dblp.uni-trier.dewww.uni-trier.de

Stefanos Gritzalis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
78EEEleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis: Clustering Oriented Architectures in Medical Sensor Environments. ARES 2008: 929-934
77EEAthanassios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas: Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ESORICS 2008: 207-222
76EEGiorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Caller identity privacy in SIP heterogeneous realms: A practical solution. ISCC 2008: 37-43
75EEGiorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Privacy Protection in Context Transfer Protocol. PDP 2008: 590-596
74EEAlexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis: A new Accounting Mechanism for Modern and Future AAA Services. SEC 2008: 693-697
73EEPeter Mueller, Kaisa Nyberg, Stefanos Gritzalis, Costas Lambrinoudakis: Message from the SecPri Workshop Organizing Technical Co-chairs. WiMob 2008
72EETheodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying and implementing privacy-preserving cryptographic protocols. Int. J. Inf. Sec. 7(6): 395-420 (2008)
71EEPetros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas: Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. Journal of Computer Security 16(6): 761-790 (2008)
70EEGeorgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos, Stefanos Gritzalis: Examining the significance of high-level programming features in source code author classification. Journal of Systems and Software 81(3): 447-460 (2008)
69EEChristos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13(3): 241-255 (2008)
68EEDemosthenes Vouyioukas, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis: Enabling the provision of secure web based m-health services utilizing XML based security models. Security and Communication Networks 1(5): 375-388 (2008)
2007
67EEChristos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. ARES 2007: 1009-1017
66EEGeorgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis: Securing Medical Sensor Environments: The CodeBlue Framework Case. ARES 2007: 637-643
65EEPetros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas: Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. ASIAN 2007: 261-267
64EEMaria Karyda, Stefanos Gritzalis, Jong Hyuk Park: A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. EUC Workshops 2007: 12-21
63EEAlexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis: On RSN-Oriented Wireless Intrusion Detection. OTM Conferences (2) 2007: 1601-1615
62EEGiorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Two privacy enhanced context transfer schemes. Q2SWinet 2007: 172-175
61EEPetros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas: Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. TrustBus 2007: 125-134
60EEGeorgios Kambourakis, Stefanos Gritzalis: On Device Authentication in Wireless Networks: Present Issues and Future Challenges. TrustBus 2007: 135-144
59EEDimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis: A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks 51(10): 2580-2593 (2007)
58EEPetros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas: Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. Electr. Notes Theor. Comput. Sci. 179: 75-86 (2007)
57EEGeorgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Carole E. Chaski, Blake Stephen Howald: Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method. IJDE 6(1): (2007)
56EEMeletis A. Belsis, Ashish N. Dwivedi, Stefanos Gritzalis, Rajeev K. Bali, Raouf N. Gorgui-Naguib: Providing secure mAccess to medical information. IJEH 3(1): 51-71 (2007)
55EEStefanos Gritzalis, Athanassios N. Yannacopoulos, Costas Lambrinoudakis, P. Hatzopoulos, Sokratis K. Katsikas: A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Int. J. Inf. Sec. 6(4): 197-211 (2007)
54EEMichael Backes, Stefanos Gritzalis, Bart Preneel: Preface. Int. J. Inf. Sec. 6(6): 359-360 (2007)
53EEJose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007)
52EEEfthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Towards a flexible trust establishment framework for sensor networks. Telecommunication Systems 35(3-4): 207-213 (2007)
2006
51 Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Springer 2006
50EEGeorgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas: Source Code Author Identification Based on N-gram Author Profiles. AIAI 2006: 508-515
49EEPetros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas: Optimized Multi-Domain Secure Interoperation using Soft Constraints. AIAI 2006: 78-85
48EEMaria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas: An ontology for secure e-government applications. ARES 2006: 1033-1037
47EEEfthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Trust Establishment in Ad Hoc and Sensor Networks. CRITIS 2006: 179-194
46EEEfthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Requirements and Challenges in the Design of Privacy-aware Sensor Networks. GLOBECOM 2006
45EEGeorgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas: Effective identification of source code authors using byte-level information. ICSE 2006: 893-896
44EEPetros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas: SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering. SAC 2006: 354-360
43EETheodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas: A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70
42EEDimitris Fotakis, Stefanos Gritzalis: Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks. Computer Communications 29(11): 2109-2122 (2006)
41EEGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis, Dimitris Geneiatakis: Support of subscribers' certificates in a hybrid WLAN-3G environment. Computer Networks 50(11): 1843-1859 (2006)
40EEStefanos Gritzalis: Public Key Infrastructure: Research and Applications. Int. J. Inf. Sec. 5(1): 1-2 (2006)
39EEStefanos Gritzalis: Developing a culture of privacy in the Global Village. Telematics and Informatics 23(3): 157-163 (2006)
2005
38 Lazaros Gymnopoulos, Stefanos Gritzalis: Introducing Ontology-based Security Policy Management in the Grid. ECIW 2005: 107-116
37 Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis: Incorporating Security Requirements Into the Software Development Process. ECIW 2005: 21-28
36 Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis: Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. ICETE 2005: 283-290
35 Petros Belsis, Apostolos Malatras, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris: Pervasive Secure Electronic Healthcare Records Management. IWUC 2005: 101-109
34EEMeletis A. Belsis, Alkis Simitsis, Stefanos Gritzalis: Workflow Based Security Incident Management. Panhellenic Conference on Informatics 2005: 684-694
33EEPetros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris: Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. TrustBus 2005: 10-19
32EETheodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying electronic voting protocols in typed MSR. WPES 2005: 35-39
2004
31 Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings Springer 2004
30EEKonstantina Kabouraki, Stefanos Gritzalis, Konstantinos Moulinos: Towards a Privacy Audit Programmes Comparison Framework. EGOV 2004: 328-331
29EEChristos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks. EGOV 2004: 66-71
28 Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Drakopoulos: Implementing Knowledge Management Techniques for Security Purposes. ICEIS (2) 2004: 535-540
27 Georgia Frantzeskou, Stefanos Gritzalis: Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process. ICETE (2) 2004: 85-92
26EEGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. NETWORKING 2004: 13-24
25EEPetros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris: Enhancing Knowledge Management Through the Use of GIS and Multimedia. PAKM 2004: 319-329
24EEGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Delivering Attribute Certificates over GPRS. SAC 2004: 1166-1170
2003
23EETheodoros Balopoulos, Stefanos Gritzalis: Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols. DEXA Workshops 2003: 396-401
22EEJohn Argyrakis, Stefanos Gritzalis, Chris Kioulafas: Privacy Enhancing Technologies: A Review. EGOV 2003: 282-287
21EELazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis: GRID Security Review. MMM-ACNS 2003: 100-111
20EEG. Angelis, Stefanos Gritzalis, Costas Lambrinoudakis: Security Policy Configuration Issues in Grid Computing Environments. SAFECOMP 2003: 331-341
19 Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Introducing PKI to Enhance Security in Future Mobile Networks. SEC 2003: 109-120
18EEJohn Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis: Towards a framework for evaluating certificate status information mechanisms. Computer Communications 26(16): 1839-1850 (2003)
17EEJohn Iliadis, Stefanos Gritzalis, Dimitris Gritzalis: ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Computer Communications 26(16): 1851-1862 (2003)
16EECostas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications 26(16): 1873-1883 (2003)
2002
15EEGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Using SSL/TLS in authentication and key agreement procedures of future mobile networks. MWCN 2002: 152-156
14 Stefanos Gritzalis, Costas Lambrinoudakis: Security Requirements of e-Government Services: An Organizational Framework. PDPTA 2002: 127-131
2001
13 Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas: Towards an ISO-9000 compliant certification service provider. HERCMA 2001: 390-397
12EEStefanos Gritzalis, Dimitris Gritzalis: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Security 9(2): 71-79 (2001)
11EENikitas Nikitakos, Stefanos Gritzalis: Risk management for new information technology insertion in a shipping company. Operational Research 1(1): 7-16 (2001)
2000
10 Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro: Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. Computers & Security 19(8): 731-746 (2000)
9EEStefanos Gritzalis, John Iliadis, Spyros Oikonomopoulos: Distributed component software security issues on deploying a secure electronic marketplace. Inf. Manag. Comput. Security 8(1): 5-13 (2000)
1999
8EEStefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis: Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications 22(8): 697-709 (1999)
7EEDiomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas: Trusted third party services for deploying secure telemedical applications over the WWW. Computers & Security 18(7): 627-639 (1999)
6EEDiomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis: Security requirements, risks and recommendations for small enterprise and home-office environments. Inf. Manag. Comput. Security 7(3): 121-128 (1999)
1998
5 Stefanos Gritzalis, John Iliadis: Addressing Security Issues in Programming Languages for Mobile Code. DEXA Workshop 1998: 288-293
4EEJohn Iliadis, Stefanos Gritzalis, V. Oikonomou: Towards Secure Downloadable Executable Content: The Java Paradigm. SAFECOMP 1998: 117-127
3 Stefanos Gritzalis, George Aggelis: Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl. Operating Systems Review 32(2): 16-32 (1998)
1996
2 Nikitas Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis: Security profile for interconnected open distributed systems with varying vulnerability. SEC 1996: 428-437
1992
1EEDimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis: A zero knowledge probabilistic login protocol. Computers & Security 11(8): 733-745 (1992)

Coauthor Index

1George Aggelis [3]
2Efthimia Aivaloglou [46] [47] [52]
3G. Angelis [20]
4John Argyrakis [22]
5Michael Backes [51] [54]
6Rajeev K. Bali [56]
7Theodoros Balopoulos [23] [32] [37] [43] [48] [72]
8Meletis A. Belsis [34] [56]
9Petros Belsis [25] [28] [33] [35] [44] [49] [58] [61] [65] [71]
10Ioannis Chalaris [25] [33] [35]
11Carole E. Chaski [57]
12Danny De Cock [18]
13Tasos Dagiuklas [59]
14Ioannis Drakopoulos [28]
15Fredj Dridi [16]
16Stelios Dritsas [21] [37] [48]
17Ashish N. Dwivedi [56]
18Dimitris Fotakis [42]
19Kostas Fragos [44] [71]
20Georgia Frantzeskou [27] [36] [45] [50] [57] [70]
21Dimitris Geneiatakis [41] [59]
22Panagiotis Georgiadis [2] [8]
23Raouf N. Gorgui-Naguib [56]
24Dimitris Gritzalis [1] [7] [12] [17] [18]
25Lazaros Gymnopoulos [21] [37] [38] [43] [48]
26P. Hatzopoulos [55]
27Blake Stephen Howald [57]
28John Iliadis [4] [5] [7] [9] [17] [18]
29Konstantina Kabouraki [30]
30Christos Kalloniatis [29] [67] [69]
31Georgios Kambourakis [15] [19] [24] [26] [41] [59] [60] [62] [63] [66] [68] [74] [75] [76] [78]
32Giorgos Karopoulos [62] [75] [76]
33Maria Karyda [37] [43] [48] [64]
34Sokratis K. Katsikas [1] [7] [10] [13] [31] [32] [43] [45] [49] [50] [51] [55] [58] [72] [77]
35Evangelia Kavakli [29] [67] [69]
36Chris Kioulafas [22]
37Eleni Klaoudatou [66] [78]
38Spyros Kokolakis [6] [37] [43] [48]
39Constantinos Kolias [68]
40Elisavet Konstantinou [78]
41Costas Lambrinoudakis [14] [16] [20] [21] [48] [55] [59] [73] [77]
42Dimitrios Lekkas [10] [13]
43Javier Lopez [31] [51] [53]
44Stephen G. MacDonell [70]
45Ilias Maglogiannis [68]
46Apostolos Malatras [25] [33] [35]
47Konstantinos Moulinos [10] [30]
48Peter Mueller [73]
49Nikitas Nikitakos [2] [11]
50Kaisa Nyberg [73]
51Spyros Oikonomopoulos [9]
52V. Oikonomou [4]
53Jose Antonio Onieva [53]
54Jong Hyuk Park [64]
55Günther Pernul [16]
56Eleni Polydoro [10]
57Bart Preneel [18] [51] [54]
58Rodrigo Roman [53]
59Angelos N. Rouskas [15] [19] [24] [26] [41] [68]
60Alkis Simitsis [34]
61Charalabos Skianis [46] [47] [52]
62Christos Skourlas [25] [28] [33] [35] [44] [61] [65] [71]
63Diomidis Spinellis [6] [7] [8] [18]
64Efstathios Stamatatos [36] [45] [50] [57] [70]
65Alexandros Tsakountakis [63] [74]
66Vassilis Tsoukalas [61] [65]
67Demosthenes Vouyioukas [68]
68Stylianos Z. Xanthopoulos [77]
69Athanassios N. Yannacopoulos [55] [77]
70Jianying Zhou [53]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)