Ioannis Krontiris

According to our database1, Ioannis Krontiris authored at least 47 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242).
Dagstuhl Reports, 2023

Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security.
Proceedings of the IEEE Vehicular Networking Conference, 2023

Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC.
Proceedings of the Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023

2022
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042).
Dagstuhl Reports, 2022

2021
BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains.
CoRR, 2021

Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
Autonomous Vehicles: Data Protection and Ethical Considerations.
Proceedings of the CSCS '20: Computer Science in Cars Symposium, 2020

Enabling Trusted Digital Identities ? From Connected Citizens to Connected Objects.
Proceedings of the CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, 2020

2019
Securing V2X Communications for the Future: Can PKI Systems offer the answer?
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2017
Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications.
J. Netw. Comput. Appl., 2017

2015
A platform for privacy protection of data requesters and data providers in mobile sensing.
Comput. Commun., 2015

Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing.
Proceedings of the Information Security Theory and Practice, 2015

User Acceptance Factors for Anonymous Credentials: An Empirical Investigation.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

An Architecture for Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

Privacy-ABC Usage Scenarios.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Trust and privacy in mobile experience sharing: future challenges and avenues for research.
IEEE Commun. Mag., 2014

Trust Relationships in Privacy-ABCs' Ecosystems.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Towards a Framework for Benchmarking Privacy-ABC Technologies.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

User Acceptance of Privacy-ABCs: An Exploratory Study.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312).
Dagstuhl Reports, 2013

Coupons as Monetary Incentives in Participatory Sensing.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

2012
Monetary incentives in participatory sensing using multi-attributive auctions.
Int. J. Parallel Emergent Distributed Syst., 2012

Attribute-Based Credentials for Trust (ABC4Trust).
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

Privacy-by-design based on quantitative threat modeling.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Towards privacy-enhanced mobile communities - Architecture, concepts and user trials.
J. Syst. Softw., 2011

Scatter - secure code authentication for efficient reprogramming in wireless sensor networks.
Int. J. Sens. Networks, 2011

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Reports, 2011

Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061).
Dagstuhl Manifestos, 2011

2010
Location privacy in urban sensing networks: research challenges and directions.
IEEE Wirel. Commun., 2010

Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
Comput. J., 2010

Integrating people-centric sensing with social networks: A privacy research agenda.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

2009
Cooperative Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009

2008
Intrusion prevention and detection in wireless sensor networks.
PhD thesis, 2008

Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

LIDeA: a distributed lightweight intrusion detection architecture for sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007

2006
GRAViTy: Geographic Routing around Voids in Sensor Networks.
Int. J. Pervasive Comput. Commun., 2006

Authenticated In-Network Programming for Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
Autonomic Communication Security in Sensor Networks.
Proceedings of the Autonomic Communication, Second International IFIP Workshop, 2005

A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

2004
SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks.
Proceedings of the NETWORKING 2004, 2004


  Loading...