default search action
Tassos Dimitriou
- > Home > Persons > Tassos Dimitriou
Publications
- 2017
- [j20]Tassos Dimitriou, Ioannis Krontiris:
Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications. J. Netw. Comput. Appl. 100: 24-34 (2017) - 2015
- [j15]Ioannis Krontiris, Tassos Dimitriou:
A platform for privacy protection of data requesters and data providers in mobile sensing. Comput. Commun. 65: 43-54 (2015) - [c43]Tassos Dimitriou, Ioannis Krontiris:
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing. WISTP 2015: 20-35 - 2013
- [c40]Ioannis Krontiris, Tassos Dimitriou:
Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications. DCOSS 2013: 249-257 - 2012
- [c37]Tassos Dimitriou, Ioannis Krontiris, Ahmad Sabouri:
PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing. MobiSec 2012: 93-106 - 2011
- [j10]Ioannis Krontiris, Tassos Dimitriou:
Scatter - secure code authentication for efficient reprogramming in wireless sensor networks. Int. J. Sens. Networks 10(1/2): 14-24 (2011) - 2010
- [j8]Thanassis Giannetsos, Tassos Dimitriou, Ioannis Krontiris, Neeli R. Prasad:
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices. Comput. J. 53(10): 1576-1593 (2010) - [j7]Ioannis Krontiris, Felix C. Freiling, Tassos Dimitriou:
Location privacy in urban sensing networks: research challenges and directions. IEEE Wirel. Commun. 17(5): 30-35 (2010) - 2009
- [c30]Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks. EWSN 2009: 263-278 - 2008
- [c25]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. SecureComm 2008: 20 - [c23]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. WiMob 2008: 526-531 - 2007
- [c22]Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, Marios Mpasoukos:
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. ALGOSENSORS 2007: 150-161 - 2006
- [j4]Tassos Dimitriou, Ioannis Krontiris:
GRAViTy: Geographic Routing around Voids in Sensor Networks. Int. J. Pervasive Comput. Commun. 2(4): 351-361 (2006) - [c17]Ioannis Krontiris, Tassos Dimitriou:
Authenticated In-Network Programming for Wireless Sensor Networks. ADHOC-NOW 2006: 390-403 - 2005
- [c13]Tassos Dimitriou, Ioannis Krontiris:
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks. IPDPS 2005 - [c10]Tassos Dimitriou, Ioannis Krontiris:
Autonomic Communication Security in Sensor Networks. WAC 2005: 141-152 - 2004
- [c7]Tassos Dimitriou, Ioannis Krontiris, Fotios Nikakis, Paul G. Spirakis:
SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks. NETWORKING 2004: 1300-1305
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint