default search action
Andreas Pashalidis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j5]Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel:
Toward a secure Kerberos key exchange with smart cards. Int. J. Inf. Sec. 13(3): 217-228 (2014) - 2013
- [j4]Javier López, Svetla Nikova, Andreas Pashalidis, Günther Pernul, Bart Preneel:
Preface. Comput. Math. Appl. 65(5): 747 (2013) - [c21]Nicolas Buchmann, Roel Peeters, Harald Baier, Andreas Pashalidis:
Security considerations on extending PACE to a biometric-based connection establishment. BIOSIG 2013: 15-26 - [c20]Andreas Pashalidis:
Simulated annealing attack on certain fingerprint authentication systems. BIOSIG 2013: 63-74 - [c19]Roel Peeters, Andreas Pashalidis:
Privacy-Friendly Checking of Remote Token Blacklists. IDMAN 2013: 18-33 - 2012
- [j3]Andreas Pashalidis, Bart Preneel:
Evaluating Tag-Based Preference Obfuscation Systems. IEEE Trans. Knowl. Data Eng. 24(9): 1613-1623 (2012) - [c18]Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel:
Security implications in Kerberos by the introduction of smart cards. AsiaCCS 2012: 59-60 - [c17]Andreas Pashalidis, Nikos Mavrogiannopoulos, Xavier Ferrer Aran, Beñat Bermejo Olaizola:
For human eyes only: security and usability evaluation. WPES 2012: 129-140 - [e1]Svetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul:
Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7163, Springer 2012, ISBN 978-3-642-29803-5 [contents] - 2011
- [j2]Jens-Matthias Bohli, Andreas Pashalidis:
Relations among privacy notions. ACM Trans. Inf. Syst. Secur. 14(1): 4:1-4:24 (2011) - [c16]David W. Chadwick, Stijn F. Lievens, Jerry den Hartog, Andreas Pashalidis, Joseph Alhadeff:
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. IEEE CLOUD 2011: 752-753 - [c15]Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel:
A New RFID Privacy Model. ESORICS 2011: 568-587 - [c14]Stefan Schiffner, Andreas Pashalidis, Elmar Tischhauser:
On the limits of privacy in reputation systems. WPES 2011: 33-42 - 2010
- [c13]Andreas Pashalidis, Stefan Schiffner:
Evaluating Adversarial Partitions. ESORICS 2010: 524-539
2000 – 2009
- 2009
- [c12]Andreas Pashalidis:
Accessing Password-Protected Resources without the Password. CSIE (4) 2009: 66-70 - [c11]Jens-Matthias Bohli, Andreas Pashalidis:
Relations Among Privacy Notions. Financial Cryptography 2009: 362-380 - 2008
- [c10]Kevin Doolin, Andreas Pashalidis, Andreas Kassler, Telma Mota:
Context-aware multimedia services in a pervasive environment: the Daidalos approach. AMBI-SYS 2008: 6 - [c9]Andreas Pashalidis:
Measuring the Effectiveness and the Fairness of Relation Hiding Systems. APSCC 2008: 1387-1394 - [i1]Hannes Tschofenig, Dirk Kröselberg, Andreas Pashalidis, Yoshihiro Ohba, Florent Bersani:
The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method. RFC 5106: 1-33 (2008) - 2007
- [c8]Matthias Franz, Bernd Meyer, Andreas Pashalidis:
Attacking Unlinkability: The Importance of Context. Privacy Enhancing Technologies 2007: 1-16 - 2006
- [b1]Andreas Pashalidis:
Interdomain user authentication and privacy. Royal Holloway, University of London, UK, 2006 - [c7]Andreas Pashalidis, Bernd Meyer:
Linking Anonymous Transactions: The Consistent View Attack. Privacy Enhancing Technologies 2006: 384-392 - 2004
- [j1]Andreas Pashalidis, Martin Fleury:
Secure Network Management within an Open-source Mobile Agent Framework. J. Netw. Syst. Manag. 12(1): 9-31 (2004) - [c6]Andreas Pashalidis, Chris J. Mitchell:
Using EMV Cards for Single Sign-On. EuroPKI 2004: 205-217 - [c5]Andreas Pashalidis, Chris J. Mitchell:
Impostor: a single sign-on system for use from untrusted devices. GLOBECOM 2004: 2191-2195 - [c4]Andreas Pashalidis, Chris J. Mitchell:
A Security Model for Anonymous Credential Systems. International Information Security Workshops 2004: 183-198 - [c3]Andreas Pashalidis, Chris J. Mitchell:
Limits to Anonymity When Using Credentials. Security Protocols Workshop 2004: 4-12 - 2003
- [c2]Andreas Pashalidis, Chris J. Mitchell:
A Taxonomy of Single Sign-On Systems. ACISP 2003: 249-264 - [c1]Andreas Pashalidis, Chris J. Mitchell:
Single Sign-On Using Trusted Platforms. ISC 2003: 54-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint