Остановите войну!
for scientists:
default search action
Sokratis K. Katsikas
- > Home > Persons > Sokratis K. Katsikas
Publications
- 2024
- [e39]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens-Boulahia, Costas Lambrinoudakis, Joaquín García-Alfaro, Guillermo Navarro-Arribas, Pantaleone Nespoli, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14398, Springer 2024, ISBN 978-3-031-54203-9 [contents] - 2020
- [e29]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, M. Angela Sasse, Weizhi Meng, Steven Furnell, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e28]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell:
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12501, Springer 2020, ISBN 978-3-030-64329-4 [contents] - 2019
- [e27]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie I. Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis:
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11387, Springer 2019, ISBN 978-3-030-12785-5 [contents] - [e26]Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11711, Springer 2019, ISBN 978-3-030-27812-0 [contents] - 2018
- [e25]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10683, Springer 2018, ISBN 978-3-319-72816-2 [contents] - 2008
- [j34]Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
Specifying and implementing privacy-preserving cryptographic protocols. Int. J. Inf. Sec. 7(6): 395-420 (2008) - [c31]Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas:
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ESORICS 2008: 207-222 - 2007
- [j31]Stefanos Gritzalis, Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas:
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Int. J. Inf. Sec. 6(4): 197-211 (2007) - 2006
- [c26]Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas:
Effective identification of source code authors using byte-level information. ICSE 2006: 893-896 - [c25]Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas:
Optimized Multi-Domain Secure Interoperation using Soft Constraints. AIAI 2006: 78-85 - [c24]Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas:
Source Code Author Identification Based on N-gram Author Profiles. AIAI 2006: 508-515 - [c23]Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70 - [c22]Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas:
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. STM 2006: 75-86 - [e6]Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings. Lecture Notes in Computer Science 4176, Springer 2006, ISBN 3-540-38341-7 [contents] - 2005
- [j28]Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
Specifying Privacy-Preserving Protocols in Typed MSR. Comput. Stand. Interfaces 27(5): 501-512 (2005) - [j27]Costas Lambrinoudakis, Stefanos Gritzalis, Petros Hatzopoulos, Athanasios N. Yannacopoulos, Sokratis K. Katsikas:
A formal model for pricing information systems insurance contracts. Comput. Stand. Interfaces 27(5): 521-532 (2005) - [c18]Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
Specifying electronic voting protocols in typed MSR. WPES 2005: 35-39 - 2004
- [c17]Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder. Communications and Multimedia Security 2004: 209-221 - [c15]Sokratis K. Katsikas, Athanasios N. Yannacopoulos, Stefanos Gritzalis, Costas Lambrinoudakis, Petros Hatzopoulos:
How Much Should We Pay for Security? (Invited Paper). IICIS 2004: 59-69 - [e4]Sokratis K. Katsikas, Stefanos Gritzalis, Javier López:
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Lecture Notes in Computer Science 3093, Springer 2004, ISBN 3-540-22216-2 [contents] - 2002
- [j23]Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas:
Quality assured trusted third parties for deploying secure internet-based healthcare applications. Int. J. Medical Informatics 65(2): 79-96 (2002) - 2001
- [c11]Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas:
Towards an ISO-9000 compliant certification service provider. HERCMA 2001: 390-397 - 2000
- [j20]Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro:
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. Comput. Secur. 19(8): 731-746 (2000) - 1999
- [j18]Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW. Comput. Secur. 18(7): 627-639 (1999) - 1992
- [j5]Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis:
A zero knowledge probabilistic login protocol. Comput. Secur. 11(8): 733-745 (1992)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint