2003 | ||
---|---|---|
4 | Simeon Xenitellis, Pita Jarupunphol: Security Vulnerabilities in the Trust-List PKI. Security and Management 2003: 72-77 | |
3 | EE | Simeon Xenitellis: Identifying security vulnerabilities through input flow tracing and analysis. Inf. Manag. Comput. Security 11(4): 195-199 (2003) |
2002 | ||
2 | Simeon Xenitellis: Security Vulnerabilities in Event-Driven Systems. SEC 2002: 147-160 | |
1999 | ||
1 | Constantinos Markantonakis, Simeon Xenitellis: Implementing a Secure Log File Download Manager for the Java Card. Communications and Multimedia Security 1999: 143-162 |
1 | Pita Jarupunphol | [4] |
2 | Constantinos Markantonakis | [1] |