Sotirios Terzis

Orcid: 0000-0002-5061-9923

According to our database1, Sotirios Terzis authored at least 37 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Getting users to click: a content analysis of phishers' tactics and techniques in mobile instant messaging phishing.
Inf. Comput. Secur., 2024

A Trust Management Delegation Protocol for Fog Computing Applications.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

Content Analysis of Persuasion Principles in Mobile Instant Message Phishing.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

Multi-party Updatable Delegated Private Set Intersection.
Proceedings of the Financial Cryptography and Data Security, 2022

2020
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient Delegated Private Set Intersection on Outsourced Private Datasets.
IEEE Trans. Dependable Secur. Comput., 2019

2016
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
O-PSI: Delegated Private Set Intersection on Outsourced Datasets.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2012
Distress Detection (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

A Middleware for Pervasive Situation-Awareness.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

2010
Towards Authentication via Selected Extraction from Electronic Personal Histories.
Proceedings of the Enterprise Information Systems - 12th International Conference, 2010

A Study in Authentication Via Electronic Personal History Questions.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 5, HCI, Funchal, Madeira, Portugal, June 8, 2010

Danger Theory and Intrusion Detection: Possibilities and Limitations of the Analogy.
Proceedings of the Artificial Immune Systems, 9th International Conference, 2010

2006
Middleware for pervasive and ad hoc computing.
Pers. Ubiquitous Comput., 2006

Towards self-protecting ubiquitous systems: monitoring trust-based interactions.
Pers. Ubiquitous Comput., 2006

Situation Determination with Reusable Situation Specifications.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Question-based authentication using context data.
Proceedings of the 4th Nordic Conference on Human-Computer Interaction 2006, Oslo, 2006

Gathering Experience in Trust-Based Interactions.
Proceedings of the Trust Management, 4th International Conference, 2006

A model and architecture for situation determination.
Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, 2006

2005
Foundations for semantically enhanced component trading : a component type model
PhD thesis, 2005

2004
Engineering Trust Based Collaborations in a Global Computing Environment.
Proceedings of the Trust Management, Second International Conference, 2004

Trust Lifecycle Management in a Global Computing Environment.
Proceedings of the Global Computing, IST/FET International Workshop, 2004

2003
Using Trust for Secure Collaboration in Uncertain Environments.
IEEE Pervasive Comput., 2003

Trust Dynamics for Collaborative Global Computing.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Towards a Middleware for Generalised Context Management.
Proceedings of the International Middleware Conference, 2003

Trusting Collaboration in Global Computing Systems.
Proceedings of the Trust Management, First International Conference, 2003

Programming structures for adaptive ambient systems.
Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, 2003

2000
A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries.
Int. J. Digit. Libr., 2000

Component Location and the Role of Trading in Large Scale Distributed Systems.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 2000

The Virtues Architecture: A Software Infrastructure for Business-to-Business E-Commerce.
Proceedings of the ICEIS 2000, 2000

1999
The Future of Enterprise Groupware Applications.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999

Vanilla: An Open Language Framework.
Proceedings of the Generative and Component-Based Software Engineering, 1999

Component Trading: the Basis for a Component-Oriented Development Framework.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

Semantic Trading: Tackling Interoperability Problems During System Integration.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

1998
A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries.
Proceedings of the Research and Advanced Technology for Digital Libraries, 1998


  Loading...