Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security
   
Publications
Journals
Conferences
Books
Chapter In Books
Conferences Proceedings Editor
Filter:

Year: Members:


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.

Journals

1D. Papamartzivanos, Félix Gómez Mármol, G. Kambourakis, Dendron: Genetic Trees driven Rule Induction for Network Intrusion Detection Systems, Future Generation Computer Systems, Vol. 79, No. 2, pp. 558-574, 2018, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167739X16305465
, indexed in SCI-E
2F. Giannakas, G. Kambourakis, A. Papasalouros, S. Gritzalis, A critical review of 13 years of Mobile Game-based Learning, Educational Technology Research and Development, Vol. 66, pp. 341-384, 2018, Springer,
http://rdcu.be/BdTM
, indexed in SCI-E, IF = TBD before next July
3G. Fotiadis, E. Konstantinou, TNFS Resistant Families of Pairing-Friendly Elliptic Curves, Journal of Theoretical Computer Science, 2018, Elsevier, (to appear)

4Pantaleone Nespoli, D. Papamartzivanos, Félix Gómez Mármol, G. Kambourakis, Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks, IEEE Communications Surveys and Tutorials, Vol. 20, No. 2, pp. 1361-1396, 2018, IEEE Press,
http://ieeexplore.ieee.org/document/8169023/
, indexed in SCI-E, IF = 17.188
5G. Fotiadis, E. Konstantinou, Generating Pairing-Friendly Elliptic Curve Parameters Using Sparse Families, Journal of Mathematical Cryptology, Vol. 12, No. 2, pp. 83-99, 2018, Walter de Gruyter GmbH, Berlin/Boston,
https://doi.org/10.1515/jmc-2017-0024

6S. Simou, C. Kalloniatis, S. Gritzalis, V. Katos, A Framework for Designing Cloud Forensics-enabled Services, Requirements Engineering, 2018, Springer,
https://link.springer.com/journal/766
, indexed in SCI-E, IF = TBD before next July
7A. Pattakou, C. Kalloniatis, S. Gritzalis, Security and Privacy under a Unified Framework: A Review, International Journal on Advances in Security, 2018, IARIA,
http://www.iariajournals.org/security/

8C. Kalloniatis, Kavroudakis D., Polydoropoulou A., S. Gritzalis, Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts, International Journal of Applied Geospatial Research, 2018, IGI Global,
https://www.igi-global.com/journal/international-journal-applied-geospatial-rese....

9R. Roman, J. Lopez, S. Gritzalis, Evolution and Trends in the Security of the Internet of Things, IEEE Computer, Vol. 51, No. 7, pp. 16-25, 2018, IEEE,
http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2
, indexed in SCI-E, IF = TBD before next July
10G. Tsekouras, Tsimikas I., C. Kalloniatis, S. Gritzalis, Interpretability Constraints for Fuzzy Modelling Implemented by Constrained Particle Swarm Optimization, IEEE Transactions on Fuzzy Systems, Vol. 26, No. 4, pp. 2348-2361, 2018, IEEE,
http://cis.ieee.org/ieee-transactions-on-fuzzy-systems.html
, indexed in SCI-E, IF = TBD before next July
11S. Islam, M. Ouedraogo, C. Kalloniatis, C. Mouratidis, S. Gritzalis, Assurance of Security and Privacy Requirements for Cloud Deployment Model, IEEE Transactions on Cloud Computing, Vol. 6, No. 2, pp. 387-400, 2018, IEEE Press,
http://www.computer.org/web/tcc
, indexed in SCI-E, IF = TBD before next July
12M. Sideri, A. Kitsiou , A. Filippopoulou, C. Kalloniatis, S. Gritzalis, E-Governance in educational settings. Greek educational organizations leadership’s perspectives towards social media usage for participatory decision-making, Internet Research, 2018, Emerald,
https://www.emeraldinsight.com/loi/intr#
, indexed in SCI-E, IF = TBD before next July
13P. Mavriki, M. Karyda, Big Data analysis in political communication: Implications for Group Privacy , International Journal of Electronic Governance, 2018, (to appear)

14A. Tsohou, E. Kosta, Enabling valid informed consent for location tracking through privacy awareness of users: A process theory, Computer Law & Security Review: The International Journal of Technology Law and Practice, 2017, (to appear),
http://www.sciencedirect.com/science/article/pii/S026736491730119X
, indexed in SCI-E, IF = 0.373
15C. Kolias, G. Kambourakis, A. Stavrou, J. Voas, DDoS in the IoT: Mirai and Other Botnets, IEEE Computer, Vol. 50, No. 7, pp. 80-84, 2017, IEEE Press,
https://www.computer.org/csdl/mags/co/2017/07/mco2017070080-abs.html
, indexed in SCI-E
16C. Kolias, V. Kolias, G. Kambourakis, TermID: A Distributed Swarm Intelligence Based Approach for Wireless Intrusion Detection, International Journal of Information Security, Vol. 16, No. 4, pp. 401-416, 2017, Springer,
https://link.springer.com/article/10.1007/s10207-016-0335-z?wt_mc=alerts.TOCjour....
, indexed in SCI-E, IF = TBD before next July
17S. A. Menesidou, V. Katos, G. Kambourakis, Cryptographic Key Management in Delay Tolerant Networks: A Survey, Future Internet, Vol. 9, No. 3, pp. 1-21, 2017, MDPI,
http://www.mdpi.com/1999-5903/9/3/26

18S. Vidros, C. Kolias, G. Kambourakis, L. Akoglu, Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset, Future Internet, 2017, MDPI,
http://www.mdpi.com/1999-5903/9/1/6

19A. Fakis, G. Karopoulos, G. Kambourakis, OnionSIP: Preserving privacy in SIP with Onion Routing, The Journal of Universal Computer Science (J.UCS), Vol. 23, No. 10, pp. 969-991, 2017, Verlag der Technischen Universität Graz,
http://www.jucs.org/jucs_23_10/onion_sip_preserving_privacy
, indexed in SCI-E, IF = 0.696
20Rahman A., S. Islam, C. Kalloniatis, S. Gritzalis, A Risk Management Approach for a Sustainable Cloud Migration, Journal of Risk and Financial Management, Vol. 10, No. 4, pp. 1-19, 2017, MDPI,
http://www.mdpi.com/journal/jrfm

21M. Sideri, A. Kitsiou , C. Kalloniatis, S. Gritzalis, Sharing secrets, revealing thoughts and feelings: Perceptions about disclosure practices and anonymity in a FB university students’ community, International Journal of Electronic Governance, Vol. 9, No. 3-4, pp. 361-384, 2017, Inderscience Publishers,
http://www.inderscience.com/info/inarticle.php?artid=88216

22K. Malagas, S. Gritzalis, N. Nikitakos, N. Nikitakos, The implementation of Goffee and Jones’s types of organizational culture in a Greek state-owned organization that introduced new technologies, Foundations of Management journal, Vol. 9, pp. 225-245, 2017, De Gruyter Publishing House,
https://www.degruyter.com/view/j/fman

23C. Kalloniatis, A. Pattakou, E. Kavakli, S. Gritzalis, Designing Secure and Privacy-aware Information Systems, International Journal of Secure Software Engineering, Vol. 8, No. 2, pp. 1-25, 2017, IGI Global,
https://www.igi-global.com/journal/international-journal-secure-software-enginee....

24C. Kolias, G. Kambourakis, A. Stavrou, S. Gritzalis, Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset, IEEE Communications Surveys and Tutorials, Vol. 18, No. 1, pp. 184-208, 2016, IEEE Press,
http://www.comsoc.org/cst
, indexed in SCI-E, IF = 17.188
25G. Kambourakis, D. Damopoulos, D. Papamartzivanos, M. Pavlidakis, Introducing Touchstroke: Keystroke-based Authentication System for Smartphones, Security and Communication Networks, Vol. 9, No. 6, pp. 542-554, 2016, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.1061/abstract
, indexed in SCI-E, IF = 1.067
26F. Giannakas, G. Kambourakis, A. Papasalouros, S. Gritzalis, Security education and awareness for K-6 going mobile, International Journal of Interactive Mobile Technologies, Vol. 10, No. 2, pp. 41-48, 2016, International Association of Online Engineering,
http://www.i-jim.org

27S. Vidros, C. Kolias, G. Kambourakis, Online Recruitment services; yet another playground for fraudsters?, Computer Fraud & Security, Vol. 2016, No. 3, pp. 8-13, 2016, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1361372316300252

28M. Anagnostopoulos, G. Kambourakis, S. Gritzalis, New facets of Mobile Botnet: Architecture and Evaluation, International Journal of Information Security, Vol. 15, No. 5, pp. 455-473, 2016, Springer,
http://link.springer.com/journal/10207
, indexed in SCI-E, IF = 1.915
29S. Simou, C. Kalloniatis, S. Gritzalis, C. Mouratidis, A Survey on Cloud Forensics Challenges and Solutions, Security and Communication Networks, 2016, Wiley,
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122
, indexed in SCI-E, IF = 1.067
30P. Diamantatos, E. Kavallieratou, S. Gritzalis, Skeleton Hinge Distribution for Writer Identification, International Journal on Artificial Intelligence Tools, Vol. 25, No. 3, pp. 1-14, 2016, Springer,
http://www.worldscientific.com/worldscinet/ijait
, indexed in SCI-E, IF = 0.778
31K. Malagas, S. Gritzalis, N. Nikitakos, How Institutional Factors that Emerge Within a Public Organization Affect the Use of an Innovation by its Employees: A Case Study of Olympic, TÉKHNE Review of Applied Management Studies, Vol. 13, No. 2, pp. 158-171, 2016, Elsevier,
http://www.sciencedirect.com/science/journal/16459911

32S. Kokolakis, Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon, Computers & Security, 2015, Elsevier, (to appear)
, indexed in SCI-E, IF = 1.035
33A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Managing the Introduction of Information Security Awareness Programs in Organisations, European Journal of Information Systems, Vol. 24, No. 1, pp. 38-58, 2015, Palgrave ,
https://www.researchgate.net/publication/257227930_Managing_the_introduction_of_....
, indexed in SCI-E, IF = 2.213
34Tsavli M., Efraimidis , V. Katos, L. Mitrou, Reengineering the user: privacy concerns about personal data on smartphones, Information and Computer Security, Vol. 23, No. 4, pp. 394-405, 2015, Emerald

35Z. Tsiatsikas, D. Geneiatakis, G. Kambourakis, A. Keromytis, An efficient and easily deployable method for dealing with DoS in SIP services, Computer Communications, Vol. 57, pp. 50-63, 2015, Elsevier,
http://www.journals.elsevier.com/computer-communications/
, indexed in SCI-E, IF = 2.099
36L. Ntalkos, G. Kambourakis, D. Damopoulos, Let, Telematics and Informatics, Vol. 32, No. 4, pp. 539-563, 2015, Elsevier,
http://www.journals.elsevier.com/telematics-and-informatics/
, indexed in SCI-E, IF = 2.261
37P. Drogkaris, S. Gritzalis, C. Kalloniatis, C. Lambrinoudakis, A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments, Future Internet , Vol. 7, No. 4, pp. 500-515, 2015, MDPI,
http://www.mdpi.com/1999-5903/7/4/500/html

38E. Kavakli, C. Kalloniatis, C. Mouratidis, S. Gritzalis, Privacy as an integral part for the implementation of cloud solutions, The Computer Journal, Vol. 58, No. 10, pp. 2213-2224, 2015, Oxford University Press,
http://comjnl.oxfordjournals.org/content/by/year
, indexed in SCI-E, IF = 1.443
39N. Nomikos, A. Nieto, P. Makris, D. N. Skoutas, D. Vouyioukas, P. Rizomiliotis, J. Lopez, C. Skianis, Relay selection for secure 5G green communications, Telecommunication Systems, Vol. 59, pp. 169-187, 2015, Springer,
http://rdcu.be/nMNV
, indexed in SCI-E, IF = 1.527
40A. Tsohou, M. Karyda, S. Kokolakis, Analyzing the role of Cognitive and Cultural Biases in the Internalization of Information Security Policies: Recommendations for Information Security Awareness Programs, Computers & Security, Vol. 52, pp. 128–141, 2015, Elsevier,
https://www.researchgate.net/publication/275898027_Analyzing_the_role_of_Cogniti....
, indexed in SCI-E, IF = 1.17
41G. Kambourakis, Anonymity and closely related terms in the Cyberspace: An analysis by example, Journal of Information Security and Applications, Vol. 19, No. 1, pp. 2-17, 2014, Elsevier,
http://www.sciencedirect.com/science/article/pii/S2214212614000209

42K. Vemou, M. Karyda, Guidelines and tools for incorporating privacy in Social Networking Platforms, IADIS International Journal on WWW/Internet, Vol. 12, No. 2, pp. 16-33, 2014,
http://www.iadisportal.org/ijwi/

43D. Kasiaras, T. Zafeiropoulos, N. Clarke, G. Kambourakis, Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices, International Journal for Information Security Research (IJISR), Vol. 4, No. 1-4, pp. 501-509, 2014, Infonomics Society,
http://www.infonomics-society.org/IJISR/

44D. Damopoulos, G. Kambourakis, S. Gritzalis, S. O. Park, Exposing mobile malware from the inside (or what is your mobile app really doing?), Peer-to-Peer Networking and Applications, Vol. 7, No. 4, pp. 687-697, 2014, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs12083-012-0179-x.pdf
, indexed in SCI-E, IF = 0.632
45N. Marangos, P. Rizomiliotis, L. Mitrou, Time Synchronization: Pivotal Element in Cloud Forensics, Security and Communication Networks , 2014, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.1056/abstract
, IF = 0.72
46Psaroudakis I., Saragiotis, V. Katos, L. Mitrou, A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description Protocol (SDP), International Journal of Electronic Security and Digital Forensics, Vol. 4, No. 6, pp. 241-267, 2014

47A. Tsohou, H. Lee, Z. Irani, Innovative Public Governance Through Cloud Computing: Information Privacy, Business Models and Performance Measurement Challenges, Transforming Government: People, Process and Policy, Vol. 8, No. 2, pp. 251-282, 2014, Emerald

48C. Kalloniatis, C. Mouratidis, V. Manousakis, S. Islam, S. Gritzalis, E. Kavakli, Towards the Design of Secure and Privacy-oriented Information Systems in the Cloud: Identifying the major concepts, Computer Standards and Interfaces, Vol. 36, No. 4, pp. 759-775, 2014, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548913001840
, indexed in SCI-E, IF = 0.879
49E. Rekleitis, P. Rizomiliotis, S. Gritzalis, How to Protect Security and Privacy in the Internet of Things: A Policy-based RFID tag management protocol, Security and Communication Networks, Vol. 7, No. 12, pp. 2669-2683, 2014, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.400/pdf
, indexed in SCI-E, IF = 0.72
50C. Kalloniatis, E. Kavakli, S. Gritzalis, Addressing Privacy in Traditional and Cloud-based Systems, International Journal of Applied Industrial Engineering, Vol. 2, No. 1, pp. 14-40, 2014, IGI Global,
http://www.igi-global.com/journal/international-journal-applied-industrial-engin....

51A. Panteli, M. Maragoudakis, S. Gritzalis, Privacy-Preserving Data Mining using Radial Basis Functions on Horizontally-partitioned Databases in the Malicious Model, International Journal on Artificial Intelligence Tools, Vol. 23, No. 5, pp. 1450007:1-22, 2014, World Scientific Publishing,
http://www.worldscientific.com/toc/ijait/23/05
, indexed in SCI-E, IF = 0.436
52G. Kambourakis, Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art, International Journal of u- and e- Service, Science and Technology, Vol. 6, No. 3, pp. 67-84, 2013, SERSC,
http://www.sersc.org/journals/IJUNESST/

53A. Tsohou, Lee H., Z. Irani, V. Weerakkody , I. Osman, A Anouze, Proposing a Reference Process Model for the Citizen-Centric Evaluation of E-Government Services, Transforming Government: People, Process and Policy, Vol. 7, No. 2, pp. 240-255, 2013, Emerald

54 K. Anastasopoulou, S. Kokolakis, Exploring Citizens’ Intention to Use e-Government Services: The Role of Cultural Bias, International Journal of Electronic Governance, Vol. 6, No. 1, pp. 3-19, 2013, Inderscience,
http://www.inderscience.com/info/inarticle.php?artid=53378

55A. Mylonas, V. Meletiadis, L. Mitrou, D. Gritzalis, Smartphone sensor data as digital evidence, Computers & Security (Special Issue: Cybercrime in the Digital Economy), Vol. 38, pp. 51-75, 2013

56L. Mitrou, Privacy by Design (in Greek), Media and Communication Law, Vol. 37 , pp. 14-25, 2013

57K. Malagas, K. Kourousis, G. Baxter, N. Nikitakos, S. Gritzalis, Τhe Introduction of Innovative Services in a State Owned Airline: A Case Study of a IT migration project, Journal of Technology Management & Innovation, Vol. 8, No. 2, pp. 74-83, 2013, Inderscience,
http://www.jotmi.org/index.php/GT/article/download/art306/759

58P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, Employing Privacy Policies and Preferences in Modern e-Government Environments, International Journal of Electronic Governance, Vol. 6, No. 2, pp. 101-116, 2013, Inderscience,
http://inderscience.metapress.com/content/r4j26m562126317k/

59D. Damopoulos, G. Kambourakis, M. Anagnostopoulos, S. Gritzalis, J. H. Park, User privacy and modern mobile services: Are they on the same path?, Personal and Ubiquitous Computing, Vol. 17, No. 7, pp. 1437-1448, 2013, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs00779-012-0579-1.pdf
, indexed in SCI-E, IF = 1.616
60K. Barbatsalou, D. Damopoulos, G. Kambourakis, V. Katos, A critical review of 7 years of Mobile Device Forensics, Digital Investigation, Vol. 10, No. 4, pp. 323-349, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1742287613001096
, indexed in SCI-E, IF = 0.986
61F. Pereniguez, R. Marin-Lopez, G. Kambourakis, A. Ruiz Martinez, S. Gritzalis, A. F. Gomez, KAMU: Providing Advanced User Privacy in Kerberos Multi-Domain Scenarios, International Journal of Information Security (IJIS), Vol. 12, No. 6, pp. 505-525, 2013, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10207-013-0201-1.pdf
, indexed in SCI-E, IF = 0.941
62M. Anagnostopoulos, G. Kambourakis, P. Kopanos, G. Louloudakis, S. Gritzalis, DNS Amplification Attack Revisited, Computers & Security, Vol. 39, pp. 475-485, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404813001405/pdfft?md5=695....
, indexed in SCI-E, IF = 1.172
63D. Damopoulos, G. Kambourakis, S. Gritzalis, From Keyloggers to Touchloggers: Take the Rough with the Smooth, Computers & Security, Vol. 32, pp. 102-114, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404812001654/pdfft?md5=4e7....
, indexed in SCI-E, IF = 1.172
64C. Mouratidis, S. Islam, C. Kalloniatis, S. Gritzalis, A Framework to support selection of Cloud Providers based on Security and Privacy Requirements, Journal of Systems and Software, Vol. 86, No. 9, pp. 2276-2293, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0164121213000575/pdfft?md5=723....
, indexed in SCI-E, IF = 1.245
65G. Karopoulos, P. Mori, F. Martinelli, Usage Control in SIP-based multimedia delivery, Computers & Security, Vol. 39, pp. 406-418, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S016740481300134X
, indexed in SCI-E, IF = 1.172
66C. Kolias, G. Kambourakis, S. Gritzalis, Attacks and Countermeasures on 802.16: Analysis and Assessment, IEEE Communications Surveys & Tutorials, Vol. 15, No. 1, pp. 487-514, 2013, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6170531&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 6.490
67P. Rizomiliotis, S. Gritzalis, On the security of AUTH, an authentication protocol based on the subspace LPN problem, International Journal of Information Security, Vol. 12, No. 2, pp. 151-154, 2013, Springer,
http://link.springer.com/article/10.1007/s10207-012-0188-z
, indexed in SCI-E, IF = 0.941
68P. Belsis, C. Skourlas, S. Gritzalis, A Wireless System for Secure Electronic Healthcare Records Management, International Journal of Advanced Pervasive and Ubiquitous Computing, Vol. 5, No. 4, pp. 16-32, 2013, IGI Global,
http://www.igi-global.com/journal/international-journal-advanced-pervasive-ubiqu....

69A. Tsohou, Lee H., K. Al-Yafi, V. Weerakkody , R. El-Haddadeh , Z. Irani, T. Medeni, L. Campos, Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries, International Journal of Electronic Government Research, Vol. 8, No. 3, pp. 63-77, 2012, IGI Global

70A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Analyzing Trajectories of Information Security Awareness, Information Technology & People, Vol. 25, No. 3, 2012, Emerald,
http://www.emeraldinsight.com/journals.htm?articleid=17047485&show=abstract
, indexed in SCI-E, IF = 0.767
71H. H. Chan, E. Konstantinou, A. Kontogeorgis, C. H. Tan, What is your “birthday elliptic curves”?, Finite Fields and Applications, Vol. 18, No. 6, 2012, Elsevier
, indexed in SCI-E
72A. Loukas, D. Damopoulos, S. A. Menesidou, Maria Eleni Skarkala, G. Kambourakis, S. Gritzalis, MILC: A Secure and Privacy-Preserving Mobile Instant Locator with Chatting, Information System Frontiers, Vol. 14, No. 3, pp. 481-497, 2012, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10796-010-9254-0.pdf
, indexed in SCI-E, IF = 0.851
73A. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, Flexible Convolutional Codes: Variable Rate and Complexity, IEEE Transactions on Communications, Vol. 3, pp. 608-613, 2012, IEEE Press,
doi:10.1109/TCOMM.2011.121211.110124
, indexed in SCI-E, IF = 1.979
74C. Mouratidis, C. Kalloniatis, S. Islam, M. P. Huget, S. Gritzalis, Aligning Security and Privacy to support the development of Secure Information Systems, Journal of Universal Computer Science, Vol. 18, No. 12, pp. 1608-1627, 2012, JUCS,
http://www.jucs.org/jucs_18_12/aligning_security_and_privacy/jucs_18_12_1608_162....
, indexed in SCI-E, IF = 0.762
75A. Tsakountakis, G. Kambourakis, S. Gritzalis, SIPA: Generic and Secure Accounting for SIP, Security and Communication Networks, Vol. 5, No. 9, pp. 1006-1027, 2012, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.387/pdf
, indexed in SCI-E, IF = 0.311
76D. Damopoulos, S. A. Menesidou, G. Kambourakis, M. Papadaki, N. Clarke, S. Gritzalis, Evaluation of Anomaly-Based IDS for Mobile Devices Using Machine Learning Classifiers, Security and Communication Networks, Vol. 5, No. 1, pp. 3-14, 2012, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.341/pdf
, indexed in SCI-E, IF = 0.311
77E. Konstantinou, Efficient Cluster-based Group Key Agreement Protocols for Wireless Ad Hoc Networks, Journal of Networks and Computer Applications, Vol. 34, No. 1, pp. 384-393, 2011, Elsevier
, indexed in SCI-E
78P. Belsis, D. Vassis, C. Skourlas, Identifying and Utilizing Secure paths in Ad-hoc Assistive Medical Environments, Security Communication Networks Journal , 2011, Wiley, (to appear),
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122
, indexed in SCI-E
79C. Kolias, G. Kambourakis, M. Maragoudakis, Swarm Intelligence in Intrusion Detection: A Survey, Computers & Security, Vol. 30, No. 8, pp. 625-642, 2011, Elsevier,
www.elsevier.com/locate/cose
, indexed in SCI-E, IF = 0.868
80V. Kolias, C. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, TELS: A Voice-Response Internet-based Learning System, Journal of Internet Technology, Vol. 12, No. 2, pp. 217-235, 2011, Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, ROC,
http://jit.ndhu.edu.tw/
, indexed in SCI-E, IF = 0.508
81I. Terzis, G. Kambourakis, G. Karopoulos, C. Lambrinoudakis, Privacy Preserving Context Transfer Schemes for 4G Networks, Wireless Communications and Mobile Computing, Vol. 11, No. 2, pp. 289–302, 2011, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/wcm.1019/abstract
, indexed in SCI-E, IF = 0.884
82E. Makri, E. Konstantinou, Constant Round Group Key Agreement Protocols: A Comparative Study, Computers and Security, Vol. 30, No. 8, pp. 643-678, 2011, Elsevier
, indexed in SCI-E
83E. Konstantinou, A. Kontogeorgis, Ramanujan Invariants for Discriminants Congruent to 5 mod 24, International Journal of Number Theory, Vol. 8, No. 1, 2011, World Scientific

84E. Konstantinou, A. Kontogeorgis, Some Remarks on the Construction of Class Field Polynomials, Advances in Mathematics of Communications, Vol. 5, No. 1, pp. 109-118, 2011
, indexed in SCI-E
85E. Klaoudatou, E. Konstantinou, G. Kambourakis, S. Gritzalis, A Survey on Cluster-based Group Key Agreement Protocols for WSNs, IEEE Communications Surveys and Tutorials, Vol. 13, No. 3, pp. 429-442, 2011, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5522466&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 6.311
86G. Kambourakis, C. Kolias, S. Gritzalis, J. H. Park, DoS Attacks Exploiting Signaling in UMTS and IMS, Computer Communications, Vol. 34, No. 3, pp. 226-235, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S014036641000085X/pdfft?md5=942....
, indexed in SCI-E, IF = 1.044
87G. Karopoulos, G. Kambourakis, S. Gritzalis, PrivaSIP: Ad-hoc Identity Privacy in SIP, Computer Standards and Interfaces, Vol. 33, No. 3, pp. 301-314, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548910000942/pdfft?md5=d68....
, indexed in SCI-E, IF = 1.257
88X. Luo, F. Liu, S. Lian, Yang C., S. Gritzalis, On the Typical Statistic Features for Image Blind Steganalysis, IEEE Journal on Selected Areas on Communications, Vol. 27, No. 7, pp. 1404-1422, 2011, IEEE,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5963160&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 3.413
89P. Belsis, C. Skourlas, S. Gritzalis, Secure electronic healthcare records management in wireless environments, Journal of Information Technology Research, Vol. 4, No. 4, pp. 1-17, 2011, IGI Global,
http://www.igi-global.com/article/secure-electronic-healthcare-records-managemen....

90C. Kalloniatis, P. Belsis, S. Gritzalis, A Soft Computing approach for Privacy Requirements Engineering, Journal of Applied Soft Computing, Vol. 11, No. 7, pp. 4341-4348, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S156849461000270X/pdfft?md5=de7....
, indexed in SCI-E, IF = 2.612
91G. Frantzeskou, S. MacDonell, E. Stamatatos, S. Georgiou, S. Gritzalis, The significance of user-defined identifiers in Java source code authorship identification, International Journal of Computer Systems Science and Engineering, Vol. 26, No. 2, pp. 139-148, 2011,
http://aut.researchgateway.ac.nz/bitstream/handle/10292/3469/Frantzeskou%20et%20....
, indexed in SCI-E, IF = 0.371
92F. Pereniguez, R. Marin-Lopez, G. Kambourakis, S. Gritzalis, A. F. Gomez, PrivaKERB: A User Privacy Framework for Kerberos, Computers & Security, Vol. 30, No. 6-7, pp. 446-463, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404811000617/pdfft?md5=774....
, indexed in SCI-E, IF = 0.868
93P. Rizomiliotis, On the Security of the Feng-Liao-Yang family of Boolean functions with optimal algebraic immunity against fast algebraic attacks, Designs, Codes and Cryptography, Vol. 57, No. 3, pp. 283-292, 2010, Springer,
http://www.springerlink.com/content/yj27532v5481857v/
, indexed in SCI-E, IF = 0.958
94P. Rizomiliotis, On the Resistance of Boolean Functions against Algebraic Attacks using Univariate Polynomial Representation, IEEE Transactions on Information Theory, Vol. 56, pp. 4014-4024, 2010, IEEE Press,
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5508623
, indexed in SCI-E, IF = 2.650
95A. Mitseva, E. Aivaloglou, A. Marchitti, N. R. Prasad, C. Skianis, S. Gritzalis, A. Waller, T. Bauge, S. Pennington, Towards Adaptive Security for Convergent Wireless Sensor Networks in Beyond 3G Environments, Wireless Communications and Mobile Computing, Vol. 10, No. 9, pp. 1193-1207, 2010, Wiley Inderscience,
http://onlinelibrary.wiley.com/doi/10.1002/wcm.678/pdf
, indexed in SCI-E, IF = 0.810
96A. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, New Constructions of High-Performance Low-Complexity Convolutional Codes, IEEE Transactions on Communications, Vol. 58, No. 7, pp. 1950 - 1961, 2010, IEEE Press,
doi:10.1109/TCOMM.2010.07.090149
, indexed in SCI-E, IF = 1.979
97P. Rizomiliotis, A. Bogris, D. Syvridis, Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication, IEEE Journal of Quantum Electronics, Vol. 46, No. 3, pp. 377-383, 2010, IEEE Press,
doi: 10.1109/JQE.2009.2034028
, indexed in SCI-E, IF = 2.113
98E. Konstantinou, A. Kontogeorgis, Y. Stamatiou, C. Zaroliagis, On the Efficient Generation of Prime Order Elliptic Curves, Journal of Cryptology, Vol. 23, pp. 477-503, 2010, Springer
, indexed in SCI-E
99E. Konstantinou, A. Kontogeorgis, Ramanujan’s Class Invariants and Their Use in Elliptic Curve Cryptography, Computers and Mathematics with Applications, Vol. 59, No. 8, pp. 2901-2917, 2010, Elsevier
, indexed in SCI-E
100D. Vassis, P. Belsis, C. Skourlas, G. Pantziou, Providing advanced remote medical treatment services through pervasive environments, Personal and Ubiquitous Computing , Vol. 14, No. 4, pp. 563-573, 2010, Springer,
http://www.springerlink.com/content/b50x6444t50116t8/
, indexed in SCI-E
101G. Kambourakis, E. Konstantinou, A. Douma, M. Anagnostopoulos, G. Fotiadis, Efficient Certification Path Discovery for MANET, EURASIP Journal on Wireless Communications and Networking, Vol. 2010, pp. 1-16, 2010, Hindawi Publishing Corporation,
http://jwcn.eurasipjournals.com/
, indexed in SCI-E, IF = 0.815
102A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Aligning Security Awareness with Information Systems Security Management, Journal of Information Systems Security, Vol. 6, No. 1, pp. 36-64, 2010,
http://www.jissec.org/Contents/V6/N1/V6N1-Tsohou.html

103G. Kambourakis, S. Gritzalis, J. H. Park, Device Authentication in Wireless and Pervasive Environments, Intelligent Automation and Soft Computing (AutoSoft), Vol. 16, No. 3, pp. 399-418, 2010, TSI Press,
http://wacong.org/autosoft/auto/163Abstracts/KAMBOURAKIS-GRITZALIS-PARK.pdf
, indexed in SCI-E, IF = 0.187
104G. Karopoulos, G. Kambourakis, S. Gritzalis, E. Konstantinou, A Framework for Identity Privacy in SIP, Journal of Network and Computer Applications, Vol. 33, No. 1, pp. 16-28, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1084804509001052/pdfft?md5=575....
, indexed in SCI-E, IF = 0.660
105P. Rizomiliotis, Improving the high order nonlinearity lower bound for Boolean functions with given Algebraic Immunity, Discrete Applied Mathematics, Vol. 158, No. 18, pp. 2049-2055, 2010, Elsevier,
doi:10.1016/j.dam.2010.08.023
, indexed in SCI-E, IF = 0.862
106E. Kosta, C. Kalloniatis, L. Mitrou, S. Gritzalis, Data protection issues pertaining to social networking under EU law, Transforming Government: People, Process, and Policy journal, Vol. 4, No. 2, pp. 193-201, 2010, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=1750-6166&volume=4&issue=2&artic....

107G. Kambourakis, D. Geneiatakis, S. Gritzalis, T. Dagiuklas, C. Lambrinoudakis, S. Ehlert, J. Fiedler, High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation, International Journal of Disaster Recovery and Business Continuity, Vol. 1, No. 1, pp. 11-30, 2010, SERSC,
http://www.sersc.org/journals/IJDRBC/vol1_no1_2010/2.pdf

108A. Tsohou, C. Lambrinoudakis, S. Kokolakis, S. Gritzalis, The Importance of Context-Dependent Privacy Requirements and Perceptions to the Design of Privacy-Aware Systems, UPGRADE, Vol. 11, No. 1, pp. 32-37, 2010, CEPIS,
http://www.cepis.org/files/cepisupgrade/issue-1-2010-tsohouetc.pdf

109F. Pereniguez, G. Kambourakis, R. Marin-Lopez, S. Gritzalis, A. F. Gomez, Privacy-Enhanced Fast Re-authentication for EAP-based Next Generation Network, Computer Communications, Vol. 33, No. 14, pp. 1682-1694, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366410000964/pdfft?md5=d07....
, indexed in SCI-E, IF = 0.815
110G. Kambourakis, E. Konstantinou, S. Gritzalis, Revisiting WiMAX MBS Security, Computers and Mathematics with Applications, Vol. 60, No. 2, pp. 217-223, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0898122110000052/pdfft?md5=53d....
, indexed in SCI-E, IF = 1.472
111A. Tsohou, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, A Security Standards’ Framework to facilitate Best Practices’ Awareness and Conformity, Information Management & Computer Security, Vol. 18, No. 5, pp. 350-365, 2010, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=18&issue=5&arti....

112C. Kolias, V. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, Design and implementation of a VoiceXML-driven Wiki Application for Assistive Environments on the Web, Personal and Ubiquitous Computing, Vol. 14, No. 6, pp. 527-539, 2010, Springer,
http://www.springer.com/computer/hci/journal/779
, indexed in SCI-E, IF = 1.137
113L. Boukas, G. Kambourakis, S. Gritzalis, Pandora: An SMS-oriented m-informational system for educational realms, Journal of Network and Computer Applications, Vol. 32, No. 3, pp. 684-702, 2009, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1084804508000672/pdfft?md5=a9d....
, indexed in SCI-E, IF = 1.111
114E. Magkos, M. Maragoudakis, V. Chryssikopoulos, S. Gritzalis, Accurate and Large-Scale Privacy-Preserving Data Mining using the Election Paradigm, Data and Knowledge Engineering, Vol. 68, No. 11, pp. 1224-1236, 2009, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0169023X09000950/pdfft?md5=c64....
, indexed in SCI-E, IF = 1.745
115P. Rizomiliotis, E. Rekleitis, S. Gritzalis, Security Analysis of the Song-Mitchell Authentication Protocol for Low-Cost RFID tags, IEEE Communications Letters, Vol. 13, No. 4, pp. 274-276, 2009, IEEE Press,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4815081
, indexed in SCI-E, IF = 1.463
116E. Konstantinou, A. Kontogeorgis, Computing Polynomials of the Ramanujan t_n class invariants, Canadian Mathematical Bulletin, Vol. 52, No. 4, pp. 583-597, 2009
, indexed in SCI-E
117E. Aivaloglou, S. Gritzalis, Hybrid Trust and Reputation Management for Sensor Networks, Wireless Networks, Vol. 16, No. 5, pp. 1493-1510, 2009, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs11276-009-0216-8.pdf
, indexed in SCI-E, IF = 1.088
118A. Tsakountakis, G. Kambourakis, S. Gritzalis, A Generic Accounting Scheme for Next Generation Networks, Computer Networks, Vol. 53, No. 14, pp. 2408-2426, 2009, Elsevier,
http://www.sciencedirect.com/science/article/pii/S138912860900156X/pdfft?md5=da3....
, indexed in SCI-E, IF = 1.201
119M. Karyda, S. Gritzalis, J. H. Park, S. Kokolakis, Privacy and Fair Information Practices in Ubiquitous Environments: Research Challenges and Future Directions, Internet Research, Vol. 19, No. 2, pp. 194-208, 2009, Emerald ,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=19&issue=2&arti....
, indexed in SCI-E, IF = 0.844
120P. Rizomiliotis, A. Tsohou, C. Lambrinoudakis, S. Gritzalis, Security and Privacy Issues in Bipolar Disorder Research, The Journal on Information Technology in Healthcare, Vol. 7, No. 4, pp. 244-250, 2009, HL7 Ramius Corp

121D. Geneiatakis, C. Lambrinoudakis, G. Kambourakis, An Ontology-based Policy for Deploying Secure SIP-based VoIP Services, Computers & Security (COSE), Vol. 27, No. 7-8, pp. 285-297, 2008, Elsevier,
http://dx.doi.org/10.1016/j.cose.2008.07.002
, indexed in SCI-E, IF = 1.028
122C. Kalloniatis, E. Kavakli, S. Gritzalis, Addressing Privacy Requirements in System Design: The PriS Methodology, Requirements Engineering, Vol. 13, No. 3, pp. 241-255, 2008, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs00766-008-0067-3.pdf
, indexed in SCI-E, IF = 1.625
123S. Ehlert, G. Zhang , D. Geneiatakis, G. Kambourakis, T. Dagiuklas, J. Mark , D. Sisalem, Two Layer Denial of Service Prevention on SIP VoIP Infrastructures, Computer Communications (COMCOM), Vol. 31, No. 10, pp. 2443-2456, 2008, Elsevier,
http://dx.doi.org/10.1016/j.comcom.2008.03.016
, indexed in SCI-E, IF = 0.619
124R. Roman, J. Lopez, S. Gritzalis, Situation Awareness Mechanisms for Wireless Sensor Networks, IEEE Communications, Vol. 46, No. 4, pp. 102-107, 2008, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4481348&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 2.799
125G. Antoniou, L. Sterling, S. Gritzalis, U. Parampalli, Privacy and Forensics investigation process: The ERPINA protocol, Computer Standards and Interfaces, Vol. 30, No. 4, pp. 229-236, 2008, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548907000979/pdfft?md5=622....
, indexed in SCI-E, IF = 1.074
126T. Balopoulos, S. Gritzalis, S. K. Katsikas, Specifying and Implementing Privacy-preserving protocols, International Journal of Information Security, Vol. 7, No. 6, pp. 395-420, 2008, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10207-008-0057-y.pdf
, indexed in SCI-E, IF = 1.094
127D. Geneiatakis, C. Lambrinoudakis, A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment, Telecommunication Systems, 2008, Springer,
http://dx.doi.org/10.1007/s11235-008-9065-5

128A. Tsohou, S. Kokolakis, M. Karyda, E. Kiountouzis, Investigating information security awareness: research and practice gaps, Information Security Journal: A Global Perspective, Vol. 17, No. 5&6, pp. 207–227, 2008, Taylor & Francis,
http://www.tandfonline.com/doi/pdf/10.1080/19393550802492487

129A. Tsohou, S. Kokolakis, M. Karyda, E. Kiountouzis, Process-Variance Models in Information Security Awareness Research, Information Management and Computer Security, Vol. 16, No. 3, pp. 271 – 287, 2008, Emerald ,
http://www.emeraldinsight.com/journals.htm?articleid=1736849&show=abstract

130A. Bogris, P. Rizomiliotis, K. Chlouverakis, A. Argyris, D. Syvridis, Feedback phase in optically generated chaos: A secret key for cryptography applications, IEEE Journal of Quantum Electronics, Vol. 44, pp. 119-124, 2008, IEEE Press ,
doi: 10.1109/JQE.2007.911687
, indexed in SCI-E, IF = 2.113
131C. Bouras, J. Papagiannopoulos, S. K. Katsikas, S. Gritzalis, The Broadband Status of the Western Greece: A study on the offer and the demand of broadband services for eGovernment promotion, International Journal of Electronic Governance, Vol. 1, No. 3, pp. 326-344, 2008, Inderscience Publishers,
http://inderscience.metapress.com/content/j164593250q58272/fulltext.pdf

132G. Frantzeskou, S. MacDonell, E. Stamatatos, S. Gritzalis, Examining the Significance of high-level programming features in Source-code Author Classification, Journal of Systems and Software, Vol. 81, No. 3, pp. 447-460, 2008, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0164121207000829/pdfft?md5=900....
, indexed in SCI-E, IF = 1.241
133P. Belsis, K. Fragos, S. Gritzalis, C. Skourlas, Applying effective feature selection techniques with Hierarchical Mixtures of Experts for spam classification, Journal of Computer Security, Vol. 16, No. 6, pp. 761-790, 2008, IOS Press,
http://iospress.metapress.com/content/l715124h57m12450/fulltext.pdf

134E. Aivaloglou, S. Gritzalis, C. Skianis, Trust Establishment in Sensor Networks: Behavior-based, Certificate-based, and a Combinational Approach, International Journal of System of Systems Engineering, Vol. 1, No. 1-2, pp. 128-148, 2008, Inderscience Publisher,
http://inderscience.metapress.com/content/t64155m1860p5gn1/fulltext.pdf

135D. Vouyioukas, G. Kambourakis, I. Maglogiannis, A. Rouskas, C. Kolias, S. Gritzalis, Enabling the Provision of Secure Web based M-Health Services utilizing XML based Security Models, Security and Communication Networks, Vol. 1, No. 5, pp. 375-388, 2008, Wiley InterScience,
http://dx.doi.org/10.1002/sec.46
, indexed in SCI-E, IF = 0904
136G. Frantzeskou, E. Stamatatos, S. Gritzalis, C. Chaski, B. Howald, Identifying Authorship by Byte Level n-grams: The Source Code Author Profile (SCAP) Method, International Journal of Digital Evidence, Vol. 6, No. 1, pp. 1-15, 2007, Economic Crime Institute,
http://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C82....

137S. Gritzalis, P. Belsis, S. K. Katsikas, Interconnecting Autonomous MedicalDomains: Security, Interoperability and Semantic-Driven Perspectives, IEEE Engineering in Medicine and Biology, Vol. 26, No. 5, pp. 23-28, 2007, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4312664&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 1.066
138D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, A. Dagiouklas, S. Gritzalis, A framework for protecting SIP-based infrastructure against Malformed Message Attacks, Computer Networks, Vol. 51, No. 10, pp. 2580-2593, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1389128606003458/pdfft?md5=69c....
, indexed in SCI-E, IF = 0.830
139I. Chatzigiannakis, E. Konstantinou, V. Liagkou, P. Spirakis, Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, Electronic Notes in Theoretical Computer Science, Vol. 171, No. 1, pp. 17-31, 2007, Elsevier

140G. Kambourakis, D. P. Kontoni, A. Rouskas, S. Gritzalis, A PKI Approach for Deploying Modern Secure Distributed e-learning and m-learning Environments, Computers and Education, Vol. 48, No. 1, pp. 1-16, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0360131504001745/pdfft?md5=435....
, indexed in SCI-E, IF = 1.602
141S. Gritzalis, A. Yannacopoulos, C. Lambrinoudakis, P. Hatzopoulos, S. K. Katsikas, A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments, International Journal of Information Security, Vol. 6, No. 4, pp. 197-211, 2007, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10207-006-0010-x.pdf
, indexed in SCI-E, IF = 1.094
142D. Geneiatakis, C. Lambrinoudakis, An Ontology Description for SIP Security Flaws, Computer Communication, Computer Communication, Vol. 30, No. 6, pp. 1367-1374, 2007, Elsevier,
http://dx.doi.org/10.1016/j.comcom.2006.12.023

143E. Konstantinou, Y. Stamatiou, C. Zaroliagis, Efficient Generation of Secure Elliptic Curves, International Journal of Information Security, Vol. 6, No. 1, pp. 47-63, 2007, Springer
, indexed in SCI-E
144G. Karopoulos, G. Kambourakis, S. Gritzalis, Survey of Secure Hand-off Optimization Schemes for Multimedia Services over all-IP Wireless Heterogeneous Networks, IEEE Communications Surveys and Tutorials, Vol. 9, No. 3, pp. 18-28, 2007, IEEE Press,
https://heim.ifi.uio.no/paalee/referencing_publications/ref-sec-karopoulos-comms....
, indexed in SCI-E, IF = 6.348
145P. Belsis, S. Gritzalis, S. K. Katsikas, Partial and fuzzy constraint satisfaction to support coalition formation, ENTCS Electronic Notes on Theoretical Computer Science, Vol. 179, No. 1, pp. 75-86, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1571066107003040/pdf?md5=2e70a....

146E. Kavakli, S. Gritzalis, C. Kalloniatis, Protecting Privacy in System Design: The electronic voting case, Tranforming Government: People, Process and Policy journal, Vol. 1, No. 4, pp. 307-332, 2007, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=1750-6166&volume=1&issue=4&artic....

147J. A. Onieva, J. Lopez, R. Rodrigo, J. Zhou, S. Gritzalis, Integration of Non-repudiation Services in Mobile Digital Rights Management Scenarios, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 35, No. 3-4, pp. 161-176, 2007, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9050-4.pdf
, indexed in SCI-E, IF = 0.423
148E. Aivaloglou, S. Gritzalis, C. Skianis, Towards a flexible trust establishment framework for sensor networks, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 35, No. 3-4, pp. 207-213, 2007, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9049-x.pdf
, indexed in SCI-E, IF = 0.423
149M. Belsis, A. Dwivedi, S. Gritzalis, R. Bali, R. Naguib, Providing Secure mAccess to Medical Information, International Journal of Electronic Healthcare, Vol. 3, No. 1, pp. 51-71, 2007, InderScience Publishers,
http://inderscience.metapress.com/content/07khkxmmbplm1nyh/fulltext.pdf

150D. Geneiatakis, A. Dagiouklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem, Survey of Security Vulnerabilities in Session Initiation Protocol, IEEE Communications Surveys and Tutorials, Vol. 8, No. 3, pp. 68-81, 2006, IEEE Press,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4020603

151S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis, S. K. Katsikas, A knowledge-based approach to security requirements for e-health applications, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, 2006,
http://www.ejeta.org/specialOct06-issue/ejeta-special-06oct-4.pdf

152G. Kambourakis, A. Rouskas, S. Gritzalis, D. Geneiatakis, Support of Subscribers Certificates in a Hybrid WLAN-3G Environment, Computer Networks, Vol. 50, No. 11, pp. 1843-1859, 2006, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1389128605002653/pdfft?md5=732....
, indexed in SCI-E, IF = 0.631
153E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis, Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework, Internet Research, Vol. 16, No. 2, pp. 140-158, 2006, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.607
154D. Fotakis, S. Gritzalis, Efficient Heuristic Algorithms for Correcting the Cascade Vulnerability Problem for Interconnected Networks, Computer Communications, Vol. 29, No. 11, pp. 2109-2122, 2006, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366406000326/pdfft?md5=7ec....
, indexed in SCI-E, IF = 0.444
155L. Mitrou, Videosurveillance in the Decisions of Courts and Data Protection Authority, To Syntagma , Vol. 1, No. 1, 2006, Ekdoseis Sakkoula, (to appear)

156M. Karyda, L. Mitrou, G. Quirchmayr, A framework for outsourcing IS/IT security services, Information Management and Computer Security, Vol. 14, No. 5, pp. 402-415, 2006, Emerald ,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=5&arti....

157L. Mitrou, M. Karyda, Employees Privacy vs. Employers, Telematics and Informatics Journal, Vol. 14, No. 5, pp. 198-217, 2006, Elsevier ,
http://ac.els-cdn.com/S073658530500047X/1-s2.0-S073658530500047X-main.pdf?_tid=2....

158A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Formulating Information Systems Risk Management Strategies through Cultural Theory, Information Management and Computer Security, Vol. 14, No. 3, pp. 198-217, 2006, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=3&arti....

159P. Rizomiliotis, Constructing Periodic Binary Sequences of Maximum Nonlinear Span, IEEE Transactions on Information Theory, Vol. 52, No. 9, pp. 4257-4261, 2006, IEEE Press ,
doi: 10.1109/TIT.2006.880054
, indexed in SCI-E, IF = 2.650
160S. Gritzalis, A Policy-ruled Knowledge Dissemination Architecture for Supporting multi-domain Secure Interoperation, The eJournal for Electronic Commerce Tools and Applications, Vol. 1, No. 4, 2006,
http://www.ejeta.org/fourth-issue/ejeta-2005.12.24.23.53.40.pdf

161K. Lamprou, S. Gritzalis, S. K. Katsikas, Security Architectures for Online Distance Learning and Training: A review, THEMES in Education, Vol. 7, No. 1, pp. 63-77, 2006,
http://earthlab.uoi.gr/theste/index.php/theste

162S. Gritzalis, Developing a Culture of Privacy in the Global Village, Telematics and Informatics, Vol. 23, No. 3, pp. 157-163, 2006, Elsevier (Editorial),
http://dl.acm.org/citation.cfm?id=1159406

163S. Gritzalis, "Public Key Infrastructure: Research and Applications", International Journal of Information Security, Vol. 5, No. 1, pp. 1-3, 2006, Springer (Editorial),
http://download.springer.com/static/pdf/678/art%253A10.1007%252Fs10207-005-0075-....

164G. Gousios, E. Aivaloglou, S. Gritzalis, Distributed Component Architectures Security Issues, Computer Standards and Interfaces, Vol. 27, No. 3, pp. 269-284, 2005, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548904000984/pdfft?md5=6bc....
, indexed in SCI-E, IF = 0.620
165G. Kambourakis, I. Maglogiannis, A. Rouskas, PKI-based Secure Mobile Access to Electronic Health Services and Data, Technology and Health Care (T&HC), Vol. 13, pp. 511-526, 2005, IOS Press,
http://iospress.metapress.com/content/5ten0ny42h74vmbl/

166E. Tsekmezoglou, J. Iliadis, A Critical View on Internet Voting Technology, The Electronic Journal for E-Commerce Tools & Applications (eJETA.org), Vol. 1, No. 4, 2005,
http://www.ejeta.org/fourth-issue/ejeta-2005.12.25.00.08.19.pdf

167M. Karyda, E. Kiountouzis, S. Kokolakis, Information Systems Security: A Contextual Perspective, Computers and Security Journal, Vol. 24, No. 3, pp. 246-260, 2005, Elsevier ,
http://www.sciencedirect.com/science/article/pii/S0167404804002378
, indexed in SCI-E, IF = 1.430 (5-year)
168M. Theoharidou, S. Kokolakis, M. Karyda, E. Kiountouzis, The insider threat to Information Systems and the effectiveness of ISO 17799, Computers and Security Journal, Vol. 24, No. 6, pp. 472-484, 2005, Elsevier ,
http://www.sciencedirect.com/science/article/pii/S0167404805000684
, indexed in SCI-E, IF = 1.430 (5-year)
169P. Belsis, E. Kiountouzis, S. Kokolakis, Information systems security from a knowledge management perspective, Information Management and Computer Security, Vol. 13, No. 3, pp. 189-202, 2005, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=13&issue=3&arti....

170S. Kokolakis, C. Lambrinoudakis, ICT security standards for healthcare applications, UPGRADE, Special Issue: Standardization for ICT Security, Vol. 6, No. 4, 2005, CEPIS ,
http://www.cepis.org/upgrade/index.jsp?p=0&n=2168&a=3078

171P. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 5, pp. 1840-1848, 2005, IEEE Press,
doi: 10.1109/TIT.2005.846428
, indexed in SCI-E, IF = 2.650
172P. Rizomiliotis, N. Kalouptsidis, Results on the nonlinear span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 4, pp. 1555-1563, 2005, IEEE Press ,
doi: 10.1109/TIT.2005.844090
, indexed in SCI-E, IF = 2.650
173A. Malatras, G. Pavlou, P. Belsis, S. Gritzalis, C. Skourlas, I. Chalaris, Deploying Pervasive Secure Knowledge Management Infrastructures, International Journal of Pervasive Computing and Communications, Vol. 1, No. 4, pp. 265-276, 2005, Troubador Publishing,
http://www.emeraldinsight.com/journals.htm?issn=1742-7371&volume=1&issue=4&artic....

174L. Gymnopoulos, V. Tsoumas, I. Soupionis, S. Gritzalis, A generic Grid security policy reconciliation framework, Internet Research, Vol. 15, No. 5, pp. 508-517, 2005, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=15&issue=5&arti....
, indexed in SCI-E, IF = 0.688
175S. Gritzalis, C. Lambrinoudakis, D. Lekkas, S. Deftereos, Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments, IEEE Transactions on Information Technology in BioMedicine, Vol. 9, No. 3, pp. 413-423, 2005, IEEE Press,
http://link.springer.com/content/pdf/10.1023%2FB%3AJOMS.0000044956.55209.75.pdf
, indexed in SCI-E, IF = 1.939
176D. Lekkas, S. Gritzalis, L. Mitrou, Withdrawing a Declaration of Will: Towards a Framework for Digital Signature Revocation, Internet Research, Vol. 15, No. 4, pp. 400-420, 2005, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.688
177T. Balopoulos, S. Gritzalis, S. K. Katsikas, Specifying Privacy Preserving Protocols in Typed MSR, Computer Standards and Interfaces, Vol. 27, No. 5, pp. 501-512, 2005, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548905000097/pdfft?md5=97a....
, indexed in SCI-E, IF = 0.620
178A. Roumboutsos, N. Nikitakos, S. Gritzalis, Information Technology Network Security Risk Assessment and Management Framework for Shipping Companies, Maritime Policy and Management, Vol. 32, No. 4, pp. 421-432, 2005, Taylor and Francis Pubs,
http://www.tandfonline.com/doi/pdf/10.1080/03088830500301501
, indexed in SCI-E, IF = 0.616
179C. Lambrinoudakis, S. Gritzalis, P. Hatzopoulos, A. Yannacopoulos, S. K. Katsikas, A formal model for pricing information systems insurance contracts, Computer Standards and Interfaces, Vol. 27, No. 5, pp. 521-532, 2005, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548905000115/pdfft?md5=a48....
, indexed in SCI-E, IF = 0.620
180S. Gritzalis, A Good-Practice Guidance on the use of PKI Services in the Public Sector of the European Union Member States, Information Management and Computer Security, Vol. 13, No. 5, pp. 379-398, 2005, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....

181P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, I. Chalaris, Flexible Secure heterogeneous File Management in Distributed Environments , IADAT Journal of Advanced Technology, Vol. 1, No. 2, pp. 66-69, 2005, IADAT,
http://www.iadat.org/publication/default.htm

182S. Gritzalis, Enhancing Privacy and Data Protection in Electronic Medical Transactions, Journal of Medical Systems, Vol. 28, No. 6, pp. 535-547, 2004, Springer,
http://www.springerlink.com/content/x4gk240082251694/fulltext.pdf
, indexed in SCI-E, IF = 0.581
183S. Gritzalis, Enhancing Web Privacy and Anonymity in the Digital Era, Information Management and Computer Security, Vol. 12, No. 3, pp. 255-288, 2004, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....

184E. Aivaloglou, G. Vouros, Shoplet and the Personal Market Place model for e-commerce, The electronic journal of e-commerce tools and applications, 2004,
http://www.ejeta.org

185L. Mitrou, The new Electronic Privacy Directive, Law of Information and Communication Media, Vol. 2, No. 3, pp. 371-375, 2004, Nomiki Vivliothiki,
http://www.nb.org

186K. Moulinos, J. Iliadis, V. Tsoumas, Towards Secure Sealing of Privacy Policies, Information Management and Computer Security, Vol. 12, No. 4, pp. 350-361, 2004, MCB University Press,
http://dx.doi.org/10.1108/09685220410553569

187E. Loukis, S. Kokolakis, An architecture for a flexible public sector collaborative environment, eJETA, Vol. 1, No. 3, 2004

188G. Kambourakis, A. Rouskas, S. Gritzalis, Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems, EURASIP Journal on Wireless Communications and Networking, Vol. 1, No. 1, pp. 184-197, 2004, Hindawi Publishing Corporation,
http://downloads.hindawi.com/journals/wcn/2004/314541.pdf
, indexed in SCI-E, IF = 0.974
189G. Aggelis, S. Gritzalis, C. Lambrinoudakis, Mechanisms for Controlling Access in the Global Grid Environment, Internet Research, Vol. 14, No. 5, pp. 347-352, 2004, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.688
190G. Kambourakis, A. Rouskas, G. Kormentzas, S. Gritzalis, Advanced SSL/TLS based Authentication for Secure WLAN-3G Interworking, IEE Proceedings Communications, Vol. 151, No. 5, pp. 501-506, 2004, IEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1344495&url=http%3A%2F%2F....
, indexed in SCI-E, IF = 0.195
191G. Kambourakis, A. Rouskas, S. Gritzalis, Experimental Analysis of an SSL-based AKA mechanism in 3G-and-beyond Wireless Networks, Wireless Personal Communications, Vol. 29, No. 3-4, pp. 303-321, 2004, Kluwer Academic Publishers / Springer,
http://link.springer.com/content/pdf/10.1023%2FB%3AWIRE.0000047068.20203.57.pdf
, indexed in SCI-E, IF = 0.243
192J. Iliadis, S. Gritzalis, D. Gritzalis, ADoCSI: Towards an Alternative Mechanism for Disseminating Certificate Status Information, Computer Communications, Vol. 26, No. 16, pp. 1851-1862, 2003, Elsevier,
http://www.sciencedirect.com/science/article/pii/S014036640300080X/pdfft?md5=c50....
, indexed in SCI-E, IF = 0.556
193J. Iliadis, S. Gritzalis, D. Spinellis, D. De Cock, B. Preneel, D. Gritzalis, Towards a Framework for Evaluating Certificate Status Information Mechanisms, Computer Communications, Vol. 26, No. 16, pp. 1839-1850, 2003, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366403000793/pdfft?md5=42b....
, indexed in SCI-E, IF = 0.556
194C. Lambrinoudakis, S. Gritzalis, F. Dridi, G. Pernul, Security Requirements for e-Government Services: A methodological approach for developing a common PKI based security policy, Computer Communications, Vol. 26, No. 16, pp. 1873-1883, 2003, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366403000823/pdfft?md5=62f....
, indexed in SCI-E, IF = 0.556
195S. Deftereos, C. Lambrinoudakis, S. Gritzalis, P. Andriopoulos, D. Georgonikou, A. Aessopos, A macro-directive mechanism that facilitates automating updating and processing of the contents of CEN-compatible Electronic Healthcare Records, Medical Informatics and the Internet in Medicine International Journal, Vol. 28, No. 1, pp. 21-41, 2003, Taylor and Francis Publications,
http://www.ncbi.nlm.nih.gov/pubmed/12851055
, indexed in SCI-E, IF = 0.419
196S. K. Katsikas, S. Gritzalis, A Best Practice Guide for Secure Electronic Commerce, Upgrade, Vol. 3, No. 6, 2002, CEPIS,
http://www.cepis.org/files/cepisupgrade/full-2002-VI.pdf#page=8

197D. Spinellis, K. Moulinos, J. Iliadis, D. Gritzalis, S. Gritzalis, S. K. Katsikas, Deploying a Secure Cyberbazaar by adding Trust on Commercial Transactions, The Electronic Journal for E-Commerce Tools & Applications, Vol. 1, No. 2, 2002, eJETA.org,
http://www.ejeta.org/second-issue/ejeta-2002.05.10.15.43.34.pdf

198N. Kolokotronis, P. Rizomiliotis, N. Kalouptsidis, Minimum linear span approximation of binary sequences, IEEE Transactions on Information Theory, Vol. 48, No. 10, pp. 2758-2764, 2002, IEEE Press ,
doi: 10.1109/TIT.2002.802621
, indexed in SCI-E, IF = 2.650
199D. Lekkas, S. Gritzalis, S. K. Katsikas, Deploying Quality Management in Trusted Third Parties within a Medical Environment: Towards ISO9000 Compliance, Health Informatics, Vol. 8, No. 1, pp. 4-14, 2002, SAGE Publications,
http://jhi.sagepub.com/content/8/1/4.full.pdf
, indexed in SCI-E, IF = 1.0
200D. Lekkas, S. Gritzalis, S. K. Katsikas, Quality assured Trusted Third Parties for deploying secure Internet-based healthcare applications, International Journal of Medical Informatics, Vol. 65, No. 2, pp. 79-96, 2002, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1386505602000060/pdfft?md5=a1c....
, indexed in SCI-E, IF = 1.374
201N. Nikitakos, S. Gritzalis, Risk Management for New Information Technology Insertion in a Shipping Company, Operational Research: An International Journal, Vol. 1, No. 1, pp. 7-16, 2001, Hellenic Operational Research Society ,
http://www.ergasya.tuc.gr/

202S. Gritzalis, D. Gritzalis, A Digital Seal solution for deploying Trust on Commercial Transactions, Information Management and Computer Security, Vol. 9, No. 2, pp. 71-79, 2001, MCB University Press,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=9&issue=2&artic....

203S. Gritzalis, D. Gritzalis, K. Moulinos, J. Iliadis, An integrated Architecture for deploying a Virtual Private Medical Network over the Web, Medical Informatics and the Internet in Medicine journal, Vol. 26, No. 1, pp. 49-72, 2001, Taylor & Francis Publications,
http://informahealthcare.com/doi/pdf/10.1080/14639230117731
, indexed in SCI-E, IF = 0.419
204S. Gritzalis, J. Iliadis, S. Oikonomopoulos, Distributed Component Software Security Issues on Deploying a Secure Electronic Marketplace, Information Management and Computer Security, Vol. 8, No. 1, pp. 5-13, 2000, MCB University Press,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=1&artic....

205S. Kokolakis, A. Demopoulos, E. Kiountouzis, The use of business process modelling in information systems security analysis and design, Information Management and Computer Security, Vol. 8, No. 3, pp. 107-116, 2000, MCB,
www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=3&articleid=86....

206S. Kokolakis, E. Kiountouzis, Achieving interoperability in a multiple-security-policies environment, Computers and Security Journal, Vol. 19, No. 3, pp. 267-281, 2000, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404800886150
, indexed in SCI-E, IF = 1.158
207C. Lambrinoudakis, S. Gritzalis, Managing Medical and Insurance Information through a Smart Card Based Information System, Journal of Medical Systems, Vol. 24, No. 4, pp. 213-234, 2000, Kluwer Academic Publishers - Plenum Corp.,
http://link.springer.com/content/pdf/10.1023%2FA%3A1005549330655.pdf
, indexed in SCI-E, IF = 0.674
208S. Gritzalis, S. K. Katsikas, D. Lekkas, K. Moulinos, E. Polydorou, Securing the electronic market: The KEYSTONE Public Key Infrastructure Architecture”, Computers and Security, Vol. 19, No. 8, pp. 731-746, 2000, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404800080226/pdfft?md5=4bc....
, indexed in SCI-E, IF = 0.743
209D. Spinellis, S. Kokolakis, S. Gritzalis, Security requirements, risks, and recommendations for small enterprise and home-office environments, Information Management and Computer Security, Vol. 7, No. 3, pp. 121-128, 1999, MCB University Press ,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....

210S. Gritzalis, J. Iliadis, D. Gritzalis, D. Spinellis, S. K. Katsikas, Developing Secure Web based Medical Applications, Medical Informatics and the Internet in Medicine Journal, Vol. 24, No. 1, pp. 75-90, 1999, Taylor & Francis Publications,
http://informahealthcare.com/doi/pdf/10.1080/146392399298537
, indexed in SCI-E, IF = 0.419
211D. Spinellis, S. Gritzalis, J. Iliadis, D. Gritzalis, S. K. Katsikas, Trusted third Party services for deploying secure telemedical applications over the Web, Computers & Security, Vol. 18, No. 7, pp. 627-639, 1999, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404899820410/pdf?md5=25d4c....
, indexed in SCI-E, IF = 0.743
212S. Gritzalis, D. Spinellis, P. Georgiadis, Security Protocols over open networks and distributed systems: Formal Methods for their Analysis, Design, and Verification , Computer Communications, Vol. 22, No. 8, pp. 697-709, 1999, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366499000304/pdfft?md5=167....
, indexed in SCI-E, IF = 0.556
213S. Gritzalis, G. Aggelis, D. Spinellis, Architectures for secure portable executable content, Internet Research, Vol. 9, No. 1, pp. 16-24, 1999, MCB University Press,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.688
214S. Gritzalis, D. Spinellis, The Cascade Vulnerability problem: The Detection problem and a Simulated Annealing approach for its Correction problem, Microprocessors and Microsystems, Vol. 21, No. 10, pp. 621-627, 1998, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0141933198000647/pdf?md5=e2d6a....
, indexed in SCI-E, IF = 0.263
215L. Mitrou, Das Griechische Datenschutzgesetz als Beispiel eine problemlosen Umsetzung der EU Datenschutzrichtlinie, Recht der Datenverarbeitung, Vol. 15, No. 2, pp. 56-63, 1998, Datacontext Fachverlag,
http://www.datakontext.com

216S. K. Katsikas, D. Spinellis, J. Iliadis, B. Blobel, Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach, International Journal of Medical Informatics, Vol. 49, No. 1, pp. 59-68, 1998, Elsevier Science

217S. Kokolakis, D. Gritzalis, S. K. Katsikas, Generic security policies for healthcare information systems, Health Informatics Journal, Vol. 4, No. 3, pp. 184-195, 1998, SAGE ,
http://jhi.sagepub.com/content/4/3-4/184.full.pdf+html

218S. Gritzalis, G. Aggelis, Security Issues Surrounding Programming Languges for Mobile Code: JAVA vs. Safe-Tcl, ACM Operating Systems Review, Vol. 32, No. 2, pp. 16-32, 1998, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=506137&type=pdf&CFID=265073195&CFTOKEN=10352....

219A. Douma, Mavroudakis Konstantinos, S. K. Katsikas, D. Gritzalis, Design of a neural network for recognition and classification of computer viruses, Computers & Security, Vol. 14, No. 5, pp. 435-448, 1995

220D. Gritzalis, S. K. Katsikas, S. Gritzalis, A Zero Knowledge Probabilistic Login Protocol, Computers and Security, Vol. 11, No. 8, pp. 733-745, 1992, Elsevier,
http://www.sciencedirect.com/science/article/pii/016740489290129F/pdf?md5=a792be....
, indexed in SCI-E, IF = 0.743


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2018