![]() |
| 2003 | ||
|---|---|---|
| 4 | Simeon Xenitellis, Pita Jarupunphol: Security Vulnerabilities in the Trust-List PKI. Security and Management 2003: 72-77 | |
| 3 | EE | Simeon Xenitellis: Identifying security vulnerabilities through input flow tracing and analysis. Inf. Manag. Comput. Security 11(4): 195-199 (2003) |
| 2002 | ||
| 2 | Simeon Xenitellis: Security Vulnerabilities in Event-Driven Systems. SEC 2002: 147-160 | |
| 1999 | ||
| 1 | Constantinos Markantonakis, Simeon Xenitellis: Implementing a Secure Log File Download Manager for the Java Card. Communications and Multimedia Security 1999: 143-162 | |
| 1 | Pita Jarupunphol | [4] |
| 2 | Constantinos Markantonakis | [1] |