Lilian Mitrou
Orcid: 0000-0001-7149-5053
According to our database1,
Lilian Mitrou
authored at least 32 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Scaling private proximity testing protocols for geofenced information exchange: A metropolitan-wide case study.
Comput. Networks, 2024
2021
Proceedings of the ICEGOV 2021: 14th International Conference on Theory and Practice of Electronic Governance, Athens, Greece, October 6, 2021
2020
Proceedings of the 5th South-East Europe Design Automation, 2020
2018
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual.
Comput. Secur., 2018
2017
Int. J. Soc. Netw. Min., 2017
2016
Secur. Commun. Networks, 2016
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment.
Inf. Comput. Secur., 2016
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare.
Inf. Comput. Secur., 2016
Cyber-Attacks Evaluation Using Simple Additive Weighting Method on the Basis of Schmitt's Analysis.
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016
Proceedings of the 10th Mediterranean Conference on Information Systems, 2016
2015
Inf. Comput. Secur., 2015
2014
A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol.
Int. J. Electron. Secur. Digit. Forensics, 2014
2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
The "Panopticon" of search engines: the response of the European data protection framework.
Requir. Eng., 2011
Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned Databases.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
2009
Proceedings of the 4th Mediterranean Conference on Information Systems, 2009
2006
Telematics Informatics, 2006
2005
Withdrawing a declaration of will: Towards a framework for digital signature revocation.
Internet Res., 2005
2003
Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications.
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the Computer Network Security, 2003
2002
Revisiting Legal and Regulatory Requirements for Secure E-Voting.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002