2009 | ||
---|---|---|
45 | EE | Stelios Dritsas, Vicky Dritsou, Bill Tsoumas, P. Constantopoulos, Dimitris Gritzalis: OntoSPIT: SPIT management through ontologies. Computer Communications 32(1): 203-212 (2009) |
2008 | ||
44 | EE | Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis: An Adaptive Policy-Based Approach to SPIT Management. ESORICS 2008: 446-460 |
43 | EE | Stelios Dritsas, Yannis Soupionis, Marianthi Theoharidou, Yannis Mallios, Dimitris Gritzalis: SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. SEC 2008: 381-395 |
42 | EE | Dimitris Gritzalis, Yannis Mallios: A SIP-oriented SPIT Management Framework. Computers & Security 27(5-6): 136-153 (2008) |
2007 | ||
41 | EE | Dimitrios Lekkas, Dimitris Gritzalis: E-Passports as a Means Towards the First World-Wide Public Key Infrastructure. EuroPKI 2007: 34-48 |
40 | EE | Giannis F. Marias, Stelios Dritsas, Marianthi Theoharidou, John Mallios, Dimitris Gritzalis: SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment. ICCCN 2007: 597-604 |
39 | EE | Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis: Threat Analysis of the Session Initiation Protocol Regarding Spam. IPCCC 2007: 426-433 |
38 | EE | Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis: Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33 |
37 | EE | Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis: A CBK for Information Security and Critical Infrastructure Protection. World Conference on Information Security Education 2007: 49-56 |
2006 | ||
36 | EE | Bill Tsoumas, Dimitris Gritzalis: Towards an Ontology-based Security Management. AINA (1) 2006: 985-992 |
35 | EE | Bill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis: Security-by-Ontology: A Knowledge-Centric Approach. SEC 2006: 99-110 |
34 | EE | Stelios Dritsas, John Tsaparas, Dimitris Gritzalis: A Generic Privacy Enhancing Technology for Pervasive Computing Environments. TrustBus 2006: 103-113 |
33 | EE | Stelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics and Informatics 23(3): 196-210 (2006) |
2005 | ||
32 | EE | Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis: An Ontology-Based Approach to Information Systems Security Management. MMM-ACNS 2005: 151-164 |
31 | EE | Dimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos: Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Transactions on Information Technology in Biomedicine 9(3): 413-423 (2005) |
2004 | ||
30 | EE | Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis: Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. EuroPKI 2004: 287-296 |
29 | EE | Dimitrios Lekkas, Dimitris Gritzalis: Cumulative notarization for long-term preservation of digital signatures. Computers & Security 23(5): 413-424 (2004) |
28 | EE | Dimitris Gritzalis: Embedding privacy in IT applications development. Inf. Manag. Comput. Security 12(1): 8-26 (2004) |
2003 | ||
27 | Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas: Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece Kluwer 2003 | |
26 | EE | Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas: Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471 |
25 | EE | Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis: A Knowledge-Based Repository Model for Security Policies Management. MMM-ACNS 2003: 112-121 |
24 | EE | John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis: Towards a framework for evaluating certificate status information mechanisms. Computer Communications 26(16): 1839-1850 (2003) |
23 | EE | John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis: ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Computer Communications 26(16): 1851-1862 (2003) |
2002 | ||
22 | EE | Costas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. DEXA Workshops 2002: 435 |
21 | L. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas: Revisiting Legal and Regulatory Requirements for Secure E-Voting. SEC 2002: 469-480 | |
20 | S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou: Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520 | |
19 | Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos: Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78 | |
18 | Diomidis Spinellis, Dimitris Gritzalis: Panoptis: Intrusion Detection Using a Domain-Specific Language. Journal of Computer Security 10(1/2): 159-176 (2002) | |
2001 | ||
17 | EE | Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis: A Privacy-Enhancing e-Business Model Based on Infomediaries. MMM-ACNS 2001: 72-83 |
16 | EE | Dimitris Gritzalis, Nikolaos Kyrloglou: Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. SCCC 2001: 115-123 |
15 | Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos: Pythia: Towards Anonymity in Authentication. SEC 2001: 1-18 | |
14 | EE | Stefanos Gritzalis, Dimitris Gritzalis: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Security 9(2): 71-79 (2001) |
2000 | ||
13 | EE | John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas: Evaluating certificate status information mechanisms. ACM Conference on Computer and Communications Security 2000: 1-8 |
12 | Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis: A Qualitative Approach to Information Availability. SEC 2000: 37-48 | |
1999 | ||
11 | EE | Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas: Trusted third party services for deploying secure telemedical applications over the WWW. Computers & Security 18(7): 627-639 (1999) |
1997 | ||
10 | EE | Dimitris Gritzalis: A baseline security policy for distributed healthcare information systems. Computers & Security 16(8): 709-719 (1997) |
1996 | ||
9 | Sokratis K. Katsikas, Dimitris Gritzalis: Information Systems Security, Facing the information society of the 21st Century Chapman & Hall 1996 | |
8 | Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis: Attack Modelling in Open Network Environments. Communications and Multimedia Security 1996: 268-277 | |
7 | EE | Dimitris Gritzalis, Sokratis K. Katsikas: Towards a formal system-to-system authentication protocol. Computer Communications 19(12): 954-961 (1996) |
6 | EE | Sokratis K. Katsikas, Thomas Spyrou, Dimitris Gritzalis, John Darzentas: Model for network behaviour under viral attack. Computer Communications 19(2): 124-132 (1996) |
1995 | ||
5 | EE | Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Design of a neural network for recognition and classification of computer viruses. Computers & Security 14(5): 435-448 (1995) |
1994 | ||
4 | EE | Michel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis: Intrusion detection: Approach and performance issues of the SECURENET system. Computers & Security 13(6): 495-508 (1994) |
1992 | ||
3 | EE | Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras: Determining access rights for medical information systems. Computers & Security 11(2): 149-161 (1992) |
2 | EE | Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis: A zero knowledge probabilistic login protocol. Computers & Security 11(8): 733-745 (1992) |
1991 | ||
1 | EE | Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou: Data security in medical information systems: The Greek case. Computers & Security 10(2): 141-159 (1991) |