Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.


I & CT Security Conferences
SECRYPT 2014
11th INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
August 28-30, 2014, Vienna, Austria
CS2 2015
CS2 2015 : Second Workshop on Cryptography and Security in Computing Systems
Jan 19- 21, 2015, Amsterdam
ICICS 2015
The 6th IEEE International Conference on Information and Communication Systems
Apr 7-9, 2015, Amman, Jordan
IEEE S&P 2015
36th IEEE Symposium on Security and Privacy
May 18-20, 2015, THE FAIRMONT, SAN JOSE, CA
IFIP SEC 2015
IFIP SEC International Conference on ICT Systems Security and Privacy Protection
May 26-28, 2015, Hamburg, Germany
CSS 2015
The 7th International Symposium on Cyberspace Safety and Security (CSS 2015)
Aug 24-26, 2015, New York, USA
ISPEC 2015
The 11st Information Security Practice and Experience Conference
May 5-8, 2015, Beijing, China
ACNS 2015
Applied Cryptography and Network Security
Jun 2-5, 2015, New York, USA
...more
Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kabourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
26-10-2014
NSA-Approved Samsung Knox Stores PIN in Cleartext
26-10-2014
POODLE attack digs up downgrade flaw in TLS
26-10-2014
US Govt. probes medical devices for cyber flaws
24-10-2014
1.2 Million Networking Devices Vulnerable Due to NAT-PMP Issues
24-10-2014
NIST Seeks Comment on Hypervisor Security Guide
24-10-2014
DHS Investigating Cybersecurity Flaws in Medical Devices
24-10-2014
Malvertising Campaign Infected Visitors to Yahoo, Other Sites With Ransomware
19-10-2014
FBI Renews Call for Wider Wiretap Powers
19-10-2014
DTM Component Vulnerabilities Expose Critical Control Systems to Cyberattacks
19-10-2014
Researchers Hide Android Applications in Image Files
15-10-2014
Android Worm Masquerades as Google App
15-10-2014
Reflected File Download: New Attack Vector Enables File Downloads Without Upload
15-10-2014
Dropbox Denies It Was Hacked, Says Passwords Stolen From Other Services
10-10-2014
IBM Products Vulnerable to ShellShock
10-10-2014
2014 ICS Cyber Security Conference: Register Today to Hold Your Spot
10-10-2014
Critical Vulnerability Found in Cuckoo Sandbox
17-05-2014
Too Many Threats, Too Few Professionals
07-01-2014
Malware Attacks Deployed by “Advanced Power” Botnet
24-12-2013
The night before Christmas and all through the cloud, not a CISO was stirring, none clicking a mouse.
01-11-2013
Gartner: 'Five Styles of Advanced Threat Defense' can protect enterprise from targeted attacks
28-10-2013
Your body is the next frontier in cybercrime
25-10-2013
Android security relies on ZOMBIE CRYPTO, argues infosec pundit
25-10-2013
New EU rules to curb transfer of data to US after Edward Snowden revelations
25-10-2013
5 Skills Every Risk and Security Leader and Professional Should Develop to Be More Effective
25-10-2013
Thomas J. Trappler: Why physical security matters, even in the cloud
20-10-2013
What’s in a certificate chain and why?
12-10-2013
Japan in Dire Need of Cyber Security Pros

Special Issues
Computer Communications, Elsevier
Security and Privacy in Unified Communications: 'Challenges and Solutions'
...more


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2013