Stefanos Gritzalis

Orcid: 0000-0002-8037-2191

Affiliations:
  • University of Piraeus, Greece
  • University of the Aegean, Samos, Greece (former)


According to our database1, Stefanos Gritzalis authored at least 260 papers between 1992 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Assessing the detection of lateral movement through unsupervised learning techniques.
Comput. Secur., 2025

2024
Leveraging application permissions and network traffic attributes for Android ransomware detection.
J. Netw. Comput. Appl., 2024

A Unified Framework for GDPR Compliance in Cloud Computing.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Cyber insurance: state of the art, trends and future directions.
Int. J. Inf. Sec., June, 2023

Efficient searchable symmetric encryption supporting range queries.
Int. J. Inf. Sec., 2023

A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset.
Comput. Secur., 2023

2022
Directional Hinge Features for Writer Identification: The Importance of the Skeleton and the Effects of Character Size and Pixel Intensity.
SN Comput. Sci., 2022

Determining the Role of Social Identity Attributes to the Protection of Users' Privacy in Social Media.
Future Internet, 2022

The Role of Users' Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study.
Future Internet, 2022

EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital Era.
Modern Socio-Technical Perspectives on Privacy, 2022

2021
Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks.
Future Internet, 2021

Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework.
Comput. Sci. Inf. Syst., 2021

PPDM-TAN: A Privacy-Preserving Multi-Party Classifier.
Comput., 2021

Public sector innovation through design thinking: Applying a participatory policy design practice to support the formulation of a national digital transformation strategy.
Proceedings of the ICEGOV 2021: 14th International Conference on Theory and Practice of Electronic Governance, Athens, Greece, October 6, 2021

2020
Preserving Digital Privacy in e-Participation Environments: Towards GDPR Compliance.
Inf., 2020

Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

PP-TAN: a Privacy Preserving Multi-party Tree Augmented Naive Bayes Classifier.
Proceedings of the 5th South-East Europe Design Automation, 2020

Are We Really Informed on the Rights GDPR Guarantees?
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical Concepts.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
A framework for designing cloud forensic-enabled services (CFeS).
Requir. Eng., 2019

A comprehensive cybersecurity learning platform for elementary education.
Inf. Secur. J. A Glob. Perspect., 2019

E-Governance in educational settings.
Internet Res., 2019

Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts.
Int. J. Appl. Geospat. Res., 2019

Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes.
Future Internet, 2019

Gamification vs. Privacy: Identifying and Analysing the Major Concerns.
Future Internet, 2019

A generalised Co-Evaluation Model of Public Policies.
Proceedings of the 13th Mediterranean Conference on Information Systems, 2019

An Intercountry Survey of Participatory Practices Used for Open Government Partnership National Action Plan Development.
Proceedings of the Electronic Government - 18th IFIP WG 8.5 International Conference, 2019

A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

What Do We Know About Our Rights to Data Protection? A Greek Case Study.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Ind. Informatics, 2018

Interpretability Constraints for Fuzzy Modeling Implemented by Constrained Particle Swarm Optimization.
IEEE Trans. Fuzzy Syst., 2018

Assurance of Security and Privacy Requirements for Cloud Deployment Models.
IEEE Trans. Cloud Comput., 2018

Evolution and Trends in IoT Security.
Computer, 2018

A Decision-Making Approach for Improving Organizations' Cloud Forensic Readiness.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Towards the Design of Usable Privacy by Design Methodologies.
Proceedings of the 5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2018

An assessment of privacy preservation in crowdsourcing approaches: Towards GDPR compliance.
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018

Never say never: Authoritative TLD nameserver-powered DNS amplification.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

The Civil Society as an Innovation Partner in Public Policy Making: Co-Creating the Greek National Action Plan on Open Government.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018

2017
Designing Secure and Privacy-Aware Information Systems.
Int. J. Secur. Softw. Eng., 2017

SOPE: A Spatial Order Preserving Encryption Model for Multi-dimensional Data.
CoRR, 2017

Modelling Cloud Forensic-Enabled Services.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Supporting Privacy by Design Using Privacy Process Patterns.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Supporting the design of privacy-aware business processes via privacy process patterns.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Maturity Level of the Quality Assurance Evaluation Procedures in Higher Education: A qualitative research.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

Europe in the shadow of financial crisis: Policy Making via Stance Classification.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Social Media Use for Decision Making Process in Educational Settings: The Greek Case for Leadership's Views and Attitude in Secondary and Tertiary Education.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Managing User Experience: Usability and Security in a New Era of Software Supremacy.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

"I Have Learned that I Must Think Twice Before...". An Educational Intervention for Enhancing Students' Privacy Awareness in Facebook.
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017

REX: A Searchable Symmetric Encryption Scheme Supporting Range Queries.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
A survey on cloud forensics challenges and solutions.
Secur. Commun. Networks, 2016

Challenges and opportunities in next-generation cyberspace security.
Secur. Commun. Networks, 2016

New facets of mobile botnet: architecture and evaluation.
Int. J. Inf. Sec., 2016

Security Education and Awareness for K-6 Going Mobile.
Int. J. Interact. Mob. Technol., 2016

Skeleton Hinge Distribution for Writer Identification.
Int. J. Artif. Intell. Tools, 2016

Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Commun. Surv. Tutorials, 2016

Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Digital privacy and social capital on social network sites. friends or foes?
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

Self-disclosure, Privacy concerns and Social Capital benefits interaction in FB: A case study.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade.
Proceedings of the Network and System Security - 10th International Conference, 2016

Reasoning About Security and Privacy in Cloud Computing Under a Unified Meta-Model.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
Innovations in emerging multimedia communication systems.
Telecommun. Syst., 2015

A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments.
Future Internet, 2015

Privacy as an Integral Part of the Implementation of Cloud Solutions.
Comput. J., 2015

Privacy and Facebook Universities Students' Communities for Confessions and Secrets: The Greek Case.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

A Meta-model for Assisting a Cloud Forensics Process.
Proceedings of the Risks and Security of Internet and Systems, 2015

ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

Towards the Development of a Cloud Forensics Methodology: A Conceptual Model.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol.
Secur. Commun. Networks, 2014

Security in a completely interconnected world.
Secur. Commun. Networks, 2014

Protecting the internet of things.
Secur. Commun. Networks, 2014

Exposing mobile malware from the inside (or what is your mobile app really doing?).
Peer-to-Peer Netw. Appl., 2014

Privacy Preserving Data Mining Using Radial Basis Functions on Horizontally Partitioned Databases in the Malicious Model.
Int. J. Artif. Intell. Tools, 2014

Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.
Comput. Stand. Interfaces, 2014

Privacy-Aware Cloud Deployment Scenario Selection.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

A holistic approach for quality assurance and advanced decision making for academic institutions using the balanced scorecard technique.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Writer Identification Using a Statistical and Model Based Approach.
Proceedings of the 14th International Conference on Frontiers in Handwriting Recognition, 2014

Cloud Forensics Solutions: A Review.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Cloud Forensics: Identifying the Major Issues and Challenges.
Proceedings of the Advanced Information Systems Engineering, 2014

2013
Requirements Engineering for Security, Privacy and Services in Cloud Environments.
Requir. Eng., 2013

User privacy and modern mobile services: are they on the same path?
Pers. Ubiquitous Comput., 2013

Mathematical and Computer Modelling in Information System Security.
Math. Comput. Model., 2013

A framework to support selection of cloud providers based on security and privacy requirements.
J. Syst. Softw., 2013

On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem.
Int. J. Inf. Sec., 2013

KAMU: providing advanced user privacy in Kerberos multi-domain scenarios.
Int. J. Inf. Sec., 2013

A Wireless System for Secure Electronic Healthcare Records Management.
Int. J. Adv. Pervasive Ubiquitous Comput., 2013

IT convergence and security.
Electron. Commer. Res., 2013

Attacks and Countermeasures on 802.16: Analysis and Assessment.
IEEE Commun. Surv. Tutorials, 2013

From keyloggers to touchloggers: Take the rough with the smooth.
Comput. Secur., 2013

DNS amplification attack revisited.
Comput. Secur., 2013

Revisiting lightweight authentication protocols based on hard learning problems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Privacy in the Cloud: Bridging the Gap between Design and Implementation.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
SIPA: generic and secure accounting for SIP.
Secur. Commun. Networks, 2012

Security and privacy in emerging information technologies.
Secur. Commun. Networks, 2012

Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
Secur. Commun. Networks, 2012

Aligning Security and Privacy to Support the Development of Secure Information Systems.
J. Univers. Comput. Sci., 2012

Guest Editorial.
J. Networks, 2012

MILC: A secure and privacy-preserving mobile instant locator with chatting.
Inf. Syst. Frontiers, 2012

Special issue on ubiquitous multimedia services.
Inf. Syst. Frontiers, 2012

Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing Students.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Applying Soft Computing Technologies for Implementing Privacy-Aware Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

Privacy Preservation by k-Anonymization of Weighted Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Network security and digital forensics in next generation communications.
Wirel. Commun. Mob. Comput., 2011

Digital privacy: theory, policies and technologies.
Requir. Eng., 2011

On the Typical Statistic Features for Image Blind Steganalysis.
IEEE J. Sel. Areas Commun., 2011

Guest Editorial.
J. Multim., 2011

Secure Electronic Healthcare Records Management in Wireless Environments.
J. Inf. Technol. Res., 2011

The significance of user-defined identifiers in Java source code authorship identification.
Comput. Syst. Sci. Eng., 2011

PrivaSIP: Ad-hoc identity privacy in SIP.
Comput. Stand. Interfaces, 2011

A Survey on Cluster-Based Group Key Agreement Protocols for WSNs.
IEEE Commun. Surv. Tutorials, 2011

PrivaKERB: A user privacy framework for Kerberos.
Comput. Secur., 2011

DoS attacks exploiting signaling in UMTS and IMS.
Comput. Commun., 2011

Special issue on soft computing for information system security.
Appl. Soft Comput., 2011

A soft computing approach for privacy requirements engineering: The PriS framework.
Appl. Soft Comput., 2011

Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned Databases.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

iSAM: An iPhone Stealth Airborne Malware.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Designing secure RFID authentication protocols is (still) a non-trivial task.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Hybrid trust and reputation management for sensor networks.
Wirel. Networks, 2010

Towards adaptive security for convergent wireless sensor networks in beyond 3G environments.
Wirel. Commun. Mob. Comput., 2010

A framework for identity privacy in SIP.
J. Netw. Comput. Appl., 2010

Device Authentication In Wireless And Pervasive Environments.
Intell. Autom. Soft Comput., 2010

Information and communications security, privacy and trust: Standards and regulations.
Comput. Stand. Interfaces, 2010

Privacy-enhanced fast re-authentication for EAP-based next generation network.
Comput. Commun., 2010

Special issue on multimedia networking and security in convergent networks.
Comput. Commun., 2010

Revisiting WiMAX MBS security.
Comput. Math. Appl., 2010

An Agent Based Back-End RFID Tag Management System.
Proceedings of the Trust, 2010

IS'10 - PC Co-chairs Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Unifying ISO Security Standards Practices into a Single Security Framework.
Proceedings of the South African Information Security Multi-Conference, 2010

Attaching Multiple Personal Identifiers in X.509 Digital Certificates.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era.
Proceedings of the Electronic Government and the Information Systems Perspective, 2010

2009
Multimedia Security in Communication (MUSIC).
J. Univers. Comput. Sci., 2009

Data Security and Privacy Protection in Pervasive Computing Environments.
J. Univers. Comput. Sci., 2009

Pandora: An SMS-oriented m-informational system for educational realms.
J. Netw. Comput. Appl., 2009

Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Res., 2009

Security analysis of the song-mitchell authentication protocol for low-cost RFID tags.
IEEE Commun. Lett., 2009

Accurate and large-scale privacy-preserving data mining using the election paradigm.
Data Knowl. Eng., 2009

A generic accounting scheme for next generation networks.
Comput. Networks, 2009

A Cluster-Based Framework for the Security of Medical Sensor Environments.
Proceedings of the Trust, 2009

Signaling-Oriented DoS Attacks in UMTS Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

End to end secure communication in ad-hoc assistive medical environments using secure paths.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Methods for Designing Privacy Aware Information Systems: A Review.
Proceedings of the PCI 2009, 2009

IS 2009 - PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

A Hierarchical Model for Cross-Domain Communication of Health Care Units.
Proceedings of the Third International Conference on Network and System Security, 2009

Trust-Based Data Disclosure in Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Information Systems Security Management: A Review and a Classification of the ISO Standards.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

2008
IEEE 802.11 Wireless LANs (WLANs): Security.
Encyclopedia of Wireless and Mobile Communications, 2008

Enabling the provision of secure web based m-health services utilizing XML based security models.
Secur. Commun. Networks, 2008

Addressing privacy requirements in system design: the PriS method.
Requir. Eng., 2008

Examining the significance of high-level programming features in source code author classification.
J. Syst. Softw., 2008

Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification.
J. Comput. Secur., 2008

Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach.
Int. J. Syst. Syst. Eng., 2008

Specifying and implementing privacy-preserving cryptographic protocols.
Int. J. Inf. Sec., 2008

Privacy and forensics investigation process: The ERPINA protocol.
Comput. Stand. Interfaces, 2008

Situation awareness mechanisms for wireless sensor networks.
IEEE Commun. Mag., 2008

Message from the SecPri Workshop Organizing Technical Co-chairs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A new Accounting Mechanism for Modern and Future AAA Services.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections.
Proceedings of the Privacy in Statistical Databases, 2008

Privacy Protection in Context Transfer Protocol.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

Binary tree based public-key management for Mobile Ad Hoc Networks.
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008

Caller identity privacy in SIP heterogeneous realms: A practical solution.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
Proceedings of the Computer Security, 2008

Clustering Oriented Architectures in Medical Sensor Environments.
Proceedings of the The Third International Conference on Availability, 2008

2007
Integration of non-repudiation services in mobile DRM scenarios.
Telecommun. Syst., 2007

Towards a flexible trust establishment framework for sensor networks.
Telecommun. Syst., 2007

A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec., 2007

Preface.
Int. J. Inf. Sec., 2007

Providing secure mAccess to medical information.
Int. J. Electron. Heal., 2007

Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method.
Int. J. Digit. EVid., 2007

Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks.
IEEE Commun. Surv. Tutorials, 2007

A framework for protecting a SIP-based infrastructure against malformed message attacks.
Comput. Networks, 2007

A PKI approach for deploying modern secure distributed e-learning and m-learning environments.
Comput. Educ., 2007

On Device Authentication in Wireless Networks: Present Issues and Future Challenges.
Proceedings of the Trust, 2007

Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains.
Proceedings of the Trust, 2007

Towards effective Wireless Intrusion Detection in IEEE 802.11i.
Proceedings of the Third International Workshop on Security, 2007

On RSN-Oriented Wireless Intrusion Detection.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Two privacy enhanced context transfer schemes.
Proceedings of the Q2SWinet'07, 2007

A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Detecting DNS Amplification Attacks.
Proceedings of the Critical Information Infrastructures Security, 2007

Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments.
Proceedings of the Advances in Computer Science, 2007

Securing Medical Sensor Environments: The CodeBlue Framework Case.
Proceedings of the The Second International Conference on Availability, 2007

Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process.
Proceedings of the The Second International Conference on Availability, 2007

2006
Developing a culture of privacy in the Global Village.
Telematics Informatics, 2006

Incorporating privacy requirements into the system design process: The PriS conceptual framework.
Internet Res., 2006

Public Key Infrastructure: Research and Applications.
Int. J. Inf. Sec., 2006

Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

Survey of security vulnerabilities in session initiation protocol.
IEEE Commun. Surv. Tutorials, 2006

Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks.
Comput. Commun., 2006

Support of subscribers' certificates in a hybrid WLAN-3G environment.
Comput. Networks, 2006

A Framework for Exploiting Security Expertise in Application Development.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Source Code Author Identification Based on N-gram Author Profiles.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Optimized Multi-Domain Secure Interoperation using Soft Constraints.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Effective identification of source code authors using byte-level information.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Requirements and Challenges in the Design of Privacy-aware Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Trust Establishment in Ad Hoc and Sensor Networks.
Proceedings of the Critical Information Infrastructures Security, 2006

Performance evaluation of a distributed OCSP protocol over MANETs.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

An ontology for secure e-government applications.
Proceedings of the The First International Conference on Availability, 2006

2005
Withdrawing a declaration of will: Towards a framework for digital signature revocation.
Internet Res., 2005

A generic Grid security policy reconciliation framework.
Internet Res., 2005

A good-practice guidance on the use of PKI services in the public sector of the European Union member states.
Inf. Manag. Comput. Security, 2005

Deploying pervasive secure knowledge management infrastructures.
Int. J. Pervasive Comput. Commun., 2005

A formal model for pricing information systems insurance contracts.
Comput. Stand. Interfaces, 2005

Distributed component architectures security issues.
Comput. Stand. Interfaces, 2005

Specifying Privacy-Preserving Protocols in Typed MSR.
Comput. Stand. Interfaces, 2005

Specifying electronic voting protocols in typed MSR.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains.
Proceedings of the Trust, 2005

Workflow Based Security Incident Management.
Proceedings of the Advances in Informatics, 2005

A framework for detecting malformed messages in SIP networks.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005

Evaluation of digital certificates acquisition in large-scale 802.11-3GPP hybrid environments.
Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks, 2005

Pervasive Secure Electronic Healthcare Records Management.
Proceedings of the Ubiquitous Computing, 2005

Secure and distributed knowledge management in pervasive environments.
Proceedings of the International Conference on Pervasive Services 2005, 2005

Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information.
Proceedings of the ICETE 2005, 2005

Employing Ontologies for the Development of Security Critical Applications.
Proceedings of the Challenges of Expanding Internet: E-Commerce, 2005

Introducing Ontology-based Security Policy Management in the Grid.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Incorporating Security Requirements Into the Software Development Process.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

2004
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks.
Wirel. Pers. Commun., 2004

Mechanisms for controlling access in the global grid environment.
Internet Res., 2004

Enhancing Web privacy and anonymity in the digital era.
Inf. Manag. Comput. Secur., 2004

Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems.
EURASIP J. Wirel. Commun. Netw., 2004

How Much Should We Pay for Security? (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Delivering Attribute Certificates over GPRS.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Enhancing Knowledge Management Through the Use of GIS and Multimedia.
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004

Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems.
Proceedings of the NETWORKING 2004, 2004

Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process.
Proceedings of the ICETE 2004, 2004

Implementing Knowledge Management Techniques for Security Purposes.
Proceedings of the ICEIS 2004, 2004

Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks.
Proceedings of the Electronic Government: Third International Conference, 2004

Towards a Privacy Audit Programmes Comparison Framework.
Proceedings of the Electronic Government: Third International Conference, 2004

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.
Proceedings of the Communications and Multimedia Security, 2004

2003
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.
Comput. Commun., 2003

Towards a framework for evaluating certificate status information mechanisms.
Comput. Commun., 2003

ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information.
Comput. Commun., 2003

Introducing PKI to Enhance Security in Future Mobile Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Security Policy Configuration Issues in Grid Computing Environments.
Proceedings of the Computer Safety, 2003

GRID Security Review.
Proceedings of the Computer Network Security, 2003

Privacy Enhancing Technologies: A Review.
Proceedings of the Electronic Government, Second International Conference, 2003

Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Quality assured trusted third parties for deploying secure internet-based healthcare applications.
Int. J. Medical Informatics, 2002

Security Requirements of e-Government Services: An Organizational Framework.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Using SSL/TLS in authentication and key agreement procedures of future mobile networks.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

2001
Risk management for new information technology insertion in a shipping company.
Oper. Res., 2001

A digital seal solution for deploying trust on commercial transactions.
Inf. Manag. Comput. Secur., 2001

Towards an ISO-9000 compliant certification service provider.
Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), 2001

2000
Distributed component software security issues on deploying a secure electronic marketplace.
Inf. Manag. Comput. Secur., 2000

Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture.
Comput. Secur., 2000

1999
Architectures for secure portable executable content.
Internet Res., 1999

Security requirements, risks and recommendations for small enterprise and home-office environments.
Inf. Manag. Comput. Secur., 1999

Trusted third party services for deploying secure telemedical applications over the WWW.
Comput. Secur., 1999

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification.
Comput. Commun., 1999

1998
Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl.
ACM SIGOPS Oper. Syst. Rev., 1998

The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction.
Microprocess. Microsystems, 1998

Towards Secure Downloadable Executable Content: The Java Paradigm.
Proceedings of the Computer Safety, 1998

Addressing Security Issues in Programming Languages for Mobile Code.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1997
Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools.
Proceedings of the 16th International Conference on Computer Safety, 1997

1996
Security profile for interconnected open distributed systems with varying vulnerability.
Proceedings of the Information Systems Security, 1996

1992
A zero knowledge probabilistic login protocol.
Comput. Secur., 1992


  Loading...