2008 | ||
---|---|---|
78 | EE | Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis: Clustering Oriented Architectures in Medical Sensor Environments. ARES 2008: 929-934 |
77 | EE | Athanassios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas: Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ESORICS 2008: 207-222 |
76 | EE | Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Caller identity privacy in SIP heterogeneous realms: A practical solution. ISCC 2008: 37-43 |
75 | EE | Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Privacy Protection in Context Transfer Protocol. PDP 2008: 590-596 |
74 | EE | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis: A new Accounting Mechanism for Modern and Future AAA Services. SEC 2008: 693-697 |
73 | EE | Peter Mueller, Kaisa Nyberg, Stefanos Gritzalis, Costas Lambrinoudakis: Message from the SecPri Workshop Organizing Technical Co-chairs. WiMob 2008 |
72 | EE | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying and implementing privacy-preserving cryptographic protocols. Int. J. Inf. Sec. 7(6): 395-420 (2008) |
71 | EE | Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas: Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. Journal of Computer Security 16(6): 761-790 (2008) |
70 | EE | Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos, Stefanos Gritzalis: Examining the significance of high-level programming features in source code author classification. Journal of Systems and Software 81(3): 447-460 (2008) |
69 | EE | Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13(3): 241-255 (2008) |
68 | EE | Demosthenes Vouyioukas, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis: Enabling the provision of secure web based m-health services utilizing XML based security models. Security and Communication Networks 1(5): 375-388 (2008) |
2007 | ||
67 | EE | Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. ARES 2007: 1009-1017 |
66 | EE | Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis: Securing Medical Sensor Environments: The CodeBlue Framework Case. ARES 2007: 637-643 |
65 | EE | Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas: Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. ASIAN 2007: 261-267 |
64 | EE | Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park: A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. EUC Workshops 2007: 12-21 |
63 | EE | Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis: On RSN-Oriented Wireless Intrusion Detection. OTM Conferences (2) 2007: 1601-1615 |
62 | EE | Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Two privacy enhanced context transfer schemes. Q2SWinet 2007: 172-175 |
61 | EE | Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas: Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. TrustBus 2007: 125-134 |
60 | EE | Georgios Kambourakis, Stefanos Gritzalis: On Device Authentication in Wireless Networks: Present Issues and Future Challenges. TrustBus 2007: 135-144 |
59 | EE | Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis: A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks 51(10): 2580-2593 (2007) |
58 | EE | Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas: Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. Electr. Notes Theor. Comput. Sci. 179: 75-86 (2007) |
57 | EE | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Carole E. Chaski, Blake Stephen Howald: Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method. IJDE 6(1): (2007) |
56 | EE | Meletis A. Belsis, Ashish N. Dwivedi, Stefanos Gritzalis, Rajeev K. Bali, Raouf N. Gorgui-Naguib: Providing secure mAccess to medical information. IJEH 3(1): 51-71 (2007) |
55 | EE | Stefanos Gritzalis, Athanassios N. Yannacopoulos, Costas Lambrinoudakis, P. Hatzopoulos, Sokratis K. Katsikas: A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Int. J. Inf. Sec. 6(4): 197-211 (2007) |
54 | EE | Michael Backes, Stefanos Gritzalis, Bart Preneel: Preface. Int. J. Inf. Sec. 6(6): 359-360 (2007) |
53 | EE | Jose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007) |
52 | EE | Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Towards a flexible trust establishment framework for sensor networks. Telecommunication Systems 35(3-4): 207-213 (2007) |
2006 | ||
51 | Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Springer 2006 | |
50 | EE | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas: Source Code Author Identification Based on N-gram Author Profiles. AIAI 2006: 508-515 |
49 | EE | Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas: Optimized Multi-Domain Secure Interoperation using Soft Constraints. AIAI 2006: 78-85 |
48 | EE | Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas: An ontology for secure e-government applications. ARES 2006: 1033-1037 |
47 | EE | Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Trust Establishment in Ad Hoc and Sensor Networks. CRITIS 2006: 179-194 |
46 | EE | Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Requirements and Challenges in the Design of Privacy-aware Sensor Networks. GLOBECOM 2006 |
45 | EE | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas: Effective identification of source code authors using byte-level information. ICSE 2006: 893-896 |
44 | EE | Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas: SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering. SAC 2006: 354-360 |
43 | EE | Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas: A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70 |
42 | EE | Dimitris Fotakis, Stefanos Gritzalis: Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks. Computer Communications 29(11): 2109-2122 (2006) |
41 | EE | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis, Dimitris Geneiatakis: Support of subscribers' certificates in a hybrid WLAN-3G environment. Computer Networks 50(11): 1843-1859 (2006) |
40 | EE | Stefanos Gritzalis: Public Key Infrastructure: Research and Applications. Int. J. Inf. Sec. 5(1): 1-2 (2006) |
39 | EE | Stefanos Gritzalis: Developing a culture of privacy in the Global Village. Telematics and Informatics 23(3): 157-163 (2006) |
2005 | ||
38 | Lazaros Gymnopoulos, Stefanos Gritzalis: Introducing Ontology-based Security Policy Management in the Grid. ECIW 2005: 107-116 | |
37 | Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis: Incorporating Security Requirements Into the Software Development Process. ECIW 2005: 21-28 | |
36 | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis: Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. ICETE 2005: 283-290 | |
35 | Petros Belsis, Apostolos Malatras, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris: Pervasive Secure Electronic Healthcare Records Management. IWUC 2005: 101-109 | |
34 | EE | Meletis A. Belsis, Alkis Simitsis, Stefanos Gritzalis: Workflow Based Security Incident Management. Panhellenic Conference on Informatics 2005: 684-694 |
33 | EE | Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris: Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. TrustBus 2005: 10-19 |
32 | EE | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying electronic voting protocols in typed MSR. WPES 2005: 35-39 |
2004 | ||
31 | Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings Springer 2004 | |
30 | EE | Konstantina Kabouraki, Stefanos Gritzalis, Konstantinos Moulinos: Towards a Privacy Audit Programmes Comparison Framework. EGOV 2004: 328-331 |
29 | EE | Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks. EGOV 2004: 66-71 |
28 | Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Drakopoulos: Implementing Knowledge Management Techniques for Security Purposes. ICEIS (2) 2004: 535-540 | |
27 | Georgia Frantzeskou, Stefanos Gritzalis: Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process. ICETE (2) 2004: 85-92 | |
26 | EE | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. NETWORKING 2004: 13-24 |
25 | EE | Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris: Enhancing Knowledge Management Through the Use of GIS and Multimedia. PAKM 2004: 319-329 |
24 | EE | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Delivering Attribute Certificates over GPRS. SAC 2004: 1166-1170 |
2003 | ||
23 | EE | Theodoros Balopoulos, Stefanos Gritzalis: Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols. DEXA Workshops 2003: 396-401 |
22 | EE | John Argyrakis, Stefanos Gritzalis, Chris Kioulafas: Privacy Enhancing Technologies: A Review. EGOV 2003: 282-287 |
21 | EE | Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis: GRID Security Review. MMM-ACNS 2003: 100-111 |
20 | EE | G. Angelis, Stefanos Gritzalis, Costas Lambrinoudakis: Security Policy Configuration Issues in Grid Computing Environments. SAFECOMP 2003: 331-341 |
19 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Introducing PKI to Enhance Security in Future Mobile Networks. SEC 2003: 109-120 | |
18 | EE | John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis: Towards a framework for evaluating certificate status information mechanisms. Computer Communications 26(16): 1839-1850 (2003) |
17 | EE | John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis: ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Computer Communications 26(16): 1851-1862 (2003) |
16 | EE | Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications 26(16): 1873-1883 (2003) |
2002 | ||
15 | EE | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Using SSL/TLS in authentication and key agreement procedures of future mobile networks. MWCN 2002: 152-156 |
14 | Stefanos Gritzalis, Costas Lambrinoudakis: Security Requirements of e-Government Services: An Organizational Framework. PDPTA 2002: 127-131 | |
2001 | ||
13 | Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas: Towards an ISO-9000 compliant certification service provider. HERCMA 2001: 390-397 | |
12 | EE | Stefanos Gritzalis, Dimitris Gritzalis: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Security 9(2): 71-79 (2001) |
11 | EE | Nikitas Nikitakos, Stefanos Gritzalis: Risk management for new information technology insertion in a shipping company. Operational Research 1(1): 7-16 (2001) |
2000 | ||
10 | Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro: Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. Computers & Security 19(8): 731-746 (2000) | |
9 | EE | Stefanos Gritzalis, John Iliadis, Spyros Oikonomopoulos: Distributed component software security issues on deploying a secure electronic marketplace. Inf. Manag. Comput. Security 8(1): 5-13 (2000) |
1999 | ||
8 | EE | Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis: Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications 22(8): 697-709 (1999) |
7 | EE | Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas: Trusted third party services for deploying secure telemedical applications over the WWW. Computers & Security 18(7): 627-639 (1999) |
6 | EE | Diomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis: Security requirements, risks and recommendations for small enterprise and home-office environments. Inf. Manag. Comput. Security 7(3): 121-128 (1999) |
1998 | ||
5 | Stefanos Gritzalis, John Iliadis: Addressing Security Issues in Programming Languages for Mobile Code. DEXA Workshop 1998: 288-293 | |
4 | EE | John Iliadis, Stefanos Gritzalis, V. Oikonomou: Towards Secure Downloadable Executable Content: The Java Paradigm. SAFECOMP 1998: 117-127 |
3 | Stefanos Gritzalis, George Aggelis: Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl. Operating Systems Review 32(2): 16-32 (1998) | |
1996 | ||
2 | Nikitas Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis: Security profile for interconnected open distributed systems with varying vulnerability. SEC 1996: 428-437 | |
1992 | ||
1 | EE | Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis: A zero knowledge probabilistic login protocol. Computers & Security 11(8): 733-745 (1992) |