrios D. Vergados and Michalis Xenos and George M. Giaglis and Stefanos Gritzalis and Lazaros F. Merakos and Panagiotis Tsanakas and Cleo Sgouropoulou}, title = {Proceedings of the 19th Panhellenic Conference on Informatics, {PCI} 2015, Athens, Greece, October 1-3, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2801948}, isbn = {978-1-4503-3551-5}, timestamp = {Wed, 23 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KalloniatisMMIGK14, author = {Christos Kalloniatis and Haralambos Mouratidis and Vassilis Manousakis and Shareeful Islam and Stefanos Gritzalis and Evangelia Kavakli}, title = {Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts}, journal = {Comput. Stand. Interfaces}, volume = {36}, number = {4}, pages = {759--775}, year = {2014}, url = {https://doi.org/10.1016/j.csi.2013.12.010}, doi = {10.1016/J.CSI.2013.12.010}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KalloniatisMMIGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijait/PanteliMG14, author = {Alexandros Panteli and Manolis Maragoudakis and Stefanos Gritzalis}, title = {Privacy Preserving Data Mining Using Radial Basis Functions on Horizontally Partitioned Databases in the Malicious Model}, journal = {Int. J. Artif. Intell. Tools}, volume = {23}, number = {5}, year = {2014}, url = {https://doi.org/10.1142/S0218213014500079}, doi = {10.1142/S0218213014500079}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijait/PanteliMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/DamopoulosKGP14, author = {Dimitrios Damopoulos and Georgios Kambourakis and Stefanos Gritzalis and Sang Oh Park}, title = {Exposing mobile malware from the inside (or what is your mobile app really doing?)}, journal = {Peer-to-Peer Netw. Appl.}, volume = {7}, number = {4}, pages = {687--697}, year = {2014}, url = {https://doi.org/10.1007/s12083-012-0179-x}, doi = {10.1007/S12083-012-0179-X}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/DamopoulosKGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ClarkeGZR14, author = {James Clarke and Stefanos Gritzalis and Jianying Zhou and Rodrigo Roman}, title = {Protecting the internet of things}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2637--2638}, year = {2014}, url = {https://doi.org/10.1002/sec.1174}, doi = {10.1002/SEC.1174}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ClarkeGZR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RekleitisRG14, author = {Evangelos Rekleitis and Panagiotis Rizomiliotis and Stefanos Gritzalis}, title = {How to protect security and privacy in the IoT: a policy-based {RFID} tag management protocol}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2669--2683}, year = {2014}, url = {https://doi.org/10.1002/sec.400}, doi = {10.1002/SEC.400}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RekleitisRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ClarkeGZR14a, author = {James Clarke and Stefanos Gritzalis and Jianying Zhou and Rodrigo Roman}, title = {Security in a completely interconnected world}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2726--2727}, year = {2014}, url = {https://doi.org/10.1002/sec.1175}, doi = {10.1002/SEC.1175}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ClarkeGZR14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SimouKKG14, author = {Stavros Simou and Christos Kalloniatis and Evangelia Kavakli and Stefanos Gritzalis}, editor = {Matthias Jarke and John Mylopoulos and Christoph Quix and Colette Rolland and Yannis Manolopoulos and Haralambos Mouratidis and Jennifer Horkoff}, title = {Cloud Forensics: Identifying the Major Issues and Challenges}, booktitle = {Advanced Information Systems Engineering - 26th International Conference, CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8484}, pages = {271--284}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07881-6\_19}, doi = {10.1007/978-3-319-07881-6\_19}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/SimouKKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SimouKKG14a, author = {Stavros Simou and Christos Kalloniatis and Evangelia Kavakli and Stefanos Gritzalis}, editor = {Lazaros S. Iliadis and Michael P. Papazoglou and Klaus Pohl}, title = {Cloud Forensics Solutions: {A} Review}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {178}, pages = {299--309}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07869-4\_28}, doi = {10.1007/978-3-319-07869-4\_28}, timestamp = {Sun, 02 Oct 2022 15:55:56 +0200}, biburl = {https://dblp.org/rec/conf/caise/SimouKKG14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfhr/ParaskevasSK14, author = {Diamantatos Paraskevas and Stefanos Gritzalis and Ergina Kavallieratou}, title = {Writer Identification Using a Statistical and Model Based Approach}, booktitle = {14th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2014, Crete, Greece, September 1-4, 2014}, pages = {589--594}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICFHR.2014.104}, doi = {10.1109/ICFHR.2014.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/ParaskevasSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/ChalarisCG14, author = {Ioannis Chalaris and Manolis Chalaris and Stefanos Gritzalis}, editor = {Sokratis K. Katsikas and Michael Hatzopoulos and Theodoros Apostolopoulos and Dimosthenis Anagnostopoulos and Elias Carayiannis and Theodora A. Varvarigou and Mara Nikolaidou}, title = {A holistic approach for quality assurance and advanced decision making for academic institutions using the balanced scorecard technique}, booktitle = {18th Panhellenic Conference on Informatics, {PCI} '14, Athens, Greece, October 2-4, 2014}, pages = {44:1--44:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2645791.2645820}, doi = {10.1145/2645791.2645820}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/ChalarisCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BeckersFGHKM14, author = {Kristian Beckers and Stephan Fa{\ss}bender and Stefanos Gritzalis and Maritta Heisel and Christos Kalloniatis and Rene Meis}, editor = {Claudia Eckert and Sokratis K. Katsikas and G{\"{u}}nther Pernul}, title = {Privacy-Aware Cloud Deployment Scenario Selection}, booktitle = {Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8647}, pages = {94--105}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09770-1\_9}, doi = {10.1007/978-3-319-09770-1\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/BeckersFGHKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DamopoulosKG13, author = {Dimitrios Damopoulos and Georgios Kambourakis and Stefanos Gritzalis}, title = {From keyloggers to touchloggers: Take the rough with the smooth}, journal = {Comput. Secur.}, volume = {32}, pages = {102--114}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2012.10.002}, doi = {10.1016/J.COSE.2012.10.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DamopoulosKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AnagnostopoulosKKLG13, author = {Marios Anagnostopoulos and Georgios Kambourakis and Panagiotis Kopanos and Georgios Louloudakis and Stefanos Gritzalis}, title = {{DNS} amplification attack revisited}, journal = {Comput. Secur.}, volume = {39}, pages = {475--485}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.10.001}, doi = {10.1016/J.COSE.2013.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AnagnostopoulosKKLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KoliasKG13, author = {Constantinos Kolias and Georgios Kambourakis and Stefanos Gritzalis}, title = {Attacks and Countermeasures on 802.16: Analysis and Assessment}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {15}, number = {1}, pages = {487--514}, year = {2013}, url = {https://doi.org/10.1109/SURV.2012.021312.00138}, doi = {10.1109/SURV.2012.021312.00138}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KoliasKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/GritzalisZJ13, author = {Stefanos Gritzalis and Justin Z. Zhan and Kitae Jeong}, title = {{IT} convergence and security}, journal = {Electron. Commer. Res.}, volume = {13}, number = {3}, pages = {237--241}, year = {2013}, url = {https://doi.org/10.1007/s10660-013-9114-3}, doi = {10.1007/S10660-013-9114-3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ecr/GritzalisZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijapuc/BelsisSG13, author = {Petros Belsis and Christos Skourlas and Stefanos Gritzalis}, title = {A Wireless System for Secure Electronic Healthcare Records Management}, journal = {Int. J. Adv. Pervasive Ubiquitous Comput.}, volume = {5}, number = {4}, pages = {16--32}, year = {2013}, url = {https://doi.org/10.4018/ijapuc.2013100102}, doi = {10.4018/IJAPUC.2013100102}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijapuc/BelsisSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/RizomiliotisG13, author = {Panagiotis Rizomiliotis and Stefanos Gritzalis}, title = {On the security of AUTH, a provably secure authentication protocol based on the subspace {LPN} problem}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {151--154}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0188-z}, doi = {10.1007/S10207-012-0188-Z}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/RizomiliotisG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Pereniguez-GarciaLKRGG13, author = {Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and Rafael Mar{\'{\i}}n L{\'{o}}pez and Georgios Kambourakis and Antonio Ruiz{-}Mart{\'{\i}}nez and Stefanos Gritzalis and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {{KAMU:} providing advanced user privacy in Kerberos multi-domain scenarios}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {6}, pages = {505--525}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0201-1}, doi = {10.1007/S10207-013-0201-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Pereniguez-GarciaLKRGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/MouratidisIKG13, author = {Haralambos Mouratidis and Shareeful Islam and Christos Kalloniatis and Stefanos Gritzalis}, title = {A framework to support selection of cloud providers based on security and privacy requirements}, journal = {J. Syst. Softw.}, volume = {86}, number = {9}, pages = {2276--2293}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2013.03.011}, doi = {10.1016/J.JSS.2013.03.011}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/MouratidisIKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/GritzalisL13, author = {Stefanos Gritzalis and Shiguo Lian}, title = {Mathematical and Computer Modelling in Information System Security}, journal = {Math. Comput. Model.}, volume = {57}, number = {11-12}, pages = {2581--2582}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2013.04.001}, doi = {10.1016/J.MCM.2013.04.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/GritzalisL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/DamopoulosKAGP13, author = {Dimitrios Damopoulos and Georgios Kambourakis and Marios Anagnostopoulos and Stefanos Gritzalis and J. H. Park}, title = {User privacy and modern mobile services: are they on the same path?}, journal = {Pers. Ubiquitous Comput.}, volume = {17}, number = {7}, pages = {1437--1448}, year = {2013}, url = {https://doi.org/10.1007/s00779-012-0579-1}, doi = {10.1007/S00779-012-0579-1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/DamopoulosKAGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/GritzalisL13, author = {Stefanos Gritzalis and Lin Liu}, title = {Requirements Engineering for Security, Privacy and Services in Cloud Environments}, journal = {Requir. Eng.}, volume = {18}, number = {4}, pages = {297--298}, year = {2013}, url = {https://doi.org/10.1007/s00766-013-0177-4}, doi = {10.1007/S00766-013-0177-4}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/GritzalisL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/ManousakisKKG13, author = {Vassilis Manousakis and Christos Kalloniatis and Evangelia Kavakli and Stefanos Gritzalis}, editor = {Xavier Franch and Pnina Soffer}, title = {Privacy in the Cloud: Bridging the Gap between Design and Implementation}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2013 International Workshops, Valencia, Spain, June 17-21, 2013. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {148}, pages = {455--465}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38490-5\_41}, doi = {10.1007/978-3-642-38490-5\_41}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/ManousakisKKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/KalloniatisMMG13, author = {Christos Kalloniatis and Vassilis Manousakis and Haralambos Mouratidis and Stefanos Gritzalis}, editor = {Christos Douligeris and Nineta Polemi and Athanasios Karantjias and Winfried Lamersdorf}, title = {Migrating into the Cloud: Identifying the Major Security and Privacy Concerns}, booktitle = {Collaborative, Trusted and Privacy-Aware e/m-Services - 12th {IFIP} {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E} 2013, Athens, Greece, April 25-26, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {399}, pages = {73--87}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37437-1\_7}, doi = {10.1007/978-3-642-37437-1\_7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/KalloniatisMMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PavlidisMKIG13, author = {Michalis Pavlidis and Haralambos Mouratidis and Christos Kalloniatis and Shareeful Islam and Stefanos Gritzalis}, editor = {Steven Furnell and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions}, booktitle = {Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8058}, pages = {185--198}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40343-9\_16}, doi = {10.1007/978-3-642-40343-9\_16}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/PavlidisMKIG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RizomiliotisG13, author = {Panagiotis Rizomiliotis and Stefanos Gritzalis}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Revisiting lightweight authentication protocols based on hard learning problems}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {125--130}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462118}, doi = {10.1145/2462096.2462118}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RizomiliotisG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LianMGH12, author = {Shiguo Lian and Jean{-}Henry Morin and Stefanos Gritzalis and Gregory L. Heileman}, title = {Special issue on ubiquitous multimedia services}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {477--479}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9263-z}, doi = {10.1007/S10796-010-9263-Z}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/LianMGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LoukasDMSKG12, author = {Athanasios Loukas and Dimitrios Damopoulos and Sofia{-}Anna Menesidou and Maria Eleni Skarkala and Georgios Kambourakis and Stefanos Gritzalis}, title = {{MILC:} {A} secure and privacy-preserving mobile instant locator with chatting}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {481--497}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9254-0}, doi = {10.1007/S10796-010-9254-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/LoukasDMSKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenLYG12, author = {Xi Chen and Shiguo Lian and Chu{-}Sing Yang and Stefanos Gritzalis}, title = {Guest Editorial}, journal = {J. Networks}, volume = {7}, number = {2}, pages = {219--221}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.2.219-221}, doi = {10.4304/JNW.7.2.219-221}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenLYG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/MouratidisKIHG12, author = {Haralambos Mouratidis and Christos Kalloniatis and Shareeful Islam and Marc{-}Philippe Huget and Stefanos Gritzalis}, title = {Aligning Security and Privacy to Support the Development of Secure Information Systems}, journal = {J. Univers. Comput. Sci.}, volume = {18}, number = {12}, pages = {1608--1627}, year = {2012}, url = {https://doi.org/10.3217/jucs-018-12-1608}, doi = {10.3217/JUCS-018-12-1608}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/MouratidisKIHG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LinLG12, author = {Xiaodong Lin and Jianwei Liu and Stefanos Gritzalis}, title = {Security and privacy in emerging information technologies}, journal = {Secur. Commun. Networks}, volume = {5}, number = {1}, pages = {1--2}, year = {2012}, url = {https://doi.org/10.1002/sec.394}, doi = {10.1002/SEC.394}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LinLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DamopoulosMKPCG12, author = {Dimitrios Damopoulos and Sofia{-}Anna Menesidou and Georgios Kambourakis and Maria Papadaki and Nathan L. Clarke and Stefanos Gritzalis}, title = {Evaluation of anomaly-based {IDS} for mobile devices using machine learning classifiers}, journal = {Secur. Commun. Networks}, volume = {5}, number = {1}, pages = {3--14}, year = {2012}, url = {https://doi.org/10.1002/sec.341}, doi = {10.1002/SEC.341}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DamopoulosMKPCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TsakountakisKG12, author = {Alexandros Tsakountakis and Georgios Kambourakis and Stefanos Gritzalis}, title = {{SIPA:} generic and secure accounting for {SIP}}, journal = {Secur. Commun. Networks}, volume = {5}, number = {9}, pages = {1006--1027}, year = {2012}, url = {https://doi.org/10.1002/sec.387}, doi = {10.1002/SEC.387}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TsakountakisKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/RizomiliotisG12, author = {Panagiotis Rizomiliotis and Stefanos Gritzalis}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {{GHB} {\#}: {A} Provably Secure HB-Like Lightweight Authentication Protocol}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {489--506}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_29}, doi = {10.1007/978-3-642-31284-7\_29}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/RizomiliotisG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/SkarkalaMGMTM12, author = {Maria Eleni Skarkala and Manolis Maragoudakis and Stefanos Gritzalis and Lilian Mitrou and Hannu Toivonen and Pirjo Moen}, title = {Privacy Preservation by k-Anonymization of Weighted Social Networks}, booktitle = {International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012}, pages = {423--428}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ASONAM.2012.75}, doi = {10.1109/ASONAM.2012.75}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/SkarkalaMGMTM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/KalloniatisBKG12, author = {Christos Kalloniatis and Petros Belsis and Evangelia Kavakli and Stefanos Gritzalis}, editor = {Marko Bajec and Johann Eder}, title = {Applying Soft Computing Technologies for Implementing Privacy-Aware Systems}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2012 International Workshops, Gda{\'{n}}sk, Poland, June 25-26, 2012. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {112}, pages = {31--45}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31069-0\_3}, doi = {10.1007/978-3-642-31069-0\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/KalloniatisBKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/BelsisGMSV12, author = {Petros Belsis and Stefanos Gritzalis and Catherine Marinagi and Christos Skourlas and Dimitris Vassis}, title = {Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing Students}, booktitle = {16th Panhellenic Conference on Informatics, {PCI} 2012, Piraeus, Greece, October 5-7, 2012}, pages = {369--374}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PCi.2012.66}, doi = {10.1109/PCI.2012.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/BelsisGMSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/LianGNL11, author = {Shiguo Lian and Stefanos Gritzalis and Nadia Nedjah and Iuon{-}Chang Lin}, title = {Special issue on soft computing for information system security}, journal = {Appl. Soft Comput.}, volume = {11}, number = {7}, pages = {4257--4259}, year = {2011}, url = {https://doi.org/10.1016/j.asoc.2011.05.040}, doi = {10.1016/J.ASOC.2011.05.040}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/LianGNL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/KalloniatisBG11, author = {Christos Kalloniatis and Petros Belsis and Stefanos Gritzalis}, title = {A soft computing approach for privacy requirements engineering: The PriS framework}, journal = {Appl. Soft Comput.}, volume = {11}, number = {7}, pages = {4341--4348}, year = {2011}, url = {https://doi.org/10.1016/j.asoc.2010.10.012}, doi = {10.1016/J.ASOC.2010.10.012}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/KalloniatisBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KambourakisKGP11, author = {Georgios Kambourakis and Constantinos Kolias and Stefanos Gritzalis and Jong Hyuk Park}, title = {DoS attacks exploiting signaling in {UMTS} and {IMS}}, journal = {Comput. Commun.}, volume = {34}, number = {3}, pages = {226--235}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.02.010}, doi = {10.1016/J.COMCOM.2010.02.010}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/KambourakisKGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pereniguez-GarciaLKGG11, author = {Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and Rafael Mar{\'{\i}}n L{\'{o}}pez and Georgios Kambourakis and Stefanos Gritzalis and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {PrivaKERB: {A} user privacy framework for Kerberos}, journal = {Comput. Secur.}, volume = {30}, number = {6-7}, pages = {446--463}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.04.001}, doi = {10.1016/J.COSE.2011.04.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pereniguez-GarciaLKGG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KlaoudatouKKG11, author = {Eleni Klaoudatou and Elisavet Konstantinou and Georgios Kambourakis and Stefanos Gritzalis}, title = {A Survey on Cluster-Based Group Key Agreement Protocols for WSNs}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {13}, number = {3}, pages = {429--442}, year = {2011}, url = {https://doi.org/10.1109/SURV.2011.061710.00109}, doi = {10.1109/SURV.2011.061710.00109}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KlaoudatouKKG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KaropoulosKG11, author = {Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis}, title = {PrivaSIP: Ad-hoc identity privacy in {SIP}}, journal = {Comput. Stand. Interfaces}, volume = {33}, number = {3}, pages = {301--314}, year = {2011}, url = {https://doi.org/10.1016/j.csi.2010.07.002}, doi = {10.1016/J.CSI.2010.07.002}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KaropoulosKG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/FrantzeskouMSGG11, author = {Georgia Frantzeskou and Stephen G. MacDonell and Efstathios Stamatatos and Stelios Georgiou and Stefanos Gritzalis}, title = {The significance of user-defined identifiers in Java source code authorship identification}, journal = {Comput. Syst. Sci. Eng.}, volume = {26}, number = {2}, year = {2011}, timestamp = {Thu, 23 Aug 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/FrantzeskouMSGG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitr/BelsisSG11, author = {Petros Belsis and Christos Skourlas and Stefanos Gritzalis}, title = {Secure Electronic Healthcare Records Management in Wireless Environments}, journal = {J. Inf. Technol. Res.}, volume = {4}, number = {4}, pages = {1--17}, year = {2011}, url = {https://doi.org/10.4018/jitr.2011100101}, doi = {10.4018/JITR.2011100101}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitr/BelsisSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm2/LianLGC11, author = {Shiguo Lian and Zhu Li and Stefanos Gritzalis and Xi Chen}, title = {Guest Editorial}, journal = {J. Multim.}, volume = {6}, number = {4}, pages = {317--319}, year = {2011}, url = {https://doi.org/10.4304/jmm.6.4.317-319}, doi = {10.4304/JMM.6.4.317-319}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmm2/LianLGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/LuoLLYG11, author = {Xiangyang Luo and Fenlin Liu and Shiguo Lian and Chunfang Yang and Stefanos Gritzalis}, title = {On the Typical Statistic Features for Image Blind Steganalysis}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {29}, number = {7}, pages = {1404--1422}, year = {2011}, url = {https://doi.org/10.1109/JSAC.2011.110807}, doi = {10.1109/JSAC.2011.110807}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/LuoLLYG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/AntonBGM11, author = {Annie I. Ant{\'{o}}n and Travis D. Breaux and Stefanos Gritzalis and John Mylopoulos}, title = {Digital privacy: theory, policies and technologies}, journal = {Requir. Eng.}, volume = {16}, number = {1}, pages = {1--2}, year = {2011}, url = {https://doi.org/10.1007/s00766-011-0117-0}, doi = {10.1007/S00766-011-0117-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/AntonBGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ParkGJW11, author = {Jong Hyuk Park and Stefanos Gritzalis and Hai Jin and Jenlong Wang}, title = {Network security and digital forensics in next generation communications}, journal = {Wirel. Commun. Mob. Comput.}, volume = {11}, number = {2}, pages = {143--145}, year = {2011}, url = {https://doi.org/10.1002/wcm.1091}, doi = {10.1002/WCM.1091}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ParkGJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/RizomiliotisRG11, author = {Panagiotis Rizomiliotis and Evangelos Rekleitis and Stefanos Gritzalis}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Designing secure {RFID} authentication protocols is (still) a non-trivial task}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {73--80}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6059962}, doi = {10.1109/ICNSS.2011.6059962}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/RizomiliotisRG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DamopoulosKG11, author = {Dimitrios Damopoulos and Georgios Kambourakis and Stefanos Gritzalis}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {iSAM: An iPhone Stealth Airborne Malware}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {17--28}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_2}, doi = {10.1007/978-3-642-21424-0\_2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DamopoulosKG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SkarkalaMGM11, author = {Maria Eleni Skarkala and Manolis Maragoudakis and Stefanos Gritzalis and Lilian Mitrou}, editor = {Steven Furnell and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {Privacy Preserving Tree Augmented Na{\"{\i}}ve Bayesian Multi-party Implementation on Horizontally Partitioned Databases}, booktitle = {Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6863}, pages = {62--73}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22890-2\_6}, doi = {10.1007/978-3-642-22890-2\_6}, timestamp = {Mon, 03 Jan 2022 22:15:13 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/SkarkalaMGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/KambourakisKG10, author = {Georgios Kambourakis and Elisavet Konstantinou and Stefanos Gritzalis}, title = {Revisiting WiMAX {MBS} security}, journal = {Comput. Math. Appl.}, volume = {60}, number = {2}, pages = {217--223}, year = {2010}, url = {https://doi.org/10.1016/j.camwa.2009.12.032}, doi = {10.1016/J.CAMWA.2009.12.032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/KambourakisKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChenGLL10, author = {Chang Wen Chen and Stefanos Gritzalis and Pascal Lorenz and Shiguo Lian}, title = {Special issue on multimedia networking and security in convergent networks}, journal = {Comput. Commun.}, volume = {33}, number = {14}, pages = {1575--1577}, year = {2010}, url = {https://doi.org/10.1016/j.comcom.2010.07.003}, doi = {10.1016/J.COMCOM.2010.07.003}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChenGLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PereniguezKLGG10, author = {Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and Georgios Kambourakis and Rafael Mar{\'{\i}}n L{\'{o}}pez and Stefanos Gritzalis and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {Privacy-enhanced fast re-authentication for EAP-based next generation network}, journal = {Comput. Commun.}, volume = {33}, number = {14}, pages = {1682--1694}, year = {2010}, url = {https://doi.org/10.1016/j.comcom.2010.02.021}, doi = {10.1016/J.COMCOM.2010.02.021}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/PereniguezKLGG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ThuraisinghamG10, author = {Bhavani Thuraisingham and Stefanos Gritzalis}, title = {Information and communications security, privacy and trust: Standards and regulations}, journal = {Comput. Stand. Interfaces}, volume = {32}, number = {5-6}, pages = {229}, year = {2010}, url = {https://doi.org/10.1016/j.csi.2010.04.001}, doi = {10.1016/J.CSI.2010.04.001}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/ThuraisinghamG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/KambourakisGP10, author = {Georgios Kambourakis and Stefanos Gritzalis and Jong Hyuk Park}, title = {Device Authentication In Wireless And Pervasive Environments}, journal = {Intell. Autom. Soft Comput.}, volume = {16}, number = {3}, pages = {399--418}, year = {2010}, url = {https://doi.org/10.1080/10798587.2010.10643089}, doi = {10.1080/10798587.2010.10643089}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iasc/KambourakisGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KaropoulosKGK10, author = {Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis and Elisavet Konstantinou}, title = {A framework for identity privacy in {SIP}}, journal = {J. Netw. Comput. Appl.}, volume = {33}, number = {1}, pages = {16--28}, year = {2010}, url = {https://doi.org/10.1016/j.jnca.2009.07.004}, doi = {10.1016/J.JNCA.2009.07.004}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KaropoulosKGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/MitsevaAMPSGWBP10, author = {Anelia Mitseva and Efthimia Aivaloglou and Maria Marchitti and Neeli Rashmi Prasad and Charalabos Skianis and Stefanos Gritzalis and Adrian Waller and Timothy Baug{\'{e}} and Sarah Pennington}, title = {Towards adaptive security for convergent wireless sensor networks in beyond 3G environments}, journal = {Wirel. Commun. Mob. Comput.}, volume = {10}, number = {9}, pages = {1193--1207}, year = {2010}, url = {https://doi.org/10.1002/wcm.678}, doi = {10.1002/WCM.678}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/MitsevaAMPSGWBP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AivaloglouG10, author = {Efthimia Aivaloglou and Stefanos Gritzalis}, title = {Hybrid trust and reputation management for sensor networks}, journal = {Wirel. Networks}, volume = {16}, number = {5}, pages = {1493--1510}, year = {2010}, url = {https://doi.org/10.1007/s11276-009-0216-8}, doi = {10.1007/S11276-009-0216-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/AivaloglouG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/DrogkarisGL10, author = {Prokopios Drogkaris and Stefanos Gritzalis and Costas Lambrinoudakis}, editor = {Kim Normann Andersen and Enrico Francesconi and {\AA}ke Gr{\"{o}}nlund and Tom M. van Engers}, title = {Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era}, booktitle = {Electronic Government and the Information Systems Perspective, First International Conference, {EGOVIS} 2010, Bilbao, Spain, August 31 - September 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6267}, pages = {142--149}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15172-9\_14}, doi = {10.1007/978-3-642-15172-9\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/egov/DrogkarisGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/DrogkarisG10, author = {Prokopios Drogkaris and Stefanos Gritzalis}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Attaching Multiple Personal Identifiers in {X.509} Digital Certificates}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {171--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_12}, doi = {10.1007/978-3-642-22633-5\_12}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/DrogkarisG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/TsohouKLG10, author = {Aggeliki Tsohou and Spyros Kokolakis and Costas Lambrinoudakis and Stefanos Gritzalis}, editor = {Nathan L. Clarke and Steven Furnell and Rossouw von Solms}, title = {Unifying {ISO} Security Standards Practices into a Single Security Framework}, booktitle = {South African Information Security Multi-Conference, {SAISMC} 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings}, pages = {188--203}, publisher = {University of Plymouth}, year = {2010}, url = {http://www.cscan.org/openaccess/?paperid=196}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/TsohouKLG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/HogbenG10, author = {Giles Hogben and Stefanos Gritzalis}, editor = {Robert Meersman and Tharam S. Dillon and Pilar Herrero}, title = {IS'10 - {PC} Co-chairs Message}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2010 - Confederated International Conferences: CoopIS, IS, {DOA} and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6426}, pages = {582}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16934-2\_43}, doi = {10.1007/978-3-642-16934-2\_43}, timestamp = {Thu, 14 Oct 2021 10:28:29 +0200}, biburl = {https://dblp.org/rec/conf/otm/HogbenG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/RekleitisRG10, author = {Evangelos Rekleitis and Panagiotis Rizomiliotis and Stefanos Gritzalis}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Miguel Soriano}, title = {An Agent Based Back-End {RFID} Tag Management System}, booktitle = {Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6264}, pages = {165--176}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15152-1\_15}, doi = {10.1007/978-3-642-15152-1\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/RekleitisRG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TsakountakisKG09, author = {Alexandros Tsakountakis and Georgios Kambourakis and Stefanos Gritzalis}, title = {A generic accounting scheme for next generation networks}, journal = {Comput. Networks}, volume = {53}, number = {14}, pages = {2408--2426}, year = {2009}, url = {https://doi.org/10.1016/j.comnet.2009.04.009}, doi = {10.1016/J.COMNET.2009.04.009}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/TsakountakisKG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/MagkosMCG09, author = {Emmanouil Magkos and Manolis Maragoudakis and Vassilios Chrissikopoulos and Stefanos Gritzalis}, title = {Accurate and large-scale privacy-preserving data mining using the election paradigm}, journal = {Data Knowl. Eng.}, volume = {68}, number = {11}, pages = {1224--1236}, year = {2009}, url = {https://doi.org/10.1016/j.datak.2009.06.003}, doi = {10.1016/J.DATAK.2009.06.003}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/MagkosMCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/RizomiliotisRG09, author = {Panagiotis Rizomiliotis and Evangelos Rekleitis and Stefanos Gritzalis}, title = {Security analysis of the song-mitchell authentication protocol for low-cost {RFID} tags}, journal = {{IEEE} Commun. Lett.}, volume = {13}, number = {4}, pages = {274--276}, year = {2009}, url = {https://doi.org/10.1109/LCOMM.2009.082117}, doi = {10.1109/LCOMM.2009.082117}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/RizomiliotisRG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/KarydaGPK09, author = {Maria Karyda and Stefanos Gritzalis and Jong Hyuk Park and Spyros Kokolakis}, title = {Privacy and fair information practices in ubiquitous environments: Research challenges and future directions}, journal = {Internet Res.}, volume = {19}, number = {2}, pages = {194--208}, year = {2009}, url = {https://doi.org/10.1108/10662240910952346}, doi = {10.1108/10662240910952346}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/KarydaGPK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BelsisFGS09, author = {Petros Belsis and Kostas Fragos and Stefanos Gritzalis and Christos Skourlas}, title = {Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {239--268}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0377}, doi = {10.3233/JCS-2009-0377}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BelsisFGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BoukasKG09, author = {Lambros Boukas and Georgios Kambourakis and Stefanos Gritzalis}, title = {Pandora: An SMS-oriented m-informational system for educational realms}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {684--702}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.07.002}, doi = {10.1016/J.JNCA.2008.07.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BoukasKG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/LianZGC09, author = {Shiguo Lian and Yan Zhang and Stefanos Gritzalis and Yu Chen}, title = {Multimedia Security in Communication {(MUSIC)}}, journal = {J. Univers. Comput. Sci.}, volume = {15}, number = {2}, pages = {398--400}, year = {2009}, url = {http://www.jucs.org/jucs\_15\_2/multimedia\_security\_in\_communication}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/LianZGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/KohDGH09, author = {Byoung{-}Soo Koh and Mieso K. Denko and Stefanos Gritzalis and Ching{-}Hsien Hsu}, title = {Data Security and Privacy Protection in Pervasive Computing Environments}, journal = {J. Univers. Comput. Sci.}, volume = {15}, number = {5}, pages = {967--969}, year = {2009}, url = {http://www.jucs.org/jucs\_15\_5/data\_security\_and\_privacy}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/KohDGH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/TsohouKLG09, author = {Aggeliki Tsohou and Spyros Kokolakis and Costas Lambrinoudakis and Stefanos Gritzalis}, editor = {Alexander B. Sideridis and Charalampos Z. Patrikakis}, title = {Information Systems Security Management: {A} Review and a Classification of the {ISO} Standards}, booktitle = {Next Generation Society. Technological and Legal Issues - Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {26}, pages = {220--235}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11631-5\_21}, doi = {10.1007/978-3-642-11631-5\_21}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edemocracy/TsohouKLG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AivaloglouG09, author = {Efthimia Aivaloglou and Stefanos Gritzalis}, title = {Trust-Based Data Disclosure in Sensor Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199546}, doi = {10.1109/ICC.2009.5199546}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/AivaloglouG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/GeneiatakisLG09, author = {Dimitris Geneiatakis and Costas Lambrinoudakis and Stefanos Gritzalis}, editor = {Yang Xiang and Javier L{\'{o}}pez and Haining Wang and Wanlei Zhou}, title = {A Hierarchical Model for Cross-Domain Communication of Health Care Units}, booktitle = {Third International Conference on Network and System Security, {NSS} 2009, Gold Coast, Queensland, Australia, October 19-21, 2009}, pages = {123--129}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NSS.2009.84}, doi = {10.1109/NSS.2009.84}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/GeneiatakisLG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/GritzalisC09, author = {Stefanos Gritzalis and Xueqi Cheng}, editor = {Robert Meersman and Tharam S. Dillon and Pilar Herrero}, title = {{IS} 2009 - {PC} Co-chairs' Message}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5871}, pages = {797}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05151-7\_3}, doi = {10.1007/978-3-642-05151-7\_3}, timestamp = {Thu, 14 Oct 2021 10:28:26 +0200}, biburl = {https://dblp.org/rec/conf/otm/GritzalisC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/KalloniatisKG09, author = {Christos Kalloniatis and Evangelia Kavakli and Stefanos Gritzalis}, editor = {Vassilios Chrissikopoulos and Nikolaos Alexandris and Christos Douligeris and Spyros Sioutas}, title = {Methods for Designing Privacy Aware Information Systems: {A} Review}, booktitle = {{PCI} 2009, 13th Panhellenic Conference on Informatics, 10-12 September 2009, Corfu, Greece}, pages = {185--194}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PCI.2009.45}, doi = {10.1109/PCI.2009.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pci/KalloniatisKG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/petra/VassisBSG09, author = {Dimitris Vassis and Petros Belsis and Christos Skourlas and Stefanos Gritzalis}, title = {End to end secure communication in ad-hoc assistive medical environments using secure paths}, booktitle = {Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, {PETRA} 2009, Corfu, Greece, June 9-13, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1579114.1579184}, doi = {10.1145/1579114.1579184}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/petra/VassisBSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/KambourakisKGP09, author = {Georgios Kambourakis and Constantinos Kolias and Stefanos Gritzalis and Jong Hyuk Park}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Signaling-Oriented DoS Attacks in {UMTS} Networks}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {280--289}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_29}, doi = {10.1007/978-3-642-02617-1\_29}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/KambourakisKGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/KlaoudatouKKG09, author = {Eleni Klaoudatou and Elisavet Konstantinou and Georgios Kambourakis and Stefanos Gritzalis}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {A Cluster-Based Framework for the Security of Medical Sensor Environments}, booktitle = {Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5695}, pages = {52--62}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03748-1\_6}, doi = {10.1007/978-3-642-03748-1\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/KlaoudatouKKG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/RomanLG08, author = {Rodrigo Roman and Javier L{\'{o}}pez and Stefanos Gritzalis}, title = {Situation awareness mechanisms for wireless sensor networks}, journal = {{IEEE} Commun. Mag.}, volume = {46}, number = {4}, pages = {102--107}, year = {2008}, url = {https://doi.org/10.1109/MCOM.2008.4481348}, doi = {10.1109/MCOM.2008.4481348}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/RomanLG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/AntoniouSGU08, author = {Giannakis Antoniou and Leon Sterling and Stefanos Gritzalis and Parampalli Udaya}, title = {Privacy and forensics investigation process: The {ERPINA} protocol}, journal = {Comput. Stand. Interfaces}, volume = {30}, number = {4}, pages = {229--236}, year = {2008}, url = {https://doi.org/10.1016/j.csi.2007.10.008}, doi = {10.1016/J.CSI.2007.10.008}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/AntoniouSGU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BalopoulosGK08, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, title = {Specifying and implementing privacy-preserving cryptographic protocols}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {395--420}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0057-y}, doi = {10.1007/S10207-008-0057-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BalopoulosGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsose/AivaloglouGS08, author = {Efthimia Aivaloglou and Stefanos Gritzalis and Charalabos Skianis}, title = {Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach}, journal = {Int. J. Syst. Syst. Eng.}, volume = {1}, number = {1/2}, pages = {128--148}, year = {2008}, url = {https://doi.org/10.1504/IJSSE.2008.018135}, doi = {10.1504/IJSSE.2008.018135}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsose/AivaloglouGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BelsisFGS08, author = {Petros Belsis and Kostas Fragos and Stefanos Gritzalis and Christos Skourlas}, title = {Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification}, journal = {J. Comput. Secur.}, volume = {16}, number = {6}, pages = {761--790}, year = {2008}, url = {https://doi.org/10.3233/JCS-2008-0319}, doi = {10.3233/JCS-2008-0319}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BelsisFGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/FrantzeskouMSG08, author = {Georgia Frantzeskou and Stephen G. MacDonell and Efstathios Stamatatos and Stefanos Gritzalis}, title = {Examining the significance of high-level programming features in source code author classification}, journal = {J. Syst. Softw.}, volume = {81}, number = {3}, pages = {447--460}, year = {2008}, url = {https://doi.org/10.1016/j.jss.2007.03.004}, doi = {10.1016/J.JSS.2007.03.004}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/FrantzeskouMSG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/KalloniatisKG08, author = {Christos Kalloniatis and Evangelia Kavakli and Stefanos Gritzalis}, title = {Addressing privacy requirements in system design: the PriS method}, journal = {Requir. Eng.}, volume = {13}, number = {3}, pages = {241--255}, year = {2008}, url = {https://doi.org/10.1007/s00766-008-0067-3}, doi = {10.1007/S00766-008-0067-3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/KalloniatisKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/VouyioukasKMRKG08, author = {Demosthenes Vouyioukas and Georgios Kambourakis and Ilias Maglogiannis and Angelos N. Rouskas and Constantinos Kolias and Stefanos Gritzalis}, title = {Enabling the provision of secure web based m-health services utilizing {XML} based security models}, journal = {Secur. Commun. Networks}, volume = {1}, number = {5}, pages = {375--388}, year = {2008}, url = {https://doi.org/10.1002/sec.46}, doi = {10.1002/SEC.46}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/VouyioukasKMRKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KlaoudatouKKG08, author = {Eleni Klaoudatou and Elisavet Konstantinou and Georgios Kambourakis and Stefanos Gritzalis}, title = {Clustering Oriented Architectures in Medical Sensor Environments}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {929--934}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.145}, doi = {10.1109/ARES.2008.145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KlaoudatouKKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YannacopoulosLGXK08, author = {Athanasios N. Yannacopoulos and Costas Lambrinoudakis and Stefanos Gritzalis and Stylianos Z. Xanthopoulos and Sokratis K. Katsikas}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for {ICT} Firms}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {207--222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_14}, doi = {10.1007/978-3-540-88313-5\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YannacopoulosLGXK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/KaropoulosKG08, author = {Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis}, title = {Caller identity privacy in {SIP} heterogeneous realms: {A} practical solution}, booktitle = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications {(ISCC} 2008), July 6-9, Marrakech, Morocco}, pages = {37--43}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISCC.2008.4625770}, doi = {10.1109/ISCC.2008.4625770}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/KaropoulosKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iswcs/KambourakisKG08, author = {Georgios Kambourakis and Elisavet Konstantinou and Stefanos Gritzalis}, title = {Binary tree based public-key management for Mobile Ad Hoc Networks}, booktitle = {Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, {ISWCS} 2008, 21-24 October 2008, Reykjav{\'{\i}}k, Iceland}, pages = {687--692}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISWCS.2008.4726144}, doi = {10.1109/ISWCS.2008.4726144}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iswcs/KambourakisKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KaropoulosKG08, author = {Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis}, title = {Privacy Protection in Context Transfer Protocol}, booktitle = {16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing {(PDP} 2008), 13-15 February 2008, Toulouse, France}, pages = {590--596}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PDP.2008.60}, doi = {10.1109/PDP.2008.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KaropoulosKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psd/MagkosMCG08, author = {Emmanouil Magkos and Manolis Maragoudakis and Vassilios Chrissikopoulos and Stefanos Gritzalis}, editor = {Josep Domingo{-}Ferrer and Y{\"{u}}cel Saygin}, title = {Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections}, booktitle = {Privacy in Statistical Databases, {UNESCO} Chair in Data Privacy International Conference, {PSD} 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5262}, pages = {284--297}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87471-3\_24}, doi = {10.1007/978-3-540-87471-3\_24}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/psd/MagkosMCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TsakountakisKG08, author = {Alexandros Tsakountakis and Georgios Kambourakis and Stefanos Gritzalis}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {A new Accounting Mechanism for Modern and Future {AAA} Services}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {693--697}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_47}, doi = {10.1007/978-0-387-09699-5\_47}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TsakountakisKG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/MuellerNGL08, author = {Peter Mueller and Kaisa Nyberg and Stefanos Gritzalis and Costas Lambrinoudakis}, title = {Message from the SecPri Workshop Organizing Technical Co-chairs}, booktitle = {{IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, 12-14 October 2008, Proceedings}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WiMob.2008.129}, doi = {10.1109/WIMOB.2008.129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/MuellerNGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/GritzalisL08, author = {Stefanos Gritzalis and Costas Lambrinoudakis}, title = {{IEEE} 802.11 Wireless LANs (WLANs): Security}, booktitle = {Encyclopedia of Wireless and Mobile Communications}, year = {2008}, url = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043913}, doi = {10.1081/E-EWMC-120043913}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/GritzalisL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ce/KambourakisKRG07, author = {Georgios Kambourakis and Denise{-}Penelope N. Kontoni and Angelos N. Rouskas and Stefanos Gritzalis}, title = {A {PKI} approach for deploying modern secure distributed e-learning and m-learning environments}, journal = {Comput. Educ.}, volume = {48}, number = {1}, pages = {1--16}, year = {2007}, url = {https://doi.org/10.1016/j.compedu.2004.10.017}, doi = {10.1016/J.COMPEDU.2004.10.017}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ce/KambourakisKRG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GeneiatakisKLDG07, author = {Dimitris Geneiatakis and Georgios Kambourakis and Costas Lambrinoudakis and Tasos Dagiuklas and Stefanos Gritzalis}, title = {A framework for protecting a SIP-based infrastructure against malformed message attacks}, journal = {Comput. Networks}, volume = {51}, number = {10}, pages = {2580--2593}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2006.11.014}, doi = {10.1016/J.COMNET.2006.11.014}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GeneiatakisKLDG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KaropoulosKG07, author = {Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis}, title = {Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {9}, number = {1-4}, pages = {18--28}, year = {2007}, url = {https://doi.org/10.1109/COMST.2007.4317619}, doi = {10.1109/COMST.2007.4317619}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KaropoulosKG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/FrantzeskouSGCH07, author = {Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis and Carole E. Chaski and Blake Stephen Howald}, title = {Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile {(SCAP)} Method}, journal = {Int. J. Digit. EVid.}, volume = {6}, number = {1}, year = {2007}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C829-0387-009D214D2170C321.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/FrantzeskouSGCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijeh/BelsisDGBG07, author = {Meletis A. Belsis and Ashish N. Dwivedi and Stefanos Gritzalis and Rajeev K. Bali and Raouf N. Gorgui{-}Naguib}, title = {Providing secure mAccess to medical information}, journal = {Int. J. Electron. Heal.}, volume = {3}, number = {1}, pages = {51--71}, year = {2007}, url = {https://doi.org/10.1504/IJEH.2007.011480}, doi = {10.1504/IJEH.2007.011480}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijeh/BelsisDGBG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GritzalisYLHK07, author = {Stefanos Gritzalis and Athanasios N. Yannacopoulos and Costas Lambrinoudakis and Petros Hatzopoulos and Sokratis K. Katsikas}, title = {A probabilistic model for optimal insurance contracts against security risks and privacy violation in {IT} outsourcing environments}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {4}, pages = {197--211}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0010-x}, doi = {10.1007/S10207-006-0010-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GritzalisYLHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesGP07, author = {Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Preface}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {359--360}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0034-x}, doi = {10.1007/S10207-007-0034-X}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/OnievaLRZG07, author = {Jose Antonio Onieva and Javier L{\'{o}}pez and Rodrigo Roman and Jianying Zhou and Stefanos Gritzalis}, title = {Integration of non-repudiation services in mobile {DRM} scenarios}, journal = {Telecommun. Syst.}, volume = {35}, number = {3-4}, pages = {161--176}, year = {2007}, url = {https://doi.org/10.1007/s11235-007-9050-4}, doi = {10.1007/S11235-007-9050-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/OnievaLRZG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/AivaloglouGS07, author = {Efthimia Aivaloglou and Stefanos Gritzalis and Charalabos Skianis}, title = {Towards a flexible trust establishment framework for sensor networks}, journal = {Telecommun. Syst.}, volume = {35}, number = {3-4}, pages = {207--213}, year = {2007}, url = {https://doi.org/10.1007/s11235-007-9049-x}, doi = {10.1007/S11235-007-9049-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/AivaloglouGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KambourakisKG07, author = {Georgios Kambourakis and Eleni Klaoudatou and Stefanos Gritzalis}, title = {Securing Medical Sensor Environments: The CodeBlue Framework Case}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {637--643}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.135}, doi = {10.1109/ARES.2007.135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KambourakisKG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KalloniatisKG07, author = {Christos Kalloniatis and Evangelia Kavakli and Stefanos Gritzalis}, title = {Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {1009--1017}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.156}, doi = {10.1109/ARES.2007.156}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KalloniatisKG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/BelsisGST07, author = {Petros Belsis and Stefanos Gritzalis and Christos Skourlas and Vassilis Tsoukalas}, editor = {Iliano Cervesato}, title = {Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments}, booktitle = {Advances in Computer Science - {ASIAN} 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4846}, pages = {261--267}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76929-3\_25}, doi = {10.1007/978-3-540-76929-3\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/BelsisGST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KambourakisMGG07, author = {Georgios Kambourakis and Tassos Moschos and Dimitris Geneiatakis and Stefanos Gritzalis}, editor = {Javier L{\'{o}}pez and Bernhard M. H{\"{a}}mmerli}, title = {Detecting {DNS} Amplification Attacks}, booktitle = {Critical Information Infrastructures Security, Second International Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5141}, pages = {185--196}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-89173-4\_16}, doi = {10.1007/978-3-540-89173-4\_16}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/KambourakisMGG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/KarydaGP07, author = {Maria Karyda and Stefanos Gritzalis and Jong Hyuk Park}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {12--21}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_2}, doi = {10.1007/978-3-540-77090-9\_2}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/KarydaGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/KaropoulosKG07, author = {Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis}, editor = {Hsiao{-}Hwa Chen and Luciano Bononi}, title = {Two privacy enhanced context transfer schemes}, booktitle = {Q2SWinet'07 - Proceedings of the Third {ACM} Workshop on {Q2S} and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007}, pages = {172--175}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1298239.1298272}, doi = {10.1145/1298239.1298272}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mswim/KaropoulosKG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/TsakountakisKG07, author = {Alexandros Tsakountakis and Georgios Kambourakis and Stefanos Gritzalis}, editor = {Robert Meersman and Zahir Tari}, title = {On RSN-Oriented Wireless Intrusion Detection}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1601--1615}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76843-2\_34}, doi = {10.1007/978-3-540-76843-2\_34}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/TsakountakisKG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secperu/TsakountakisKG07, author = {Alexandros Tsakountakis and Georgios Kambourakis and Stefanos Gritzalis}, editor = {Panagiotis Georgiadis and Javier L{\'{o}}pez and Stefanos Gritzalis and Giannis F. Marias}, title = {Towards effective Wireless Intrusion Detection in {IEEE} 802.11i}, booktitle = {Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007}, pages = {37--42}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SECPERU.2007.18}, doi = {10.1109/SECPERU.2007.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secperu/TsakountakisKG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BelsisGST07, author = {Petros Belsis and Stefanos Gritzalis and Christos Skourlas and Vassilis Tsoukalas}, editor = {Costas Lambrinoudakis and G{\"{u}}nther Pernul and A Min Tjoa}, title = {Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains}, booktitle = {Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4657}, pages = {125--134}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74409-2\_15}, doi = {10.1007/978-3-540-74409-2\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/BelsisGST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/KambourakisG07, author = {Georgios Kambourakis and Stefanos Gritzalis}, editor = {Costas Lambrinoudakis and G{\"{u}}nther Pernul and A Min Tjoa}, title = {On Device Authentication in Wireless Networks: Present Issues and Future Challenges}, booktitle = {Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4657}, pages = {135--144}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74409-2\_16}, doi = {10.1007/978-3-540-74409-2\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/KambourakisG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secperu/2007, editor = {Panagiotis Georgiadis and Javier L{\'{o}}pez and Stefanos Gritzalis and Giannis F. Marias}, title = {Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4279756/proceeding}, isbn = {0-7695-2863-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secperu/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KambourakisRGG06, author = {Georgios Kambourakis and Angelos N. Rouskas and Stefanos Gritzalis and Dimitris Geneiatakis}, title = {Support of subscribers' certificates in a hybrid {WLAN-3G} environment}, journal = {Comput. Networks}, volume = {50}, number = {11}, pages = {1843--1859}, year = {2006}, url = {https://doi.org/10.1016/j.comnet.2005.08.007}, doi = {10.1016/J.COMNET.2005.08.007}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KambourakisRGG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FotakisG06, author = {Dimitris Fotakis and Stefanos Gritzalis}, title = {Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks}, journal = {Comput. Commun.}, volume = {29}, number = {11}, pages = {2109--2122}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2006.01.007}, doi = {10.1016/J.COMCOM.2006.01.007}, timestamp = {Thu, 24 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/FotakisG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/GeneiatakisDKLGES06, author = {Dimitris Geneiatakis and Tasos Dagiuklas and Georgios Kambourakis and Costas Lambrinoudakis and Stefanos Gritzalis and Sven Ehlert and Dorgham Sisalem}, title = {Survey of security vulnerabilities in session initiation protocol}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {8}, number = {1-4}, pages = {68--81}, year = {2006}, url = {https://doi.org/10.1109/COMST.2006.253270}, doi = {10.1109/COMST.2006.253270}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/GeneiatakisDKLGES06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Gritzalis06, author = {Stefanos Gritzalis}, title = {Public Key Infrastructure: Research and Applications}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {1}, pages = {1--2}, year = {2006}, url = {https://doi.org/10.1007/s10207-005-0075-y}, doi = {10.1007/S10207-005-0075-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Gritzalis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/KavakliKLG06, author = {Evangelia Kavakli and Christos Kalloniatis and Pericles Loucopoulos and Stefanos Gritzalis}, title = {Incorporating privacy requirements into the system design process: The PriS conceptual framework}, journal = {Internet Res.}, volume = {16}, number = {2}, pages = {140--158}, year = {2006}, url = {https://doi.org/10.1108/10662240610656483}, doi = {10.1108/10662240610656483}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/KavakliKLG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/Gritzalis06, author = {Stefanos Gritzalis}, title = {Developing a culture of privacy in the Global Village}, journal = {Telematics Informatics}, volume = {23}, number = {3}, pages = {157--163}, year = {2006}, url = {https://doi.org/10.1016/j.tele.2005.07.002}, doi = {10.1016/J.TELE.2005.07.002}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tele/Gritzalis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KarydaBGKLGD06, author = {Maria Karyda and Theodoros Balopoulos and Lazaros Gymnopoulos and Spyros Kokolakis and Costas Lambrinoudakis and Stefanos Gritzalis and Stelios Dritsas}, title = {An ontology for secure e-government applications}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {1033--1037}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.28}, doi = {10.1109/ARES.2006.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KarydaBGKLGD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/PapapanagiotouM06, author = {Konstantinos Papapanagiotou and Giannis F. Marias and Panagiotis Georgiadis and Stefanos Gritzalis}, title = {Performance evaluation of a distributed {OCSP} protocol over MANETs}, booktitle = {3rd {IEEE} Consumer Communications and Networking Conference, {CCNC} 2006, Las Vegas, NV, USA, February 13, 2006}, pages = {1--5}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CCNC.2006.1592976}, doi = {10.1109/CCNC.2006.1592976}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/PapapanagiotouM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/AivaloglouGS06, author = {Efthimia Aivaloglou and Stefanos Gritzalis and Charalabos Skianis}, editor = {Javier L{\'{o}}pez}, title = {Trust Establishment in Ad Hoc and Sensor Networks}, booktitle = {Critical Information Infrastructures Security, First International Workshop, {CRITIS} 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {4347}, pages = {179--194}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11962977\_15}, doi = {10.1007/11962977\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/AivaloglouGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AivaloglouGS06, author = {Efthimia Aivaloglou and Stefanos Gritzalis and Charalabos Skianis}, title = {Requirements and Challenges in the Design of Privacy-aware Sensor Networks}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.234}, doi = {10.1109/GLOCOM.2006.234}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/AivaloglouGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/FrantzeskouSGK06, author = {Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Leon J. Osterweil and H. Dieter Rombach and Mary Lou Soffa}, title = {Effective identification of source code authors using byte-level information}, booktitle = {28th International Conference on Software Engineering {(ICSE} 2006), Shanghai, China, May 20-28, 2006}, pages = {893--896}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134285.1134445}, doi = {10.1145/1134285.1134445}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/FrantzeskouSGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/BelsisGK06, author = {Petros Belsis and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Ilias Maglogiannis and Kostas Karpouzis and Max Bramer}, title = {Optimized Multi-Domain Secure Interoperation using Soft Constraints}, booktitle = {Artificial Intelligence Applications and Innovations, 3rd {IFIP} Conference on Artificial Intelligence Applications and Innovations {(AIAI)} 2006, June 7-9, 2006, Athens, Greece}, series = {{IFIP}}, volume = {204}, pages = {78--85}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-34224-9\_10}, doi = {10.1007/0-387-34224-9\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/BelsisGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/FrantzeskouSGK06, author = {Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Ilias Maglogiannis and Kostas Karpouzis and Max Bramer}, title = {Source Code Author Identification Based on N-gram Author Profiles}, booktitle = {Artificial Intelligence Applications and Innovations, 3rd {IFIP} Conference on Artificial Intelligence Applications and Innovations {(AIAI)} 2006, June 7-9, 2006, Athens, Greece}, series = {{IFIP}}, volume = {204}, pages = {508--515}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-34224-9\_59}, doi = {10.1007/0-387-34224-9\_59}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/FrantzeskouSGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BelsisFGS06, author = {Petros Belsis and Kostas Fragos and Stefanos Gritzalis and Christos Skourlas}, editor = {Hisham Haddad}, title = {{SF-HME} system: a hierarchical mixtures-of-experts classification system for spam filtering}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {354--360}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141360}, doi = {10.1145/1141277.1141360}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/BelsisFGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BalopoulosGKKGK06, author = {Theodoros Balopoulos and Lazaros Gymnopoulos and Maria Karyda and Spyros Kokolakis and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Simone Fischer{-}H{\"{u}}bner and Steven Furnell and Costas Lambrinoudakis}, title = {A Framework for Exploiting Security Expertise in Application Development}, booktitle = {Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4083}, pages = {62--70}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11824633\_7}, doi = {10.1007/11824633\_7}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/BalopoulosGKKGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BelsisGK07, author = {Petros Belsis and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {75--86}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.032}, doi = {10.1016/J.ENTCS.2006.08.032}, timestamp = {Tue, 24 Jan 2023 13:29:56 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BelsisGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2006, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810}, doi = {10.1007/11836810}, isbn = {3-540-38341-7}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/GousiosAG05, author = {Giorgos Gousios and Efthimia Aivaloglou and Stefanos Gritzalis}, title = {Distributed component architectures security issues}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {3}, pages = {269--284}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2004.08.003}, doi = {10.1016/J.CSI.2004.08.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/GousiosAG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BalopoulosGK05, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, title = {Specifying Privacy-Preserving Protocols in Typed {MSR}}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {5}, pages = {501--512}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2005.01.008}, doi = {10.1016/J.CSI.2005.01.008}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/BalopoulosGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LambrinoudakisGHYK05, author = {Costas Lambrinoudakis and Stefanos Gritzalis and Petros Hatzopoulos and Athanasios N. Yannacopoulos and Sokratis K. Katsikas}, title = {A formal model for pricing information systems insurance contracts}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {5}, pages = {521--532}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2005.01.010}, doi = {10.1016/J.CSI.2005.01.010}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LambrinoudakisGHYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/MalatrasPBGSC05, author = {Apostolos Malatras and George Pavlou and Petros Belsis and Stefanos Gritzalis and Christos Skourlas and Ioannis Chalaris}, title = {Deploying pervasive secure knowledge management infrastructures}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {1}, number = {4}, pages = {265--276}, year = {2005}, url = {https://doi.org/10.1108/17427370580000130}, doi = {10.1108/17427370580000130}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpcc/MalatrasPBGSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gritzalis05, author = {Stefanos Gritzalis}, title = {A good-practice guidance on the use of {PKI} services in the public sector of the European Union member states}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {5}, pages = {379--398}, year = {2005}, url = {https://doi.org/10.1108/09685220510627278}, doi = {10.1108/09685220510627278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gritzalis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/LekkasGM05, author = {Dimitrios Lekkas and Stefanos Gritzalis and Lilian Mitrou}, title = {Withdrawing a declaration of will: Towards a framework for digital signature revocation}, journal = {Internet Res.}, volume = {15}, number = {4}, pages = {400--420}, year = {2005}, url = {https://doi.org/10.1108/10662240510615173}, doi = {10.1108/10662240510615173}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/LekkasGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/GymnopoulosTSG05, author = {Lazaros Gymnopoulos and Vassilis Tsoumas and Yannis Soupionis and Stefanos Gritzalis}, title = {A generic Grid security policy reconciliation framework}, journal = {Internet Res.}, volume = {15}, number = {5}, pages = {508--517}, year = {2005}, url = {https://doi.org/10.1108/10662240510629457}, doi = {10.1108/10662240510629457}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/GymnopoulosTSG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/BalopoulosDGKKG05, author = {Theodoros Balopoulos and Stelios Dritsas and Lazaros Gymnopoulos and Maria Karyda and Spyros Kokolakis and Stefanos Gritzalis}, title = {Incorporating Security Requirements Into the Software Development Process}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {21--28}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eciw/BalopoulosDGKKG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/GymnopoulosG05, author = {Lazaros Gymnopoulos and Stefanos Gritzalis}, title = {Introducing Ontology-based Security Policy Management in the Grid}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {107--116}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/GymnopoulosG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/DritsasGKBKLG05, author = {Stelios Dritsas and Lazaros Gymnopoulos and Maria Karyda and Theodoros Balopoulos and Spyros Kokolakis and Costas Lambrinoudakis and Stefanos Gritzalis}, editor = {Matohisa Funabashi and Adam Grzech}, title = {Employing Ontologies for the Development of Security Critical Applications}, booktitle = {Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government, 5th {IFIP} Conference e-Commerce, e-Business, and e-Government (I3E'2OO5), October 28-30, 2005, Poznan, Poland}, series = {{IFIP}}, volume = {189}, pages = {187--201}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-29773-1\_13}, doi = {10.1007/0-387-29773-1\_13}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/i3e/DritsasGKBKLG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/FrantzeskouSG05a, author = {Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis}, editor = {Joaquim Filipe and Helder Coelhas and M{\'{o}}nica Saramago}, title = {Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information}, booktitle = {E-business and Telecommunication Networks - Second International Conference, {ICETE} 2005, Reading, UK, October 3-7, 2005. Selected Papers}, series = {Communications in Computer and Information Science}, volume = {3}, pages = {163--173}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-75993-5\_14}, doi = {10.1007/978-3-540-75993-5\_14}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/FrantzeskouSG05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/FrantzeskouSG05, author = {Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis}, editor = {Joaquim Filipe and Luminita Vasiu}, title = {Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information}, booktitle = {{ICETE} 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005}, pages = {283--290}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Tue, 07 Nov 2006 14:13:57 +0100}, biburl = {https://dblp.org/rec/conf/icete/FrantzeskouSG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icps/MalatrasPBGSC05, author = {Apostolos Malatras and George Pavlou and Petros Belsis and Stefanos Gritzalis and Christos Skourlas and Ioannis Chalaris}, title = {Secure and distributed knowledge management in pervasive environments}, booktitle = {Proceedings of the International Conference on Pervasive Services 2005, {ICPS} '05, Santorini, Greece, July 11-14, 2005}, pages = {79--87}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PERSER.2005.1506393}, doi = {10.1109/PERSER.2005.1506393}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icps/MalatrasPBGSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwuc/BelsisMGSC05, author = {Petros Belsis and Apostolos Malatras and Stefanos Gritzalis and Christos Skourlas and Ioannis Chalaris}, editor = {Soraya Kouadri Most{\'{e}}faoui and Zakaria Maamar}, title = {Pervasive Secure Electronic Healthcare Records Management}, booktitle = {Ubiquitous Computing, Proceedings of the 2nd International Workshop on Ubiquitous Computing, {IWUC} 2005, In conjunction with {ICEIS} 2005, Miami, USA, May 2005}, pages = {101--109}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Tue, 05 Jul 2005 15:02:30 +0200}, biburl = {https://dblp.org/rec/conf/iwuc/BelsisMGSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lanman/DoukasKKRG05, author = {Nikolaos Doukas and Eleni Klaoudatou and Georgios Kambourakis and Angelos N. Rouskas and Stefanos Gritzalis}, title = {Evaluation of digital certificates acquisition in large-scale 802.11-3GPP hybrid environments}, booktitle = {The 14th {IEEE} Workshop on Local and Metropolitan Area Networks, {LANMAN} 2005, Chania, Crete, Greece, September 18, 2005}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/LANMAN.2005.1541544}, doi = {10.1109/LANMAN.2005.1541544}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lanman/DoukasKKRG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lanman/GeneiatakisKDLG05, author = {Dimitris Geneiatakis and Georgios Kambourakis and Tasos Dagiuklas and Costas Lambrinoudakis and Stefanos Gritzalis}, title = {A framework for detecting malformed messages in {SIP} networks}, booktitle = {The 14th {IEEE} Workshop on Local and Metropolitan Area Networks, {LANMAN} 2005, Chania, Crete, Greece, September 18, 2005}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/LANMAN.2005.1541543}, doi = {10.1109/LANMAN.2005.1541543}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lanman/GeneiatakisKDLG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/BelsisSG05, author = {Meletis A. Belsis and Alkis Simitsis and Stefanos Gritzalis}, editor = {Panayiotis Bozanis and Elias N. Houstis}, title = {Workflow Based Security Incident Management}, booktitle = {Advances in Informatics, 10th Panhellenic Conference on Informatics, {PCI} 2005, Volos, Greece, November 11-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3746}, pages = {684--694}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11573036\_65}, doi = {10.1007/11573036\_65}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pci/BelsisSG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BelsisGMSC05, author = {Petros Belsis and Stefanos Gritzalis and Apostolos Malatras and Christos Skourlas and Ioannis Chalaris}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and G{\"{u}}nther Pernul}, title = {Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains}, booktitle = {Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3592}, pages = {10--19}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11537878\_2}, doi = {10.1007/11537878\_2}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/BelsisGMSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BalopoulosGK05, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Specifying electronic voting protocols in typed {MSR}}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {35--39}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102207}, doi = {10.1145/1102199.1102207}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BalopoulosGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/KambourakisRG04, author = {Georgios Kambourakis and Angelos N. Rouskas and Stefanos Gritzalis}, title = {Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2004}, number = {1}, pages = {184--197}, year = {2004}, url = {https://doi.org/10.1155/S1687147204403016}, doi = {10.1155/S1687147204403016}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/KambourakisRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gritzalis04a, author = {Stefanos Gritzalis}, title = {Enhancing Web privacy and anonymity in the digital era}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {3}, pages = {255--287}, year = {2004}, url = {https://doi.org/10.1108/09685220410542615}, doi = {10.1108/09685220410542615}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gritzalis04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/AngelisGL04, author = {George Angelis and Stefanos Gritzalis and Costas Lambrinoudakis}, title = {Mechanisms for controlling access in the global grid environment}, journal = {Internet Res.}, volume = {14}, number = {5}, pages = {347--352}, year = {2004}, url = {https://doi.org/10.1108/10662240410566935}, doi = {10.1108/10662240410566935}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/AngelisGL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KambourakisRG04, author = {Georgios Kambourakis and Angelos N. Rouskas and Stefanos Gritzalis}, title = {Experimental Analysis of an SSL-Based {AKA} Mechanism in 3G-and-Beyond Wireless Networks}, journal = {Wirel. Pers. Commun.}, volume = {29}, number = {3-4}, pages = {303--321}, year = {2004}, url = {https://doi.org/10.1023/B:WIRE.0000047068.20203.57}, doi = {10.1023/B:WIRE.0000047068.20203.57}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KambourakisRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/BalopoulosGK04, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {David Chadwick and Bart Preneel}, title = {An Extension of Typed {MSR} for Specifying Esoteric Protocols and Their Dolev-Yao Intruder}, booktitle = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11} Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom}, series = {{IFIP}}, volume = {175}, pages = {209--221}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24486-7\_16}, doi = {10.1007/0-387-24486-7\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/BalopoulosGK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/KalloniatisKG04, author = {Christos Kalloniatis and Evangelia Kavakli and Stefanos Gritzalis}, editor = {Roland Traunm{\"{u}}ller}, title = {Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks}, booktitle = {Electronic Government: Third International Conference, {EGOV} 2004, Zaragoza, Spain, August 30 - September 3, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3183}, pages = {66--71}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30078-6\_11}, doi = {10.1007/978-3-540-30078-6\_11}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/egov/KalloniatisKG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/KabourakiGM04, author = {Konstantina Kabouraki and Stefanos Gritzalis and Konstantinos Moulinos}, editor = {Roland Traunm{\"{u}}ller}, title = {Towards a Privacy Audit Programmes Comparison Framework}, booktitle = {Electronic Government: Third International Conference, {EGOV} 2004, Zaragoza, Spain, August 30 - September 3, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3183}, pages = {328--331}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30078-6\_54}, doi = {10.1007/978-3-540-30078-6\_54}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/egov/KabourakiGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/BelsisGSD04, author = {Petros Belsis and Stefanos Gritzalis and Christos Skourlas and Ioannis Drakopoulos}, title = {Implementing Knowledge Management Techniques for Security Purposes}, booktitle = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004}, pages = {535--540}, year = {2004}, timestamp = {Thu, 02 Feb 2017 12:56:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/BelsisGSD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/FrantzeskouG04, author = {Georgia Frantzeskou and Stefanos Gritzalis}, editor = {Jo{\~{a}}o Ascenso and Carlos Belo and Luminita Vasiu and M{\'{o}}nica Saramago and Helder Coelhas}, title = {Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process}, booktitle = {{ICETE} 2004, 1st International Conference on E-Business and Telecommunication Networks, Set{\'{u}}bal, Portugal, August 24-28, 2004, Proceedings}, pages = {85--92}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Mon, 25 Oct 2004 15:24:15 +0200}, biburl = {https://dblp.org/rec/conf/icete/FrantzeskouG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/KambourakisRG04, author = {Georgios Kambourakis and Angelos N. Rouskas and Stefanos Gritzalis}, editor = {Nikolas Mitrou and Kimon P. Kontovasilis and George N. Rouskas and Ilias Iliadis and Lazaros F. Merakos}, title = {Inter/Intra Core Network Security with {PKI} for 3G-and-Beyond Systems}, booktitle = {{NETWORKING} 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International {IFIP-TC6} Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3042}, pages = {13--24}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24693-0\_2}, doi = {10.1007/978-3-540-24693-0\_2}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/KambourakisRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakm/BelsisGMSC04, author = {Petros Belsis and Stefanos Gritzalis and Apostolos Malatras and Christos Skourlas and Ioannis Chalaris}, editor = {Dimitris Karagiannis and Ulrich Reimer}, title = {Enhancing Knowledge Management Through the Use of {GIS} and Multimedia}, booktitle = {Practical Aspects of Knowledge Management, 5th International Conference, {PAKM} 2004, Vienna, Austria, December 2-3, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3336}, pages = {319--329}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30545-3\_30}, doi = {10.1007/978-3-540-30545-3\_30}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/pakm/BelsisGMSC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KambourakisRG04, author = {Georgios Kambourakis and Angelos N. Rouskas and Stefanos Gritzalis}, editor = {Hisham Haddad and Andrea Omicini and Roger L. Wainwright and Lorie M. Liebrock}, title = {Delivering Attribute Certificates over {GPRS}}, booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004}, pages = {1166--1170}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/967900.968137}, doi = {10.1145/967900.968137}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/KambourakisRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/KatsikasYGLH04, author = {Sokratis K. Katsikas and Athanasios N. Yannacopoulos and Stefanos Gritzalis and Costas Lambrinoudakis and Petros Hatzopoulos}, editor = {Paul Dowland and Steven Furnell and Bhavani Thuraisingham and Xiaoyang Sean Wang}, title = {How Much Should We Pay for Security? (Invited Paper)}, booktitle = {Security Management, Integrity, and Internal Control in Information Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}}, series = {{IFIP}}, volume = {193}, pages = {59--69}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-31167-X\_4}, doi = {10.1007/0-387-31167-X\_4}, timestamp = {Tue, 16 May 2023 22:42:09 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/KatsikasYGLH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2004, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98201}, doi = {10.1007/B98201}, isbn = {3-540-22216-2}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/IliadisGSCPG03, author = {John Iliadis and Stefanos Gritzalis and Diomidis Spinellis and Danny De Cock and Bart Preneel and Dimitris Gritzalis}, title = {Towards a framework for evaluating certificate status information mechanisms}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1839--1850}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00079-3}, doi = {10.1016/S0140-3664(03)00079-3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/IliadisGSCPG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/IliadisGG03, author = {John Iliadis and Stefanos Gritzalis and Dimitris Gritzalis}, title = {ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1851--1862}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00080-X}, doi = {10.1016/S0140-3664(03)00080-X}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/IliadisGG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LambrinoudakisGDP03, author = {Costas Lambrinoudakis and Stefanos Gritzalis and Fredj Dridi and G{\"{u}}nther Pernul}, title = {Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1873--1883}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00082-3}, doi = {10.1016/S0140-3664(03)00082-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LambrinoudakisGDP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/BalopoulosG03, author = {Theodoros Balopoulos and Stefanos Gritzalis}, title = {Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols}, booktitle = {14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic}, pages = {396--401}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/DEXA.2003.1232054}, doi = {10.1109/DEXA.2003.1232054}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/BalopoulosG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egov/ArgyrakisGK03, author = {John Argyrakis and Stefanos Gritzalis and Chris Kioulafas}, editor = {Roland Traunm{\"{u}}ller}, title = {Privacy Enhancing Technologies: {A} Review}, booktitle = {Electronic Government, Second International Conference, {EGOV} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2739}, pages = {282--287}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10929179\_51}, doi = {10.1007/10929179\_51}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/egov/ArgyrakisGK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GymnopoulosDGL03, author = {Lazaros Gymnopoulos and Stelios Dritsas and Stefanos Gritzalis and Costas Lambrinoudakis}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {{GRID} Security Review}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {100--111}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_8}, doi = {10.1007/978-3-540-45215-7\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/GymnopoulosDGL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/AngelisGL03, author = {George Angelis and Stefanos Gritzalis and Costas Lambrinoudakis}, editor = {Stuart Anderson and Massimo Felici and Bev Littlewood}, title = {Security Policy Configuration Issues in Grid Computing Environments}, booktitle = {Computer Safety, Reliability, and Security, 22nd International Conference, {SAFECOMP} 2003, Edinburgh, UK, September 23-26, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2788}, pages = {331--341}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39878-3\_26}, doi = {10.1007/978-3-540-39878-3\_26}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safecomp/AngelisGL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KambourakisRG03, author = {Georgios Kambourakis and Angelos N. Rouskas and Stefanos Gritzalis}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {Introducing {PKI} to Enhance Security in Future Mobile Networks}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {109--120}, publisher = {Kluwer}, year = {2003}, timestamp = {Thu, 24 Aug 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KambourakisRG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/LekkasGK02, author = {Dimitrios Lekkas and Stefanos Gritzalis and Sokratis K. Katsikas}, title = {Quality assured trusted third parties for deploying secure internet-based healthcare applications}, journal = {Int. J. Medical Informatics}, volume = {65}, number = {2}, pages = {79--96}, year = {2002}, url = {https://doi.org/10.1016/S1386-5056(02)00006-0}, doi = {10.1016/S1386-5056(02)00006-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmi/LekkasGK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwcn/KambourakisRG02, author = {Georgios Kambourakis and Angelos N. Rouskas and Stefanos Gritzalis}, title = {Using {SSL/TLS} in authentication and key agreement procedures of future mobile networks}, booktitle = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm, Sweden}, pages = {152--156}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/MWCN.2002.1045713}, doi = {10.1109/MWCN.2002.1045713}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwcn/KambourakisRG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/GritzalisL02, author = {Stefanos Gritzalis and Costas Lambrinoudakis}, editor = {Hamid R. Arabnia}, title = {Security Requirements of e-Government Services: An Organizational Framework}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} '02, June 24 - 27, 2002, Las Vegas, Nevada, USA, Volume 1}, pages = {127--131}, publisher = {{CSREA} Press}, year = {2002}, timestamp = {Fri, 05 Dec 2003 09:23:58 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/GritzalisL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GritzalisG01, author = {Stefanos Gritzalis and Dimitris Gritzalis}, title = {A digital seal solution for deploying trust on commercial transactions}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {2}, pages = {71--79}, year = {2001}, url = {https://doi.org/10.1108/09685220110388836}, doi = {10.1108/09685220110388836}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GritzalisG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/or/NikitakosG01, author = {Nikitas V. Nikitakos and Stefanos Gritzalis}, title = {Risk management for new information technology insertion in a shipping company}, journal = {Oper. Res.}, volume = {1}, number = {1}, pages = {7--16}, year = {2001}, url = {https://doi.org/10.1007/BF02936396}, doi = {10.1007/BF02936396}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/or/NikitakosG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hercma/LekkasGK01, author = {Dimitrios Lekkas and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Elias A. Lipitakis}, title = {Towards an {ISO-9000} compliant certification service provider}, booktitle = {Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), Athens, Greece, September 20-22, 2001}, pages = {390--397}, publisher = {{LEA} Press, Athens, Hellas}, year = {2001}, timestamp = {Wed, 20 Jun 2018 09:48:24 +0200}, biburl = {https://dblp.org/rec/conf/hercma/LekkasGK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisKLMP00, author = {Stefanos Gritzalis and Sokratis K. Katsikas and Dimitrios Lekkas and Konstantinos Moulinos and Eleni Polydoro}, title = {Securing The Electronic Market: The {KEYSTONE} Public Key Infrastructure Architecture}, journal = {Comput. Secur.}, volume = {19}, number = {8}, pages = {731--746}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)08022-6}, doi = {10.1016/S0167-4048(00)08022-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisKLMP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GritzalisIO00, author = {Stefanos Gritzalis and John Iliadis and Spyros Oikonomopoulos}, title = {Distributed component software security issues on deploying a secure electronic marketplace}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {5--13}, year = {2000}, url = {https://doi.org/10.1108/09685220010312290}, doi = {10.1108/09685220010312290}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GritzalisIO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/GritzalisSG99, author = {Stefanos Gritzalis and Diomidis Spinellis and Panagiotis Georgiadis}, title = {Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification}, journal = {Comput. Commun.}, volume = {22}, number = {8}, pages = {697--709}, year = {1999}, url = {https://doi.org/10.1016/S0140-3664(99)00030-4}, doi = {10.1016/S0140-3664(99)00030-4}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/GritzalisSG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpinellisGIGK99, author = {Diomidis Spinellis and Stefanos Gritzalis and John Iliadis and Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Trusted third party services for deploying secure telemedical applications over the {WWW}}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {627--639}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82041-0}, doi = {10.1016/S0167-4048(99)82041-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpinellisGIGK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SpinellisKG99, author = {Diomidis Spinellis and Spyros Kokolakis and Stefanos Gritzalis}, title = {Security requirements, risks and recommendations for small enterprise and home-office environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {7}, number = {3}, pages = {121--128}, year = {1999}, url = {https://doi.org/10.1108/09685229910371071}, doi = {10.1108/09685229910371071}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SpinellisKG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/GritzalisAS99, author = {Stefanos Gritzalis and George Aggelis and Diomidis Spinellis}, title = {Architectures for secure portable executable content}, journal = {Internet Res.}, volume = {9}, number = {1}, pages = {16--24}, year = {1999}, url = {https://doi.org/10.1108/10662249910251273}, doi = {10.1108/10662249910251273}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/GritzalisAS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/GritzalisS98, author = {Stefanos Gritzalis and Diomidis Spinellis}, title = {The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction}, journal = {Microprocess. Microsystems}, volume = {21}, number = {10}, pages = {621--627}, year = {1998}, url = {https://doi.org/10.1016/S0141-9331(98)00064-7}, doi = {10.1016/S0141-9331(98)00064-7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/GritzalisS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/GritzalisA98, author = {Stefanos Gritzalis and George Aggelis}, title = {Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {32}, number = {2}, pages = {16--32}, year = {1998}, url = {https://doi.org/10.1145/506133.506137}, doi = {10.1145/506133.506137}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/GritzalisA98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/GritzalisI98, author = {Stefanos Gritzalis and John Iliadis}, editor = {Roland R. Wagner}, title = {Addressing Security Issues in Programming Languages for Mobile Code}, booktitle = {Ninth International Workshop on Database and Expert Systems Applications, Vienna, Austria, August 24-28, 1998, Proceedings}, pages = {288--293}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/DEXA.1998.707415}, doi = {10.1109/DEXA.1998.707415}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/GritzalisI98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/IliadisGO98, author = {John Iliadis and Stefanos Gritzalis and V. Oikonomou}, editor = {Wolfgang D. Ehrenberger}, title = {Towards Secure Downloadable Executable Content: The Java Paradigm}, booktitle = {Computer Safety, Reliability and Security, 17th International Conference, SAFECOMP'98, Heidelberg, Germany, October 5-7, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1516}, pages = {117--127}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49646-7\_9}, doi = {10.1007/3-540-49646-7\_9}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/IliadisGO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/GritzalisS97, author = {Stefanos Gritzalis and Diomidis Spinellis}, editor = {Peter Daniel}, title = {Cryptographic Protocols over Open Distributed Systems: {A} Taxonomy of Flaws and related Protocol Analysis Tools}, booktitle = {16th International Conference on Computer Safety, Reliability and Security, Safe Comp 1997, York, UK, September 7-10, 1997}, pages = {123--137}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/978-1-4471-0997-6\_10}, doi = {10.1007/978-1-4471-0997-6\_10}, timestamp = {Wed, 26 Jun 2019 14:32:32 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/GritzalisS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NikitakosGG96, author = {Nikitas V. Nikitakos and Stefanos Gritzalis and Panagiotis Georgiadis}, editor = {Sokratis K. Katsikas and Dimitris Gritzalis}, title = {Security profile for interconnected open distributed systems with varying vulnerability}, booktitle = {Information Systems Security, Facing the information society of the 21st Century}, series = {{IFIP} Conference Proceedings}, volume = {54}, pages = {428--437}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/NikitakosGG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisKG92, author = {Dimitris Gritzalis and Sokratis K. Katsikas and Stefanos Gritzalis}, title = {A zero knowledge probabilistic login protocol}, journal = {Comput. Secur.}, volume = {11}, number = {8}, pages = {733--745}, year = {1992}, url = {https://doi.org/10.1016/0167-4048(92)90129-F}, doi = {10.1016/0167-4048(92)90129-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisKG92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.