default search action
Stefanos Gritzalis
Person information
- affiliation: University of Piraeus, Greece
- affiliation (former): University of the Aegean, Samos, Greece
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j132]Sekione Reward Jeremiah, Haotian Chen, Stefanos Gritzalis, Jong Hyuk Park:
Leveraging application permissions and network traffic attributes for Android ransomware detection. J. Netw. Comput. Appl. 230: 103950 (2024) - [c126]Argyri Pattakou, Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis:
A Unified Framework for GDPR Compliance in Cloud Computing. ARES 2024: 177:1-177:9 - [e13]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens-Boulahia, Costas Lambrinoudakis, Joaquín García-Alfaro, Guillermo Navarro-Arribas, Pantaleone Nespoli, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14398, Springer 2024, ISBN 978-3-031-54203-9 [contents] - 2023
- [j131]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, Stefanos Gritzalis:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. Comput. Secur. 125: 103051 (2023) - [j130]Aggeliki Tsohou, Vasiliki Diamantopoulou, Stefanos Gritzalis, Costas Lambrinoudakis:
Cyber insurance: state of the art, trends and future directions. Int. J. Inf. Sec. 22(3): 737-748 (2023) - [j129]Eirini Molla, Panagiotis Rizomiliotis, Stefanos Gritzalis:
Efficient searchable symmetric encryption supporting range queries. Int. J. Inf. Sec. 22(4): 785-798 (2023) - 2022
- [j128]Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis, Stefanos Gritzalis:
Determining the Role of Social Identity Attributes to the Protection of Users' Privacy in Social Media. Future Internet 14(9): 249 (2022) - [j127]Angeliki Kitsiou, Charikleia Despotidi, Christos Kalloniatis, Stefanos Gritzalis:
The Role of Users' Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study. Future Internet 14(11): 328 (2022) - [j126]Diamantatos Paraskevas, Ergina Kavallieratou, Stefanos Gritzalis:
Directional Hinge Features for Writer Identification: The Importance of the Skeleton and the Effects of Character Size and Pixel Intensity. SN Comput. Sci. 3(1): 56 (2022) - [p1]Vasiliki Diamantopoulou, Costas Lambrinoudakis, Jennifer King, Stefanos Gritzalis:
EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital Era. Modern Socio-Technical Perspectives on Privacy 2022: 427-448 - [i3]Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Georgios Karopoulos, Stefanos Gritzalis:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. CoRR abs/2208.06722 (2022) - 2021
- [j125]Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou:
PPDM-TAN: A Privacy-Preserving Multi-Party Classifier. Comput. 9(1): 6 (2021) - [j124]Christos Kalloniatis, Costas Lambrinoudakis, Mathias Musahl, Athanasios G. Kanatas, Stefanos Gritzalis:
Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework. Comput. Sci. Inf. Syst. 18(1): 323-347 (2021) - [j123]Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, Stefanos Gritzalis:
Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks. Future Internet 13(2): 23 (2021) - [c125]Athanasia Routzouni, Nikolaos Dimitrios (Nikos) Vasilakis, Spiros Kapetanakis, Stefanos Gritzalis, Athanasia Pouloudi:
Public sector innovation through design thinking: Applying a participatory policy design practice to support the formulation of a national digital transformation strategy. ICEGOV 2021: 104-110 - [i2]Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos, Stelios Georgiou, Stefanos Gritzalis:
The significance of user-defined identifiers in Java source code authorship identification. CoRR abs/2101.12384 (2021) - 2020
- [j122]Vasiliki Diamantopoulou, Aggeliki Androutsopoulou, Stefanos Gritzalis, Yannis Charalabidis:
Preserving Digital Privacy in e-Participation Environments: Towards GDPR Compliance. Inf. 11(2): 117 (2020) - [c124]Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, Stefanos Gritzalis:
Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 117-132 - [c123]Maria Sideri, Stefanos Gritzalis:
Are We Really Informed on the Rights GDPR Guarantees? HAISA 2020: 315-326 - [c122]Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou:
PP-TAN: a Privacy Preserving Multi-party Tree Augmented Naive Bayes Classifier. SEEDA-CECNSM 2020: 1-8 - [c121]Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, Stefanos Gritzalis:
Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments. TrustBus 2020: 140-155 - [e12]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, M. Angela Sasse, Weizhi Meng, Steven Furnell, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e11]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell:
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12501, Springer 2020, ISBN 978-3-030-64329-4 [contents] - [e10]Nikitas N. Karanikolas, Athanasios Voulodimos, Cleo Sgouropoulou, Mara Nikolaidou, Stefanos Gritzalis:
PCI 2020: 24th Pan-Hellenic Conference on Informatics, Athens, Greece, 20-22 November, 2020. ACM 2020, ISBN 978-1-4503-8897-9 [contents] - [e9]Stefanos Gritzalis, Edgar R. Weippl, Gabriele Kotsis, A Min Tjoa, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings. Lecture Notes in Computer Science 12395, Springer 2020, ISBN 978-3-030-58985-1 [contents]
2010 – 2019
- 2019
- [j121]Aikaterini-Georgia Mavroeidi, Angeliki Kitsiou, Christos Kalloniatis, Stefanos Gritzalis:
Gamification vs. Privacy: Identifying and Analysing the Major Concerns. Future Internet 11(3): 67 (2019) - [j120]Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis, Dimitris Kavroudakis, Stefanos Gritzalis:
Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes. Future Internet 11(11): 234 (2019) - [j119]Christos Kalloniatis, Dimitris Kavroudakis, Amalia Polidoropoulou, Stefanos Gritzalis:
Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts. Int. J. Appl. Geospat. Res. 10(1): 73-91 (2019) - [j118]Maria Sideri, Angeliki Kitsiou, Ariadni Filippopoulou, Christos Kalloniatis, Stefanos Gritzalis:
E-Governance in educational settings. Internet Res. 29(4): 818-845 (2019) - [j117]Filippos Giannakas, Andreas Papasalouros, Georgios Kambourakis, Stefanos Gritzalis:
A comprehensive cybersecurity learning platform for elementary education. Inf. Secur. J. A Glob. Perspect. 28(3): 81-106 (2019) - [j116]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis, Vasilios Katos:
A framework for designing cloud forensic-enabled services (CFeS). Requir. Eng. 24(3): 403-430 (2019) - [c120]Panagiotis Rizomiliotis, Stefanos Gritzalis:
Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips. CCSW 2019: 141-152 - [c119]Maria Sideri, Athanasios Fontaras, Stefanos Gritzalis:
What Do We Know About Our Rights to Data Protection? A Greek Case Study. e-Democracy 2019: 18-33 - [c118]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis, Vasilis Katos:
A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services. e-Democracy 2019: 161-177 - [c117]Athanasia Routzouni, Athanasios P. Deligiannis, Vassilios Peristeras, Stefanos Gritzalis:
An Intercountry Survey of Participatory Practices Used for Open Government Partnership National Action Plan Development. EGOV 2019: 82-93 - [c116]Athanasia Routzouni, Athanasios P. Deligiannis, Stefanos Gritzalis:
A generalised Co-Evaluation Model of Public Policies. MCIS 2019: 29 - [e8]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie I. Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis:
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11387, Springer 2019, ISBN 978-3-030-12785-5 [contents] - [e7]Stefanos Gritzalis, Edgar R. Weippl, Sokratis K. Katsikas, Gabriele Anderst-Kotsis, A Min Tjoa, Ismail Khalil:
Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings. Lecture Notes in Computer Science 11711, Springer 2019, ISBN 978-3-030-27812-0 [contents] - 2018
- [j115]Rodrigo Roman Castro, Javier López, Stefanos Gritzalis:
Evolution and Trends in IoT Security. Computer 51(7): 16-25 (2018) - [j114]Shareeful Islam, Moussa Ouedraogo, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis:
Assurance of Security and Privacy Requirements for Cloud Deployment Models. IEEE Trans. Cloud Comput. 6(2): 387-400 (2018) - [j113]George E. Tsekouras, John V. Tsimikas, Christos Kalloniatis, Stefanos Gritzalis:
Interpretability Constraints for Fuzzy Modeling Implemented by Constrained Particle Swarm Optimization. IEEE Trans. Fuzzy Syst. 26(4): 2348-2361 (2018) - [j112]Kim-Kwang Raymond Choo, Stefanos Gritzalis, Jong Hyuk Park:
Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities. IEEE Trans. Ind. Informatics 14(8): 3567-3569 (2018) - [c115]Athanasia Routzouni, Stefanos Gritzalis:
The Civil Society as an Innovation Partner in Public Policy Making: Co-Creating the Greek National Action Plan on Open Government. MCIS 2018: 25 - [c114]Marios Anagnostopoulos, Georgios Kambourakis, Stefanos Gritzalis, David K. Y. Yau:
Never say never: Authoritative TLD nameserver-powered DNS amplification. NOMS 2018: 1-9 - [c113]Vasiliki Diamantopoulou, Aggeliki Androutsopoulou, Stefanos Gritzalis, Yannis Charalabidis:
An assessment of privacy preservation in crowdsourcing approaches: Towards GDPR compliance. RCIS 2018: 1-9 - [c112]Argyri Pattakou, Aikaterini-Georgia Mavroeidi, Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis:
Towards the Design of Usable Privacy by Design Methodologies. ESPRE@RE 2018: 1-8 - [c111]Stavros Simou, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, Stefanos Gritzalis:
A Decision-Making Approach for Improving Organizations' Cloud Forensic Readiness. TrustBus 2018: 150-164 - [e6]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10683, Springer 2018, ISBN 978-3-319-72816-2 [contents] - [e5]Nikitas N. Karanikolas, Basilis Mamalis, John Kontos, Grammati E. Pantziou, Stefanos Gritzalis, Christos Douligeris:
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, PCI 2018, Athens, Greece, November 29 - December 01, 2018. ACM 2018, ISBN 978-1-4503-6610-6 [contents] - 2017
- [j111]Christos Kalloniatis, Argyri Pattakou, Evangelia Kavakli, Stefanos Gritzalis:
Designing Secure and Privacy-Aware Information Systems. Int. J. Secur. Softw. Eng. 8(2): 1-25 (2017) - [c110]Vasiliki Diamantopoulou, Aggeliki Tsohou, Euripidis N. Loukis, Stefanos Gritzalis:
Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation. AMCIS 2017 - [c109]Panagiotis Rizomiliotis, Eirini Molla, Stefanos Gritzalis:
REX: A Searchable Symmetric Encryption Scheme Supporting Range Queries. CCSW 2017: 29-37 - [c108]Maria Sideri, Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, Stefanos Gritzalis:
"I Have Learned that I Must Think Twice Before...". An Educational Intervention for Enhancing Students' Privacy Awareness in Facebook. e-Democracy 2017: 79-94 - [c107]Panagiotis Zagouras, Christos Kalloniatis, Stefanos Gritzalis:
Managing User Experience: Usability and Security in a New Era of Software Supremacy. HCI (22) 2017: 174-188 - [c106]Nikolaos Argyropoulos, Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan J. Delaney, Andrew Fish, Stefanos Gritzalis:
A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements. HICSS 2017: 1-10 - [c105]Maria Sideri, Ariadni Filippopoulou, George Rouvalis, Christos Kalloniatis, Stefanos Gritzalis:
Social Media Use for Decision Making Process in Educational Settings: The Greek Case for Leadership's Views and Attitude in Secondary and Tertiary Education. HICSS 2017: 1-10 - [c104]Lefkothea Spiliotopoulou, Dimitrios Damopoulos, Yannis Charalabidis, Manolis Maragoudakis, Stefanos Gritzalis:
Europe in the shadow of financial crisis: Policy Making via Stance Classification. HICSS 2017: 1-10 - [c103]Manolis Chalaris, Ioannis Chalaris, Stefanos Gritzalis, Cleo Sgouropoulou:
Maturity Level of the Quality Assurance Evaluation Procedures in Higher Education: A qualitative research. PCI 2017: 63:1-63:2 - [c102]Vasiliki Diamantopoulou, Nikolaos Argyropoulos, Christos Kalloniatis, Stefanos Gritzalis:
Supporting the design of privacy-aware business processes via privacy process patterns. RCIS 2017: 187-198 - [c101]Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis:
Supporting Privacy by Design Using Privacy Process Patterns. SEC 2017: 491-505 - [c100]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis:
Modelling Cloud Forensic-Enabled Services. TrustBus 2017: 147-163 - [i1]Eirini Molla, Theodoros Tzouramanis, Stefanos Gritzalis:
SOPE: A Spatial Order Preserving Encryption Model for Multi-dimensional Data. CoRR abs/1710.09420 (2017) - 2016
- [j110]Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Stefanos Gritzalis:
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Commun. Surv. Tutorials 18(1): 184-208 (2016) - [j109]Diamantatos Paraskevas, Ergina Kavallieratou, Stefanos Gritzalis:
Skeleton Hinge Distribution for Writer Identification. Int. J. Artif. Intell. Tools 25(3): 1650015:1-1650015:14 (2016) - [j108]Filippos Giannakas, Georgios Kambourakis, Andreas Papasalouros, Stefanos Gritzalis:
Security Education and Awareness for K-6 Going Mobile. Int. J. Interact. Mob. Technol. 10(2): 41-48 (2016) - [j107]Marios Anagnostopoulos, Georgios Kambourakis, Stefanos Gritzalis:
New facets of mobile botnet: architecture and evaluation. Int. J. Inf. Sec. 15(5): 455-473 (2016) - [j106]Jong Hyuk Park, Stefanos Gritzalis, Bo-Chao Cheng, Ning Zhang:
Challenges and opportunities in next-generation cyberspace security. Secur. Commun. Networks 9(6): 455-456 (2016) - [j105]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis:
A survey on cloud forensics challenges and solutions. Secur. Commun. Networks 9(18): 6285-6314 (2016) - [c99]Argyri Pattakou, Christos Kalloniatis, Stefanos Gritzalis:
Reasoning About Security and Privacy in Cloud Computing Under a Unified Meta-Model. HAISA 2016: 56-66 - [c98]Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis:
Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade. NSS 2016: 126-139 - [c97]Eleni Tzortzaki, Angeliki Kitsiou, Maria Sideri, Stefanos Gritzalis:
Self-disclosure, Privacy concerns and Social Capital benefits interaction in FB: A case study. PCI 2016: 32 - [c96]Angeliki Kitsiou, Eleni Tzortzaki, Maria Sideri, Stefanos Gritzalis:
Digital privacy and social capital on social network sites. friends or foes? STAST 2016: 3-16 - [c95]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis:
Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems. TrustBus 2016: 35-47 - 2015
- [j104]Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis:
Privacy as an Integral Part of the Implementation of Cloud Solutions. Comput. J. 58(10): 2213-2224 (2015) - [j103]Prokopios Drogkaris, Stefanos Gritzalis, Christos Kalloniatis, Costas Lambrinoudakis:
A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments. Future Internet 7(4): 500-515 (2015) - [j102]Shiguo Lian, Stefanos Gritzalis:
Innovations in emerging multimedia communication systems. Telecommun. Syst. 59(3): 289-290 (2015) - [c94]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis:
Towards the Development of a Cloud Forensics Methodology: A Conceptual Model. CAiSE Workshops 2015: 470-481 - [c93]Panagiotis Rizomiliotis, Stefanos Gritzalis:
ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes. CCSW 2015: 65-76 - [c92]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis:
A Meta-model for Assisting a Cloud Forensics Process. CRiSIS 2015: 177-187 - [c91]Maria Sideri, Angeliki Kitsiou, Christos Kalloniatis, Stefanos Gritzalis:
Privacy and Facebook Universities Students' Communities for Confessions and Secrets: The Greek Case. e-Democracy 2015: 77-94 - [e4]Nikitas N. Karanikolas, Demosthenes Akoumianakis, Mara Nikolaidou, Dimitrios D. Vergados, Michalis Xenos, George M. Giaglis, Stefanos Gritzalis, Lazaros F. Merakos, Panagiotis Tsanakas, Cleo Sgouropoulou:
Proceedings of the 19th Panhellenic Conference on Informatics, PCI 2015, Athens, Greece, October 1-3, 2015. ACM 2015, ISBN 978-1-4503-3551-5 [contents] - 2014
- [j101]Christos Kalloniatis, Haralambos Mouratidis, Vassilis Manousakis, Shareeful Islam, Stefanos Gritzalis, Evangelia Kavakli:
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Comput. Stand. Interfaces 36(4): 759-775 (2014) - [j100]Alexandros Panteli, Manolis Maragoudakis, Stefanos Gritzalis:
Privacy Preserving Data Mining Using Radial Basis Functions on Horizontally Partitioned Databases in the Malicious Model. Int. J. Artif. Intell. Tools 23(5) (2014) - [j99]Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis, Sang Oh Park:
Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer-to-Peer Netw. Appl. 7(4): 687-697 (2014) - [j98]James Clarke, Stefanos Gritzalis, Jianying Zhou, Rodrigo Roman:
Protecting the internet of things. Secur. Commun. Networks 7(12): 2637-2638 (2014) - [j97]Evangelos Rekleitis, Panagiotis Rizomiliotis, Stefanos Gritzalis:
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. Secur. Commun. Networks 7(12): 2669-2683 (2014) - [j96]James Clarke, Stefanos Gritzalis, Jianying Zhou, Rodrigo Roman:
Security in a completely interconnected world. Secur. Commun. Networks 7(12): 2726-2727 (2014) - [c90]Stavros Simou, Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Cloud Forensics: Identifying the Major Issues and Challenges. CAiSE 2014: 271-284 - [c89]Stavros Simou, Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Cloud Forensics Solutions: A Review. CAiSE Workshops 2014: 299-309 - [c88]Diamantatos Paraskevas, Stefanos Gritzalis, Ergina Kavallieratou:
Writer Identification Using a Statistical and Model Based Approach. ICFHR 2014: 589-594 - [c87]Ioannis Chalaris, Manolis Chalaris, Stefanos Gritzalis:
A holistic approach for quality assurance and advanced decision making for academic institutions using the balanced scorecard technique. Panhellenic Conference on Informatics 2014: 44:1-44:6 - [c86]Kristian Beckers, Stephan Faßbender, Stefanos Gritzalis, Maritta Heisel, Christos Kalloniatis, Rene Meis:
Privacy-Aware Cloud Deployment Scenario Selection. TrustBus 2014: 94-105 - 2013
- [j95]Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis:
From keyloggers to touchloggers: Take the rough with the smooth. Comput. Secur. 32: 102-114 (2013) - [j94]Marios Anagnostopoulos, Georgios Kambourakis, Panagiotis Kopanos, Georgios Louloudakis, Stefanos Gritzalis:
DNS amplification attack revisited. Comput. Secur. 39: 475-485 (2013) - [j93]Constantinos Kolias, Georgios Kambourakis, Stefanos Gritzalis:
Attacks and Countermeasures on 802.16: Analysis and Assessment. IEEE Commun. Surv. Tutorials 15(1): 487-514 (2013) - [j92]Stefanos Gritzalis, Justin Z. Zhan, Kitae Jeong:
IT convergence and security. Electron. Commer. Res. 13(3): 237-241 (2013) - [j91]Petros Belsis, Christos Skourlas, Stefanos Gritzalis:
A Wireless System for Secure Electronic Healthcare Records Management. Int. J. Adv. Pervasive Ubiquitous Comput. 5(4): 16-32 (2013) - [j90]Panagiotis Rizomiliotis, Stefanos Gritzalis:
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem. Int. J. Inf. Sec. 12(2): 151-154 (2013) - [j89]Fernando Pereñíguez-Garcia, Rafael Marín López, Georgios Kambourakis, Antonio Ruiz-Martínez, Stefanos Gritzalis, Antonio Fernandez Gómez-Skarmeta:
KAMU: providing advanced user privacy in Kerberos multi-domain scenarios. Int. J. Inf. Sec. 12(6): 505-525 (2013) - [j88]Haralambos Mouratidis, Shareeful Islam, Christos Kalloniatis, Stefanos Gritzalis:
A framework to support selection of cloud providers based on security and privacy requirements. J. Syst. Softw. 86(9): 2276-2293 (2013) - [j87]Stefanos Gritzalis, Shiguo Lian:
Mathematical and Computer Modelling in Information System Security. Math. Comput. Model. 57(11-12): 2581-2582 (2013) - [j86]Dimitrios Damopoulos, Georgios Kambourakis, Marios Anagnostopoulos, Stefanos Gritzalis, J. H. Park:
User privacy and modern mobile services: are they on the same path? Pers. Ubiquitous Comput. 17(7): 1437-1448 (2013) - [j85]Stefanos Gritzalis, Lin Liu:
Requirements Engineering for Security, Privacy and Services in Cloud Environments. Requir. Eng. 18(4): 297-298 (2013) - [c85]Vassilis Manousakis, Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Privacy in the Cloud: Bridging the Gap between Design and Implementation. CAiSE Workshops 2013: 455-465 - [c84]Christos Kalloniatis, Vassilis Manousakis, Haralambos Mouratidis, Stefanos Gritzalis:
Migrating into the Cloud: Identifying the Major Security and Privacy Concerns. I3E 2013: 73-87 - [c83]Michalis Pavlidis, Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis:
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions. TrustBus 2013: 185-198 - [c82]Panagiotis Rizomiliotis, Stefanos Gritzalis:
Revisiting lightweight authentication protocols based on hard learning problems. WISEC 2013: 125-130 - 2012
- [j84]Shiguo Lian, Jean-Henry Morin, Stefanos Gritzalis, Gregory L. Heileman:
Special issue on ubiquitous multimedia services. Inf. Syst. Frontiers 14(3): 477-479 (2012) - [j83]Athanasios Loukas, Dimitrios Damopoulos, Sofia-Anna Menesidou, Maria Eleni Skarkala, Georgios Kambourakis, Stefanos Gritzalis:
MILC: A secure and privacy-preserving mobile instant locator with chatting. Inf. Syst. Frontiers 14(3): 481-497 (2012) - [j82]Xi Chen, Shiguo Lian, Chu-Sing Yang, Stefanos Gritzalis:
Guest Editorial. J. Networks 7(2): 219-221 (2012) - [j81]Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Marc-Philippe Huget, Stefanos Gritzalis:
Aligning Security and Privacy to Support the Development of Secure Information Systems. J. Univers. Comput. Sci. 18(12): 1608-1627 (2012) - [j80]Xiaodong Lin, Jianwei Liu, Stefanos Gritzalis:
Security and privacy in emerging information technologies. Secur. Commun. Networks 5(1): 1-2 (2012) - [j79]Dimitrios Damopoulos, Sofia-Anna Menesidou, Georgios Kambourakis, Maria Papadaki, Nathan L. Clarke, Stefanos Gritzalis:
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Secur. Commun. Networks 5(1): 3-14 (2012) - [j78]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
SIPA: generic and secure accounting for SIP. Secur. Commun. Networks 5(9): 1006-1027 (2012) - [c81]Panagiotis Rizomiliotis, Stefanos Gritzalis:
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. ACNS 2012: 489-506 - [c80]Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou, Hannu Toivonen, Pirjo Moen:
Privacy Preservation by k-Anonymization of Weighted Social Networks. ASONAM 2012: 423-428 - [c79]Christos Kalloniatis, Petros Belsis, Evangelia Kavakli, Stefanos Gritzalis:
Applying Soft Computing Technologies for Implementing Privacy-Aware Systems. CAiSE Workshops 2012: 31-45 - [c78]Petros Belsis, Stefanos Gritzalis, Catherine Marinagi, Christos Skourlas, Dimitris Vassis:
Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing Students. Panhellenic Conference on Informatics 2012: 369-374 - 2011
- [j77]Shiguo Lian, Stefanos Gritzalis, Nadia Nedjah, Iuon-Chang Lin:
Special issue on soft computing for information system security. Appl. Soft Comput. 11(7): 4257-4259 (2011) - [j76]Christos Kalloniatis, Petros Belsis, Stefanos Gritzalis:
A soft computing approach for privacy requirements engineering: The PriS framework. Appl. Soft Comput. 11(7): 4341-4348 (2011) - [j75]Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park:
DoS attacks exploiting signaling in UMTS and IMS. Comput. Commun. 34(3): 226-235 (2011) - [j74]Fernando Pereñíguez-Garcia, Rafael Marín López, Georgios Kambourakis, Stefanos Gritzalis, Antonio Fernandez Gómez-Skarmeta:
PrivaKERB: A user privacy framework for Kerberos. Comput. Secur. 30(6-7): 446-463 (2011) - [j73]Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
A Survey on Cluster-Based Group Key Agreement Protocols for WSNs. IEEE Commun. Surv. Tutorials 13(3): 429-442 (2011) - [j72]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
PrivaSIP: Ad-hoc identity privacy in SIP. Comput. Stand. Interfaces 33(3): 301-314 (2011) - [j71]Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos, Stelios Georgiou, Stefanos Gritzalis:
The significance of user-defined identifiers in Java source code authorship identification. Comput. Syst. Sci. Eng. 26(2) (2011) - [j70]Petros Belsis, Christos Skourlas, Stefanos Gritzalis:
Secure Electronic Healthcare Records Management in Wireless Environments. J. Inf. Technol. Res. 4(4): 1-17 (2011) - [j69]Shiguo Lian, Zhu Li, Stefanos Gritzalis, Xi Chen:
Guest Editorial. J. Multim. 6(4): 317-319 (2011) - [j68]Xiangyang Luo, Fenlin Liu, Shiguo Lian, Chunfang Yang, Stefanos Gritzalis:
On the Typical Statistic Features for Image Blind Steganalysis. IEEE J. Sel. Areas Commun. 29(7): 1404-1422 (2011) - [j67]Annie I. Antón, Travis D. Breaux, Stefanos Gritzalis, John Mylopoulos:
Digital privacy: theory, policies and technologies. Requir. Eng. 16(1): 1-2 (2011) - [j66]Jong Hyuk Park, Stefanos Gritzalis, Hai Jin, Jenlong Wang:
Network security and digital forensics in next generation communications. Wirel. Commun. Mob. Comput. 11(2): 143-145 (2011) - [c77]Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis:
Designing secure RFID authentication protocols is (still) a non-trivial task. NSS 2011: 73-80 - [c76]Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis:
iSAM: An iPhone Stealth Airborne Malware. SEC 2011: 17-28 - [c75]Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou:
Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned Databases. TrustBus 2011: 62-73 - 2010
- [j65]Georgios Kambourakis, Elisavet Konstantinou, Stefanos Gritzalis:
Revisiting WiMAX MBS security. Comput. Math. Appl. 60(2): 217-223 (2010) - [j64]Chang Wen Chen, Stefanos Gritzalis, Pascal Lorenz, Shiguo Lian:
Special issue on multimedia networking and security in convergent networks. Comput. Commun. 33(14): 1575-1577 (2010) - [j63]Fernando Pereñíguez-Garcia, Georgios Kambourakis, Rafael Marín López, Stefanos Gritzalis, Antonio Fernandez Gómez-Skarmeta:
Privacy-enhanced fast re-authentication for EAP-based next generation network. Comput. Commun. 33(14): 1682-1694 (2010) - [j62]Bhavani Thuraisingham, Stefanos Gritzalis:
Information and communications security, privacy and trust: Standards and regulations. Comput. Stand. Interfaces 32(5-6): 229 (2010) - [j61]Georgios Kambourakis, Stefanos Gritzalis, Jong Hyuk Park:
Device Authentication In Wireless And Pervasive Environments. Intell. Autom. Soft Comput. 16(3): 399-418 (2010) - [j60]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis, Elisavet Konstantinou:
A framework for identity privacy in SIP. J. Netw. Comput. Appl. 33(1): 16-28 (2010) - [j59]Anelia Mitseva, Efthimia Aivaloglou, Maria Marchitti, Neeli Rashmi Prasad, Charalabos Skianis, Stefanos Gritzalis, Adrian Waller, Timothy Baugé, Sarah Pennington:
Towards adaptive security for convergent wireless sensor networks in beyond 3G environments. Wirel. Commun. Mob. Comput. 10(9): 1193-1207 (2010) - [j58]Efthimia Aivaloglou, Stefanos Gritzalis:
Hybrid trust and reputation management for sensor networks. Wirel. Networks 16(5): 1493-1510 (2010) - [c74]Prokopios Drogkaris, Stefanos Gritzalis, Costas Lambrinoudakis:
Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era. EGOVIS 2010: 142-149 - [c73]Prokopios Drogkaris, Stefanos Gritzalis:
Attaching Multiple Personal Identifiers in X.509 Digital Certificates. EuroPKI 2010: 171-177 - [c72]Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis:
Unifying ISO Security Standards Practices into a Single Security Framework. SAISMC 2010: 188-203 - [c71]Giles Hogben, Stefanos Gritzalis:
IS'10 - PC Co-chairs Message. OTM Conferences (1) 2010: 582 - [c70]Evangelos Rekleitis, Panagiotis Rizomiliotis, Stefanos Gritzalis:
An Agent Based Back-End RFID Tag Management System. TrustBus 2010: 165-176
2000 – 2009
- 2009
- [j57]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
A generic accounting scheme for next generation networks. Comput. Networks 53(14): 2408-2426 (2009) - [j56]Emmanouil Magkos, Manolis Maragoudakis, Vassilios Chrissikopoulos, Stefanos Gritzalis:
Accurate and large-scale privacy-preserving data mining using the election paradigm. Data Knowl. Eng. 68(11): 1224-1236 (2009) - [j55]Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis:
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags. IEEE Commun. Lett. 13(4): 274-276 (2009) - [j54]Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park, Spyros Kokolakis:
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions. Internet Res. 19(2): 194-208 (2009) - [j53]Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. J. Comput. Secur. 17(3): 239-268 (2009) - [j52]Lambros Boukas, Georgios Kambourakis, Stefanos Gritzalis:
Pandora: An SMS-oriented m-informational system for educational realms. J. Netw. Comput. Appl. 32(3): 684-702 (2009) - [j51]Shiguo Lian, Yan Zhang, Stefanos Gritzalis, Yu Chen:
Multimedia Security in Communication (MUSIC). J. Univers. Comput. Sci. 15(2): 398-400 (2009) - [j50]Byoung-Soo Koh, Mieso K. Denko, Stefanos Gritzalis, Ching-Hsien Hsu:
Data Security and Privacy Protection in Pervasive Computing Environments. J. Univers. Comput. Sci. 15(5): 967-969 (2009) - [c69]Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis:
Information Systems Security Management: A Review and a Classification of the ISO Standards. e-Democracy 2009: 220-235 - [c68]Efthimia Aivaloglou, Stefanos Gritzalis:
Trust-Based Data Disclosure in Sensor Networks. ICC 2009: 1-6 - [c67]Dimitris Geneiatakis, Costas Lambrinoudakis, Stefanos Gritzalis:
A Hierarchical Model for Cross-Domain Communication of Health Care Units. NSS 2009: 123-129 - [c66]Stefanos Gritzalis, Xueqi Cheng:
IS 2009 - PC Co-chairs' Message. OTM Conferences (2) 2009: 797 - [c65]Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Methods for Designing Privacy Aware Information Systems: A Review. Panhellenic Conference on Informatics 2009: 185-194 - [c64]Dimitris Vassis, Petros Belsis, Christos Skourlas, Stefanos Gritzalis:
End to end secure communication in ad-hoc assistive medical environments using secure paths. PETRA 2009 - [c63]Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park:
Signaling-Oriented DoS Attacks in UMTS Networks. ISA 2009: 280-289 - [c62]Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
A Cluster-Based Framework for the Security of Medical Sensor Environments. TrustBus 2009: 52-62 - 2008
- [j49]Rodrigo Roman, Javier López, Stefanos Gritzalis:
Situation awareness mechanisms for wireless sensor networks. IEEE Commun. Mag. 46(4): 102-107 (2008) - [j48]Giannakis Antoniou, Leon Sterling, Stefanos Gritzalis, Parampalli Udaya:
Privacy and forensics investigation process: The ERPINA protocol. Comput. Stand. Interfaces 30(4): 229-236 (2008) - [j47]Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
Specifying and implementing privacy-preserving cryptographic protocols. Int. J. Inf. Sec. 7(6): 395-420 (2008) - [j46]Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis:
Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach. Int. J. Syst. Syst. Eng. 1(1/2): 128-148 (2008) - [j45]Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. J. Comput. Secur. 16(6): 761-790 (2008) - [j44]Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos, Stefanos Gritzalis:
Examining the significance of high-level programming features in source code author classification. J. Syst. Softw. 81(3): 447-460 (2008) - [j43]Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13(3): 241-255 (2008) - [j42]Demosthenes Vouyioukas, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis:
Enabling the provision of secure web based m-health services utilizing XML based security models. Secur. Commun. Networks 1(5): 375-388 (2008) - [c61]Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis:
Clustering Oriented Architectures in Medical Sensor Environments. ARES 2008: 929-934 - [c60]Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas:
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ESORICS 2008: 207-222 - [c59]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Caller identity privacy in SIP heterogeneous realms: A practical solution. ISCC 2008: 37-43 - [c58]Georgios Kambourakis, Elisavet Konstantinou, Stefanos Gritzalis:
Binary tree based public-key management for Mobile Ad Hoc Networks. ISWCS 2008: 687-692 - [c57]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Privacy Protection in Context Transfer Protocol. PDP 2008: 590-596 - [c56]Emmanouil Magkos, Manolis Maragoudakis, Vassilios Chrissikopoulos, Stefanos Gritzalis:
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections. Privacy in Statistical Databases 2008: 284-297 - [c55]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
A new Accounting Mechanism for Modern and Future AAA Services. SEC 2008: 693-697 - [c54]Peter Mueller, Kaisa Nyberg, Stefanos Gritzalis, Costas Lambrinoudakis:
Message from the SecPri Workshop Organizing Technical Co-chairs. WiMob 2008 - [r1]Stefanos Gritzalis, Costas Lambrinoudakis:
IEEE 802.11 Wireless LANs (WLANs): Security. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [j41]Georgios Kambourakis, Denise-Penelope N. Kontoni, Angelos N. Rouskas, Stefanos Gritzalis:
A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Comput. Educ. 48(1): 1-16 (2007) - [j40]Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis:
A framework for protecting a SIP-based infrastructure against malformed message attacks. Comput. Networks 51(10): 2580-2593 (2007) - [j39]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks. IEEE Commun. Surv. Tutorials 9(1-4): 18-28 (2007) - [j38]Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Carole E. Chaski, Blake Stephen Howald:
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method. Int. J. Digit. EVid. 6(1) (2007) - [j37]Meletis A. Belsis, Ashish N. Dwivedi, Stefanos Gritzalis, Rajeev K. Bali, Raouf N. Gorgui-Naguib:
Providing secure mAccess to medical information. Int. J. Electron. Heal. 3(1): 51-71 (2007) - [j36]Stefanos Gritzalis, Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas:
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Int. J. Inf. Sec. 6(4): 197-211 (2007) - [j35]Michael Backes, Stefanos Gritzalis, Bart Preneel:
Preface. Int. J. Inf. Sec. 6(6): 359-360 (2007) - [j34]Jose Antonio Onieva, Javier López, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis:
Integration of non-repudiation services in mobile DRM scenarios. Telecommun. Syst. 35(3-4): 161-176 (2007) - [j33]Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis:
Towards a flexible trust establishment framework for sensor networks. Telecommun. Syst. 35(3-4): 207-213 (2007) - [c53]Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis:
Securing Medical Sensor Environments: The CodeBlue Framework Case. ARES 2007: 637-643 - [c52]Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. ARES 2007: 1009-1017 - [c51]Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas:
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. ASIAN 2007: 261-267 - [c50]Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, Stefanos Gritzalis:
Detecting DNS Amplification Attacks. CRITIS 2007: 185-196 - [c49]Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park:
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. EUC Workshops 2007: 12-21 - [c48]Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Two privacy enhanced context transfer schemes. Q2SWinet 2007: 172-175 - [c47]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
On RSN-Oriented Wireless Intrusion Detection. OTM Conferences (2) 2007: 1601-1615 - [c46]Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
Towards effective Wireless Intrusion Detection in IEEE 802.11i. SECPerU 2007: 37-42 - [c45]Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas:
Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. TrustBus 2007: 125-134 - [c44]Georgios Kambourakis, Stefanos Gritzalis:
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. TrustBus 2007: 135-144 - [e3]Panagiotis Georgiadis, Javier López, Stefanos Gritzalis, Giannis F. Marias:
Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007. IEEE Computer Society 2007, ISBN 0-7695-2863-5 [contents] - 2006
- [j32]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis, Dimitris Geneiatakis:
Support of subscribers' certificates in a hybrid WLAN-3G environment. Comput. Networks 50(11): 1843-1859 (2006) - [j31]Dimitris Fotakis, Stefanos Gritzalis:
Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks. Comput. Commun. 29(11): 2109-2122 (2006) - [j30]Dimitris Geneiatakis, Tasos Dagiuklas, Georgios Kambourakis, Costas Lambrinoudakis, Stefanos Gritzalis, Sven Ehlert, Dorgham Sisalem:
Survey of security vulnerabilities in session initiation protocol. IEEE Commun. Surv. Tutorials 8(1-4): 68-81 (2006) - [j29]Stefanos Gritzalis:
Public Key Infrastructure: Research and Applications. Int. J. Inf. Sec. 5(1): 1-2 (2006) - [j28]Evangelia Kavakli, Christos Kalloniatis, Pericles Loucopoulos, Stefanos Gritzalis:
Incorporating privacy requirements into the system design process: The PriS conceptual framework. Internet Res. 16(2): 140-158 (2006) - [j27]Stefanos Gritzalis:
Developing a culture of privacy in the Global Village. Telematics Informatics 23(3): 157-163 (2006) - [c43]Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas:
An ontology for secure e-government applications. ARES 2006: 1033-1037 - [c42]Konstantinos Papapanagiotou, Giannis F. Marias, Panagiotis Georgiadis, Stefanos Gritzalis:
Performance evaluation of a distributed OCSP protocol over MANETs. CCNC 2006: 1-5 - [c41]Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis:
Trust Establishment in Ad Hoc and Sensor Networks. CRITIS 2006: 179-194 - [c40]Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis:
Requirements and Challenges in the Design of Privacy-aware Sensor Networks. GLOBECOM 2006 - [c39]Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas:
Effective identification of source code authors using byte-level information. ICSE 2006: 893-896 - [c38]Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas:
Optimized Multi-Domain Secure Interoperation using Soft Constraints. AIAI 2006: 78-85 - [c37]Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas:
Source Code Author Identification Based on N-gram Author Profiles. AIAI 2006: 508-515 - [c36]Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas:
SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering. SAC 2006: 354-360 - [c35]Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70 - [c34]Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas:
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. STM 2006: 75-86 - [e2]Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings. Lecture Notes in Computer Science 4176, Springer 2006, ISBN 3-540-38341-7 [contents] - 2005
- [j26]Giorgos Gousios, Efthimia Aivaloglou, Stefanos Gritzalis:
Distributed component architectures security issues. Comput. Stand. Interfaces 27(3): 269-284 (2005) - [j25]Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
Specifying Privacy-Preserving Protocols in Typed MSR. Comput. Stand. Interfaces 27(5): 501-512 (2005) - [j24]Costas Lambrinoudakis, Stefanos Gritzalis, Petros Hatzopoulos, Athanasios N. Yannacopoulos, Sokratis K. Katsikas:
A formal model for pricing information systems insurance contracts. Comput. Stand. Interfaces 27(5): 521-532 (2005) - [j23]Apostolos Malatras, George Pavlou, Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris:
Deploying pervasive secure knowledge management infrastructures. Int. J. Pervasive Comput. Commun. 1(4): 265-276 (2005) - [j22]Stefanos Gritzalis:
A good-practice guidance on the use of PKI services in the public sector of the European Union member states. Inf. Manag. Comput. Security 13(5): 379-398 (2005) - [j21]Dimitrios Lekkas, Stefanos Gritzalis, Lilian Mitrou:
Withdrawing a declaration of will: Towards a framework for digital signature revocation. Internet Res. 15(4): 400-420 (2005) - [j20]Lazaros Gymnopoulos, Vassilis Tsoumas, Yannis Soupionis, Stefanos Gritzalis:
A generic Grid security policy reconciliation framework. Internet Res. 15(5): 508-517 (2005) - [c33]Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis:
Incorporating Security Requirements Into the Software Development Process. ECIW 2005: 21-28 - [c32]Lazaros Gymnopoulos, Stefanos Gritzalis:
Introducing Ontology-based Security Policy Management in the Grid. ECIW 2005: 107-116 - [c31]Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Theodoros Balopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis:
Employing Ontologies for the Development of Security Critical Applications. I3E 2005: 187-201 - [c30]Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis:
Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level Information. ICETE (Selected Papers) 2005: 163-173 - [c29]Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis:
Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. ICETE 2005: 283-290 - [c28]Apostolos Malatras, George Pavlou, Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris:
Secure and distributed knowledge management in pervasive environments. ICPS 2005: 79-87 - [c27]Petros Belsis, Apostolos Malatras, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris:
Pervasive Secure Electronic Healthcare Records Management. IWUC 2005: 101-109 - [c26]Nikolaos Doukas, Eleni Klaoudatou, Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Evaluation of digital certificates acquisition in large-scale 802.11-3GPP hybrid environments. LANMAN 2005 - [c25]Dimitris Geneiatakis, Georgios Kambourakis, Tasos Dagiuklas, Costas Lambrinoudakis, Stefanos Gritzalis:
A framework for detecting malformed messages in SIP networks. LANMAN 2005 - [c24]Meletis A. Belsis, Alkis Simitsis, Stefanos Gritzalis:
Workflow Based Security Incident Management. Panhellenic Conference on Informatics 2005: 684-694 - [c23]Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris:
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. TrustBus 2005: 10-19 - [c22]Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
Specifying electronic voting protocols in typed MSR. WPES 2005: 35-39 - 2004
- [j19]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems. EURASIP J. Wirel. Commun. Netw. 2004(1): 184-197 (2004) - [j18]Stefanos Gritzalis:
Enhancing Web privacy and anonymity in the digital era. Inf. Manag. Comput. Secur. 12(3): 255-287 (2004) - [j17]George Angelis, Stefanos Gritzalis, Costas Lambrinoudakis:
Mechanisms for controlling access in the global grid environment. Internet Res. 14(5): 347-352 (2004) - [j16]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks. Wirel. Pers. Commun. 29(3-4): 303-321 (2004) - [c21]Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder. Communications and Multimedia Security 2004: 209-221 - [c20]Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks. EGOV 2004: 66-71 - [c19]Konstantina Kabouraki, Stefanos Gritzalis, Konstantinos Moulinos:
Towards a Privacy Audit Programmes Comparison Framework. EGOV 2004: 328-331 - [c18]Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Drakopoulos:
Implementing Knowledge Management Techniques for Security Purposes. ICEIS (2) 2004: 535-540 - [c17]Georgia Frantzeskou, Stefanos Gritzalis:
Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process. ICETE (2) 2004: 85-92 - [c16]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. NETWORKING 2004: 13-24 - [c15]Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris:
Enhancing Knowledge Management Through the Use of GIS and Multimedia. PAKM 2004: 319-329 - [c14]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Delivering Attribute Certificates over GPRS. SAC 2004: 1166-1170 - [c13]Sokratis K. Katsikas, Athanasios N. Yannacopoulos, Stefanos Gritzalis, Costas Lambrinoudakis, Petros Hatzopoulos:
How Much Should We Pay for Security? (Invited Paper). IICIS 2004: 59-69 - [e1]Sokratis K. Katsikas, Stefanos Gritzalis, Javier López:
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Lecture Notes in Computer Science 3093, Springer 2004, ISBN 3-540-22216-2 [contents] - 2003
- [j15]John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis:
Towards a framework for evaluating certificate status information mechanisms. Comput. Commun. 26(16): 1839-1850 (2003) - [j14]John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis:
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Comput. Commun. 26(16): 1851-1862 (2003) - [j13]Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul:
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Comput. Commun. 26(16): 1873-1883 (2003) - [c12]Theodoros Balopoulos, Stefanos Gritzalis:
Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols. DEXA Workshops 2003: 396-401 - [c11]John Argyrakis, Stefanos Gritzalis, Chris Kioulafas:
Privacy Enhancing Technologies: A Review. EGOV 2003: 282-287 - [c10]Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis:
GRID Security Review. MMM-ACNS 2003: 100-111 - [c9]George Angelis, Stefanos Gritzalis, Costas Lambrinoudakis:
Security Policy Configuration Issues in Grid Computing Environments. SAFECOMP 2003: 331-341 - [c8]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Introducing PKI to Enhance Security in Future Mobile Networks. SEC 2003: 109-120 - 2002
- [j12]Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas:
Quality assured trusted third parties for deploying secure internet-based healthcare applications. Int. J. Medical Informatics 65(2): 79-96 (2002) - [c7]Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis:
Using SSL/TLS in authentication and key agreement procedures of future mobile networks. MWCN 2002: 152-156 - [c6]Stefanos Gritzalis, Costas Lambrinoudakis:
Security Requirements of e-Government Services: An Organizational Framework. PDPTA 2002: 127-131 - 2001
- [j11]Stefanos Gritzalis, Dimitris Gritzalis:
A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Secur. 9(2): 71-79 (2001) - [j10]Nikitas V. Nikitakos, Stefanos Gritzalis:
Risk management for new information technology insertion in a shipping company. Oper. Res. 1(1): 7-16 (2001) - [c5]Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas:
Towards an ISO-9000 compliant certification service provider. HERCMA 2001: 390-397 - 2000
- [j9]Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro:
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. Comput. Secur. 19(8): 731-746 (2000) - [j8]Stefanos Gritzalis, John Iliadis, Spyros Oikonomopoulos:
Distributed component software security issues on deploying a secure electronic marketplace. Inf. Manag. Comput. Secur. 8(1): 5-13 (2000)
1990 – 1999
- 1999
- [j7]Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis:
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Comput. Commun. 22(8): 697-709 (1999) - [j6]Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW. Comput. Secur. 18(7): 627-639 (1999) - [j5]Diomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis:
Security requirements, risks and recommendations for small enterprise and home-office environments. Inf. Manag. Comput. Secur. 7(3): 121-128 (1999) - [j4]Stefanos Gritzalis, George Aggelis, Diomidis Spinellis:
Architectures for secure portable executable content. Internet Res. 9(1): 16-24 (1999) - 1998
- [j3]Stefanos Gritzalis, Diomidis Spinellis:
The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction. Microprocess. Microsystems 21(10): 621-627 (1998) - [j2]Stefanos Gritzalis, George Aggelis:
Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl. ACM SIGOPS Oper. Syst. Rev. 32(2): 16-32 (1998) - [c4]Stefanos Gritzalis, John Iliadis:
Addressing Security Issues in Programming Languages for Mobile Code. DEXA Workshop 1998: 288-293 - [c3]John Iliadis, Stefanos Gritzalis, V. Oikonomou:
Towards Secure Downloadable Executable Content: The Java Paradigm. SAFECOMP 1998: 117-127 - 1997
- [c2]Stefanos Gritzalis, Diomidis Spinellis:
Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools. SAFECOMP 1997: 123-137 - 1996
- [c1]Nikitas V. Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis:
Security profile for interconnected open distributed systems with varying vulnerability. SEC 1996: 428-437 - 1992
- [j1]Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis:
A zero knowledge probabilistic login protocol. Comput. Secur. 11(8): 733-745 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint