2008 |
78 | EE | Eleni Klaoudatou,
Elisavet Konstantinou,
Georgios Kambourakis,
Stefanos Gritzalis:
Clustering Oriented Architectures in Medical Sensor Environments.
ARES 2008: 929-934 |
77 | EE | Athanassios N. Yannacopoulos,
Costas Lambrinoudakis,
Stefanos Gritzalis,
Stylianos Z. Xanthopoulos,
Sokratis K. Katsikas:
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.
ESORICS 2008: 207-222 |
76 | EE | Giorgos Karopoulos,
Georgios Kambourakis,
Stefanos Gritzalis:
Caller identity privacy in SIP heterogeneous realms: A practical solution.
ISCC 2008: 37-43 |
75 | EE | Giorgos Karopoulos,
Georgios Kambourakis,
Stefanos Gritzalis:
Privacy Protection in Context Transfer Protocol.
PDP 2008: 590-596 |
74 | EE | Alexandros Tsakountakis,
Georgios Kambourakis,
Stefanos Gritzalis:
A new Accounting Mechanism for Modern and Future AAA Services.
SEC 2008: 693-697 |
73 | EE | Peter Mueller,
Kaisa Nyberg,
Stefanos Gritzalis,
Costas Lambrinoudakis:
Message from the SecPri Workshop Organizing Technical Co-chairs.
WiMob 2008 |
72 | EE | Theodoros Balopoulos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Specifying and implementing privacy-preserving cryptographic protocols.
Int. J. Inf. Sec. 7(6): 395-420 (2008) |
71 | EE | Petros Belsis,
Kostas Fragos,
Stefanos Gritzalis,
Christos Skourlas:
Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification.
Journal of Computer Security 16(6): 761-790 (2008) |
70 | EE | Georgia Frantzeskou,
Stephen G. MacDonell,
Efstathios Stamatatos,
Stefanos Gritzalis:
Examining the significance of high-level programming features in source code author classification.
Journal of Systems and Software 81(3): 447-460 (2008) |
69 | EE | Christos Kalloniatis,
Evangelia Kavakli,
Stefanos Gritzalis:
Addressing privacy requirements in system design: the PriS method.
Requir. Eng. 13(3): 241-255 (2008) |
68 | EE | Demosthenes Vouyioukas,
Georgios Kambourakis,
Ilias Maglogiannis,
Angelos N. Rouskas,
Constantinos Kolias,
Stefanos Gritzalis:
Enabling the provision of secure web based m-health services utilizing XML based security models.
Security and Communication Networks 1(5): 375-388 (2008) |
2007 |
67 | EE | Christos Kalloniatis,
Evangelia Kavakli,
Stefanos Gritzalis:
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process.
ARES 2007: 1009-1017 |
66 | EE | Georgios Kambourakis,
Eleni Klaoudatou,
Stefanos Gritzalis:
Securing Medical Sensor Environments: The CodeBlue Framework Case.
ARES 2007: 637-643 |
65 | EE | Petros Belsis,
Stefanos Gritzalis,
Christos Skourlas,
Vassilis Tsoukalas:
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments.
ASIAN 2007: 261-267 |
64 | EE | Maria Karyda,
Stefanos Gritzalis,
Jong Hyuk Park:
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
EUC Workshops 2007: 12-21 |
63 | EE | Alexandros Tsakountakis,
Georgios Kambourakis,
Stefanos Gritzalis:
On RSN-Oriented Wireless Intrusion Detection.
OTM Conferences (2) 2007: 1601-1615 |
62 | EE | Giorgos Karopoulos,
Georgios Kambourakis,
Stefanos Gritzalis:
Two privacy enhanced context transfer schemes.
Q2SWinet 2007: 172-175 |
61 | EE | Petros Belsis,
Stefanos Gritzalis,
Christos Skourlas,
Vassilis Tsoukalas:
Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains.
TrustBus 2007: 125-134 |
60 | EE | Georgios Kambourakis,
Stefanos Gritzalis:
On Device Authentication in Wireless Networks: Present Issues and Future Challenges.
TrustBus 2007: 135-144 |
59 | EE | Dimitris Geneiatakis,
Georgios Kambourakis,
Costas Lambrinoudakis,
Tasos Dagiuklas,
Stefanos Gritzalis:
A framework for protecting a SIP-based infrastructure against malformed message attacks.
Computer Networks 51(10): 2580-2593 (2007) |
58 | EE | Petros Belsis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation.
Electr. Notes Theor. Comput. Sci. 179: 75-86 (2007) |
57 | EE | Georgia Frantzeskou,
Efstathios Stamatatos,
Stefanos Gritzalis,
Carole E. Chaski,
Blake Stephen Howald:
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method.
IJDE 6(1): (2007) |
56 | EE | Meletis A. Belsis,
Ashish N. Dwivedi,
Stefanos Gritzalis,
Rajeev K. Bali,
Raouf N. Gorgui-Naguib:
Providing secure mAccess to medical information.
IJEH 3(1): 51-71 (2007) |
55 | EE | Stefanos Gritzalis,
Athanassios N. Yannacopoulos,
Costas Lambrinoudakis,
P. Hatzopoulos,
Sokratis K. Katsikas:
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments.
Int. J. Inf. Sec. 6(4): 197-211 (2007) |
54 | EE | Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Preface.
Int. J. Inf. Sec. 6(6): 359-360 (2007) |
53 | EE | Jose Antonio Onieva,
Javier Lopez,
Rodrigo Roman,
Jianying Zhou,
Stefanos Gritzalis:
Integration of non-repudiation services in mobile DRM scenarios.
Telecommunication Systems 35(3-4): 161-176 (2007) |
52 | EE | Efthimia Aivaloglou,
Stefanos Gritzalis,
Charalabos Skianis:
Towards a flexible trust establishment framework for sensor networks.
Telecommunication Systems 35(3-4): 207-213 (2007) |
2006 |
51 | | Sokratis K. Katsikas,
Javier Lopez,
Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Springer 2006 |
50 | EE | Georgia Frantzeskou,
Efstathios Stamatatos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Source Code Author Identification Based on N-gram Author Profiles.
AIAI 2006: 508-515 |
49 | EE | Petros Belsis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Optimized Multi-Domain Secure Interoperation using Soft Constraints.
AIAI 2006: 78-85 |
48 | EE | Maria Karyda,
Theodoros Balopoulos,
Lazaros Gymnopoulos,
Spyros Kokolakis,
Costas Lambrinoudakis,
Stefanos Gritzalis,
Stelios Dritsas:
An ontology for secure e-government applications.
ARES 2006: 1033-1037 |
47 | EE | Efthimia Aivaloglou,
Stefanos Gritzalis,
Charalabos Skianis:
Trust Establishment in Ad Hoc and Sensor Networks.
CRITIS 2006: 179-194 |
46 | EE | Efthimia Aivaloglou,
Stefanos Gritzalis,
Charalabos Skianis:
Requirements and Challenges in the Design of Privacy-aware Sensor Networks.
GLOBECOM 2006 |
45 | EE | Georgia Frantzeskou,
Efstathios Stamatatos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Effective identification of source code authors using byte-level information.
ICSE 2006: 893-896 |
44 | EE | Petros Belsis,
Kostas Fragos,
Stefanos Gritzalis,
Christos Skourlas:
SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering.
SAC 2006: 354-360 |
43 | EE | Theodoros Balopoulos,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis,
Sokratis K. Katsikas:
A Framework for Exploiting Security Expertise in Application Development.
TrustBus 2006: 62-70 |
42 | EE | Dimitris Fotakis,
Stefanos Gritzalis:
Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks.
Computer Communications 29(11): 2109-2122 (2006) |
41 | EE | Georgios Kambourakis,
Angelos N. Rouskas,
Stefanos Gritzalis,
Dimitris Geneiatakis:
Support of subscribers' certificates in a hybrid WLAN-3G environment.
Computer Networks 50(11): 1843-1859 (2006) |
40 | EE | Stefanos Gritzalis:
Public Key Infrastructure: Research and Applications.
Int. J. Inf. Sec. 5(1): 1-2 (2006) |
39 | EE | Stefanos Gritzalis:
Developing a culture of privacy in the Global Village.
Telematics and Informatics 23(3): 157-163 (2006) |
2005 |
38 | | Lazaros Gymnopoulos,
Stefanos Gritzalis:
Introducing Ontology-based Security Policy Management in the Grid.
ECIW 2005: 107-116 |
37 | | Theodoros Balopoulos,
Stelios Dritsas,
Lazaros Gymnopoulos,
Maria Karyda,
Spyros Kokolakis,
Stefanos Gritzalis:
Incorporating Security Requirements Into the Software Development Process.
ECIW 2005: 21-28 |
36 | | Georgia Frantzeskou,
Efstathios Stamatatos,
Stefanos Gritzalis:
Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information.
ICETE 2005: 283-290 |
35 | | Petros Belsis,
Apostolos Malatras,
Stefanos Gritzalis,
Christos Skourlas,
Ioannis Chalaris:
Pervasive Secure Electronic Healthcare Records Management.
IWUC 2005: 101-109 |
34 | EE | Meletis A. Belsis,
Alkis Simitsis,
Stefanos Gritzalis:
Workflow Based Security Incident Management.
Panhellenic Conference on Informatics 2005: 684-694 |
33 | EE | Petros Belsis,
Stefanos Gritzalis,
Apostolos Malatras,
Christos Skourlas,
Ioannis Chalaris:
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains.
TrustBus 2005: 10-19 |
32 | EE | Theodoros Balopoulos,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Specifying electronic voting protocols in typed MSR.
WPES 2005: 35-39 |
2004 |
31 | | Sokratis K. Katsikas,
Stefanos Gritzalis,
Javier Lopez:
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings
Springer 2004 |
30 | EE | Konstantina Kabouraki,
Stefanos Gritzalis,
Konstantinos Moulinos:
Towards a Privacy Audit Programmes Comparison Framework.
EGOV 2004: 328-331 |
29 | EE | Christos Kalloniatis,
Evangelia Kavakli,
Stefanos Gritzalis:
Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks.
EGOV 2004: 66-71 |
28 | | Petros Belsis,
Stefanos Gritzalis,
Christos Skourlas,
Ioannis Drakopoulos:
Implementing Knowledge Management Techniques for Security Purposes.
ICEIS (2) 2004: 535-540 |
27 | | Georgia Frantzeskou,
Stefanos Gritzalis:
Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process.
ICETE (2) 2004: 85-92 |
26 | EE | Georgios Kambourakis,
Angelos N. Rouskas,
Stefanos Gritzalis:
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems.
NETWORKING 2004: 13-24 |
25 | EE | Petros Belsis,
Stefanos Gritzalis,
Apostolos Malatras,
Christos Skourlas,
Ioannis Chalaris:
Enhancing Knowledge Management Through the Use of GIS and Multimedia.
PAKM 2004: 319-329 |
24 | EE | Georgios Kambourakis,
Angelos N. Rouskas,
Stefanos Gritzalis:
Delivering Attribute Certificates over GPRS.
SAC 2004: 1166-1170 |
2003 |
23 | EE | Theodoros Balopoulos,
Stefanos Gritzalis:
Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols.
DEXA Workshops 2003: 396-401 |
22 | EE | John Argyrakis,
Stefanos Gritzalis,
Chris Kioulafas:
Privacy Enhancing Technologies: A Review.
EGOV 2003: 282-287 |
21 | EE | Lazaros Gymnopoulos,
Stelios Dritsas,
Stefanos Gritzalis,
Costas Lambrinoudakis:
GRID Security Review.
MMM-ACNS 2003: 100-111 |
20 | EE | G. Angelis,
Stefanos Gritzalis,
Costas Lambrinoudakis:
Security Policy Configuration Issues in Grid Computing Environments.
SAFECOMP 2003: 331-341 |
19 | | Georgios Kambourakis,
Angelos N. Rouskas,
Stefanos Gritzalis:
Introducing PKI to Enhance Security in Future Mobile Networks.
SEC 2003: 109-120 |
18 | EE | John Iliadis,
Stefanos Gritzalis,
Diomidis Spinellis,
Danny De Cock,
Bart Preneel,
Dimitris Gritzalis:
Towards a framework for evaluating certificate status information mechanisms.
Computer Communications 26(16): 1839-1850 (2003) |
17 | EE | John Iliadis,
Stefanos Gritzalis,
Dimitris Gritzalis:
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information.
Computer Communications 26(16): 1851-1862 (2003) |
16 | EE | Costas Lambrinoudakis,
Stefanos Gritzalis,
Fredj Dridi,
Günther Pernul:
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy.
Computer Communications 26(16): 1873-1883 (2003) |
2002 |
15 | EE | Georgios Kambourakis,
Angelos N. Rouskas,
Stefanos Gritzalis:
Using SSL/TLS in authentication and key agreement procedures of future mobile networks.
MWCN 2002: 152-156 |
14 | | Stefanos Gritzalis,
Costas Lambrinoudakis:
Security Requirements of e-Government Services: An Organizational Framework.
PDPTA 2002: 127-131 |
2001 |
13 | | Dimitrios Lekkas,
Stefanos Gritzalis,
Sokratis K. Katsikas:
Towards an ISO-9000 compliant certification service provider.
HERCMA 2001: 390-397 |
12 | EE | Stefanos Gritzalis,
Dimitris Gritzalis:
A digital seal solution for deploying trust on commercial transactions.
Inf. Manag. Comput. Security 9(2): 71-79 (2001) |
11 | EE | Nikitas Nikitakos,
Stefanos Gritzalis:
Risk management for new information technology insertion in a shipping company.
Operational Research 1(1): 7-16 (2001) |
2000 |
10 | | Stefanos Gritzalis,
Sokratis K. Katsikas,
Dimitrios Lekkas,
Konstantinos Moulinos,
Eleni Polydoro:
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture.
Computers & Security 19(8): 731-746 (2000) |
9 | EE | Stefanos Gritzalis,
John Iliadis,
Spyros Oikonomopoulos:
Distributed component software security issues on deploying a secure electronic marketplace.
Inf. Manag. Comput. Security 8(1): 5-13 (2000) |
1999 |
8 | EE | Stefanos Gritzalis,
Diomidis Spinellis,
Panagiotis Georgiadis:
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification.
Computer Communications 22(8): 697-709 (1999) |
7 | EE | Diomidis Spinellis,
Stefanos Gritzalis,
John Iliadis,
Dimitris Gritzalis,
Sokratis K. Katsikas:
Trusted third party services for deploying secure telemedical applications over the WWW.
Computers & Security 18(7): 627-639 (1999) |
6 | EE | Diomidis Spinellis,
Spyros Kokolakis,
Stefanos Gritzalis:
Security requirements, risks and recommendations for small enterprise and home-office environments.
Inf. Manag. Comput. Security 7(3): 121-128 (1999) |
1998 |
5 | | Stefanos Gritzalis,
John Iliadis:
Addressing Security Issues in Programming Languages for Mobile Code.
DEXA Workshop 1998: 288-293 |
4 | EE | John Iliadis,
Stefanos Gritzalis,
V. Oikonomou:
Towards Secure Downloadable Executable Content: The Java Paradigm.
SAFECOMP 1998: 117-127 |
3 | | Stefanos Gritzalis,
George Aggelis:
Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl.
Operating Systems Review 32(2): 16-32 (1998) |
1996 |
2 | | Nikitas Nikitakos,
Stefanos Gritzalis,
Panagiotis Georgiadis:
Security profile for interconnected open distributed systems with varying vulnerability.
SEC 1996: 428-437 |
1992 |
1 | EE | Dimitris Gritzalis,
Sokratis K. Katsikas,
Stefanos Gritzalis:
A zero knowledge probabilistic login protocol.
Computers & Security 11(8): 733-745 (1992) |