Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security
   
Publications
Journals
Conferences
Books
Chapter In Books
Conferences Proceedings Editor
Filter:

Year: Members:


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.

Journals

1D. Papamartzivanos, Félix Gómez Mármol, G. Kambourakis, Dendron: Genetic Trees driven Rule Induction for Network Intrusion Detection Systems, Future Generation Computer Systems, Vol. 79, No. 2, pp. 558-574, 2018, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167739X16305465
, indexed in SCI-E
2Pantaleone Nespoli, D. Papamartzivanos, Félix Gómez Mármol, G. Kambourakis, Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks, IEEE Communications Surveys and Tutorials, 2018, IEEE Press, (to appear),
http://ieeexplore.ieee.org/document/8169023/
, IF = 17.188
3G. Fotiadis, E. Konstantinou, Generating Pairing-Friendly Elliptic Curve Parameters Using Sparse Families, Journal of Mathematical Cryptology, 2018, (to appear)

4S. Simou, C. Kalloniatis, S. Gritzalis, V. Katos, A Framework for Designing Cloud Forensics-enabled Services, Requirements Engineering, 2018, Springer,
https://link.springer.com/journal/766
, indexed in SCI-E, IF = TBD before next July
5F. Giannakas, G. Kambourakis, A. Papasalouros, S. Gritzalis, A critical review of 13 years of Mobile Game-based Learning, Educational Technology Research and Development, Vol. 66, pp. 341-384, 2018, Springer,
http://rdcu.be/BdTM
, indexed in SCI-E, IF = TBD before next July
6R. Roman, J. Lopez, S. Gritzalis, Evolution and Trends in the Security of the Internet of Things, IEEE Computer, 2018, IEEE,
http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2
, indexed in SCI-E, IF = TBD before next July
7G. Fotiadis, E. Konstantinou, TNFS Resistant Families of Pairing-Friendly Elliptic Curves, Journal of Theoretical Computer Science, 2018, Elsevier, (to appear)

8A. Pattakou, C. Kalloniatis, S. Gritzalis, Security and Privacy under a Unified Framework: A Review, International Journal on Advances in Security, 2018, IARIA,
http://www.iariajournals.org/security/

9A. Tsohou, E. Kosta, Enabling valid informed consent for location tracking through privacy awareness of users: A process theory, Computer Law & Security Review: The International Journal of Technology Law and Practice, 2017, (to appear),
http://www.sciencedirect.com/science/article/pii/S026736491730119X
, indexed in SCI-E, IF = 0.373
10K. Malagas, S. Gritzalis, N. Nikitakos, M. Chalaris, The implementation of Goffee and Jones’s types of organizational culture in a Greek state-owned organization that introduced new technologies, Foundations of Management journal, Vol. 9, pp. 225-245, 2017, De Gruyter Publishing House,
https://www.degruyter.com/view/j/fman

11C. Kolias, G. Kambourakis, A. Stavrou, J. Voas, DDoS in the IoT: Mirai and Other Botnets, IEEE Computer, Vol. 50, No. 7, pp. 80-84, 2017, IEEE Press,
https://www.computer.org/csdl/mags/co/2017/07/mco2017070080-abs.html
, indexed in SCI-E
12C. Kolias, V. Kolias, G. Kambourakis, TermID: A Distributed Swarm Intelligence Based Approach for Wireless Intrusion Detection, International Journal of Information Security, Vol. 16, No. 4, pp. 401-416, 2017, Springer,
https://link.springer.com/article/10.1007/s10207-016-0335-z?wt_mc=alerts.TOCjour....
, indexed in SCI-E, IF = TBD before next July
13S. A. Menesidou, V. Katos, G. Kambourakis, Cryptographic Key Management in Delay Tolerant Networks: A Survey, Future Internet, Vol. 9, No. 3, pp. 1-21, 2017, MDPI,
http://www.mdpi.com/1999-5903/9/3/26

14S. Vidros, C. Kolias, G. Kambourakis, L. Akoglu, Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset, Future Internet, 2017, MDPI,
http://www.mdpi.com/1999-5903/9/1/6

15G. Tsekouras, Tsimikas I., C. Kalloniatis, S. Gritzalis, Interpretability Constraints for Fuzzy Modelling Implemented by Constrained Particle Swarm Optimization, IEEE Transactions on Fuzzy Systems, 2017, IEEE,
http://cis.ieee.org/ieee-transactions-on-fuzzy-systems.html
, indexed in SCI-E, IF = TBD before next July
16Rahman A., S. Islam, C. Kalloniatis, S. Gritzalis, A Risk Management Approach for a Sustainable Cloud Migration, Journal of Risk and Financial Management, Vol. 10, No. 20, 2017, MDPI,
http://www.mdpi.com/journal/jrfm
, indexed in SCI-E, IF = TBD before next July
17C. Kalloniatis, A. Pattakou, E. Kavakli, S. Gritzalis, Designing Secure and Privacy-aware Information Systems, International Journal of Secure Software Engineering, Vol. 8, No. 2, pp. 1-25, 2017, IGI Global,
https://www.igi-global.com/journal/international-journal-secure-software-enginee....

18A. Fakis, G. Karopoulos, G. Kambourakis, OnionSIP: Preserving privacy in SIP with Onion Routing, The Journal of Universal Computer Science (J.UCS), Vol. 23, No. 10, pp. 969-991, 2017, Verlag der Technischen Universität Graz,
http://www.jucs.org/jucs_23_10/onion_sip_preserving_privacy
, indexed in SCI-E, IF = 0.696
19M. Sideri, A. Kitsiou , C. Kalloniatis, S. Gritzalis, Sharing secrets, revealing thoughts and feelings: Perceptions about disclosure practices and anonymity in a FB university students’ community, International Journal of Electronic Governance, Vol. 9, No. 3-4, pp. 361-384, 2017, Inderscience Publishers,
http://www.inderscience.com/info/inarticle.php?artid=88216

20K. Malagas, S. Gritzalis, N. Nikitakos, How Institutional Factors that Emerge Within a Public Organization Affect the Use of an Innovation by its Employees: A Case Study of Olympic, TÉKHNE Review of Applied Management Studies, Vol. 13, No. 2, pp. 158-171, 2016, Elsevier,
http://www.sciencedirect.com/science/journal/16459911

21C. Kolias, G. Kambourakis, A. Stavrou, S. Gritzalis, Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset, IEEE Communications Surveys and Tutorials, Vol. 18, No. 1, pp. 184-208, 2016, IEEE Press,
http://www.comsoc.org/cst
, indexed in SCI-E, IF = 17.188
22G. Kambourakis, D. Damopoulos, D. Papamartzivanos, M. Pavlidakis, Introducing Touchstroke: Keystroke-based Authentication System for Smartphones, Security and Communication Networks, Vol. 9, No. 6, pp. 542-554, 2016, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.1061/abstract
, indexed in SCI-E, IF = 1.067
23M. Anagnostopoulos, G. Kambourakis, S. Gritzalis, New facets of Mobile Botnet: Architecture and Evaluation, International Journal of Information Security, Vol. 15, No. 5, pp. 455-473, 2016, Springer,
http://link.springer.com/journal/10207
, indexed in SCI-E, IF = 1.915
24S. Simou, C. Kalloniatis, S. Gritzalis, C. Mouratidis, A Survey on Cloud Forensics Challenges and Solutions, Security and Communication Networks, 2016, Wiley,
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122
, indexed in SCI-E, IF = 1.067
25P. Diamantatos, E. Kavallieratou, S. Gritzalis, Skeleton Hinge Distribution for Writer Identification, International Journal on Artificial Intelligence Tools, Vol. 25, No. 3, pp. 1-14, 2016, Springer,
http://www.worldscientific.com/worldscinet/ijait
, indexed in SCI-E, IF = 0.778
26S. Islam, M. Ouedraogo, C. Kalloniatis, C. Mouratidis, S. Gritzalis, Assurance of Security and Privacy Requirements for Cloud Deployment Model, IEEE Transactions on Cloud Computing, 2016, IEEE Press,
http://www.computer.org/web/tcc

27F. Giannakas, G. Kambourakis, A. Papasalouros, S. Gritzalis, Security education and awareness for K-6 going mobile, International Journal of Interactive Mobile Technologies, Vol. 10, No. 2, pp. 41-48, 2016, International Association of Online Engineering,
http://www.i-jim.org

28S. Vidros, C. Kolias, G. Kambourakis, Online Recruitment services; yet another playground for fraudsters?, Computer Fraud & Security, Vol. 2016, No. 3, pp. 8-13, 2016, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1361372316300252

29S. Kokolakis, Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon, Computers & Security, 2015, Elsevier, (to appear)
, indexed in SCI-E, IF = 1.035
30A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Managing the Introduction of Information Security Awareness Programs in Organisations, European Journal of Information Systems, Vol. 24, No. 1, pp. 38-58, 2015, Palgrave ,
https://www.researchgate.net/publication/257227930_Managing_the_introduction_of_....
, indexed in SCI-E, IF = 2.213
31Tsavli M., Efraimidis , V. Katos, L. Mitrou, Reengineering the user: privacy concerns about personal data on smartphones, Information and Computer Security, Vol. 23, No. 4, pp. 394-405, 2015, Emerald

32P. Drogkaris, S. Gritzalis, C. Kalloniatis, C. Lambrinoudakis, A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments, Future Internet , Vol. 7, No. 4, pp. 500-515, 2015, MDPI,
http://www.mdpi.com/1999-5903/7/4/500/html

33Z. Tsiatsikas, D. Geneiatakis, G. Kambourakis, A. Keromytis, An efficient and easily deployable method for dealing with DoS in SIP services, Computer Communications, Vol. 57, pp. 50-63, 2015, Elsevier,
http://www.journals.elsevier.com/computer-communications/
, indexed in SCI-E, IF = 2.099
34L. Ntalkos, G. Kambourakis, D. Damopoulos, Let, Telematics and Informatics, Vol. 32, No. 4, pp. 539-563, 2015, Elsevier,
http://www.journals.elsevier.com/telematics-and-informatics/
, indexed in SCI-E, IF = 2.261
35E. Kavakli, C. Kalloniatis, C. Mouratidis, S. Gritzalis, Privacy as an integral part for the implementation of cloud solutions, The Computer Journal, Vol. 58, No. 10, pp. 2213-2224, 2015, Oxford University Press,
http://comjnl.oxfordjournals.org/content/by/year
, indexed in SCI-E, IF = 1.443
36A. Tsohou, M. Karyda, S. Kokolakis, Analyzing the role of Cognitive and Cultural Biases in the Internalization of Information Security Policies: Recommendations for Information Security Awareness Programs, Computers & Security, Vol. 52, pp. 128–141, 2015, Elsevier, (to appear),
https://www.researchgate.net/publication/275898027_Analyzing_the_role_of_Cogniti....
, indexed in SCI-E, IF = 1.17
37N. Nomikos, A. Nieto, P. Makris, D. N. Skoutas, D. Vouyioukas, P. Rizomiliotis, J. Lopez, C. Skianis, Relay selection for secure 5G green communications, Telecommunication Systems, Vol. 59, pp. 169-187, 2015, Springer,
http://rdcu.be/nMNV
, indexed in SCI-E, IF = 1.542
38G. Kambourakis, Anonymity and closely related terms in the Cyberspace: An analysis by example, Journal of Information Security and Applications, Vol. 19, No. 1, pp. 2-17, 2014, Elsevier,
http://www.sciencedirect.com/science/article/pii/S2214212614000209

39K. Vemou, M. Karyda, Guidelines and tools for incorporating privacy in Social Networking Platforms, IADIS International Journal on WWW/Internet, Vol. 12, No. 2, pp. 16-33, 2014,
http://www.iadisportal.org/ijwi/

40D. Kasiaras, T. Zafeiropoulos, N. Clarke, G. Kambourakis, Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices, International Journal for Information Security Research (IJISR), Vol. 4, No. 1-4, pp. 501-509, 2014, Infonomics Society,
http://www.infonomics-society.org/IJISR/

41D. Damopoulos, G. Kambourakis, S. Gritzalis, S. O. Park, Exposing mobile malware from the inside (or what is your mobile app really doing?), Peer-to-Peer Networking and Applications, Vol. 7, No. 4, pp. 687-697, 2014, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs12083-012-0179-x.pdf
, indexed in SCI-E, IF = 0.632
42C. Kalloniatis, C. Mouratidis, V. Manousakis, S. Islam, S. Gritzalis, E. Kavakli, Towards the Design of Secure and Privacy-oriented Information Systems in the Cloud: Identifying the major concepts, Computer Standards and Interfaces, Vol. 36, No. 4, pp. 759-775, 2014, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548913001840
, indexed in SCI-E, IF = 0.879
43A. Panteli, M. Maragoudakis, S. Gritzalis, Privacy-Preserving Data Mining using Radial Basis Functions on Horizontally-partitioned Databases in the Malicious Model, International Journal on Artificial Intelligence Tools, Vol. 23, No. 5, pp. 1450007:1-22, 2014, World Scientific Publishing,
http://www.worldscientific.com/toc/ijait/23/05
, indexed in SCI-E, IF = 0.436
44E. Rekleitis, P. Rizomiliotis, S. Gritzalis, How to Protect Security and Privacy in the Internet of Things: A Policy-based RFID tag management protocol, Security and Communication Networks, Vol. 7, No. 12, pp. 2669-2683, 2014, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.400/pdf
, indexed in SCI-E, IF = 0.72
45N. Marangos, P. Rizomiliotis, L. Mitrou, Time Synchronization: Pivotal Element in Cloud Forensics, Security and Communication Networks , 2014, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.1056/abstract
, IF = 0.72
46Psaroudakis I., Saragiotis, V. Katos, L. Mitrou, A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description Protocol (SDP), International Journal of Electronic Security and Digital Forensics, Vol. 4, No. 6, pp. 241-267, 2014

47C. Kalloniatis, E. Kavakli, S. Gritzalis, Addressing Privacy in Traditional and Cloud-based Systems, International Journal of Applied Industrial Engineering, Vol. 2, No. 1, pp. 14-40, 2014, IGI Global,
http://www.igi-global.com/journal/international-journal-applied-industrial-engin....

48A. Tsohou, H. Lee, Z. Irani, Innovative Public Governance Through Cloud Computing: Information Privacy, Business Models and Performance Measurement Challenges, Transforming Government: People, Process and Policy, Vol. 8, No. 2, pp. 251-282, 2014, Emerald

49G. Kambourakis, Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art, International Journal of u- and e- Service, Science and Technology, Vol. 6, No. 3, pp. 67-84, 2013, SERSC,
http://www.sersc.org/journals/IJUNESST/

50A. Tsohou, Lee H., Z. Irani, V. Weerakkody , I. Osman, A Anouze, Proposing a Reference Process Model for the Citizen-Centric Evaluation of E-Government Services, Transforming Government: People, Process and Policy, Vol. 7, No. 2, pp. 240-255, 2013, Emerald

51 K. Anastasopoulou, S. Kokolakis, Exploring Citizens’ Intention to Use e-Government Services: The Role of Cultural Bias, International Journal of Electronic Governance, Vol. 6, No. 1, pp. 3-19, 2013, Inderscience,
http://www.inderscience.com/info/inarticle.php?artid=53378

52A. Mylonas, V. Meletiadis, L. Mitrou, D. Gritzalis, Smartphone sensor data as digital evidence, Computers & Security (Special Issue: Cybercrime in the Digital Economy), Vol. 38, pp. 51-75, 2013

53L. Mitrou, Privacy by Design (in Greek), Media and Communication Law, Vol. 37 , pp. 14-25, 2013

54K. Malagas, K. Kourousis, G. Baxter, N. Nikitakos, S. Gritzalis, Τhe Introduction of Innovative Services in a State Owned Airline: A Case Study of a IT migration project, Journal of Technology Management & Innovation, Vol. 8, No. 2, pp. 74-83, 2013, Inderscience,
http://www.jotmi.org/index.php/GT/article/download/art306/759

55P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, Employing Privacy Policies and Preferences in Modern e-Government Environments, International Journal of Electronic Governance, Vol. 6, No. 2, pp. 101-116, 2013, Inderscience,
http://inderscience.metapress.com/content/r4j26m562126317k/

56D. Damopoulos, G. Kambourakis, M. Anagnostopoulos, S. Gritzalis, J. H. Park, User privacy and modern mobile services: Are they on the same path?, Personal and Ubiquitous Computing, Vol. 17, No. 7, pp. 1437-1448, 2013, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs00779-012-0579-1.pdf
, indexed in SCI-E, IF = 1.616
57K. Barbatsalou, D. Damopoulos, G. Kambourakis, V. Katos, A critical review of 7 years of Mobile Device Forensics, Digital Investigation, Vol. 10, No. 4, pp. 323-349, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1742287613001096
, indexed in SCI-E, IF = 0.986
58F. Pereniguez, R. Marin-Lopez, G. Kambourakis, A. Ruiz Martinez, S. Gritzalis, A. F. Gomez, KAMU: Providing Advanced User Privacy in Kerberos Multi-Domain Scenarios, International Journal of Information Security (IJIS), Vol. 12, No. 6, pp. 505-525, 2013, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10207-013-0201-1.pdf
, indexed in SCI-E, IF = 0.941
59M. Anagnostopoulos, G. Kambourakis, P. Kopanos, G. Louloudakis, S. Gritzalis, DNS Amplification Attack Revisited, Computers & Security, Vol. 39, pp. 475-485, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404813001405/pdfft?md5=695....
, indexed in SCI-E, IF = 1.172
60D. Damopoulos, G. Kambourakis, S. Gritzalis, From Keyloggers to Touchloggers: Take the Rough with the Smooth, Computers & Security, Vol. 32, pp. 102-114, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404812001654/pdfft?md5=4e7....
, indexed in SCI-E, IF = 1.172
61P. Rizomiliotis, S. Gritzalis, On the security of AUTH, an authentication protocol based on the subspace LPN problem, International Journal of Information Security, Vol. 12, No. 2, pp. 151-154, 2013, Springer,
http://link.springer.com/article/10.1007/s10207-012-0188-z
, indexed in SCI-E, IF = 0.941
62C. Mouratidis, S. Islam, C. Kalloniatis, S. Gritzalis, A Framework to support selection of Cloud Providers based on Security and Privacy Requirements, Journal of Systems and Software, Vol. 86, No. 9, pp. 2276-2293, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0164121213000575/pdfft?md5=723....
, indexed in SCI-E, IF = 1.245
63G. Karopoulos, P. Mori, F. Martinelli, Usage Control in SIP-based multimedia delivery, Computers & Security, Vol. 39, pp. 406-418, 2013, Elsevier,
http://www.sciencedirect.com/science/article/pii/S016740481300134X
, indexed in SCI-E, IF = 1.172
64C. Kolias, G. Kambourakis, S. Gritzalis, Attacks and Countermeasures on 802.16: Analysis and Assessment, IEEE Communications Surveys & Tutorials, Vol. 15, No. 1, pp. 487-514, 2013, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6170531&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 6.490
65P. Belsis, C. Skourlas, S. Gritzalis, A Wireless System for Secure Electronic Healthcare Records Management, International Journal of Advanced Pervasive and Ubiquitous Computing, Vol. 5, No. 4, pp. 16-32, 2013, IGI Global,
http://www.igi-global.com/journal/international-journal-advanced-pervasive-ubiqu....

66A. Tsohou, Lee H., K. Al-Yafi, V. Weerakkody , R. El-Haddadeh , Z. Irani, T. Medeni, L. Campos, Supporting Public Policy Making Processes with Workflow Technology: Lessons Learned From Cases in Four European Countries, International Journal of Electronic Government Research, Vol. 8, No. 3, pp. 63-77, 2012, IGI Global

67A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Analyzing Trajectories of Information Security Awareness, Information Technology & People, Vol. 25, No. 3, 2012, Emerald,
http://www.emeraldinsight.com/journals.htm?articleid=17047485&show=abstract
, indexed in SCI-E, IF = 0.767
68H. H. Chan, E. Konstantinou, A. Kontogeorgis, C. H. Tan, What is your “birthday elliptic curves”?, Finite Fields and Applications, Vol. 18, No. 6, 2012, Elsevier
, indexed in SCI-E
69A. Loukas, D. Damopoulos, S. A. Menesidou, Maria Eleni Skarkala, G. Kambourakis, S. Gritzalis, MILC: A Secure and Privacy-Preserving Mobile Instant Locator with Chatting, Information System Frontiers, Vol. 14, No. 3, pp. 481-497, 2012, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10796-010-9254-0.pdf
, indexed in SCI-E, IF = 0.851
70A. Tsakountakis, G. Kambourakis, S. Gritzalis, SIPA: Generic and Secure Accounting for SIP, Security and Communication Networks, Vol. 5, No. 9, pp. 1006-1027, 2012, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.387/pdf
, indexed in SCI-E, IF = 0.311
71D. Damopoulos, S. A. Menesidou, G. Kambourakis, M. Papadaki, N. Clarke, S. Gritzalis, Evaluation of Anomaly-Based IDS for Mobile Devices Using Machine Learning Classifiers, Security and Communication Networks, Vol. 5, No. 1, pp. 3-14, 2012, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/sec.341/pdf
, indexed in SCI-E, IF = 0.311
72C. Mouratidis, C. Kalloniatis, S. Islam, M. P. Huget, S. Gritzalis, Aligning Security and Privacy to support the development of Secure Information Systems, Journal of Universal Computer Science, Vol. 18, No. 12, pp. 1608-1627, 2012, JUCS,
http://www.jucs.org/jucs_18_12/aligning_security_and_privacy/jucs_18_12_1608_162....
, indexed in SCI-E, IF = 0.762
73A. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, Flexible Convolutional Codes: Variable Rate and Complexity, IEEE Transactions on Communications, Vol. 3, pp. 608-613, 2012, IEEE Press,
doi:10.1109/TCOMM.2011.121211.110124
, indexed in SCI-E, IF = 1.979
74E. Konstantinou, Efficient Cluster-based Group Key Agreement Protocols for Wireless Ad Hoc Networks, Journal of Networks and Computer Applications, Vol. 34, No. 1, pp. 384-393, 2011, Elsevier
, indexed in SCI-E
75P. Belsis, D. Vassis, C. Skourlas, Identifying and Utilizing Secure paths in Ad-hoc Assistive Medical Environments, Security Communication Networks Journal , 2011, Wiley, (to appear),
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122
, indexed in SCI-E
76C. Kolias, G. Kambourakis, M. Maragoudakis, Swarm Intelligence in Intrusion Detection: A Survey, Computers & Security, Vol. 30, No. 8, pp. 625-642, 2011, Elsevier,
www.elsevier.com/locate/cose
, indexed in SCI-E, IF = 0.868
77V. Kolias, C. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, TELS: A Voice-Response Internet-based Learning System, Journal of Internet Technology, Vol. 12, No. 2, pp. 217-235, 2011, Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, ROC,
http://jit.ndhu.edu.tw/
, indexed in SCI-E, IF = 0.508
78I. Terzis, G. Kambourakis, G. Karopoulos, C. Lambrinoudakis, Privacy Preserving Context Transfer Schemes for 4G Networks, Wireless Communications and Mobile Computing, Vol. 11, No. 2, pp. 289–302, 2011, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/wcm.1019/abstract
, indexed in SCI-E, IF = 0.884
79E. Makri, E. Konstantinou, Constant Round Group Key Agreement Protocols: A Comparative Study, Computers and Security, Vol. 30, No. 8, pp. 643-678, 2011, Elsevier
, indexed in SCI-E
80E. Konstantinou, A. Kontogeorgis, Ramanujan Invariants for Discriminants Congruent to 5 mod 24, International Journal of Number Theory, Vol. 8, No. 1, 2011, World Scientific

81E. Konstantinou, A. Kontogeorgis, Some Remarks on the Construction of Class Field Polynomials, Advances in Mathematics of Communications, Vol. 5, No. 1, pp. 109-118, 2011
, indexed in SCI-E
82P. Belsis, C. Skourlas, S. Gritzalis, Secure electronic healthcare records management in wireless environments, Journal of Information Technology Research, Vol. 4, No. 4, pp. 1-17, 2011, IGI Global,
http://www.igi-global.com/article/secure-electronic-healthcare-records-managemen....

83E. Klaoudatou, E. Konstantinou, G. Kambourakis, S. Gritzalis, A Survey on Cluster-based Group Key Agreement Protocols for WSNs, IEEE Communications Surveys and Tutorials, Vol. 13, No. 3, pp. 429-442, 2011, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5522466&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 6.311
84G. Kambourakis, C. Kolias, S. Gritzalis, J. H. Park, DoS Attacks Exploiting Signaling in UMTS and IMS, Computer Communications, Vol. 34, No. 3, pp. 226-235, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S014036641000085X/pdfft?md5=942....
, indexed in SCI-E, IF = 1.044
85C. Kalloniatis, P. Belsis, S. Gritzalis, A Soft Computing approach for Privacy Requirements Engineering, Journal of Applied Soft Computing, Vol. 11, No. 7, pp. 4341-4348, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S156849461000270X/pdfft?md5=de7....
, indexed in SCI-E, IF = 2.612
86F. Pereniguez, R. Marin-Lopez, G. Kambourakis, S. Gritzalis, A. F. Gomez, PrivaKERB: A User Privacy Framework for Kerberos, Computers & Security, Vol. 30, No. 6-7, pp. 446-463, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404811000617/pdfft?md5=774....
, indexed in SCI-E, IF = 0.868
87G. Karopoulos, G. Kambourakis, S. Gritzalis, PrivaSIP: Ad-hoc Identity Privacy in SIP, Computer Standards and Interfaces, Vol. 33, No. 3, pp. 301-314, 2011, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548910000942/pdfft?md5=d68....
, indexed in SCI-E, IF = 1.257
88G. Frantzeskou, S. MacDonell, E. Stamatatos, S. Georgiou, S. Gritzalis, The significance of user-defined identifiers in Java source code authorship identification, International Journal of Computer Systems Science and Engineering, Vol. 26, No. 2, pp. 139-148, 2011,
http://aut.researchgateway.ac.nz/bitstream/handle/10292/3469/Frantzeskou%20et%20....
, indexed in SCI-E, IF = 0.371
89X. Luo, F. Liu, S. Lian, Yang C., S. Gritzalis, On the Typical Statistic Features for Image Blind Steganalysis, IEEE Journal on Selected Areas on Communications, Vol. 27, No. 7, pp. 1404-1422, 2011, IEEE,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5963160&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 3.413
90P. Rizomiliotis, On the Security of the Feng-Liao-Yang family of Boolean functions with optimal algebraic immunity against fast algebraic attacks, Designs, Codes and Cryptography, Vol. 57, No. 3, pp. 283-292, 2010, Springer,
http://www.springerlink.com/content/yj27532v5481857v/
, indexed in SCI-E, IF = 0.958
91A. Mitseva, E. Aivaloglou, A. Marchitti, N. R. Prasad, C. Skianis, S. Gritzalis, A. Waller, T. Bauge, S. Pennington, Towards Adaptive Security for Convergent Wireless Sensor Networks in Beyond 3G Environments, Wireless Communications and Mobile Computing, Vol. 10, No. 9, pp. 1193-1207, 2010, Wiley Inderscience,
http://onlinelibrary.wiley.com/doi/10.1002/wcm.678/pdf
, indexed in SCI-E, IF = 0.810
92P. Rizomiliotis, On the Resistance of Boolean Functions against Algebraic Attacks using Univariate Polynomial Representation, IEEE Transactions on Information Theory, Vol. 56, pp. 4014-4024, 2010, IEEE Press,
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5508623
, indexed in SCI-E, IF = 2.650
93A. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, New Constructions of High-Performance Low-Complexity Convolutional Codes, IEEE Transactions on Communications, Vol. 58, No. 7, pp. 1950 - 1961, 2010, IEEE Press,
doi:10.1109/TCOMM.2010.07.090149
, indexed in SCI-E, IF = 1.979
94P. Rizomiliotis, A. Bogris, D. Syvridis, Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication, IEEE Journal of Quantum Electronics, Vol. 46, No. 3, pp. 377-383, 2010, IEEE Press,
doi: 10.1109/JQE.2009.2034028
, indexed in SCI-E, IF = 2.113
95E. Konstantinou, A. Kontogeorgis, Y. Stamatiou, C. Zaroliagis, On the Efficient Generation of Prime Order Elliptic Curves, Journal of Cryptology, Vol. 23, pp. 477-503, 2010, Springer
, indexed in SCI-E
96E. Konstantinou, A. Kontogeorgis, Ramanujan’s Class Invariants and Their Use in Elliptic Curve Cryptography, Computers and Mathematics with Applications, Vol. 59, No. 8, pp. 2901-2917, 2010, Elsevier
, indexed in SCI-E
97D. Vassis, P. Belsis, C. Skourlas, G. Pantziou, Providing advanced remote medical treatment services through pervasive environments, Personal and Ubiquitous Computing , Vol. 14, No. 4, pp. 563-573, 2010, Springer,
http://www.springerlink.com/content/b50x6444t50116t8/
, indexed in SCI-E
98C. Kolias, V. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, Design and implementation of a Voice-XML driven Wiki Application for Assistive Environments on the Web, Personal and Ubiquitous Computing, Vol. 14, No. 6, pp. 527-539, 2010, Springer,
http://www.springer.com/computer/hci/journal/779
, indexed in SCI-E, IF = 1.137
99G. Kambourakis, E. Konstantinou, A. Douma, M. Anagnostopoulos, G. Fotiadis, Efficient Certification Path Discovery for MANET, EURASIP Journal on Wireless Communications and Networking, Vol. 2010, pp. 1-16, 2010, Hindawi Publishing Corporation,
http://jwcn.eurasipjournals.com/
, indexed in SCI-E, IF = 0.815
100A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Aligning Security Awareness with Information Systems Security Management, Journal of Information Systems Security, Vol. 6, No. 1, pp. 36-64, 2010,
http://www.jissec.org/Contents/V6/N1/V6N1-Tsohou.html

101G. Kambourakis, S. Gritzalis, J. H. Park, Device Authentication in Wireless and Pervasive Environments, Intelligent Automation and Soft Computing (AutoSoft), Vol. 16, No. 3, pp. 399-418, 2010, TSI Press,
http://wacong.org/autosoft/auto/163Abstracts/KAMBOURAKIS-GRITZALIS-PARK.pdf
, indexed in SCI-E, IF = 0.187
102G. Kambourakis, D. Geneiatakis, S. Gritzalis, T. Dagiuklas, C. Lambrinoudakis, S. Ehlert, J. Fiedler, High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation, International Journal of Disaster Recovery and Business Continuity, Vol. 1, No. 1, pp. 11-30, 2010, SERSC,
http://www.sersc.org/journals/IJDRBC/vol1_no1_2010/2.pdf

103G. Kambourakis, E. Konstantinou, S. Gritzalis, Revisiting WiMAX MBS Security, Computers and Mathematics with Applications, Vol. 60, No. 2, pp. 217-223, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0898122110000052/pdfft?md5=53d....
, indexed in SCI-E, IF = 1.472
104G. Karopoulos, G. Kambourakis, S. Gritzalis, E. Konstantinou, A Framework for Identity Privacy in SIP, Journal of Network and Computer Applications, Vol. 33, No. 1, pp. 16-28, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1084804509001052/pdfft?md5=575....
, indexed in SCI-E, IF = 0.660
105F. Pereniguez, G. Kambourakis, R. Marin-Lopez, S. Gritzalis, A. F. Gomez, Privacy-Enhanced Fast Re-authentication for EAP-based Next Generation Network, Computer Communications, Vol. 33, No. 14, pp. 1682-1694, 2010, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366410000964/pdfft?md5=d07....
, indexed in SCI-E, IF = 0.815
106A. Tsohou, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, A Security Standards’ Framework to facilitate Best Practices’ Awareness and Conformity, Information Management & Computer Security, Vol. 18, No. 5, pp. 350-365, 2010, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=18&issue=5&arti....

107A. Tsohou, C. Lambrinoudakis, S. Kokolakis, S. Gritzalis, The Importance of Context-Dependent Privacy Requirements and Perceptions to the Design of Privacy-Aware Systems, UPGRADE, Vol. 11, No. 1, pp. 32-37, 2010, CEPIS,
http://www.cepis.org/files/cepisupgrade/issue-1-2010-tsohouetc.pdf

108P. Rizomiliotis, Improving the high order nonlinearity lower bound for Boolean functions with given Algebraic Immunity, Discrete Applied Mathematics, Vol. 158, No. 18, pp. 2049-2055, 2010, Elsevier,
doi:10.1016/j.dam.2010.08.023
, indexed in SCI-E, IF = 0.862
109E. Kosta, C. Kalloniatis, L. Mitrou, S. Gritzalis, Data protection issues pertaining to social networking under EU law, Transforming Government: People, Process, and Policy journal, Vol. 4, No. 2, pp. 193-201, 2010, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=1750-6166&volume=4&issue=2&artic....

110L. Boukas, G. Kambourakis, S. Gritzalis, Pandora: An SMS-oriented e-informational system for educational realms, Journal of Network and Computer Applications, Vol. 32, No. 3, pp. 684-702, 2009, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1084804508000672/pdfft?md5=a9d....
, indexed in SCI-E, IF = 1.111
111E. Magkos, M. Maragoudakis, V. Chryssikopoulos, S. Gritzalis, Accurate and Large-Scale Privacy-Preserving Data Mining using the Election Paradigm, Data and Knowledge Engineering, Vol. 68, No. 11, pp. 1224-1236, 2009, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0169023X09000950/pdfft?md5=c64....
, indexed in SCI-E, IF = 1.745
112P. Rizomiliotis, E. Rekleitis, S. Gritzalis, Security Analysis of the Song-Mitchell Authentication Protocol for Low-Cost RFID tags, IEEE Communications Letters, Vol. 13, No. 4, pp. 274-276, 2009, IEEE Press,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4815081
, indexed in SCI-E, IF = 1.463
113E. Konstantinou, A. Kontogeorgis, Computing Polynomials of the Ramanujan t_n class invariants, Canadian Mathematical Bulletin, Vol. 52, No. 4, pp. 583-597, 2009
, indexed in SCI-E
114E. Aivaloglou, S. Gritzalis, Hybrid Trust and Reputation Management for Sensor Networks, Wireless Networks, Vol. 16, No. 5, pp. 1493-1510, 2009, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs11276-009-0216-8.pdf
, indexed in SCI-E, IF = 1.088
115A. Tsakountakis, G. Kambourakis, S. Gritzalis, A Generic Accounting Scheme for Next Generation Networks, Computer Networks, Vol. 53, No. 14, pp. 2408-2426, 2009, Elsevier,
http://www.sciencedirect.com/science/article/pii/S138912860900156X/pdfft?md5=da3....
, indexed in SCI-E, IF = 1.201
116M. Karyda, S. Gritzalis, J. H. Park, S. Kokolakis, Privacy and Fair Information Practices in Ubiquitous Environments: Research Challenges and Future Directions, Internet Research, Vol. 19, No. 2, pp. 194-208, 2009, Emerald ,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=19&issue=2&arti....
, indexed in SCI-E, IF = 0.844
117P. Rizomiliotis, A. Tsohou, C. Lambrinoudakis, S. Gritzalis, Security and Privacy Issues in Bipolar Disorder Research, The Journal on Information Technology in Healthcare, Vol. 7, No. 4, pp. 244-250, 2009, HL7 Ramius Corp

118D. Geneiatakis, C. Lambrinoudakis, G. Kambourakis, An Ontology Based-Policy for Deploying Secure SIP-based VoIP Services, Computers & Security (COSE), Vol. 27, No. 7-8, pp. 285-297, 2008, Elsevier,
http://dx.doi.org/10.1016/j.cose.2008.07.002
, indexed in SCI-E, IF = 1.028
119C. Kalloniatis, E. Kavakli, S. Gritzalis, Addressing Privacy Requirements in System Design: The PriS Methodology, Requirements Engineering, Vol. 13, No. 3, pp. 241-255, 2008, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs00766-008-0067-3.pdf
, indexed in SCI-E, IF = 1.625
120S. Ehlert, G. Zhang , D. Geneiatakis, G. Kambourakis, T. Dagiuklas, J. Mark , D. Sisalem, Two Layer Denial of Service Prevention on SIP VoIP Infrastructures, Computer Communications (COMCOM), Vol. 31, No. 10, pp. 2443-2456, 2008, Elsevier,
http://dx.doi.org/10.1016/j.comcom.2008.03.016
, indexed in SCI-E, IF = 0.619
121R. Roman, J. Lopez, S. Gritzalis, Situation Awareness Mechanisms for Wireless Sensor Networks, IEEE Communications, Vol. 46, No. 4, pp. 102-107, 2008, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4481348&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 2.799
122G. Antoniou, L. Sterling, S. Gritzalis, U. Parampalli, Privacy and Forensics investigation process: The ERPINA protocol, Computer Standards and Interfaces, Vol. 30, No. 4, pp. 229-236, 2008, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548907000979/pdfft?md5=622....
, indexed in SCI-E, IF = 1.074
123T. Balopoulos, S. Gritzalis, S. K. Katsikas, Specifying and Implementing Privacy-preserving protocols, International Journal of Information Security, Vol. 7, No. 6, pp. 395-420, 2008, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10207-008-0057-y.pdf
, indexed in SCI-E, IF = 1.094
124D. Geneiatakis, C. Lambrinoudakis, A Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment, Telecommunication Systems, 2008, Springer,
http://dx.doi.org/10.1007/s11235-008-9065-5

125A. Tsohou, S. Kokolakis, M. Karyda, E. Kiountouzis, Investigating information security awareness: research and practice gaps, Information Security Journal: A Global Perspective, Vol. 17, No. 5&6, pp. 207–227, 2008, Taylor & Francis,
http://www.tandfonline.com/doi/pdf/10.1080/19393550802492487

126A. Tsohou, S. Kokolakis, M. Karyda, E. Kiountouzis, Process-Variance Models in Information Security Awareness Research, Information Management and Computer Security, Vol. 16, No. 3, pp. 271 – 287, 2008, Emerald ,
http://www.emeraldinsight.com/journals.htm?articleid=1736849&show=abstract

127E. Aivaloglou, S. Gritzalis, C. Skianis, Trust Establishment in Sensor Networks: Behavior-based, Certificate-based, and a Combinational Approach, International Journal of System of Systems Engineering, Vol. 1, No. 1-2, pp. 128-148, 2008, Inderscience Publisher,
http://inderscience.metapress.com/content/t64155m1860p5gn1/fulltext.pdf

128P. Belsis, K. Fragos, S. Gritzalis, C. Skourlas, Applying effective feature selection techniques with Hierarchical Mixtures of Experts for spam classification, Journal of Computer Security, Vol. 16, No. 6, pp. 761-790, 2008, IOS Press,
http://iospress.metapress.com/content/l715124h57m12450/fulltext.pdf

129C. Bouras, J. Papagiannopoulos, S. K. Katsikas, S. Gritzalis, The Broadband Status of the Western Greece: A study on the offer and the demand of broadband services for eGovernment promotion, International Journal of Electronic Governance, Vol. 1, No. 3, pp. 326-344, 2008, Inderscience Publishers,
http://inderscience.metapress.com/content/j164593250q58272/fulltext.pdf

130G. Frantzeskou, S. MacDonell, E. Stamatatos, S. Gritzalis, Examining the Significance of high-level programming features in Source-code Author Classification, Journal of Systems and Software, Vol. 81, No. 3, pp. 447-460, 2008, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0164121207000829/pdfft?md5=900....
, indexed in SCI-E, IF = 1.241
131A. Bogris, P. Rizomiliotis, K. Chlouverakis, A. Argyris, D. Syvridis, Feedback phase in optically generated chaos: A secret key for cryptography applications, IEEE Journal of Quantum Electronics, Vol. 44, pp. 119-124, 2008, IEEE Press ,
doi: 10.1109/JQE.2007.911687
, indexed in SCI-E, IF = 2.113
132D. Vouyioukas, G. Kambourakis, I. Maglogiannis, A. Rouskas, C. Kolias, S. Gritzalis, Enabling the Provision of Secure Web based M-Health Services utilizing XML based Security Models, Security and Communication Networks, Vol. 1, No. 5, pp. 375-388, 2008, Wiley InterScience,
http://dx.doi.org/10.1002/sec.46
, indexed in SCI-E, IF = 0.72
133G. Frantzeskou, E. Stamatatos, S. Gritzalis, C. Chaski, B. Howald, Identifying Authorship by Byte Level n-grams: The Source Code Author Profile (SCAP) Method, International Journal of Digital Evidence, Vol. 6, No. 1, pp. 1-15, 2007, Economic Crime Institute,
http://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C82....

134S. Gritzalis, P. Belsis, S. K. Katsikas, Interconnecting Autonomous MedicalDomains: Security, Interoperability and Semantic-Driven Perspectives, IEEE Engineering in Medicine and Biology, Vol. 26, No. 5, pp. 23-28, 2007, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4312664&url=http%3A%2F%2Fi....
, indexed in SCI-E, IF = 1.066
135D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, A. Dagiouklas, S. Gritzalis, A framework for protecting SIP-based infrastructure against Malformed Message Attacks, Computer Networks, Vol. 51, No. 10, pp. 2580-2593, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1389128606003458/pdfft?md5=69c....
, indexed in SCI-E, IF = 0.830
136I. Chatzigiannakis, E. Konstantinou, V. Liagkou, P. Spirakis, Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, Electronic Notes in Theoretical Computer Science, Vol. 171, No. 1, pp. 17-31, 2007, Elsevier

137G. Kambourakis, D. P. Kontoni, A. Rouskas, S. Gritzalis, A PKI Approach for Deploying Modern Secure Distributed e-learning and m-learning Environments, Computers and Education, Vol. 48, No. 1, pp. 1-16, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0360131504001745/pdfft?md5=435....
, indexed in SCI-E, IF = 1.602
138S. Gritzalis, A. Yannacopoulos, C. Lambrinoudakis, P. Hatzopoulos, S. K. Katsikas, A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments, International Journal of Information Security, Vol. 6, No. 4, pp. 197-211, 2007, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs10207-006-0010-x.pdf
, indexed in SCI-E, IF = 1.094
139D. Geneiatakis, C. Lambrinoudakis, An Ontology Description for SIP Security Flaws, Computer Communication, Computer Communication, Vol. 30, No. 6, pp. 1367-1374, 2007, Elsevier,
http://dx.doi.org/10.1016/j.comcom.2006.12.023

140E. Konstantinou, Y. Stamatiou, C. Zaroliagis, Efficient Generation of Secure Elliptic Curves, International Journal of Information Security, Vol. 6, No. 1, pp. 47-63, 2007, Springer
, indexed in SCI-E
141P. Belsis, S. Gritzalis, S. K. Katsikas, Partial and fuzzy constraint satisfaction to support coalition formation, ENTCS Electronic Notes on Theoretical Computer Science, Vol. 179, No. 1, pp. 75-86, 2007, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1571066107003040/pdf?md5=2e70a....

142E. Kavakli, S. Gritzalis, C. Kalloniatis, Protecting Privacy in System Design: The electronic voting case, Tranforming Government: People, Process and Policy journal, Vol. 1, No. 4, pp. 307-332, 2007, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=1750-6166&volume=1&issue=4&artic....

143M. Belsis, A. Dwivedi, S. Gritzalis, R. Bali, R. Naguib, Providing Secure mAccess to Medical Information, International Journal of Electronic Healthcare, Vol. 3, No. 1, pp. 51-71, 2007, InderScience Publishers,
http://inderscience.metapress.com/content/07khkxmmbplm1nyh/fulltext.pdf

144J. A. Onieva, J. Lopez, R. Rodrigo, J. Zhou, S. Gritzalis, Integration of Non-repudiation Services in Mobile Digital Rights Management Scenarios, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 35, No. 3-4, pp. 161-176, 2007, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9050-4.pdf
, indexed in SCI-E, IF = 0.423
145E. Aivaloglou, S. Gritzalis, C. Skianis, Towards a flexible trust establishment framework for sensor networks, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol. 35, No. 3-4, pp. 207-213, 2007, Springer,
http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9049-x.pdf
, indexed in SCI-E, IF = 0.423
146G. Karopoulos, G. Kambourakis, S. Gritzalis, Survey of Secure Hand-off Optimization Schemes for Multimedia Services over all-IP Wireless Heterogeneous Networks, IEEE Communications Surveys and Tutorials, Vol. 9, No. 3, pp. 18-28, 2007, IEEE Press,
https://heim.ifi.uio.no/paalee/referencing_publications/ref-sec-karopoulos-comms....
, indexed in SCI-E, IF = 6.348
147D. Geneiatakis, A. Dagiouklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem, Survey of Security Vulnerabilities in Session Initiation Protocol, IEEE Communications Surveys and Tutorials, Vol. 8, No. 3, pp. 68-81, 2006, IEEE Press,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4020603

148S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis, S. K. Katsikas, A knowledge-based approach to security requirements for e-health applications, The electronic Journal for E-Commerce Tools & Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era, 2006,
http://www.ejeta.org/specialOct06-issue/ejeta-special-06oct-4.pdf

149G. Kambourakis, A. Rouskas, S. Gritzalis, D. Geneiatakis, Support of Subscribers Certificates in a Hybrid WLAN-3G Environment, Computer Networks, Vol. 50, No. 11, pp. 1843-1859, 2006, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1389128605002653/pdfft?md5=732....
, indexed in SCI-E, IF = 0.631
150E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis, Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework, Internet Research, Vol. 16, No. 2, pp. 140-158, 2006, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.607
151D. Fotakis, S. Gritzalis, Efficient Heuristic Algorithms for Correcting the Cascade Vulnerability Problem for Interconnected Networks, Computer Communications, Vol. 29, No. 11, pp. 2109-2122, 2006, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366406000326/pdfft?md5=7ec....
, indexed in SCI-E, IF = 0.444
152L. Mitrou, Videosurveillance in the Decisions of Courts and Data Protection Authority, To Syntagma , Vol. 1, No. 1, 2006, Ekdoseis Sakkoula, (to appear)

153M. Karyda, L. Mitrou, G. Quirchmayr, A framework for outsourcing IS/IT security services, Information Management and Computer Security, Vol. 14, No. 5, pp. 402-415, 2006, Emerald ,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=5&arti....

154L. Mitrou, M. Karyda, Employees Privacy vs. Employers, Telematics and Informatics Journal, Vol. 14, No. 5, pp. 198-217, 2006, Elsevier ,
http://ac.els-cdn.com/S073658530500047X/1-s2.0-S073658530500047X-main.pdf?_tid=2....

155A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Formulating Information Systems Risk Management Strategies through Cultural Theory, Information Management and Computer Security, Vol. 14, No. 3, pp. 198-217, 2006, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=14&issue=3&arti....

156S. Gritzalis, A Policy-ruled Knowledge Dissemination Architecture for Supporting multi-domain Secure Interoperation, The eJournal for Electronic Commerce Tools and Applications, Vol. 1, No. 4, 2006,
http://www.ejeta.org/fourth-issue/ejeta-2005.12.24.23.53.40.pdf

157S. Gritzalis, "Public Key Infrastructure: Research and Applications", International Journal of Information Security, Vol. 5, No. 1, pp. 1-3, 2006, Springer (Editorial),
http://download.springer.com/static/pdf/678/art%253A10.1007%252Fs10207-005-0075-....

158K. Lamprou, S. Gritzalis, S. K. Katsikas, Security Architectures for Online Distance Learning and Training: A review, THEMES in Education, Vol. 7, No. 1, pp. 63-77, 2006,
http://earthlab.uoi.gr/theste/index.php/theste

159P. Rizomiliotis, Constructing Periodic Binary Sequences of Maximum Nonlinear Span, IEEE Transactions on Information Theory, Vol. 52, No. 9, pp. 4257-4261, 2006, IEEE Press ,
doi: 10.1109/TIT.2006.880054
, indexed in SCI-E, IF = 2.650
160S. Gritzalis, Developing a Culture of Privacy in the Global Village, Telematics and Informatics, Vol. 23, No. 3, pp. 157-163, 2006, Elsevier (Editorial),
http://dl.acm.org/citation.cfm?id=1159406

161G. Gousios, E. Aivaloglou, S. Gritzalis, Distributed Component Architectures Security Issues, Computer Standards and Interfaces, Vol. 27, No. 3, pp. 269-284, 2005, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548904000984/pdfft?md5=6bc....
, indexed in SCI-E, IF = 0.620
162P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, I. Chalaris, Flexible Secure heterogeneous File Management in Distributed Environments , IADAT Journal of Advanced Technology, Vol. 1, No. 2, pp. 66-69, 2005, IADAT,
http://www.iadat.org/publication/default.htm

163G. Kambourakis, I. Maglogiannis, A. Rouskas, PKI-based Secure Mobile Access to Electronic Health Services and Data, Technology and Health Care (T&HC), Vol. 13, pp. 511-526, 2005, IOS Press,
http://iospress.metapress.com/content/5ten0ny42h74vmbl/

164E. Tsekmezoglou, J. Iliadis, A Critical View on Internet Voting Technology, The Electronic Journal for E-Commerce Tools & Applications (eJETA.org), Vol. 1, No. 4, 2005,
http://www.ejeta.org/fourth-issue/ejeta-2005.12.25.00.08.19.pdf

165M. Karyda, E. Kiountouzis, S. Kokolakis, Information Systems Security: A Contextual Perspective, Computers and Security Journal, Vol. 24, No. 3, pp. 246-260, 2005, Elsevier ,
http://www.sciencedirect.com/science/article/pii/S0167404804002378
, indexed in SCI-E, IF = 1.430 (5-year)
166M. Theoharidou, S. Kokolakis, M. Karyda, E. Kiountouzis, The insider threat to Information Systems and the effectiveness of ISO 17799, Computers and Security Journal, Vol. 24, No. 6, pp. 472-484, 2005, Elsevier ,
http://www.sciencedirect.com/science/article/pii/S0167404805000684
, indexed in SCI-E, IF = 1.430 (5-year)
167P. Belsis, E. Kiountouzis, S. Kokolakis, Information systems security from a knowledge management perspective, Information Management and Computer Security, Vol. 13, No. 3, pp. 189-202, 2005, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=13&issue=3&arti....

168S. Kokolakis, C. Lambrinoudakis, ICT security standards for healthcare applications, UPGRADE, Special Issue: Standardization for ICT Security, Vol. 6, No. 4, 2005, CEPIS ,
http://www.cepis.org/upgrade/index.jsp?p=0&n=2168&a=3078

169S. Gritzalis, A Good-Practice Guidance on the use of PKI Services in the Public Sector of the European Union Member States, Information Management and Computer Security, Vol. 13, No. 5, pp. 379-398, 2005, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....

170C. Lambrinoudakis, S. Gritzalis, P. Hatzopoulos, A. Yannacopoulos, S. K. Katsikas, A formal model for pricing information systems insurance contracts, Computer Standards and Interfaces, Vol. 27, No. 5, pp. 521-532, 2005, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548905000115/pdfft?md5=a48....
, indexed in SCI-E, IF = 0.620
171A. Roumboutsos, N. Nikitakos, S. Gritzalis, Information Technology Network Security Risk Assessment and Management Framework for Shipping Companies, Maritime Policy and Management, Vol. 32, No. 4, pp. 421-432, 2005, Taylor and Francis Pubs,
http://www.tandfonline.com/doi/pdf/10.1080/03088830500301501
, indexed in SCI-E, IF = 0.616
172T. Balopoulos, S. Gritzalis, S. K. Katsikas, Specifying Privacy Preserving Protocols in Typed MSR, Computer Standards and Interfaces, Vol. 27, No. 5, pp. 501-512, 2005, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0920548905000097/pdfft?md5=97a....
, indexed in SCI-E, IF = 0.620
173D. Lekkas, S. Gritzalis, L. Mitrou, Withdrawing a Declaration of Will: Towards a Framework for Digital Signature Revocation, Internet Research, Vol. 15, No. 4, pp. 400-420, 2005, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.688
174S. Gritzalis, C. Lambrinoudakis, D. Lekkas, S. Deftereos, Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments, IEEE Transactions on Information Technology in BioMedicine, Vol. 9, No. 3, pp. 413-423, 2005, IEEE Press,
http://link.springer.com/content/pdf/10.1023%2FB%3AJOMS.0000044956.55209.75.pdf
, indexed in SCI-E, IF = 1.939
175L. Gymnopoulos, V. Tsoumas, I. Soupionis, S. Gritzalis, A generic Grid security policy reconciliation framework, Internet Research, Vol. 15, No. 5, pp. 508-517, 2005, Emerald,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=15&issue=5&arti....
, indexed in SCI-E, IF = 0.688
176P. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 5, pp. 1840-1848, 2005, IEEE Press,
doi: 10.1109/TIT.2005.846428
, indexed in SCI-E, IF = 2.650
177P. Rizomiliotis, N. Kalouptsidis, Results on the nonlinear span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 4, pp. 1555-1563, 2005, IEEE Press ,
doi: 10.1109/TIT.2005.844090
, indexed in SCI-E, IF = 2.650
178A. Malatras, G. Pavlou, P. Belsis, S. Gritzalis, C. Skourlas, I. Chalaris, Deploying Pervasive Secure Knowledge Management Infrastructures, International Journal of Pervasive Computing and Communications, Vol. 1, No. 4, pp. 265-276, 2005, Troubador Publishing,
http://www.emeraldinsight.com/journals.htm?issn=1742-7371&volume=1&issue=4&artic....

179S. Gritzalis, Enhancing Privacy and Data Protection in Electronic Medical Transactions, Journal of Medical Systems, Vol. 28, No. 6, pp. 535-547, 2004, Springer,
http://www.springerlink.com/content/x4gk240082251694/fulltext.pdf
, indexed in SCI-E, IF = 0.581
180S. Gritzalis, Enhancing Web Privacy and Anonymity in the Digital Era, Information Management and Computer Security, Vol. 12, No. 3, pp. 255-288, 2004, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....

181E. Aivaloglou, G. Vouros, Shoplet and the Personal Market Place model for e-commerce, The electronic journal of e-commerce tools and applications, 2004,
http://www.ejeta.org

182L. Mitrou, The new Electronic Privacy Directive, Law of Information and Communication Media, Vol. 2, No. 3, pp. 371-375, 2004, Nomiki Vivliothiki,
http://www.nb.org

183K. Moulinos, J. Iliadis, V. Tsoumas, Towards Secure Sealing of Privacy Policies, Information Management and Computer Security, Vol. 12, No. 4, pp. 350-361, 2004, MCB University Press,
http://dx.doi.org/10.1108/09685220410553569

184G. Aggelis, S. Gritzalis, C. Lambrinoudakis, Mechanisms for Controlling Access in the Global Grid Environment, Internet Research, Vol. 14, No. 5, pp. 347-352, 2004, Emerald,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.688
185G. Kambourakis, A. Rouskas, G. Kormentzas, S. Gritzalis, Advanced SSL/TLS based Authentication for Secure WLAN-3G Interworking, IEE Proceedings Communications, Vol. 151, No. 5, pp. 501-506, 2004, IEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1344495&url=http%3A%2F%2F....
, indexed in SCI-E, IF = 0.195
186G. Kambourakis, A. Rouskas, S. Gritzalis, Experimental Analysis of an SSL-based AKA mechanism in 3G-and-beyond Wireless Networks, Wireless Personal Communications, Vol. 29, No. 3-4, pp. 303-321, 2004, Kluwer Academic Publishers / Springer,
http://link.springer.com/content/pdf/10.1023%2FB%3AWIRE.0000047068.20203.57.pdf
, indexed in SCI-E, IF = 0.243
187E. Loukis, S. Kokolakis, An architecture for a flexible public sector collaborative environment, eJETA, Vol. 1, No. 3, 2004

188G. Kambourakis, A. Rouskas, S. Gritzalis, Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems, EURASIP Journal on Wireless Communications and Networking, Vol. 1, No. 1, pp. 184-197, 2004, Hindawi Publishing Corporation,
http://downloads.hindawi.com/journals/wcn/2004/314541.pdf
, indexed in SCI-E, IF = 0.974
189J. Iliadis, S. Gritzalis, D. Spinellis, D. De Cock, B. Preneel, D. Gritzalis, Towards a Framework for Evaluating Certificate Status Information Mechanisms, Computer Communications, Vol. 26, No. 16, pp. 1839-1850, 2003, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366403000793/pdfft?md5=42b....
, indexed in SCI-E, IF = 0.556
190J. Iliadis, S. Gritzalis, D. Gritzalis, ADoCSI: Towards an Alternative Mechanism for Disseminating Certificate Status Information, Computer Communications, Vol. 26, No. 16, pp. 1851-1862, 2003, Elsevier,
http://www.sciencedirect.com/science/article/pii/S014036640300080X/pdfft?md5=c50....
, indexed in SCI-E, IF = 0.556
191C. Lambrinoudakis, S. Gritzalis, F. Dridi, G. Pernul, Security Requirements for e-Government Services: A methodological approach for developing a common PKI based security policy, Computer Communications, Vol. 26, No. 16, pp. 1873-1883, 2003, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366403000823/pdfft?md5=62f....
, indexed in SCI-E, IF = 0.556
192S. Deftereos, C. Lambrinoudakis, S. Gritzalis, P. Andriopoulos, D. Georgonikou, A. Aessopos, A macro-directive mechanism that facilitates automating updating and processing of the contents of CEN-compatible Electronic Healthcare Records, Medical Informatics and the Internet in Medicine International Journal, Vol. 28, No. 1, pp. 21-41, 2003, Taylor and Francis Publications,
http://www.ncbi.nlm.nih.gov/pubmed/12851055
, indexed in SCI-E, IF = 0.419
193S. K. Katsikas, S. Gritzalis, A Best Practice Guide for Secure Electronic Commerce, Upgrade, Vol. 3, No. 6, 2002, CEPIS,
http://www.cepis.org/files/cepisupgrade/full-2002-VI.pdf#page=8

194D. Spinellis, K. Moulinos, J. Iliadis, D. Gritzalis, S. Gritzalis, S. K. Katsikas, Deploying a Secure Cyberbazaar by adding Trust on Commercial Transactions, The Electronic Journal for E-Commerce Tools & Applications, Vol. 1, No. 2, 2002, eJETA.org,
http://www.ejeta.org/second-issue/ejeta-2002.05.10.15.43.34.pdf

195D. Lekkas, S. Gritzalis, S. K. Katsikas, Quality assured Trusted Third Parties for deploying secure Internet-based healthcare applications, International Journal of Medical Informatics, Vol. 65, No. 2, pp. 79-96, 2002, Elsevier,
http://www.sciencedirect.com/science/article/pii/S1386505602000060/pdfft?md5=a1c....
, indexed in SCI-E, IF = 1.374
196D. Lekkas, S. Gritzalis, S. K. Katsikas, Deploying Quality Management in Trusted Third Parties within a Medical Environment: Towards ISO9000 Compliance, Health Informatics, Vol. 8, No. 1, pp. 4-14, 2002, SAGE Publications,
http://jhi.sagepub.com/content/8/1/4.full.pdf
, indexed in SCI-E, IF = 1.0
197N. Kolokotronis, P. Rizomiliotis, N. Kalouptsidis, Minimum linear span approximation of binary sequences, IEEE Transactions on Information Theory, Vol. 48, No. 10, pp. 2758-2764, 2002, IEEE Press ,
doi: 10.1109/TIT.2002.802621
, indexed in SCI-E, IF = 2.650
198N. Nikitakos, S. Gritzalis, Risk Management for New Information Technology Insertion in a Shipping Company, Operational Research: An International Journal, Vol. 1, No. 1, pp. 1-10, 2001, Hellenic Operational Research Society ,
http://www.ergasya.tuc.gr/

199S. Gritzalis, D. Gritzalis, A Digital Seal solution for deploying Trust on Commercial Transactions, Information Management and Computer Security, Vol. 9, No. 2, pp. 71-79, 2001, MCB University Press,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=9&issue=2&artic....

200S. Gritzalis, D. Gritzalis, K. Moulinos, J. Iliadis, An integrated Architecture for deploying a Virtual Private Medical Network over the Web, Medical Informatics and the Internet in Medicine journal, Vol. 26, No. 1, pp. 49-72, 2001, Taylor & Francis Publications,
http://informahealthcare.com/doi/pdf/10.1080/14639230117731
, indexed in SCI-E, IF = 0.419
201S. Gritzalis, J. Iliadis, S. Oikonomopoulos, Distributed Component Software Security Issues on Deploying a Secure Electronic Marketplace, Information Management and Computer Security, Vol. 8, No. 1, pp. 5-13, 2000, MCB University Press,
http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=1&artic....

202S. Kokolakis, A. Demopoulos, E. Kiountouzis, The use of business process modelling in information systems security analysis and design, Information Management and Computer Security, Vol. 8, No. 3, pp. 107-116, 2000, MCB,
www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=3&articleid=86....

203S. Kokolakis, E. Kiountouzis, Achieving interoperability in a multiple-security-policies environment, Computers and Security Journal, Vol. 19, No. 3, pp. 267-281, 2000, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404800886150
, indexed in SCI-E, IF = 1.158
204S. Gritzalis, S. K. Katsikas, D. Lekkas, K. Moulinos, E. Polydorou, Securing the electronic market: The KEYSTONE Public Key Infrastructure Architecture”, Computers and Security, Vol. 19, No. 8, pp. 731-746, 2000, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404800080226/pdfft?md5=4bc....
, indexed in SCI-E, IF = 0.743
205C. Lambrinoudakis, S. Gritzalis, Managing Medical and Insurance Information through a Smart Card Based Information System, Journal of Medical Systems, Vol. 24, No. 4, pp. 213-234, 2000, Kluwer Academic Publishers - Plenum Corp.,
http://link.springer.com/content/pdf/10.1023%2FA%3A1005549330655.pdf
, indexed in SCI-E, IF = 0.674
206S. Gritzalis, G. Aggelis, D. Spinellis, Architectures for secure portable executable content, Internet Research, Vol. 9, No. 1, pp. 16-24, 1999, MCB University Press,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....
, indexed in SCI-E, IF = 0.688
207S. Gritzalis, D. Spinellis, P. Georgiadis, Security Protocols over open networks and distributed systems: Formal Methods for their Analysis, Design, and Verification , Computer Communications, Vol. 22, No. 8, pp. 697-709, 1999, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0140366499000304/pdfft?md5=167....
, indexed in SCI-E, IF = 0.556
208D. Spinellis, S. Gritzalis, J. Iliadis, D. Gritzalis, S. K. Katsikas, Trusted third Party services for deploying secure telemedical applications over the Web, Computers & Security, Vol. 18, No. 7, pp. 627-639, 1999, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0167404899820410/pdf?md5=25d4c....
, indexed in SCI-E, IF = 0.743
209S. Gritzalis, J. Iliadis, D. Gritzalis, D. Spinellis, S. K. Katsikas, Developing Secure Web based Medical Applications, Medical Informatics and the Internet in Medicine Journal, Vol. 24, No. 1, pp. 75-90, 1999, Taylor & Francis Publications,
http://informahealthcare.com/doi/pdf/10.1080/146392399298537
, indexed in SCI-E, IF = 0.419
210D. Spinellis, S. Kokolakis, S. Gritzalis, Security requirements, risks, and recommendations for small enterprise and home-office environments, Information Management and Computer Security, Vol. 7, No. 3, pp. 121-128, 1999, MCB University Press ,
http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published....

211S. Gritzalis, D. Spinellis, The Cascade Vulnerability problem: The Detection problem and a Simulated Annealing approach for its Correction problem, Microprocessors and Microsystems, Vol. 21, No. 10, pp. 621-627, 1998, Elsevier,
http://www.sciencedirect.com/science/article/pii/S0141933198000647/pdf?md5=e2d6a....
, indexed in SCI-E, IF = 0.263
212L. Mitrou, Das Griechische Datenschutzgesetz als Beispiel eine problemlosen Umsetzung der EU Datenschutzrichtlinie, Recht der Datenverarbeitung, Vol. 15, No. 2, pp. 56-63, 1998, Datacontext Fachverlag,
http://www.datakontext.com

213S. K. Katsikas, D. Spinellis, J. Iliadis, B. Blobel, Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach, International Journal of Medical Informatics, Vol. 49, No. 1, pp. 59-68, 1998, Elsevier Science

214S. Kokolakis, D. Gritzalis, S. K. Katsikas, Generic security policies for healthcare information systems, Health Informatics Journal, Vol. 4, No. 3, pp. 184-195, 1998, SAGE ,
http://jhi.sagepub.com/content/4/3-4/184.full.pdf+html

215S. Gritzalis, G. Aggelis, Security Issues Surrounding Programming Languges for Mobile Code: JAVA vs. Safe-Tcl, ACM Operating Systems Review, Vol. 32, No. 2, pp. 16-32, 1998, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=506137&type=pdf&CFID=265073195&CFTOKEN=10352....

216A. Douma, Mavroudakis Konstantinos, S. K. Katsikas, D. Gritzalis, Design of a neural network for recognition and classification of computer viruses, Computers & Security, Vol. 14, No. 5, pp. 435-448, 1995

217D. Gritzalis, S. K. Katsikas, S. Gritzalis, A Zero Knowledge Probabilistic Login Protocol, Computers and Security, Vol. 11, No. 8, pp. 733-745, 1992, Elsevier,
http://www.sciencedirect.com/science/article/pii/016740489290129F/pdf?md5=a792be....
, indexed in SCI-E, IF = 0.743


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2017