Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security

Welcome

Welcome to the home page of the "Info-Sec-Lab" Laboratory of Information & Communication Systems Security, Dept. of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, Greece.


I & CT Security Conferences
Conferences
Calendar of upcoming scientific conferences - Information Security
WorldWide
SECRYPT 2014
11th INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
August 28-30, 2014, Vienna, Austria
ISDF 2014
The International Conference in Information, Security, and Digital Forensics (ISDF2014)
Dec 12-14, 2014, AMC College Thessaloniki, Greece
CS2 2015
CS2 2015 : Second Workshop on Cryptography and Security in Computing Systems
Jan 19- 21, 2015, Amsterdam
...more
Members
Faculty Members
Postdoctoral Research Fellows
Postgraduate Research Fellows

Publications
Journals
Conferences
Books
Book Chapters
Conference Proceedings Editing

Research Areas

Our main research interests lie in the areas of:

  • Security and Privacy Economics
  • Secure eCommerce, eBusiness, eGovernment, eHealth
  • Privacy Technologies
  • Development of Secure Information Systems
  • Smart Cards Technologies
  • Security and Privacy Legal and Regulatory issues
  • Forensics Investigation; Internet Telephony Security
  • Wireless and Mobile Communications Security
  • Privacy and Trust in Wireless Sensor Networks
  • Security and Privacy in m-health environments
  • Formal Methods for the Analysis and Design of Cryptographic Protocols

Books (in English)
Digital Privacy: Theory, Technologies, and Practices
Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, Sabrina De Capitani di Vimercati (Eds.) Auerbach Publications, Taylor and Francis Group, January 2008

Security and Privacy in Mobile and Wireless Networking
Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis (Eds.) Troubador Publishing Ltd, February 2009


Books (in Greek)
Συγχρονη Κρυπτογραφία - Θεωρία και Εφαρμογές
Mike Burmester - Stefanos Gritzalis - Sokratis Katsikas - Vasileios Chrisikopoulos

Προστασία της Ιδιώτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών
Costas Lambrinoudakis - Lilian Mitrou - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Ασυρμάτων και Κινητών Δικτύων Επικοινωνιών
Georgios Kabourakis - Stefanos Gritzalis - Sokratis Katsikas

Ασφάλεια Δικτύων Υπολογιστών
Stefanos Gritzalis - Sokratis Katsikas - Dimitris Gritzalis

Ασφάλεια Πληροφοριακών Συστημάτων
Sokratis Katsikas - Dimitrios Gritzalis - Stefanos Gritzalis

Projects



News
31-08-2014
Feedback Friday: JPMorgan Targeted in Alleged Russian Cyberattack - Industry Reactions
31-08-2014
Many Wi-Fi Connections in Brazil Vulnerable to MitM Attacks: Researcher
31-08-2014
97,000 Bugzilla Testers' Data Dumped on Public Server
27-08-2014
Singapore Boosts Cyber Security After Hacking Incidents
27-08-2014
Short-Lived Websites Provide Cover for Malicious Activity: Blue Coat
27-08-2014
Google Patches 50 Security Vulnerabilities in Chrome Browser Update
25-08-2014
Sony PlayStation network brought down by a DDoS attack and President’s Plane diverted
25-08-2014
Feedback Friday: Heartbleed Exploited in Theft of 4.5M Patient Records - Industry Reactions
25-08-2014
Secret Service: Over 1,000 Business Infected With "Backoff" Point-of-sale Malware
25-08-2014
Philippines Hunts New Suspects in New 'Sextortion' Ring
21-08-2014
Hacking Into Traffic Lights With a Plain Old Laptop Is Scary Simple
21-08-2014
'Machete' Cyber Espionage Attacks Target Spanish-Speaking Countries
21-08-2014
Graphic Library Flaw Exposes Apps Created With Delphi, C++ Builder
21-08-2014
Hackers Exploited Heartbleed Bug to Steal 4.5 Million Patient Records: Report
17-08-2014
Google Bolsters Safe Browsing Service With New Alert for Suspicious Software
17-08-2014
New Bugat Malware Uses HTML Injections Taken From Gameover Zeus
17-08-2014
Bypassing Security Defenses: DEF CON
14-08-2014
BlackBerry Patches Authentication Bypass, Information Disclosure Vulnerabilities
14-08-2014
Kaseya Acquires Scorpion Software to Build Identity Management as a Service Business
14-08-2014
Android Trojan Krysanec Comes Disguised as Legitimate Apps
04-06-2014
Exclusive: U.S. companies seek cyber experts for top jobs, board seats
17-05-2014
Too Many Threats, Too Few Professionals
07-01-2014
Malware Attacks Deployed by “Advanced Power” Botnet
24-12-2013
The night before Christmas and all through the cloud, not a CISO was stirring, none clicking a mouse.
01-11-2013
Gartner: 'Five Styles of Advanced Threat Defense' can protect enterprise from targeted attacks
28-10-2013
Your body is the next frontier in cybercrime
25-10-2013
Android security relies on ZOMBIE CRYPTO, argues infosec pundit
25-10-2013
New EU rules to curb transfer of data to US after Edward Snowden revelations
25-10-2013
5 Skills Every Risk and Security Leader and Professional Should Develop to Be More Effective
25-10-2013
Thomas J. Trappler: Why physical security matters, even in the cloud
25-10-2013
How to Select a Strong Password Without Forgetting It
20-10-2013
What’s in a certificate chain and why?
12-10-2013
Japan in Dire Need of Cyber Security Pros
08-10-2013
The Cities With The Most Computer Science Jobs

Special Issues
Computer Communications, Elsevier
Security and Privacy in Unified Communications: Challenges and Solutions
...more


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2013