Vassilios Chrissikopoulos

According to our database1, Vassilios Chrissikopoulos authored at least 39 papers between 1992 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Emotions in Motion: The Combined Effect of Positive and Negative Emotions on Personalised E-Commerce.
Int. J. Online Mark., 2017

2014
Shiny happy people buying: the role of emotions on personalized e-shopping.
Electron. Mark., 2014

Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

2013
T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Assessing Emotions Related to Privacy and Trust in Personalized Services.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

2012
A Model for Hybrid Evidence Investigation.
Int. J. Digit. Crime Forensics, 2012

Modeling security in cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2012

Secure and privacy-preserving, timed vehicular communications.
Int. J. Ad Hoc Ubiquitous Comput., 2012

A Model for Hybrid Evidence Investigation.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Fair Anonymous Authentication for Location Based Services.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2009
Treating scalability and modelling human countermeasures against local preference worms via gradient models.
J. Comput. Virol., 2009

Accurate and large-scale privacy-preserving data mining using the election paradigm.
Data Knowl. Eng., 2009

A Novel Stochastic Approach for Modeling Random Scanning Worms.
Proceedings of the PCI 2009, 2009

2008
Strengthening Privacy Protection in VANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems.
Proceedings of the WEBIST 2008, 2008

Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections.
Proceedings of the Privacy in Statistical Databases, 2008

Design and Implementation Aspects of a Novel Java P2P Simulator with GUI.
Proceedings of the Panhellenic Conference on Informatics, 2008

2007
A spatial stochastic model for worm propagation: scale effects.
J. Comput. Virol., 2007

2006
Secure distributed intelligent networks.
Comput. Commun., 2006

2005
A Text Categorization Technique based on a Numerical Conversion of a Symbolic Expression and an Onion Layers Algorithm.
J. Digit. Inf., 2005

Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

2004
Uncoercible e-Bidding Games.
Electron. Commer. Res., 2004

2002
Interactive Search Results.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2002

2001
Secure medical digital libraries.
Int. J. Medical Informatics, 2001

Strong Forward Security.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Software-Based Receipt-Freeness in On-Line Elections.
Proceedings of the Advances in Network and Distributed Systems Security, 2001

Receipt-Freeness in Large-Scale Elections without Untappable Channels.
Proceedings of the Towards The E-Society: E-Commerce, 2001

An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions.
Proceedings of the Electronic Commerce and Web Technologies, 2001

Dynamic Multi-signatures for Secure Autonomous Agents.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
Secure linking of customers, merchants and banks in electronic commerce.
Future Gener. Comput. Syst., 2000

An Equitably Fair On-line Auction Scheme.
Proceedings of the Electronic Commerce and Web Technologies, 2000

Secure Transactions with Mobile Agents in Hostile Environments.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Parametric person identification from the EEG using computational geometry.
Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, 1999

Person identification based on parametric processing of the EEG.
Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, 1999

1998
A Digital Library Model for the Grey Literature of Academic Institutes.
Proceedings of the Research and Advanced Technology for Digital Libraries, 1998

1996
Security enforcement in a European medical device vigilance system network.
Proceedings of the Information Systems Security, 1996

Efficient and provably secure key agreement.
Proceedings of the Information Systems Security, 1996

Network Security in a Telemedicine System.
Proceedings of the Communications and Multimedia Security II, 1996

1992
An Efficient Public Key Distribution System.
Proceedings of the Education and Society, 1992


  Loading...