2009 |
45 | EE | Stelios Dritsas,
Vicky Dritsou,
Bill Tsoumas,
P. Constantopoulos,
Dimitris Gritzalis:
OntoSPIT: SPIT management through ontologies.
Computer Communications 32(1): 203-212 (2009) |
2008 |
44 | EE | Yannis Soupionis,
Stelios Dritsas,
Dimitris Gritzalis:
An Adaptive Policy-Based Approach to SPIT Management.
ESORICS 2008: 446-460 |
43 | EE | Stelios Dritsas,
Yannis Soupionis,
Marianthi Theoharidou,
Yannis Mallios,
Dimitris Gritzalis:
SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned.
SEC 2008: 381-395 |
42 | EE | Dimitris Gritzalis,
Yannis Mallios:
A SIP-oriented SPIT Management Framework.
Computers & Security 27(5-6): 136-153 (2008) |
2007 |
41 | EE | Dimitrios Lekkas,
Dimitris Gritzalis:
E-Passports as a Means Towards the First World-Wide Public Key Infrastructure.
EuroPKI 2007: 34-48 |
40 | EE | Giannis F. Marias,
Stelios Dritsas,
Marianthi Theoharidou,
John Mallios,
Dimitris Gritzalis:
SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment.
ICCCN 2007: 597-604 |
39 | EE | Stelios Dritsas,
John Mallios,
Marianthi Theoharidou,
Giannis F. Marias,
Dimitris Gritzalis:
Threat Analysis of the Session Initiation Protocol Regarding Spam.
IPCCC 2007: 426-433 |
38 | EE | Aggeliki Tsohou,
Marianthi Theoharidou,
Spyros Kokolakis,
Dimitris Gritzalis:
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.
TrustBus 2007: 24-33 |
37 | EE | Marianthi Theoharidou,
Eleftheria Stougiannou,
Dimitris Gritzalis:
A CBK for Information Security and Critical Infrastructure Protection.
World Conference on Information Security Education 2007: 49-56 |
2006 |
36 | EE | Bill Tsoumas,
Dimitris Gritzalis:
Towards an Ontology-based Security Management.
AINA (1) 2006: 985-992 |
35 | EE | Bill Tsoumas,
Panagiotis Papagiannakopoulos,
Stelios Dritsas,
Dimitris Gritzalis:
Security-by-Ontology: A Knowledge-Centric Approach.
SEC 2006: 99-110 |
34 | EE | Stelios Dritsas,
John Tsaparas,
Dimitris Gritzalis:
A Generic Privacy Enhancing Technology for Pervasive Computing Environments.
TrustBus 2006: 103-113 |
33 | EE | Stelios Dritsas,
Dimitris Gritzalis,
Costas Lambrinoudakis:
Protecting privacy and anonymity in pervasive computing: trends and perspectives.
Telematics and Informatics 23(3): 196-210 (2006) |
2005 |
32 | EE | Bill Tsoumas,
Stelios Dritsas,
Dimitris Gritzalis:
An Ontology-Based Approach to Information Systems Security Management.
MMM-ACNS 2005: 151-164 |
31 | EE | Dimitris Gritzalis,
Costas Lambrinoudakis,
Dimitrios Lekkas,
S. Deftereos:
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments.
IEEE Transactions on Information Technology in Biomedicine 9(3): 413-423 (2005) |
2004 |
30 | EE | Georgios Kambourakis,
Angelos N. Rouskas,
Dimitris Gritzalis:
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks.
EuroPKI 2004: 287-296 |
29 | EE | Dimitrios Lekkas,
Dimitris Gritzalis:
Cumulative notarization for long-term preservation of digital signatures.
Computers & Security 23(5): 413-424 (2004) |
28 | EE | Dimitris Gritzalis:
Embedding privacy in IT applications development.
Inf. Manag. Comput. Security 12(1): 8-26 (2004) |
2003 |
27 | | Dimitris Gritzalis,
Sabrina De Capitani di Vimercati,
Pierangela Samarati,
Sokratis K. Katsikas:
Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece
Kluwer 2003 |
26 | EE | Costas Lambrinoudakis,
Spyros Kokolakis,
Maria Karyda,
Vassilis Tsoumas,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Electronic Voting Systems: Security Implications of the Administrative Workflow.
DEXA Workshops 2003: 467-471 |
25 | EE | Spyros Kokolakis,
Costas Lambrinoudakis,
Dimitris Gritzalis:
A Knowledge-Based Repository Model for Security Policies Management.
MMM-ACNS 2003: 112-121 |
24 | EE | John Iliadis,
Stefanos Gritzalis,
Diomidis Spinellis,
Danny De Cock,
Bart Preneel,
Dimitris Gritzalis:
Towards a framework for evaluating certificate status information mechanisms.
Computer Communications 26(16): 1839-1850 (2003) |
23 | EE | John Iliadis,
Stefanos Gritzalis,
Dimitris Gritzalis:
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information.
Computer Communications 26(16): 1851-1862 (2003) |
2002 |
22 | EE | Costas Lambrinoudakis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Building a Reliable e-Voting System: Functional Requirements and Legal Constraints.
DEXA Workshops 2002: 435 |
21 | | L. Mitrou,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Revisiting Legal and Regulatory Requirements for Secure E-Voting.
SEC 2002: 469-480 |
20 | | S. Ikonomopoulos,
Costas Lambrinoudakis,
Dimitris Gritzalis,
Spyros Kokolakis,
K. Vassiliou:
Functional Requirements for a Secure Electronic Voting System.
SEC 2002: 507-520 |
19 | | Dimitris Gritzalis,
Maria Karyda,
Lazaros Gymnopoulos:
Elaborating Quantitative Approaches for IT Security Evaluation.
SEC 2002: 67-78 |
18 | | Diomidis Spinellis,
Dimitris Gritzalis:
Panoptis: Intrusion Detection Using a Domain-Specific Language.
Journal of Computer Security 10(1/2): 159-176 (2002) |
2001 |
17 | EE | Dimitris Gritzalis,
Konstantinos Moulinos,
Konstantinos Kostis:
A Privacy-Enhancing e-Business Model Based on Infomediaries.
MMM-ACNS 2001: 72-83 |
16 | EE | Dimitris Gritzalis,
Nikolaos Kyrloglou:
Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes.
SCCC 2001: 115-123 |
15 | | Dimitris Gritzalis,
Konstantinos Moulinos,
John Iliadis,
Costas Lambrinoudakis,
S. Xarhoulacos:
Pythia: Towards Anonymity in Authentication.
SEC 2001: 1-18 |
14 | EE | Stefanos Gritzalis,
Dimitris Gritzalis:
A digital seal solution for deploying trust on commercial transactions.
Inf. Manag. Comput. Security 9(2): 71-79 (2001) |
2000 |
13 | EE | John Iliadis,
Diomidis Spinellis,
Dimitris Gritzalis,
Bart Preneel,
Sokratis K. Katsikas:
Evaluating certificate status information mechanisms.
ACM Conference on Computer and Communications Security 2000: 1-8 |
12 | | Theodore Tryfonas,
Dimitris Gritzalis,
Spyros Kokolakis:
A Qualitative Approach to Information Availability.
SEC 2000: 37-48 |
1999 |
11 | EE | Diomidis Spinellis,
Stefanos Gritzalis,
John Iliadis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW.
Computers & Security 18(7): 627-639 (1999) |
1997 |
10 | EE | Dimitris Gritzalis:
A baseline security policy for distributed healthcare information systems.
Computers & Security 16(8): 709-719 (1997) |
1996 |
9 | | Sokratis K. Katsikas,
Dimitris Gritzalis:
Information Systems Security, Facing the information society of the 21st Century
Chapman & Hall 1996 |
8 | | Sokratis K. Katsikas,
Dimitris Gritzalis,
Paul G. Spirakis:
Attack Modelling in Open Network Environments.
Communications and Multimedia Security 1996: 268-277 |
7 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas:
Towards a formal system-to-system authentication protocol.
Computer Communications 19(12): 954-961 (1996) |
6 | EE | Sokratis K. Katsikas,
Thomas Spyrou,
Dimitris Gritzalis,
John Darzentas:
Model for network behaviour under viral attack.
Computer Communications 19(2): 124-132 (1996) |
1995 |
5 | EE | Anastasia Doumas,
Konstantinos Mavroudakis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Design of a neural network for recognition and classification of computer viruses.
Computers & Security 14(5): 435-448 (1995) |
1994 |
4 | EE | Michel Denault,
Dimitris Karagiannis,
Dimitris Gritzalis,
Paul G. Spirakis:
Intrusion detection: Approach and performance issues of the SECURENET system.
Computers & Security 13(6): 495-508 (1994) |
1992 |
3 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas,
J. Keklikoglou,
A. Tomaras:
Determining access rights for medical information systems.
Computers & Security 11(2): 149-161 (1992) |
2 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas,
Stefanos Gritzalis:
A zero knowledge probabilistic login protocol.
Computers & Security 11(8): 733-745 (1992) |
1991 |
1 | EE | Dimitris Gritzalis,
A. Tomaras,
Sokratis K. Katsikas,
J. Keklikoglou:
Data security in medical information systems: The Greek case.
Computers & Security 10(2): 141-159 (1991) |