Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security
   
Publications
Journals
Conferences
Books
Chapter In Books
Conferences Proceedings Editor
Filter:

Year: Members:

Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.

Conferences

1V. Diamantopoulou, A. Androutsopoulou, S. Gritzalis, Υ. Charalabidis, An Assessment of Privacy Preservation in Crowdsourcing Approaches: Towards GDPR Compliance, IEEE RCIS 12nd International Conference on Research Challenges in Information Science, B. Le Grand, (ed), (to appear), May 2018, Nantes, France, IEEE Conference Publishing Services,
http://www.rcis-conf.com/

2M. Anagnostopoulos, G. Kambourakis, S. Gritzalis, D. K. Y. Yau, Never say Never: Authoritative TLD nameserver-powered DNS amplification, The 16th IEEE/IFIP Network Operations and Management Symposium (NOMS 2018), April 2018, Taipei, Taiwan,
http://noms2018.ieee-noms.org/

3M. Sideri, A. Kitsiou , E. Tzortzaki, C. Kalloniatis, S. Gritzalis, I have learned that I must think twice before. An educational intervention for enhancing students’ privacy awareness in FB, e-Democracy 2017 7th International Conference on e-Democracy, S. Katsikas, V. Zorkadis, (eds), pp. 79-95, December 2017, Athens, Greece, Springer CCIS Communications in Computer and Information Science, Vol.792,
http://www.edemocracy2017.eu/

4P. Mavriki, M. Karyda, Using personalization technologies for political purposes: privacy implications, 7th International Conference on eDemocracy, S. Katsikas and V. Zorkadis, (eds), pp. 33-46, December 2017, Athens, Greece, Springer International Publishing AG

5P. Rizomiliotis, E. Molla, S. Gritzalis, REX: a Searchable Symmetric Encryption Scheme Supporting Range Queries, ACM CCSW 2017 9th ACM Cloud Computing Security Workshop, A. Stavrou, G. Karame, (eds), pp. 29-37, November 2017, Dallas, Texas, USA, ACM Press,
https://dl.acm.org/citation.cfm?id=3140653

6G. Fotiadis, E. Konstantinou, Ordinary Pairing-Friendly Genus 2 Hyperelliptic Curves with Absolutely Simple Jacobians, 7th International Conference on Mathematical Aspects of Computer and Information Sciences - MACIS 2017, J. Blömer, I. S. Kotsireas, T. Kutsia, D. Simos, (eds), pp. 409-424, November 2017, Vienna, AT, Springer International Publishing AG,
https://doi.org/10.1007/978-3-319-72453-9_33

7G. Kambourakis, C. Kolias, A. Stavrou, The Mirai Botnet and the IoT Zombie Armies, The 36th IEEE Military Communications Conference (MILCOM 2017), October 2017, Baltimore, MD, USA, IEEE Press,
http://events.afcea.org/milcom17/public/enter.aspx

8M. Anagnostopoulos, G. Kambourakis, P. Drakatos, M. Karavolos, S. Kotsilitis, D. K. Y. Yau, Botnet command and control architectures revisited: Tor Hidden services and Fluxing, The 18th International Conference on Web Information Systems Engineering (WISE 2017), pp. 517-527, October 2017, Moscow, Russia, Springer LNCS Vol. 10570,
http://www.wise-conferences.org/

9C. Kalloniatis, D. Kavroudakis, A. Polydoropoulou, S. Gritzalis, Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts, 2nd SMART-MED Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean, C. Nikolaides, (ed), September 2017, Heraklion, Greece, Springer,
http://www.smartbluecity.com/event

10C. Gkountis, M. Taha, J. Lloret, G. Kambourakis, Lightweight Algorithm for Protecting SDN controller against DDoS attacks, The 10th IFIP Wireless and Mobile Networking Conference (WMNC 2017), September 2017, Valencia, Spain, IEEE Press,
http://jlloret.webs.upv.es/wmnc2017/

11M. Karyda, FOSTERING INFORMATION SECURITY CULTURE IN ORGANISATIONS: A RESEARCH AGENDA, 11th Mediterranean Conference on Information Systems (MCIS 2017) , (to appear), September 2017, Genoa, Italy, AIS Electronic Library (AISeL)

12M. Chalaris, I. Chalaris, S. Gritzalis, Sgouropoulou C., Maturity Level of the Quality Assurance Evaluation Procedures in Higher Education: A qualitative research, PCI 2017 21st Pan-Hellenic Conference on Informatics, I. Anagnostopoulos et al., (eds), September 2017, Larisa, Greece, ACM Press,
https://dl.acm.org/citation.cfm?id=3139438

13A. Skalkos, A. Tsohou, M. Karyda, S. Kokolakis, INVESTIGATING THE VALUES THAT DRIVE THE ADOPTION OF ANONYMITY TOOLS: A LADDERING APPROACH, 11th Mediterranean Conference on Information Systems (MCIS 2017) , September 2017, The 11th Mediterranean Conference on Information Systems Genoa,Italy, AIS Electronic Library (AISeL)

14S. Simou, C. Kalloniatis, S. Gritzalis, Modelling Cloud Forensic-Enabled Services, TRUSTBUS 2017 13th International Conference on Trust, Privacy and Security in Digital Business, S. Fischer-Huebner, C. Lambrinoudakis, (eds), pp. 147-163, August 2017, Lyon, France, Springer LNCS Lecture Notes in Computer Science,
http://www.ds.unipi.gr/trustbus2017/

15V. Diamantopoulou, A. Tsohou, E. Loukis, S. Gritzalis, Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation, AMCIS 2017 23rd Americas Conference on Information Systems, August 2017, Boston, USA, AIS,
https://amcis2017.aisnet.org/

16G. Fotiadis, E. Konstantinou, Pairing-Friendly Elliptic Curves Resistant to TNFS Attacks, 7th International Conference on Algebraic Informatics - CAI 2017, June 2017, Kalamata, Greece

17V. Diamantopoulou, N. Argyropoulos, C. Kalloniatis, S. Gritzalis, Supporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns, IEEE RCIS 2017 11th International Conference on Research Challenges in Information Science, S. Assar, O. Pastor, H. Mouratidis, (eds), pp. 187-198, May 2017, Brighton, UK, IEEE Press,
http://sense-brighton.eu/rcis2017/

18P. Zagouras, C. Kalloniatis, S. Gritzalis, Managing User Experience: Usability and Security in a New Era of Software Supremacy, HCII 2017 19th International Conference on Human-Computer Interaction, T. Tryfonas, (ed), pp. 174-188, May 2017, Vancouver, Canada, Springer LNCS Lecture Notes in Computer Science,
http://2017.hci.international/

19V. Diamantopoulou, C. Kalloniatis, S. Gritzalis, C. Mouratidis, Supporting Privacy by Design using Privacy Process Patterns, IFIP SEC 2017 32nd IFIP International Information Security Conference, S. De Capitani di Vimercati, F. Martinelli, (eds), pp. 491-505, May 2017, Rome, Italy, Springer LNCS,
https://link.springer.com/chapter/10.1007/978-3-319-58469-0_33

20A. Pattakou, C. Kalloniatis, S. Gritzalis, Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review, CLOUD COMPUTING 2017 8th International Conference on Cloud Computing, GRIDs, and Virtualization, P. Dini, (ed), February 2017, Athens, Greece, IARIA,
https://www.iaria.org/conferences2017/CLOUDCOMPUTING17.html

21V. Cozza, Z. Tsiatsikas, M. Conti, G. Kambourakis, Why Snoopy loves online services: An Analysis of (lack of) Privacy in Online Services (ICISSP 2017), The 3rd International Conference on Information Systems Security and Privacy, February 2017, Porto, Portugal, SCITEPRESS,
http://www.icissp.org/

22M. Sideri, A. Filippopoulou, G. Rouvalis , C. Kalloniatis, S. Gritzalis, Social media use for decision making process in educational settings: The Greek case for Leadership’s views and attitudes in Secondary and Tertiary Education, HICSS-50 2017 Hawaii International Conference on System Sciences, T. Bui, R. Sprague, (eds), pp. 2875–2884, January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services,
http://www.hicss.org/

23L. Spiliotopoulou, D. Damopoulos, Υ. Charalabidis, M. Maragoudakis, S. Gritzalis, Europe in the shadow of financial crisis: Policy Making via Stance Classification, HICSS-50 2017 Hawaii International Conference on System Sciences, T. Bui, R. Sprague, (eds), pp. 2835–2844, January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services,
http://www.hicss.org/

24N. Argyropoulos, S. Shei, C. Kalloniatis, C. Mouratidis, A. Delaney, A. Fish, S. Gritzalis, A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements, HICSS-50 2017 Hawaii International Conference on System Sciences, T. Bui, R. Sprague, (eds), pp. 4827-4836, January 2017, Hawaii, USA, IEEE CPS Conference Publishing Services,
http://www.hicss.org/

25A. Kitsiou , E. Tzortzaki, M. Sideri, S. Gritzalis, Digital Privacy and Social Capital on Social Network Sites. Friends or Foes?, STAST 2016 6th International Workshop on Socio-Technical Aspects of Security and Trust, Z. Benenson, C. Gates, (eds), December 2016, Los Angeles, USA, IEEE CPS Conference Publishing Services,
http://stast.uni.lu/

26E. Tzortzaki, A. Kitsiou , M. Sideri, S. Gritzalis, Self-disclosure, Privacy concerns and Social Capital benefits interaction in Facebook: A case study, PCI 2016 20th Pan-Hellenic Conference on Informatics, V. Verykios et al., (eds), November 2016, Patras, Greece, ACM Press,
http://pci2016.teiwest.gr/

27S. Simou, C. Kalloniatis, C. Mouratidis, S. Gritzalis, Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems, TRUSTBUS ‘16 13th International Conference on Trust, Privacy and Security in Digital Business, S. Katsikas, C. Lambrinoudakis, (eds), pp. 35-47, September 2016, Porto, Portugal, Springer LNCS Lecture Notes in Computer Science,
http://www.ds.unipi.gr/trustbus2016/

28Ioannis Stylios, S. Kokolakis, Thanou, O., Chatzis, S., User's Attitudes on Mobile Devices: Can Users' Practices Protect Their Sensitive Data?, 10th Mediterranean Conference on Information Systems (MCIS) 2016, September 2016,
https://www.researchgate.net/publication/304790129_User%27s_Attitudes_on_Mobile_....

29Ioannis Stylios, Thanou, O., Iosif Androulidakis, Elena Zaitseva, A Review of Continuous Authentication Using Behavioral Biometrics, ACM SEEDA-CECNSM 2016, September 2016, ACM,
https://www.researchgate.net/publication/303974524_A_Review_of_Continuous_Authen....

30Ioannis Stylios, Thanou, O., Iosif Androulidakis, Elena Zaitseva, Communication Security & Cyberbullying: A Review of the Legal Issues, ACM SEEDA-CECNSM 2016, September 2016, ACM,
https://www.researchgate.net/publication/303974289_Communication_Security_Cyberb....

31E. Mitakidis, D. Taketzis, A. Fakis, G. Kambourakis, SnoopyBot: An Android spyware to bridge the mixes in Tor, The 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2016), September 2016, Split, Croatia, IEEE Press,
http://marjan.fesb.hr/SoftCOM/2016/

32Z. Tsiatsikas, D. Geneiatakis, G. Kambourakis, S. Gritzalis, Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade, NSS 2016 The 10th International Conference on Network and System Security, M. Yung et al., (eds), September 2016, Taipei, Taiwan, Springer LNCS Lecture Notes in Computer Science,
http://nsclab.org/nss2016/

33A. Pattakou, C. Kalloniatis, S. Gritzalis, Reasoning about security and privacy in cloud computing under a unified meta-model, HAISA 2016 10th International Symposium on Human Aspects of Information Security & Assurance, N. Clarke, S. Furnell, (eds), pp. 55-66, July 2016, Frankfurt, Germany, Haisa,
http://haisa.org/?page=home

34V. Kouliaridis, V. Vlachos, I. Savvas, I. Androulidakis, SIRTOS: A simple real-time operating system, Information and Digital Technologies (IDT), 2016 International Conference on, July 2016, Rzeszow, Poland, IEEE,
https://ieeexplore.ieee.org/document/7557165/

35Karavaras E., E.Magos, A. Tsohou, Low User Awareness Against Social Malware: an Empirical Study and Design of a Security Application, 13th European, Mediterranean and Middle Eastern Conference on Information Systems (EMCIS 2016), June 2016, Krakow, Poland

36I. Topa, M. Karyda, ANALYZING SECURITY BEHAVIOUR DETERMINATS FOR ENHANCING ISP COMPLIANCE AND SECURITY MANAGEMENT, 13th European, Mediterranean and Middle Eastern Conference on Information Systems(EMCIS) 2016, 2016, Krakow, Poland

37M. Sideri, A. Kitsiou , C. Kalloniatis, S. Gritzalis, Privacy and Facebook Universities students’ communities for confessions and secrets: The Greek case, e-Democracy 2015 6th International Conference on e-Democracy, S. K. Katsikas, A. Sideridis, (eds), pp. 77-94, December 2015, Athens, Greece, Springer CCIS Communications in Computer and Information Science,
http://www.edemocracy2015.eu/

38Q. Yang, D. Damopoulos, G. Portokalidis, WYSISNWIV: What You Scan Is Not What I Visit , International Symposium on Recent Advances in Intrusion Detection (RAID), (to appear), November 2015, Kyoto, Japan

39Stylios, I.C., Chatzis, S., Thanou, O., S. Kokolakis, Mobile phones & behavioral modalities: Surveying users’ practices, 23rd Telecommunications Forum (TELFOR 2015), November 2015, Belgrade, Serbia

40Ioannis Stylios, Chatzis, S., Thanou, O., S. Kokolakis, Mobile Phones & Behavioral Modalities: Surveying users’ practices, TELFOR 2015 International IEEE Conference, November 2015, IEEE,
https://www.researchgate.net/publication/283477804_Mobile_Phones__Behavioral_Mod....

41F. Giannakas, G. Kambourakis, S. Gritzalis, CyberAware: A Mobile Game-based app for Cybersecurity Education and Awareness, IMCL 2015 International Conference on Interactive Mobile Communication, Technologies and Learning, M. Auer, (ed), November 2015, Thessaloniki, Greece, IEEE CPS Conference Publishing Services,
http://www.imcl-conference.org/imcl2015/

42K. Vemou, M. Karyda, Evaluating privacy practices in Web 2.0 services, 9th Mediterranean Conference on Information Systems, October 2015, Samos, Greece, Association of Information Systems (AIS)

43P. Rizomiliotis, S. Gritzalis, ORAM based forward privacy preserving Dynamic Searchable Symmetric Encryption Schemes, ACM CCSW 2015 7th ACM Cloud Computing Security Workshop, C. Nita-Rotaru, F. Kerschbaum, (eds), pp. 65-76, October 2015, Denver, USA, ACM Press,
http://ccsw.ics.uci.edu/15/

44P. Drogkaris, A. Gritzalis, A Privacy Preserving Framework for Big Data in e-Government Environments, 12th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2015), Javier Lopez, Fischer-Huebner Simone, Costas Lambrinoudakis, (eds), pp. 210-218, September 2015, Valencia, Spain, Springer LNCS,
http://link.springer.com/chapter/10.1007/978-3-319-22906-5_16

45Z. Tsiatsikas, M. Anagnostopoulos, G. Kambourakis, S. Lambrou, D. Geneiatakis, Hidden in plain sight. SDP-based covert channel for Botnet communication, 12th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2015), September 2015, Valencia, Spain, Springer,
http://www.ds.unipi.gr/trustbus15/

46Z. Tsiatsikas, A. Fakis, D. Papamartzivanos, D. Geneiatakis, G. Kambourakis, C. Kolias, Battling against DDoS in SIP. Is machine learning-based detection an effective weapon?, The 12th International Conference on Security and Cryptography (SECRYPT 2015) , July 2015, Colmar, France, SCITEPRESS,
http://www.secrypt.icete.org/

47S. Simou, C. Kalloniatis, C. Mouratidis, S. Gritzalis, A Meta-model for assisting a Cloud Forensics Process, CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems, A. Gabillon, (ed), pp. 177-187, July 2015, Mytilene, Greece, Springer LNCS Lecture Notes in Computer Science,
http://www.ds.unipi.gr/crisis2015/

48E. Kavakli, F. Bantimaroudis, C. Kalloniatis, S. Gritzalis, K. Avgeri, Towards the Design of Trustworthy Websites for Cultural Organizations: A Visitor’s perspective, EMCIS 2015 12th Mediterranean and Middle Eastern Conference on Information Systems, V. Morabito, (ed), June 2015, Athens, Greece, EMCIS,
http://emcis.eu/

49K. Vemou, G. Mousa, M. Karyda, On the low diffusion of Privacy-enhancing Technologies in Social Networking: results of an empirical investigation, 12th European, Mediterranean & Middle Eastern Conference on Information Systems 2015 (EMCIS2015), June 2015, Athens, Greece

50P. Drogkaris, Promoting Intelligent Analysts Training through Serious Gaming: The LEILA Approach, 12th European Mediterranean & Middle Eastern Conference on Information Systems, June 2015, Athens, Greece, EMCIS Conference Proceedings

51S. Simou, C. Kalloniatis, C. Mouratidis, S. Gritzalis, Towards the development of a Cloud Forensics Methodology: A Conceptual Model, WISSE 2015 5th International Workshop on Information Systems Security Engineering, D. Rosado, (eds), pp. 470-481, June 2015, Stockholm, Sweden, Springer LNCS Lecture Notes in Computer Science,
http://caise2015.dsv.su.se/call-for-papers/workshops/wisse/

52I. Topa, M. Karyda, Identifying Factors that Influence Employees’ Security Behavior for Enhancing ISP Compliance, 12th Trust, Privacy and Security in Digital Business International Conference, pp. 169-179, 2015, Valencia, Spain, Springer International Publishing

53D. Kasiaras, T. Zafeiropoulos, N. Clarke, G. Kambourakis, Android Forensics: Correlation Analysis, The 9th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 157-162, December 2014, London, UK, IEEE Press,
http://www.icitst.org/

54G. Tzelepis, T. Skentos, Ioannis Stylios, Study and environmental surveying on the Fire of Parnitha with Geographic Information Systems (GIS) for similar natural risk management in the future, 8th Hellenic Conference HellasGIs, December 2014, HellasGIs,
https://www.researchgate.net/publication/274731891_Melete_kai_periballontike_apo....

55Z. Tsiatsikas, G. Kambourakis, D. Geneiatakis, Exposing Resource Consumption Attacks in Internet Multimedia Services, The 14th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2014) - Security Track, December 2014, Noida, India, IEEE Press,
http://www.isspit.org/isspit/2014/

56L. Mitrou, P. Drogkaris, G. Leventakis, Legal and Social Aspects of Surveillance Technologies: CCTV in Greece, International Conference on Citizens’ Perspectives on Surveillance, Security and Privacy: Controversies, Alternatives and Solutions, pp. 39-41, November 2014, Vienna, Austria, Conference Proceedings

57Ioannis Stylios, V. Vlachos, Iosif Androulidakis, Performance Comparison of Machine Learning Algorithms for Diagnosis of Cardiotocograms with Class Inequality, TELFOR 2014 International IEEE Conference, November 2014, IEEE,
https://www.researchgate.net/publication/274732174_Performance_Comparison_of_Mac....

58K. Vemou, M. Karyda, S. Kokolakis, Directions for Raising Privacy Awareness in SNS Platforms, 18th Panhellenic Conference on Informatics, pp. 1-6, October 2014, Athens, ACM New York,
http://dl.acm.org/citation.cfm?id=2645794

59A. Latsiou, P. Rizomiliotis, The Rainy Season of Cryptography, Proceedings of the 18th Panhellenic Conference on Informatics, pp. 1-6, October 2014, ACM,
http://dl.acm.org/citation.cfm?id=2645798

60D. Papamartzivanos, D. Damopoulos, G. Kambourakis, A cloud-based architecture to crowdsource mobile app privacy leaks, The 18th Panhellenic Conference on Informatics (PCI 2014), special session on Security and Privacy Issues in the Cloud Computing Era, pp. 1-6, October 2014, Athens, Greece, ACM press,
http://dl.acm.org/citation.cfm?id=2645799

61I. Chalaris, M. Chalaris, S. Gritzalis, A holistic approach for quality assurance and advanced decision making for academic institutions using the balanced scorecard technique, PCI 2014 18th Pan-Hellenic Conference on Informatics, E. Carayiannis, T. Varvarigou, M. Nikolaidou, (eds), pp. 1-6, October 2014, Athens, Greece, ACM Press,
http://pci2014.hua.gr/

62G. Fotiadis, E. Konstantinou, More Sparse Families of Pairing-Friendly Elliptic Curves, 13th International Conference on Cryptology and Network Security – CANS’2014, D. Gritzalis, A. Kiayias, I. Askoxylakis, (eds), pp. 384-389, October 2014, Heraklion, Crete, GR, Springer, Cham,
https://doi.org/10.1007/978-3-319-12280-9_25

63P. Drogkaris, A. Gritzalis, C. Lambrinoudakis, Empowering Users to Specify and Manage their Privacy Preferences in e-Government Environments, 3rd International Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2014), Andrea Kö, Enrico Francesconi, (eds), pp. 237 - 245, September 2014, Munich, Germany, Springer LNCS,
http://link.springer.com/chapter/10.1007/978-3-319-10178-1_19

64P. Diamantatos, E. Kavallieratou, S. Gritzalis, Writer Identification using Statistical and Model Based Approach, ICFHR 2014 14th International Conference on Frontiers in Handwriting Recognition, J. Llados, R. Manmatha, C. - L. Tan, (eds), pp. 589-594, September 2014, Crete, Greece, ICFHR ,
http://www.icfhr2014.org/

65G. Karopoulos, A. Fakis, G. Kambourakis, Complete SIP message obfuscation: PrivaSIP over Tor, The 9th International Conference on Availability, Reliability and Security (ARES 2014) - 9th International Workshop on Frontiers in Availability, Reliability and Security (FARES), A. M. Tjoa, E. Weippl et al., (eds), pp. 217-226, September 2014, Fribourg, Switzerland , IEEE CPS,
http://www.ares-conference.eu/conference/

66C. Beckers, S. Faßbender , S. Gritzalis, M. Heisel, C. Kalloniatis, R. Meis, Privacy-Aware Cloud Deployment Scenario Selection, TRUSTBUS ‘14 11th International Conference on Trust, Privacy and Security in Digital Business, G. Pernull, S. Katsikas, (eds), pp. 94-105, August 2014, Munich, Germany, Springer LNCS Lecture Notes in Computer Science,
http://www.dexa.org/previous/dexa2014/program8cfa.html?cid=444

67H. Jiang , A. Tsohou, The Dual Nature of Personal Web Usage At Workplace: Impacts, Antecedents And Regulating Policies, European Conference on Information Systems (ECIS), June 2014, Tel Aviv, Israel

68H. Jiang , A. Tsohou, Expressive Or Instrumental: A Dual-Perspective Model Of Personal Web Usage At Workplace (Research in Progress) , European Conference on Information Systems (ECIS), June 2014, Tel Aviv, Israel

69P. Drogkaris, G. Leventakis, A. Sfetsos, Promoting Law Enforcement Capabilities through Asynchronous Training and Serious Games in the Fight against Cybercrime, International Conference, The Rule of Law in a era of change: Security, Social Justice and Inclusive Governance, June 2014, Athens, Greece, Conference Proceedings

70T. Spyridopoulos, I. Topa, T. Tryfonas, M. Karyda, A holistic approach for Cyber Assurance of Critical Infrastructure with the Viable System Model, 29th IFIP TC 11 International Conference, SEC 2014, pp. 438-445, June 2014, Marrakech, Morocco, Springer Berlin Heidelberg,
http://link.springer.com/chapter/10.1007%2F978-3-642-55415-5_37

71S. Simou, C. Kalloniatis, E. Kavakli, S. Gritzalis, Cloud Forensics: Identifying the Major Issues and Challenges, CAiSE 2014 26th International Conference on Advanced Information Systems Engineering, M. Jarke, J. Mylopoulos, C. Quix , (eds), pp. 271-284, June 2014, Thessaloniki, Greece, Springer LNCS Lecture Notes in Computer Science,
http://delab.csd.auth.gr/caise2014/

72S. Simou, C. Kalloniatis, E. Kavakli, S. Gritzalis, Cloud Forensics Solutions: A Review, WISSE 2014 4th International Workshop on Information Systems Security Engineering, H. Mouratidis, (ed), pp. 299-309, June 2014, Thessaloniki, Greece, Springer LNCS Lecture Notes in Computer Science,
http://gsya.esi.uclm.es/WISSE2014/

73D. Damopoulos, G. Kambourakis, G. Portokalidis, The Best of Both Worlds. A Framework for the Synergistic Operation of Host and Cloud Anomaly-based IDS for Smartphones, The 7th European Workshop on Systems Security (EuroSec 2014), April 2014, Amsterdam, The Netherlands, ACM Press,
http://www.syssec-project.eu/eurosec-2014/

74K. Vemou, M. Karyda, Embedding privacy practices in social networking services, 7th IADIS International Conference Information Systems 2014, P. Powell, M. B. Nunes and P. Isaías, (eds), pp. 201-208, March 2014, Madrid, Spain, IADIS Press

75E. Aivaloglou, C. Alexopoulos, title, conf, editors, (eds), pp. 350, January 2014, tenessi, publisher,
http://www.aegean.gr

76P. Rizomiliotis, Oblivious RAM: State of the Art and New Constructions, BalkanCrypt 2013, T. Baicheva, S. Nikova, T. Yalcin, (eds), (to appear), November 2013, Sofia, Bulgaria

77M. Pavlidis, E. Kavakli, F. Bantimaroudis, C. Mouratidis, C. Kalloniatis, S. Gritzalis, The role of trust for the development of cultural internet-based systems, EMCIS 2013 European, Mediterranean, and Middle Eastern Conference on Information Systems, A. Ghoneim, M. Kamal, (eds), October 2013, London, UK, EMCIS [Best Paper Award],
http://www.ct.aegean.gr/people/vkavakli/publications/pdf_files/2013_EMCIS.pdf

78M. Chalaris, S. Gritzalis, M. Maragoudakis, C. Sgouropoulou, A. Tsolakidis, Improving quality of educational processes providing new knowledge using data mining techniques, 3rd IC-ININFO International Conference on Integrated Information, D. Sakas, (ed), September 2013, Prague, Czech, Procedia, Elsevier,
http://www.icininfo.net/

79P. Belsis, S. Gritzalis, C. Lambrinoudakis, C. Skourlas, V. Tsoukalas, D. Vassis, An agent based architecture benchmark, 3rd IC-ININFO International Conference on Integrated Information, D. Sakas, (ed), September 2013, Prague, Czech, Procedia, Elsevier,
http://www.icininfo.net/

80D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection using Semantics, Event Processing and Sequential Analysis, 8th International Conference on Critical Information Infrastructures Security (CRITIS 2013), E. Luiijf and P. Hartel, (eds), pp. 133-141, September 2013, Amsterdam, Springer LNCS,
http://link.springer.com/chapter/10.1007%2F978-3-319-03964-0_12

81Z. Tsiatsikas, D. Geneiatakis, G. Kambourakis, A. Keromytis, Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP, The 8th International Conference on Availability, Reliability and Security (ARES 2013), pp. 224-229, September 2013, Regensburg, Germany, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6657244&url=http%3A%2F%2Fi....

82G. Fotiadis, E. Konstantinou, On the Efficient Generation of Generalized MNT Elliptic Curves, 5th International Conference on Algebraic Informatics - CAI 2013, T. Muntean, D. Poulakis, R. Rolland, (eds), pp. 147-159, September 2013, Porquerolles Island, FR, Springer, Berlin, Heidelberg,
https://doi.org/10.1007/978-3-642-40663-8_15

83M. Pavlidis, C. Mouratidis, C. Kalloniatis, S. Islam, S. Gritzalis, Trustworthy Selection of Cloud Providers based on Security and Privacy Requirements: Justifying Trust Assumptions, TRUSTBUS 2013 10th International Conference on Trust, Privacy and Security in Digital Business, S. Furnell, C. Lambrinoudakis, (eds), pp. 185-198, August 2013, Prague, Czech, Springer LNCS Lecture Notes in Computer Science,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-40343-9_16.pdf

84K. Vemou, M. Karyda, Α classification of factors influencing low adoption of PETs among SNS users, 10th International Conference on Trust, Privacy & Security in Digital Business, S. Furnell, C. Lambrinoudakis, and J. Lopez, (eds), pp. 74-84, August 2013, Prague, Czech Republic, Springer,
http://link.springer.com/chapter/10.1007/978-3-642-40343-9_7

85 K. Anastasopoulou, S. Kokolakis, T. Tryfonas, Analysis of strategic stakeholder interactions in cloudbased mobile app use by privacy-sensitive end users (invited paper), 15th International Conference on Human-Computer Interaction (HCII2013), July 2013, Las Vegas, Nevada, USA, [The HCII 2013 Conference Proceedings will be published by Springer

86M. Kandias, L. Mitrou, V. Stavrou, D. Gritzalis, Which side are you on? A new Panopticon vs. privacy, 10th International Conference on Security and Cryptography (SECRYPT 2013), Samarati P., et al. , (eds), pp. 98-110, July 2013, Iceland

87D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, A Blend of Semantic Monitoring and Intrusion Detection Systems for the Protection of Critical Infrastructures: Research efforts within the Greek Cybercrime Center, Fifth International Conference on Computanional Intelligence, Communication Systems and Networks (CICSYN 2013), G. Romero, A. Orsoni, (eds), June 2013, Spain, IEEE CPS

88M. Kandias, K. Galbogini, L. Mitrou, D. Gritzalis, Insiders trapped in the mirror reveal themselves in social media, 7th International Conference on Network and System Security (NSS 2013), LNCS 7873, pp. 220-235, June 2013, Spain, Springer

89E. Konstantinou, An Efficient Constant Round ID-based Group Key Agreement Protocol for Ad hoc Networks, 7th International Conference on Network and System Security - NSS 2013, June 2013, Madrid, Spain, Springer

90B. Genge, C. Siaterlis, G. Karopoulos, Data fusion-base anomaly detection in networked critical infrastructures, Dependable Systems and Networks Workshop, pp. 1-8, June 2013, Budapest, IEEE,
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6615505

91V. Manousakis, C. Kalloniatis, E. Kavakli, S. Gritzalis, Privacy in the Cloud: Bridging the Gap between Design and Implementation, WISSE 2013 3rd International Workshop on Information Systems Security Engineering, D. Rosado, N. Lammari, (eds), pp. 455-465, June 2013, Valencia, Spain, Springer LNCS Lecture Notes in Computer Science,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-38490-5_41.pdf

92F. Giannakas, Didactical and Pedagogical use of I.C.T. at Primary School with S.R.E.P : Understand, communicate, seek, collaborate and implement, 3rd Pan-Hellenic Conference "Integration and Use of ICTs to the Education Process", May 2013, Piraeus, Greece

93D. Kostopoulos, V. Tsoulkas, G. Leventakis, P. Drogkaris, V. Politopoulou, Semantic Systems Modeling and Monitoring for Real Time Decision Making: Results and Next Steps within the Greek Cyber Security Center of Excellence, AMSS 15th International Conference on Modelling and Simulation (UK-SIM 2013), April 2013, Cambridge UK, IEEE CPS

94C. Kalloniatis, V. Manousakis, C. Mouratidis, S. Gritzalis, Migrating into the Cloud: Identifying the Major Security and Privacy Concerns, I3E 2013 12th IFIP Conference on e-Business, e-Services, e-Society, C. Douligeris, N. Polemi, (eds), pp. 73-87, April 2013, Piraeus, Greece, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-37437-1_7.pdf

95P. Rizomiliotis, S. Gritzalis, Revisiting Lightweight Authentication Protocols based on Hard Learning Problems, ACM WiSec 2013 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, A.-R. Sadeghi, M. Gruteser, (eds), pp. 125-130, April 2013, Budapest, Hungary, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=2462118&ftid=1363558&dwn=1&CFID=265073195&CF....

96G. Kambourakis, D. Damopoulos, A competent post-authentication and non-repudiation biometric-based scheme for m-Learning, The 10th IASTED International Conference on Web-based Education (WBE 2013), V. Uskov, (ed), pp. 821-827, February 2013, Innsbruck, Austria, ACTA Press,
http://www.actapress.com/Abstract.aspx?paperId=455465

97Oh J., Lee H., A. Tsohou, Relational Versus Structural Embeddedness in IT Outsourcing Networks: The Role Of Requirement Unpredictability And Measurement Difficulty, 17th Pacific Asia Conference on Information Systems (PACIS 2013), 2013, Jeju Island, Korea

98E. Lalas, L. Mitrou, C. Lambrinoudakis, ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence, 10th International Conference on Trust, Privacy & Security in Digital Business (TRUSTBUS 2013), LNCS 8058, S. Furnell, C. Lambrinoudakis, J. Lopez, (eds), pp. 137-148, 2013, Chech Republic, Springer

99M. Kandias, V. Stavrou, N. Bozovic, L. Mitrou, D. Gritzalis, Predicting the insider threat via social media: The YouTube case, 12th Workshop on Privacy in the Electronic Society (WPES 2013), 2013, Berlin, ACM Press

100M. Kandias, V. Stavrou, N. Bozovic, L. Mitrou, D. Gritzalis, Can we trust this user? Predicting insider’s attitude via YouTube usage profiling, 10th IEEE International Conference on Autonomous and Trusted Computing (ATC 2013), 2013, Italy, IEEE Press

101L. Mitrou, Naming and Blaming in Greece: Social Control as Law Enforcement Tool, Living in Surveillance Societies (LISS 2013), Webster W. et al., (eds), pp. 247-258, 2013, Great Britain

102K. Ntalianis, E. Sardis, N. Tsapatsoulis, A. Doulamis, P. Rizomiliotis, Multiocular Surveillance of Wide Dynamic Environments Based on Optical Vision, Event Modeling and End-to-End Data Encryption - A Cloud-based Monitoring approach of Maritime Activities, IEEE GlobeCom 2012, Man-Sec Workshop, H. Eslambolchi, (ed), December 2012, Anaheim, California, USA, IEEE Press

103N.Marangos, P. Rizomiliotis, L. Mitrou, Digital Forensics in the Cloud Computing Era, IEEE GlobeCom 2012, Man-Sec Workshop, H. Eslambolchi, (ed), December 2012, Anaheim, California, USA, IEEE Press

104 K. Anastasopoulou, S. Kokolakis, T. Tryfonas, Analysis of strategic stakeholder interactions in cloudbased mobile app use by privacy-sensitive end users, Conference on Decision and Game Theory for Security (GameSec2012), November 2012, Budapest, Hungary

105C. Kalyvas, E. Konstantinou, G. Kambourakis, Modeling Multiple Modes of Operation with Alloy, International Conference on Security Technology (SecTech 2012), T.H. Kim et al., (eds), pp. 78-85, November 2012, Jeju, Korea, CCIS 339, Springer,
http://link.springer.com/chapter/10.1007%2F978-3-642-35264-5_11

106S. Kokolakis, K. Anastasopoulou, M. Karyda, An Analysis of Privacy-related Strategic Choices of Buyers and Sellers in e-Commerce Transactions, 16th Panhellenic Conference on Informatics (PCI2012), October 2012, Piraeus, CPS

107P. Belsis, S. Gritzalis, C. C. Marinagi, C. Skourlas, D. Vassis, Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing Students, PCI 2012 16th Pan-Hellenic Conference on Informatics, D. Vergados, C. Lambrinoudakis, (eds), pp. 369-374, October 2012, Piraues, Greece, IEEE CPS Conference Publishing Services,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6377420&url=http%3A%2F%2Fi....

108P. Rizomiliotis, C. Skianis, PASSIVE: Policy-Assessed system-level Security, 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012 ), S. Fischer-Hübner, S. Katsikas , (eds), September 2012, Vienna, Austria, Springer

109A. Katsiotis, N. Kalouptsidis, P. Rizomiliotis, Recursive Flexible Convolutional Encoders for Parallel Concatenation, International Symposium on Turbo Codes & Iterative Information Processing (ISTC), E. Agrell, J. B. Anderson, E. G. Larsson, (eds), August 2012, Gothenburg, Sweden, IEEE Press

110Maria Eleni Skarkala, Hannu Toivonen, Pirjo Moen, M. Maragoudakis, S. Gritzalis, L. Mitrou, Privacy Preservation by k-Anonymization of Weighted Social Networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, P. Yu, K. Carley et al., (eds), pp. 423-428, August 2012, Istanbul, Turkey, IEEE CPS Conference Publishing Services,
http://dl.acm.org/ft_gateway.cfm?id=2457065&ftid=1367437&dwn=1&CFID=265073195&CF....

111A. Tsohou, Lee H., K. Al-Yafi, Evaluating M-Government Applications: An Elaboration Likelihood Model Framework, European, Mediterranean & Middle Eastern Conference on Information Systems , Ghoneim A., Klischewski R., Schrödl H., Muhammed K., (eds), pp. 154-160, June 2012, Munich, Germany

112A. Tsohou, Lee H., Z. Irani, V. Weerakkody , I. Osman, A. Latif, T. Medeni, Evaluating E-Government Services From A Citizens’ Perspective: A Reference Process Model, European, Mediterranean & Middle Eastern Conference on Information Systems , Ghoneim A., Klischewski R., Schrödl H., Muhammed K., (eds), pp. 146-153, June 2012, Munich, Germany

113L. Mitrou, M. Karyda, EU΄s Data Protection Reform and the right to be forgotten - A legal response to a technological challenge?, 5th International Conference of Information Law and Ethics, Available at SSRN: http://ssrn.com/abstract=2165245, June 2012, Corfu, Greece

114R. El-Haddadeh , A. Tsohou, M. Karyda, Implementation challenges for information security awareness initiatives in e-Government, European Conference on Information Systems, Paper 179, June 2012, Barcelona, Spain, AIS Electronic Library (AISeL)

115P. Rizomiliotis, S. Gritzalis, GHB#: a provably secure HB-like lightweight authentication protocol, ACNS 2012 10th International Conference on Applied Cryptography and Network Security, F.Bao, P. Samarati, (eds), pp. 489-506, June 2012, Singapore, Springer Lecture Notes in Computer Science LNCS,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-31284-7_29.pdf

116D. Damopoulos, G. Kambourakis, S. Gritzalis, Sang Oh Park, Lifting the veil on mobile malware: A complete dynamic solution for iOS, The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer), June 2012, Vancouver, Canada, FTRA,
http://www.icsd.aegean.gr/publication_files/conference/195992784.pdf

117C. Kalloniatis, P. Belsis, E. Kavakli, S. Gritzalis, Applying soft computing technologies for implementing privacy-aware systems, WISSE 2012 2nd International Workshop on Information Systems Security Engineering, C. Mouratidis, D. Rosado, N. Lammari, (eds), pp. 31-45, June 2012, Gdansk, Poland, Springer LNBIP Lecture Notes in Business Information Processing,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-31069-0_3.pdf

118G. Karopoulos, P. Mori, F. Martinelli, Continuous Authorizations in SIP with Usage Control, 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012), pp. 283-287, February 2012, Garching, Germany, IEEE

119D. Damopoulos, G. Kambourakis, M. Anagnostopoulos, S. Gritzalis, J. H. Park, User-privacy and modern smartphones: A Siri(ous) dilemma, FTRA AIM 2012 International Conference on Advanced IT, Engineering and Management, S. Rho, N. Chilamkurti, W.-E. Chen, S.-O. Park, (eds), February 2012, Seoul, FTRA,
http://download.springer.com/static/pdf/213/art%253A10.1007%252Fs00779-012-0579-....

120A. Tsohou, Lee H., M. Barbos, A location based persuasive information system for public consultation: An elaboration likelihood mode approach, 2nd International Workshop on Advanced Service Management, 2012, Matsmoto, Japan

121E. Chatzicharalampous, G. Frantzeskou, E. Stamatatos, Author Identification in Imbalanced Sets of Source Code Samples, 24th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2012), pp. 790-797, 2012

122P. Makris, D. N. Skoutas, P. Rizomiliotis, C. Skianis, A User-Oriented, Customizable Infrastructure Sharing Approach for Hybrid Cloud Computing Environments, IEEE International Conference on Cloud Computing Technology and Science 2011 (IEEE CloudCom), (to appear), November 2011, Athens, Greece, IEEE Press

123E. Loukis, S. Kokolakis, K. Anastasopoulou, Factors of PKI adoption in European firms, The 6th Mediterranean Conference on Information Systems (MCIS) 2011, September 2011, Cyprus

124P. Rizomiliotis, E. Rekleitis, S. Gritzalis, Designing secure RFID authentication protocols is (still) a non-trivial task, NSS 2011 5th International Conference on Network and Systems Security, P. Samarati, S. Foresti, J. Hu, (eds), pp. 73-80, September 2011, Milan, Italy, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6059962&url=http%3A%2F%2Fi....

125Maria Eleni Skarkala, M. Maragoudakis, S. Gritzalis, L. Mitrou, Privacy Preserving Tree Augmented Naïve Bayesian Multi – party Implementation on Horizontally Partitioned Databases, TrustBus 2011 8th International Conference on Trust, Privacy and Security of Digital Business, S. Furnell, C. Lambrinoudakis, and G. Pernul, (eds), pp. 62 - 73, August 2011, Toulouse, France, Lecture Notes in Computer Science LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-22890-2_6.pdf

126E. Konstantinou, E. Klaoudatou, P. Kamparmpakis, Performance Evaluation of ID-based Group Key Agreement Protocols, Sixth International Conference on Availability, Reliability and Security (AReS 2011), August 2011, Vienna, Austria, IEEE CPS

127I. Agudo, D. Nunez , G. Giammatteo, P. Rizomiliotis, C. Lambrinoudakis, Cryptography goes to the Cloud, Secure and Trust Computing, data management, and Applications (STA) 2011, STAVE workshop, J. Lopez, (ed), (to appear), June 2011, Loutraki, Greece, Springer CCIS

128A. Waller, I. Sandy, E. Power, E. Aivaloglou, C. Skianis, A. Muñoz, A. Mana, Policy Based Management for Security in Cloud Computing, STAVE 2011 1st International Workshop on Security & Trust for Applications in Virtualised Environments, J. Lopez, (ed), June 2011, Loutraki, Greece, Springer CCIS

129G. Karopoulos, F. Martinelli, IMS session management based on Usage Control, The 8th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), pp. 71-78, June 2011, Loutraki, Greece, Springer

130D. Nunez , I. Agudo, P. Drogkaris, S. Gritzalis, Identity Management Challenges for Intercloud Applications, STAVE 2011 1st International Workshop on Security & Trust for Applications in Virtualised Environments, C. Skianis, (ed), pp. 198-204, June 2011, Loutraki, Greece, Springer CCIS,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-22365-5_24.pdf

131D. Damopoulos, G. Kambourakis, S. Gritzalis, iSAM: An iPhone Stealth Airborne Malware, IFIP SEC 2011 26th IFIP TC-11 International Information Security Conference, J. Camenisch, S. Fischer-Huebner, Y. SJ Murayama, (eds), pp. 17-28, June 2011, Lucerne, Switzerland, IFIP Advances in Information and Communication Technology, Vol. 354, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-21424-0_2.pdf

132Lim J., Lee H., A. Tsohou, What makes online brand community prosperous? The mediating role of sense of belonging and brand loyalty, LG CNS / KrAIS Workshop 2011, a post ICIS 2011 program, Shanghai, China, (to appear), 2011

133E. Rekleitis, P. Rizomiliotis, S. Gritzalis, A holistic approach to RFID security and privacy, SecIoT 2010 1st International Workshop on the Security of the Internet of Things, J. Zhou. et al., (eds), December 2010, Tokyo, Japan,
http://www.researchgate.net/publication/235781173_A_holistic_approach_to_RFID_se....

134A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Analyzing Information Security Awareness through Networks of Association, 7th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2010), pp. 227-237, September 2010, Bilbao, Spain, Lecture Notes in Computer Science, Springer

135P. Drogkaris, S. Gritzalis, Attaching Multiple Personal Identifiers in X.509 Digital Certificates, EuroPKI 2010 7th European Workshop on Public Key Services, Applications and Infrastructures, J. Camenisch and C. Lambrinoudakis, (eds), pp. 171-177, September 2010, Athens, Greece, Springer LNCS,
http://download.springer.com/static/pdf/65/chp%253A10.1007%252F978-3-642-22633-5....

136P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era, EGOVIS 2010 International Conference on Electronic Government and the Information Systems Perspective, R.Wagner, (ed), pp. 142-149, September 2010, Bilbao, Spain, Springer LNCS,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-15172-9_14.pdf

137F. Giannakas, K. Papanikolaou, Interaction Analysis at synchronous educational environments, 7th Pan-Hellenic Conference with International participation, September 2010, Korinthos, Greece,
http://korinthos.uop.gr/~hcicte10/

138E. Rekleitis, P. Rizomiliotis, S. Gritzalis, An Agent Based Back-end RFID Tag Management System, TrustBus’10 7th International Conference on Trust, Privacy and Security in Digital Business, S.Katsikas, J.Lopez, M. Soriano , (eds), pp. 165-176, August 2010, Bilbao, Spain, Springer Berlin Heidelberg,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-15152-1_15.pdf

139R. Evans, A. Tsohou, T. Tryfonas, T. Morgan, Architecting Secure Systems with the ISO standards 26702 and 27001, 5th IEEE International Conference on Systems of Systems Engineering (SoSE 2010), June 2010, Loughborough, UK, IEEE Computer Society Press

140N. Vrakas, C. Kalloniatis, A. Tsohou, C. Lambrinoudakis, Privacy Requirements Engineering for Trustworthy e-Government Services, 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), pp. 298-307, June 2010, Berlin, Germany, Lecture Notes in Computer Science series, Springer

141A. Tsohou, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, Unifying ISO Security Standards Practices into a Single Security Framework, 2010 South African Information Security Multi-Conference, May 2010, Port Elisabeth, South Africa,
https://www.google.gr/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCkQ....

142F. Giannakas, An alternative proposal with the design of electronic games for the teaching of Multimedia-Networks lesson to the Secondary Education, 5th Pan-Hellenic Conference at the Didactic of Informatics, April 2010, Athens, Greece,
http://hermes2.di.uoa.gr:8080/didinf5/

143P. Rizomiliotis, Misusing universal hash functions: security analysis of a hardware efficient stream cipher using LFSR based hash function, IEEE Information Theory Workshop, January 2010, Cairo, Egypt, IEEE Press

144G. Kambourakis, E. Konstantinou, S. Gritzalis, Revisiting WiMAX MBS Security, FTRG ACSA 2009 International Workshop on Advances in Cryptography, Security and Applications for Future Computing, Y. Mu, J. H. Park, (eds), pp. 181-190, December 2009, Deju, Korea, IEEE Press,
http://www.sciencedirect.com/science/article/pii/S0898122110000052/pdfft?md5=53d....

145D. Geneiatakis, C. Lambrinoudakis, S. Gritzalis, A Hierarchical Model for Cross-Domain Communication of Health-Care Units, NSS 2009 3rd International Conference on Network and System Security, Y. Xiang, J. Lopez, H. Wang, (eds), pp. 123-129, October 2009, Gold Coast, Australia, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5318946&url=http%3A%2F%2Fi....

146P. Drogkaris, C. Lambrinoudakis, S. Gritzalis, Introducing Federated Identities to One-Stop-Shop e-Government Environments: The Greek Case, 19th Conference on eChallenges 2009, P. Cunningham, (ed), pp. 88 - 93, October 2009, Istanbul, Turkey, eChallenges Pub.,
http://www.icsd.aegean.gr/publication_files/conference/886491186.pdf

147C. Kolias, V. Kolias, G. Kambourakis, A Secure and Efficient Authentication Protocol for Passive RFID Tags, Sixth International Symposium on Wireless Communication Systems 2009 (ISWCS’09), pp. 36-40, September 2009, Siena, Italy, IEEE Press

148A.-M. Piskopani, L. Mitrou, Facebook: Reconstructing Communication and decostructing privacy law? , 4th Mediterranean Conference on Information Systems, Polymenakou/Pouloudi/Pramatari (eds.), September 2009, Athens- Greece

149P. Rizomiliotis, HB −MAC: Improving the Random− HB# authentication protocol, Trustbus 2009, Fischer-Huebner S., Lambrinoudakis C., (eds), pp. 159-168, September 2009, Linz, Austria, Springer

150A. Tsohou, M. Karyda, S. Kokolakis, E. Kiountouzis, Aligning Security Awareness with Information Systems Security Management, 4th Mediterranean Conference on Information Systems (MCIS09), September 2009, Athens, Greece

151C. Kalloniatis, E. Kavakli, S. Gritzalis, Methods for Designing Privacy Aware Information Systems: A review, PCI 2009 13th Pan-Hellenic Conference on Informatics, N. Alexandris, V. Chrissikopoulos, C. Douligeris, S. Sioutas, (eds), pp. 185-194, September 2009, Corfu, Greece, IEEE CPS Conference Publishing Services,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5298356&url=http%3A%2F%2Fi....

152E. Klaoudatou, E. Konstantinou, G. Kambourakis, S. Gritzalis, A Cluster-based Framework for the Security of Medical Sensor Environments, TrustBus’09 6th International Conference on Trust, Privacy and Security in Digital Business, S. Fischer-Huebner, C. Labrinoudakis, (eds), September 2009, Linz, Austria, Lecture Notes in Computer Science LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-03748-1_6.pdf

153P. Drogkaris, S. Gritzalis, C. Lambrinoudakis, Enabling Secure Data Management in e-Government Environments: The Greek Case, EGOV 2009 8th International Conference on Electronic Government, E. Ferro, J. Scholl, M. Wimmer, (eds), pp. 138 - 144, September 2009, Linz, Austria, Trauner Verlag

154D. Gkoutzelis, S. Gritzalis, Web Server Security on Open Source Environments, 3rd Conference on Electronic Democracy – Next Generation Society: Technological and Legal Issues, A. Sideridis C.Pratikakis, (eds), pp. 235-245, September 2009, Athens, Springer Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics, & Telecom,
http://www.e-democracy2009.gr/index.php/home.html

155A. Tsohou, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, Information Systems Security Management: A review and a classification of the ISO standards, e-Democracy 2009 , A. Sideridis and C. Patrikakis , (eds), pp. 220-235, September 2009, Athens, Greece, Springer Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics, & Telecom,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-11631-5_21.pdf

156A. Tsohou, P. Rizomiliotis, C. Lambrinoudakis, S. Gritzalis, Security and Privacy Issues in Bipolar Disorder Research, ICICTH 7th International Conference on Information and Communication Technologies in Health, A. Hasman et al., (eds), July 2009, Samos, Greece, INEAG

157K. Prousalis, E. Konstantinou, N. Konofaos, A. A. Iliadis, Developing Quantum Nanocomputing for Pervasive Health Environments, Nanohealth 2009 Workshop in Nanoengineering and Nanocomputing Applications for Pervasive Health Environments of the Future in conjuction with Petra 2009 2nd International Conference on PErvasive Technologies Related to Assistive Environments, June 2009, Corfu, Greece, ACM Press

158D. Geneiatakis, C. Lambrinoudakis, G. Kambourakis, A. Kafkalas, S. Ehlert, A First Order Logic Security Verification Model for SIP, IEEE International Conference on Communications (ICC 2009), June 2009, Dresden, Germany, IEEE Press,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5198603&url=http%3A%2F%2Fi....

159D. Vassis, P. Belsis, C. Skourlas, S. Gritzalis, End to end secure communication in ad-hoc assistive medical environments using secure paths, PSPAE 2009 1st Workshop on Privacy and Security in Pervasive e-Health and Assistive Environments, in conjunction with PETRA 2009 2nd International Conference on Pervasive Technologies related to Assistive Environments, G. Pantziou, (ed), June 2009, Corfu, Greece, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=1579184&ftid=658246&dwn=1&CFID=265073195&CFT....

160E. Aivaloglou, S. Gritzalis, Trust-based data disclosure in Sensor Networks, IEEE ICC 2009 International Conference on Communications – Communication and Information Systems Security Symposium, P.Mueller, S. Gritzalis, R. Boutaba, J. Hu, (eds), June 2009, Dresden, Germany, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5199546&url=http%3A%2F%2Fi....

161G. Kambourakis, C. Kolias, S. Gritzalis, J. H. Park, Signaling-oriented DoS Attacks in UMTS Networks, ISA 2009 3rd International Conference on Information Security and Assurance, J. Zhan et al., (eds), pp. 280-289, June 2009, Seoul, Korea, Lecture Notes in Computer Science LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-642-02617-1_29.pdf

162Iosif Androulidakis, V. Christou, N. Bardis, Ioannis Stylios, Surveying user’s practices regarding mobile phone’s security features, 3rd WSEAS International Conference, June 2009,
https://www.researchgate.net/publication/234805471_Surveying_users%27_practices_....

163P. Belsis, D. Vassis, S. Gritzalis, C. Skourlas, W-HER: A wireless distributed framework for secure dissemination of electronic healthcare records, IWSSIP 2009 16th International Conference on Systems, Signals and Image Processing, June 2009, Chalkida, Greece, IEEE CPS Conference Publishing Services

164E. Kosta, C. Kalloniatis, L. Mitrou, E. Kavakli, Search engines: gateway to a new “Panopticon”, TRUSTBUS -Trust, Privacy and Security in Digital Business, Lecture Notes in Computer Science, pp. 11-21, 2009, Berlin Heidelberg , Springer 2009

165A. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, New Constructions of Low-Complexity Convolutional Codes, IEEE International Conference on Communications 2009 , 2009, Dresden, Germany, IEEE Press

166P. Rizomiliotis, A. Bogris, D. Syvridis, Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication, IEEE International Conference on Communications 2009 , 2009, Dresden, Germany, IEEE Press

167P. Rizomiliotis, Vectorial Boolean Functions: algebraic immunity and annihilators, Enhancing Crypto-Primitives with Techniques from Coding Theory, NATO Advanced Research Workshop, 2009, Veliko Turnovo, Bulgaria, IOS Press

168C. Kolias, V. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization, 3rd International Workshop on Semantic Media Adaptation and Personalization (SMAP 2008), pp. 157-163, December 2008, Prague, Czech Republic, IEEE Computer Society Press,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4724866

169C. Kolias, V. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles, 3rd International Workshop on Semantic Media Adaptation and Personalization (SMAP 2008) , December 2008, Prague, Czech Republic, IEEE Computer Society Press,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4724868&queryText....

170A. Yannacopoulos, C. Lambrinoudakis, S. Gritzalis, S. Xanthopoulos, S. K. Katsikas, Modeling Privacy Insurance contracts and their utilization in Risk Management for ICT firms, ESORICS 2008 13th European Symposium on Research in Computer Security, S. Jajodia, J. Lopez, (eds), pp. 207-222, October 2008, Malaga, Spain, Springer LNCS 5283,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-88313-5_14.pdf

171G. Kambourakis, E. Konstantinou, S. Gritzalis, Binary Tree Based Public-Key Management for Mobile Ad Hoc Networks, ISWCS, K. Gudmundsson, B. S. Yeo, (eds), pp. 687-692, October 2008, Reykjavik, Iceland, IEEE CPS,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4726144&queryText....

172D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony, 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2008), S. Furnell, S. Katsikas, A. Lioy, (eds), pp. 59-68, September 2008, Turin, Italy, Lecture Notes in Computer Science LNCS 5185, Springer,
http://link.springer.com/chapter/10.1007%2F978-3-540-85735-8_7

173E. Magkos, M. Maragoudakis, V. Chryssikopoulos, S. Gritzalis, Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections, PSD 2008 Privacy in Statistical Databases, J. Domingo-Ferrer, (ed), pp. 284-297, September 2008, Istanbul, Turkey, Lecture Notes in Computer Science LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-87471-3_24.pdf

174P. Drogkaris, D. Geneiatakis, S. Gritzalis, C. Lambrinoudakis, L. Mitrou, Towards an Enhanced Authentication Framework for eGovernment Services: The Greek case, EGOV’08 7th International Conference on Electronic Government, E. Ferro, J. Scholl, M. Wimmer, (eds), pp. 189-196, September 2008, Torino, Italy, Trauner Verlag,
http://www.icsd.aegean.gr/publication_files/conference/673141011.pdf

175A. Tsakountakis, G. Kambourakis, S. Gritzalis, A new Accounting Mechanism for Modern and Future AAA Services, IFIP SEC 2008 23rd International Information Security Conference , S. Jajodia, P. Samarati, (eds), pp. 693-697, September 2008, Milan, Italy, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-0-387-09699-5_47.pdf

176C. Kolias, V. Kolias, J. Anagnostopoulos, G. Kambourakis, E. Kayafas, A pervasive Wiki application based on VoiceXML, 1st International Conference on Pervasive Technologies in e/m-Learning and Internet-based Experiments (PTLIE , July 2008, Athens, Greece, ACM press

177G. Karopoulos, G. Kambourakis, S. Gritzalis, Caller Identity Privacy in SIP heterogeneous realms: A practical solution, MediaWin 2008 3rd Workshop on Multimedia Applications over Wireless Networks (in conjunction with ISCC 2008 13th IEEE Symposium on Computers and Communications), A. Zanella et al., (eds), pp. 37 - 43, July 2008, Marakkech, Morocco, IEEE CPS,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4625770&queryText....

178E. Konstantinou, Cluster-based Group Key Agreement for Wireless Ad hoc Networks, ARES 2008, 3rd International Conference on Availability, Reliability and Security, March 2008, Barcelona, Spain, IEEE Computer Society Press

179C. Kolias, S. Demertzis, G. Kambourakis, Design and Implementation of a Secure Mobile Wiki System, Seventh IASTED International Conference on Web-based Education (WBE 2008), Uskov V., (ed), pp. 212-217, March 2008, Innsbruck, Austria, ACTA press

180E. Klaoudatou, E. Konstantinou, G. Kambourakis, S. Gritzalis, Clustering Oriented Architectures in Medical Sensor Environments, WSPE 2008 International Workshop on Security and Privacy in e-Health (in conjunction with ARES 2008 3rd International Conference on Availability, Reliability, and Security), T. Muck, (ed), pp. 929-934, March 2008, Barcelona, Spain, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4529443&url=http%3A%2F%2Fi....

181G. Karopoulos, G. Kambourakis, S. Gritzalis, Privacy Protection in Context Transfer Protocol, PDP 2008 16th Euromicro International Conference on Parallel, Distributed and Network based Processing – Special Session on Security in Networked and Distributed Systems, D. El Baz, J. Bourgeois, F. Spies, (eds), pp. 590-596, February 2008, Toulouse, France, IEEE CPS,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4457174&queryText....

182P. Rizomiliotis, Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity, 11th IMA International Conference on Cryptography and Coding, pp. 204-219, December 2007, Cirencester, UK, Springer

183P. Belsis, S. Gritzalis, C. Skourlas, V. Tsoukalas, Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments, 20th Annual Asian Computing Science Conference, I. Cervesato, (ed), pp. 261-267, December 2007, Doha, Qatar, Lecture Notes in Computer Science LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-76929-3_25.pdf

184E. Aivaloglou, A. Mitseva, C. Skianis, S. Gritzalis, A. Waller, N. R. Prasad, Scalable Security Management for Wireless Sensor Networks for Medical Scenarios, WPMC 2007 10th International Symposium on Wireless Personal Multimedia Communications, U. Desai et al., (eds), December 2007, Jaipur, India,
http://www.icsd.aegean.gr/infosec_base/papers/2007-WPMC-AMSGWP.pdf

185A. Tsakountakis, G. Kambourakis, S. Gritzalis, On RSN-oriented Wireless Intrusion Detection, 2nd OTM International Symposium on Information Security (IS), M. Freire, S. M. de Sousa, V. Santos, H. J. Park, (eds), pp. 1601-1615, December 2007, Algarve, Portugal, Lecture Notes in Computer Science LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-76843-2_34.pdf

186M. Karyda, S. Gritzalis, J. H. Park, A Critical Approach to Privacy Research in Ubiquitous Environments: Issues and Underlying Assumptions, TRUST’07 2nd International Workshop on Trustworthiness, Reliability, and Services in Ubiquitous and Sensor Networks, L. Yang et al., (eds), pp. 12-21, December 2007, Taipei, Taiwan, Lecture Notes in Computer Science LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-77090-9_2.pdf

187G. Karopoulos, G. Kambourakis, S. Gritzalis, Two privacy-enhanced context transfer schemes, ACM Q2SWinet 2007 3rd ACM International Workshop on Quality of Service and Security for Wireless and Mobile Networks (in conjunction with the 10th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems), L. Bononi, (ed), pp. 172-175, October 2007, Chania, Greece, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=1298272&ftid=461466&dwn=1&CFID=265073195&CFT....

188A. Tsohou, M. Theoharidou, S. Kokolakis, D. Gritzalis, Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship, TrustBus’07 4th International Conference on Trust, Privacy and Security in Digital Business, G. Pernul, C. Lambrinoudakis, M. Tjoa, (eds), September 2007, Lecture Notes in Computer Science LNCS, Springer

189C. Fragos, M. Karyda, E. Kiountouzis, Using the Lens of Circuits of Power in Information Systems Security Management, 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus ‘07), C. Lambrinoudakis , G. Pernul, A Min Tjoa, (eds), pp. 228-236, September 2007, Regensburg, Germany, Springer

190P. Belsis, S. Gritzalis, C. Skourlas, V. Tsoukalas, Design and implementation of distributed access control infrastructure for dynamic coalitions, TrustBus’07 4th International Conference on Trust, Privacy and Security in Digital Business, G. Pernul, C. Lambrinoudakis, M. Tjoa, (eds), pp. 125-134, September 2007, Regensburg, Germany, Lecture Notes in Computer Science LNCS 4657, Springer ,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-74409-2_15.pdf

191G. Karopoulos, G. Kambourakis, S. Gritzalis, Privacy Preserving Context Transfer in All-IP Networks, MMM-ACNS-07 International Conference Mathematical Methods, Models and Architectures, I. Kotenko et al., (eds), pp. 390-395, September 2007, St. Petersburg, Russia, CCIS Communications in Computer and Information Science, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-73986-9_33.pdf

192G. Kambourakis, S. Gritzalis, On Device Authentication in Wireless Networks: Present issues and future challenges, TrustBus’07 4th International Conference on Trust, Privacy and Security in Digital Business, G. Pernul, C. Lambrinoudakis, M. Tjoa, (eds), pp. 135-144, September 2007, Regensburg, Germany, Lecture Notes in Computer Science LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-74409-2_16.pdf

193G. Kambourakis, T. Moschos, D. Geneiatakis, S. Gritzalis, A Fair Solution to DNS Amplification Attacks, WDFIA, S. Kokolakis, T. Tryfonas, (eds), pp. 38-47, August 2007, Samos, Greece, IEEE CPS,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4299371

194A. Tsakountakis, G. Kambourakis, S. Gritzalis, Towards Effective Wireless Intrusion Detection in IEEE 802.11i, 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (in conjunction with the IEEE ICPS, P. Georgiadis, J. Lopez, S. Gritzalis, G.Marias, (eds), pp. 37-42, July 2007, Istanbul, Turkey, IEEE CPS,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4279768&queryText....

195E. Aivaloglou, A. Mitseva, C. Skianis, A. Waller, N. R. Prasad, S. Gritzalis, Context-Aware Security Management for Wireless Sensor Networks, CAPS 2007 Third Workshop on Context Awareness for Proactive Systems, June 2007, Guildford, United Kingdom

196I. Chatzigiannakis, E. Konstantinou, V. Liagkou, P. Spirakis, Agent-based Distributed Group Key Establishment in WirelessSensor Networks, 3rd IEEE International Workshop on Trust,Security, and Privacy for Ubiquitous Computing (TSPUC 2007), June 2007, ISBN 1-4244-0992-6

197C. Kalloniatis, E. Kavakli, S. Gritzalis, Using Privacy Process Patterns for incorporating Privacy requirements into the System Design Process, ARES 2007 The International Conference on Availability, Reliability, and Security - SecSE 2007 Secure Software Engineering Workshop, T. Skramstad et al., (eds), pp. 1009-1016, April 2007, Vienna, Austria, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4159903&url=http%3A%2F%2Fi....

198G. Kambourakis, A. Andreadis, C. Paganos, A. Rouskas, S. Gritzalis, Bluetooth Security Mechanisms for Handheld Devices: A Performance Evaluation Study, EW 2007 13th European Wireless Conference, M. Terre, (ed), April 2007, Paris, France, VDE,
http://www.icsd.aegean.gr/publication_files/conference/601057801.pdf

199G. Kambourakis, E. Klaoudatou, S. Gritzalis, Securing Medical Sensor Environments: The Codeblue framework case, ARES 2007 The 2nd International Conference on Availability, Reliability, and Security - FARES 2007 1st International Symposium on Frontiers in Availability, Reliability and Security, R. Wagner, A. M. Tjoa et al., (eds), pp. 637-643, April 2007, Vienna, Austria, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4159858&url=http%3A%2F%2Fi....

200M. Karyda, L. Mitrou, Internet Forensics: Legal and Technical issues, 2nd Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), pp. 3-12, 2007, Samos, Greece, IEEE

201G. Kambourakis, T. Moschos, D. Geneiatakis, S. Gritzalis, Detecting DNS Amplifications Attacks, IFIP IEEE CRITIS’07 2nd International Workshop on Critical Information Infrastructures Security, J. Lopez, B. Hammerli, (eds), pp. 185-196, 2007, Malaga, Spain, Lecture Notes in Computer Science LNCS 5141, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-89173-4_16.pdf

202G. Antoniou, S. Gritzalis, Uncontrollable Privacy: The right that every attacker desires, 4th Australian Information Security Management Conference, W. Hutchinson, C. Valli, (eds), December 2006, Mount Lawley, Australia, Australian Computer Society,
http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1063&context=ism&sei-redir=1&re....

203G. Antoniou, S. Gritzalis, Network Forensics and Privacy Enhancing Technologies “living” together in harmony, 4th Australian Information Security Management Conference, W. Hutchinson, C. Valli, (eds), December 2006, Mount Lawley, Australia, Australian Computer Society,
http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1062&context=ism&sei-redir=1&re....

204E. Aivaloglou, S. Gritzalis, C. Skianis, Requirements and Challenges in the Design of Privacy-aware Sensor Networks, 49th IEEE GLOBECOM Conference – World Class Solutions: Networking the Globe Technical Symposium, P. Lorenz, J. M. Nogueira, S. Makri, (eds), pp. 1217-1221, November 2006, San Francisco, USA, IEEE CPS,
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4150864&tag=1

205G. Antoniou, S. Gritzalis, RPINA: Network Forensics protocol embedding Privacy Enhancing Technologies, ISCIT 2006 International Symposium on Communications and Information Technologies, A. Taguchi et al., (eds), October 2006, Bangkok, Thailand, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4141562&url=http%3A%2F%2Fi....

206E. Aivaloglou, S. Gritzalis, C. Skianis, Trust Establishment in Ad-Hoc and Sensor Networks, CRITIS, J.Lopez, (ed), pp. 179-194, September 2006, Samos, Greece, Lecture Notes in Computer Science LNCS 4347, Springer,
http://link.springer.com/content/pdf/10.1007%2F11962977_15.pdf

207T. Balopoulos, L. Gymnopoulos, M. Karyda, S. Kokolakis, S. Gritzalis, S. K. Katsikas, A Framework for Exploiting Security Expertise in Application Development, TrustBus’06 3rd International Conference on Trust, Privacy, and Security in the Digital Business, S. Furnell, C. Lambrinoudakis, S. Fischer-Huebner, (eds), pp. 62-70, September 2006, Krakow, Poland, Lecture Notes in Computer Science LNCS Vol. 4083, Springer,
http://www.icsd.aegean.gr/publication_files/conference/582134205.pdf

208P. Belsis, S. Gritzalis, S. K. Katsikas, Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation, STM 2006 2nd Workshop on Security and Trust Management (in conjunction with ESORICS 2006), P. Samarati, S. Etalle, (eds), pp. 75-81, September 2006, Hamburg, Germany, ENTCS,
http://www.sciencedirect.com/science/article/pii/S1571066107003040/pdf?md5=2e70a....

209I. Chatzigiannakis, E. Konstantinou, V. Liagkou, P. Spirakis, Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, 2nd Workshop on Cryptography for Ad hoc Networks - WCAN 2006, July 2006

210D. Geneiatakis, T. Dagiuklas, C. Lambrinoudakis, G. Kambourakis, S. Gritzalis, Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study, CSNDSP , M. Logothetis et al. , (eds), July 2006, Patras, Greece,
http://www.wcl.ece.upatras.gr/CSNDSP/contents/Sessions/Presentations/A12%20-%20I....

211L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Dritsas, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, Developing a Security Patterns Repository for Secure Applications Design, ECIW 2006 5thEuropean Conference on Information Warfare and Security, C. Candolin et al., (eds), pp. 51-60, June 2006, Helsinki, Finland, ACL Academic Conferences Limited,
http://www.icsd.aegean.gr/publication_files/conference/167886250.pdf

212G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. K. Katsikas, Source Code Authorship Analysis using N-grams, AIAI 2006 3rd IFIP Conference on Artificial Intelligence Applications and Innovations, M. Bramer, I. Maglogiannis , (eds), pp. 508-515, June 2006, Athens, Greece, Springer,
https://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C8....

213G. Kambourakis, D. Geneiatakis, T. Dagiuklas, C. Lambrinoudakis, S. Gritzalis, Towards Effective SIP load balancing, 3rd Annual VoIP Security Workshop, D. Sisalem et al., (eds), June 2006, Berlin, Germany, ACM Press,
http://www.iptel.org/voipsecurity/doc/14%20-%20Kambourakis%20-%20Towards%20Effec....

214P. Belsis, S. Gritzalis, S. K. Katsikas, Optimized Multi-Domain Secure Interoperation using Soft Constraints, AIAI 2006 3rd IFIP Conference on Artificial Intelligence Applications and Innovations, M. Bramer, I. Maglogiannis , (eds), pp. 78-85, June 2006, Athens, Greece, Springer,
http://link.springer.com/content/pdf/10.1007%2F0-387-34224-9_10.pdf

215G. Frantzeskou, E. Stamatatos, S. Gritzalis, S. K. Katsikas, Effective Identification of Source Code Authors Using Byte-Level Information, 28th International Conference on Software Engineering ICSE 2006 - Emerging Results Track, B. Cheng, B. Shen , (eds), pp. 893-896, May 2006, Shanghai, China, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=1134445&ftid=355450&dwn=1&CFID=265073195&CFT....

216P. Belsis, K. Fragos, S. Gritzalis, C. Skourlas, SF-HME system: A Hierarchical Mixtures-of-Experts classification system for Spam Filtering, ACM SAC 2006 21st ACM Symposium on Applied Computing – Computer Security Track, G. Bella, P. Ryan, (eds), pp. 354-360, April 2006, Dijon, France, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=1141360&ftid=361583&dwn=1&CFID=265073195&CFT....

217M. Karyda, T. Balopoulos, S. Dritsas, L. Gymnopoulos, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, An Ontology for Secure e-Government applications, DeSeGov’06 Workshop on Dependability and Security in eGovernment, A. Tjoa, E. Schweighofer, (eds), pp. 1033-1037, April 2006, Vienna, Austria, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1625421&url=http%3A%2F%2Fi....

218P. Belsis, S. Gritzalis, G. Pantziou, C. Skourlas, Knowledge Sharing and Reusability within the Public Sector: Security Challenges and potential Solutions, Electronic Democracy – Challenges of the Digital Era, N. Sideridis, (ed), pp. 389-399, March 2006, Athens, Greece

219K. Papapanagiotou, G. F. Marias, P. Georgiadis, S. Gritzalis, Performance Evaluation of a distributed OCSP protocol over MANETs, IEEE CCNC, pp. 1-5, January 2006, Las Vegas, USA, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1592976&url=http%3A%2F%2Fi....

220C. Kalloniatis, E. Kavakli, S. Gritzalis, Dealing with Privacy Issues during the System Design Process, IEEE ISSPIT, D. Serpanos et al., (eds), pp. 546-551, December 2005, Athens, Greece, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1577156&url=http%3A%2F%2Fi....

221P. Belsis, S. Gritzalis, S. K. Katsikas, A Scalable Security Architecture enabling Coalition Formation between Autonomous Domains, ISSPIT, D. Serpanos et al., (eds), pp. 560-565, December 2005, Athens, Greece, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1577158&url=http%3A%2F%2Fi....

222S. K. Katsikas, A. N. Yannacopoulos, S. Gritzalis, C. Lambrinoudakis, P. Hatzopoulos, How much should we pay for security?, IFIP 11.1-11.5 Joint Working Conference on Security Management, Integrity and Internal Control in Information Systems, B. Thuraisingham, (ed), pp. 59-70, December 2005, Fairfax, Virginia, Springer,
http://link.springer.com/content/pdf/10.1007%2F0-387-31167-X_4.pdf

223G. Kambourakis, D. Geneiatakis, S. Gritzalis, T. Dagiuklas, C. Lambrinoudakis, Security and Privacy issues towards ENUM Protocol, ISSPIT ‘05 5th IEEE International Symposium on Signal Processing and Information Technology, D. Serpanos et al., (eds), pp. 478-483, December 2005, Athens, Greece, IEEE CPS,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1577144&queryText....

224G. Kambourakis, D. P. Kontoni, I. Sapounas, Modeling Learners’ Perceptions towards Educational Portals and Collaborative Learning Tools Usage: The Hellenic Open University Case, Third International Conference on Open and Distance Learning: , pp. 209-220, November 2005, Patra, Greece, Propompos publications

225T. Balopoulos, S. Gritzalis, S. K. Katsikas, Specifying Electronic Voting Protocols in Typed MSR, ACM WPES CCS 2005 Computer and Communications Security Conference - Workshop on Privacy in the Electronic Society, S. De Capitani di Vimercati, R. Dingledine, (eds), pp. 35-39, November 2005, Alexandria, VA, USA, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=1102207&type=pdf&CFID=265073195&CFTOKEN=1035....

226M. Belsis, A. Simitsis, S. Gritzalis, Workflow Based Security Incident Management, PCI 2005 10th Panhellenic Conference of Informatics, E. Houstis , (ed), pp. 684-694, November 2005, Volos, Greece, Lecture Notes in Computer Science LNCS Vol.3746, Springer,
http://link.springer.com/content/pdf/10.1007%2F11573036_65.pdf

227S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, Employing Ontologies for the Developmentof Security Critical Applications: The Secure e-Poll Paradigm, IFIP I3E International Conference on eBusiness,eCommerce, and eGovernemnt, M. Funabashi, A. Grzech, (eds), pp. 187-201, October 2005, Poznan, Poland, Springer,
http://link.springer.com/content/pdf/10.1007%2F0-387-29773-1_13.pdf

228G. Frantzeskou, E. Stamatatos, S. Gritzalis, Supporting the Digital Crime Investigation Process: Effective Discrimination of Source Code Authors based on Byte-level Information, ICETE‘2005 International Conference on eBusiness and Telecommunication Networks – Security and Reliability in Information Systems and Networks Track, pp. 283-290, October 2005, UK, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-75993-5_14.pdf

229F. Trochoutsos, S. Gritzalis, S. K. Katsikas, G. Charamis, Information Systems Security Effective Guidelines for “Participants”, HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, E. Lypitakis, (ed), September 2005, Athens, Greece, LEA Publisher

230P. Rizomiliotis, Periodic Binary Sequences of Maximum Nonlinear Span, 2005 IEEE International Symposium on Information Theory, pp. 469-473, September 2005, Adelaide, Australia, IEEE Press

231E. Kavakli, C. Kalloniatis, S. Gritzalis, Matching user Privacy Requirements to Implementation Techniques, HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, E. Lypitakis, (ed), September 2005, Athens, Greece, LEA Publisher,
http://www.aueb.gr/pympe/hercma/proceedings2005/H05-FULL-PAPERS-1/KAVAKLI-KALLON....

232S. Gritzalis, P. Belsis, M. Karyda, M. Chalaris, C. Skourlas, I. Chalaris, Designing the Provision of PKI services for eGovernment, HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, E. Lypitakis, (ed), September 2005, Athens, Greece, LEA publisher,
http://www.aueb.gr/pympe/hercma/proceedings2005/H05-FULL-PAPERS-1/GRITZALIS-BELS....

233D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis, S. Gritzalis, SIP Message Tampering: THE SQL code INJECTION attack, 13th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM ‘05), N. Rozic et al., (eds), pp. 176-181, September 2005, Split, Croatia, IEEE CPS,
http://www.cs.columbia.edu/~dgen/papers/conferences/conference-02.pdf

234D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis, S. Gritzalis, A Framework for Detecting Malformed Messages in SIP Networks, 14th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN ‘05), September 2005, Chania, Greece, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1541543&url=http%3A%2F%2Fi....

235N. Doukas, E. Klaoudatou, G. Kambourakis, A. Rouskas, S. Gritzalis, Evaluation of digital certificates acquisition in large-scale 802.11-3GPP Hybrid Environments, 14th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN ‘05), pp. 176-181, September 2005, Chania, Greece, IEEE CPS,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1541544&queryText....

236P. Belsis, S. Gritzalis, A. Malatras, C. Skourlas, I. Chalaris, Sec-Shield: Security Preserved Distributed Knowledge Management between Autonomous Domains, DEXA, G. Pernul, J. Lopez, (eds), pp. 10-19, August 2005, Copenhagen, Denmark, Springer,
http://link.springer.com/content/pdf/10.1007%2F11537878_2.pdf

237C. Kalloniatis, E. Kavakli, S. Gritzalis, PriS Methodology: Incorporating Privacy Requirements into the System Design Process, 13th IEEE International Requirements Engineering Conference – Symposium on Requirements Engineering , J. Mylopoulos, G. Spafford , (eds), August 2005, Paris, France, IEEE CPS

238P. Belsis, S. Gritzalis, Security Control Schemes for Pervasive Medical Environments, ICPS 2005 1st IEEE International Conference on Pervasive Services - Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU, P. Georgiadis, S. Gritzalis, Y. Marias, (eds), pp. 35-43, July 2005, Santorini, Greece, Diavlos Press

239A. Malatras, G. Pavlou, P. Belsis, S. Gritzalis, C. Skourlas, I. Chalaris, Secure and Distributed Knowledge Management in Pervasive Environments, IEEE International Conference on Pervasive Services ICPS , V. Kalogeraki, (ed), pp. 79-87, July 2005, Santorini, Greece, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1506393&url=http%3A%2F%2Fi....

240P. Belsis, S. Gritzalis, C. Skourlas, Security Enhanced Distributed Knowledge Management Architecture, 5th International Conference on Knowledge Management, K. Tochtermann, H. Maurer , (eds), pp. 327-335, July 2005, Graz, Austria, JUCS Pubs.,
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.162.28&rep=rep1&type=pd....

241L. Gymnopoulos, S. Gritzalis, Introducing Ontology-based Security Policy Management in the GRID, ECIW 2005 4th European Conference on Information Warfare and Security, pp. 107-116, July 2005, Glamorgan, United Kingdom, Academic Conferences Limited,
http://www.google.gr/books?hl=en&lr=&id=3ADTFSJiX1kC&oi=fnd&pg=PA107&dq=Introduc....

242L. Gymnopoulos, V. Tsoumas, I. Soupionis, S. Gritzalis, Enhancing Security Policy Negotiation in the GRID, INC 2005 5th International Network Conference, S. Furnell, S. K. Katsikas , (eds), pp. 175-182, July 2005, Samos, Greece, University of Plymouth,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=15&issue=5&arti....

243D. Geneiatakis, G. Kambourakis, A. Dagiouklas, C. Lambrinoudakis, S. Gritzalis, Session Initiation Protocol Security Mechanisms: A state-of-the-art review, INC, S. Furnell, S. K. Katsikas, (eds), pp. 147-156, July 2005, Samos, Greece, Ziti Pubs,
http://startrinity.com/VoIP/Resources/sip-security-mechanisms-a-state-of-the-art....

244T. Balopoulos, S. Dritsas, L. Gymnopoulos, M. Karyda, S. Kokolakis, S. Gritzalis, Incorporating Security Requirements into the Software Development Process, ECIW 2005 4th European Conference on Information Warfare and Security, pp. 21-28, July 2005, Glamorgan, United Kingdom, Academic Conferences Limited,
http://www.google.gr/books?hl=en&lr=&id=Vf3QzGSLLhUC&oi=fnd&pg=PA21&dq=Security+....

245G. Frantzeskou, E. Stamatatos, S. Gritzalis, Source Code Authorship Analysis using N-grams, 7th Biennial Conference on Forensic Linguistics, July 2005, Cardiff, UK,
http://link.springer.com/content/pdf/10.1007%2F0-387-34224-9_59.pdf

246P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, I. Chalaris, Pervasive Secure Electronic Healthcare Records Management, ICEIS 7th International Conference on Enterprise Information Systems - Workshop on Ubiquitous Computing, K. Mostefaoui, Z. Maamar, (eds), pp. 101-109, May 2005, Miami, USA, published by ICEIS

247P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, I. Chalaris, Semantically enabled Secure Multimedia content delivery using GIS principles, IADAT-micv2005 International Conference on Multimedia, Image Processing and Computer Vision, J. Larrauri et al. , (eds), April 2005, Madrid, Spain, published by IADAT,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-30545-3_30.pdf

248E. Konstantinou, A. Kontogeorgis, Y. Stamatiou, C. Zaroliagis, Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations, International Conference on Information Security and Cryptology - ICISC 2004, pp. 261-278, 2005, LNCS Vol. 3506, Springer - Verlag

249E. Konstantinou, V. Liagkou, P. Spirakis, Y. Stamatiou, M. Yung, Trust Engineering: from requirements to system design and maintenance - a working national lottery system experience, Information Security Conference - ISC 2005, pp. 44-58, 2005, LNCS Vol. 3650, Springer - Verlag

250P. Belsis, S. Gritzalis, Distributed Autonomous Knowledge Acquisition and Dissemination Ontology based Framework, PAKM 2004 5th International Conference on Practical Aspects of Knowledge Management -Workshop on Enterprise Modeling and Ontology: Ingredients for Interoperability, H. Kuhn , (ed), pp. 319-329, December 2004, Vienna, Austria, University of Vienna,
http://www.dke.univie.ac.at/mmp/Proceedings_Workshop1_PAKM2004.pdf#page=100

251P. Belsis, S. Gritzalis, A. Malatras, C. Skourlas, I. Chalaris, Enhancing Knowledge through the use of GIS and Multimedia, PAKM 2004 5th International Conference on Practical Aspects of Knowledge Management, U. Reimer, D. Karagiannis , (eds), pp. 319-329, December 2004, Vienna, Austria, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-30545-3_30.pdf

252L. Mitrou, E-voting: Constitutional and Legal Requirements in the Recommendation of the Council of Europe , 2nd Votobit International Conference, J. Barrat, (ed), pp. 20, October 2004, Leon-Spain, University of Leon

253P. Rizomiliotis, Family of p-ary sequences with oprimal correlation property and large linear span from Helleseth-Gong sequences, International Symposium on Information Theory and its Applications, October 2004, Parma

254S. Ikonomopoulos, S. Gritzalis, Integration of Security Engineering into the Rational Unified Process – An Early Iteration, 19th IEEE International Conference on Automated Software Engineering – SAPS’04 Workshop on Specification and Automated Processing of Security Requirements, A. Mapa, C. Rudolph , (eds), pp. 167-178, September 2004, Linz, Austria, IEEE Press and Austrian Computer Society

255T. Balopoulos, S. Gritzalis, S. K. Katsikas, An Extension of Typed MSR for Specifying Esoteric Protocols and their Dolev-Yao Intruder, IFIP TC-6 TC-11 CMS 8th Conference on Communications and Multimedia Security, David Chadwick, Bart Preneel, (eds), pp. 209-220, September 2004, Windermere, UK, Springer Vol.175,
http://link.springer.com/content/pdf/10.1007%2F0-387-24486-7_16.pdf

256C. Kalloniatis, E. Kavakli, S. Gritzalis, Security Requirements Engineering for eGovernment Applications: Analysis of Current Frameworks, DEXA’04 EGOV’04 3rd International Conference on Electronic Government, R. Traunmuller , (ed), pp. 66-71, September 2004, Zaragoza, Spain, LNCS, Springer,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-30078-6_11.pdf

257D. Kambouraki, S. Gritzalis, K. Moulinos, A Privacy Audit Methodologies Comparison Framework, DEXA’04 EGOV’04 3rd International Conference on Electronic Government, R. Traunmuller , (ed), pp. 328-331, September 2004, Zaragoza, Spain, LNCS, Springer,
http://link.springer.com/chapter/10.1007/978-3-540-30078-6_54

258G. Frantzeskou, S. Gritzalis, S. MacDonell, Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process, ICETE, C. Belo, L. Vasiu, (eds), pp. 85-92, August 2004, Setubal Portugal, Kluwer Academic Publishers,
http://aut.researchgateway.ac.nz/bitstream/handle/10292/1633/Frantzeskou%2c%20Gr....

259C. Carafasoulis, S. Gritzalis, An IP marking mechanism for the Privacy Enhancing Technologies: the right to choose, INC'2004 4th International Network Conference, S. Furnell , (ed), pp. 409-416, July 2004, Plymouth, UK, IEE & University of Plymouth

260G. Angelis, S. Gritzalis, C. Lambrinoudakis, Addressing Authentication and Authorization Issues in the Grid, 4th INC International Network Conference, S. Furnell , (ed), pp. 319-326, July 2004, Plymouth, UK, IEEE & University of Plymouth,
http://www.emeraldinsight.com/journals.htm?articleid=863815&show=abstract

261P. Rizomiliotis, N. Kalouptsidis, Result on the nonlinear span of binary sequences, 2004 IEEE International Symposium on Information Theory, pp. 124, June 2004, Chicago, IL USA, IEEE Press

262G. Kambourakis, A. Rouskas, D. Gritzalis, Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks, 1st European PKI Workshop, pp. 287-296, June 2004, Samos, Greece, LNCS 3093,
http://link.springer.com/chapter/10.1007/978-3-540-25980-0_23

263G. Kambourakis, A. Rouskas, S. Gritzalis, Delivering Attribute Certificates over GPRS, ACM SAC 2004 19th International ACM Symposium on Applied Computing - Mobile Computing and Applications Track, H. V. Leong, A. Chan , (eds), pp. 1166-1170, May 2004, Nicosia, Cyprus, ACM Press,
http://dl.acm.org/ft_gateway.cfm?id=968137&ftid=250358&dwn=1&CFID=265073195&CFTO....

264G. Kambourakis, A. Rouskas, S. Gritzalis, Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems, 3rd IFIP NETWORKING TC-6 International Conference on Networking, N. Mitrou et al., (eds), pp. 13-24, May 2004, Athens, Greece, Springer, LNCS 3042,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-24693-0_2.pdf

265P. Belsis, S. Gritzalis, C. Skourlas, I. Drakopoulos, Implementing Knowledge Management techniques for security purposes, ICEIS 2004 6th International Conference on Enterprise Information Systems, S. Hammoudi, J. Cordeiro, (eds), pp. 535-540, April 2004, Porto, Portugal, ICEIS

266M. Karyda, S. Kokolakis, E. Kiountouzis, Information Systems Security and the Structuring of Organisations, 7th International Conference on the Social and Ethical Impacts of Information and Communication Technologies (ETHICOMP 2004), T. Bynum, N. Pouloudi, S. Rogerson, T. Spyrou, (eds), pp. 451-461, April 2004, Syros, Greece, University of the Aegean

267G. Kambourakis, D. P. Kontoni, I. Sapounas, Introducing Attribute Certificates to Secure Distributed eLearning or mLearning Services, 4th IASTED Web Based Education (WBE , pp. 436-440, February 2004, Innsbruck, Austria, ACTA Press,
http://www.actapress.com/Abstract.aspx?paperId=16243

268E. Konstantinou, V. Liagkou, P. Spirakis, Y. Stamatiou, M. Yung, Electronic National Lotteries, Financial Cryptography - FC 2004, pp. 147-163, 2004, LNCS Vol. 3110, Springer - Verlag

269E. Konstantinou, Y. Stamatiou, C. Zaroliagis, On the Use of Weber Polynomials in Elliptic Curve Cryptography, Public Key Infrastructure - EuroPKI 2004, pp. 335-349, 2004, LNCS Vol. 3093

270S. Kokolakis, C. Lambrinoudakis, D. Gritzalis, A Knowledge-Based Repository Model for Security Policies Management, MMM-ACNS-2003 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, V. Gorodetski, L. Popyack, V. Skormin , (eds), pp. 112-121, September 2003, St. Petersburg, Russia, Springer, LNCS 2776

271L. Mitrou, K. Moulinos, Privacy and Data Protection in Electronic Communications, MMM-ACNS, V. Gorodetsky, L. Popyack, V. Shormin, (eds), pp. 432-436, September 2003, St. Petersburg, Springer

272C. Lambrinoudakis, S. Kokolakis, M. Karyda, V. Tsoumas, D. Gritzalis, S. K. Katsikas, Electronic Voting Systems: Security Implications of the Administrative Workflow, 14th International Workshop on Database and Expert Systems Applications (DEXA 2003), W06: International Workshop on Trust and Privacy in Digital Business (TrustBus), pp. 467-471, September 2003, Prague, Czech, IEEE Computer Society Press

273J. Argyrakis, S. Gritzalis, C. Kioulafas, Privacy Enhancing Technologies: A review, EGOV03 2nd International Conference on Electronic Government, R. Traunmuller , (ed), pp. 282-287, September 2003, Prague, Czech Republic, LNCS 2739, Springer,
http://link.springer.com/content/pdf/10.1007%2F10929179_51.pdf

274G. Angelis, S. Gritzalis, C. Lambrinoudakis, Security Policy Configuration Issues in GRID Computing Environments, 22nd SAFECOMP International Conference on Computer Safety, Reliability and Security, St. Anderson, M. Felici, Bev. Littlewood, (eds), pp. 331-341, September 2003, Edinburgh, UK, Lecture Notes in Computer Science LNCS, Springer Verlag,
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=14&issue=5&arti....

275L. Gymnopoulos, S. Dritsas, S. Gritzalis, C. Lambrinoudakis, Grid Security Review, 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2003), V. Gorodetsky, L. Popyack, and V. Skormin, (eds), pp. 100-111, September 2003, St. Petersburg, Russia, Springer-Verlag,
http://link.springer.com/content/pdf/10.1007%2F978-3-540-45215-7_8.pdf

276T. Balopoulos, S. Gritzalis, Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols, 14th International Workshop on Database and Expert Systems Applications (Trust and Privacy in Digital Business), Javier Lopez, Gunther Pernul, (eds), pp. 396-401, September 2003, Prague, Czech Republic, IEEE Computer Society,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1232054&url=http%3A%2F%2Fi....

277E. Loukis, S. Kokolakis, Computer supported collaboration in the public sector: the ICTE-PAN project, 2nd EGOV Conference , September 2003, Prague, Czech Republic

278P. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, 2003 IEEE International Symposium on Information Theory, pp. 377, July 2003, Yokohama, Japan, IEEE Press

279M. Karyda, S. Kokolakis, E. Kiountouzis, Content, Context, Process Analysis of IS Security Policy Formation, 18th IFIP International Conference on Information Security, D. Gritzalis, S. de Capitani di Vimercati, P. Samarati, S.K.Katsikas , (eds), pp. 145-156, May 2003, Athens, Greece, Kluwer Academic Publishers

280G. Kambourakis, A. Rouskas, S. Gritzalis, Introducing PKI to enhance Security in Future Mobile Networks, IFIPSEC’2003 18th IFIP International Information Security Conference, D. Gritzalis P. Samarati, S. K. Katsikas, S. De Capitani di Vimercati, (eds), pp. 109-120, May 2003, Athens, Greece, Kluwer Academic Publishers,
http://link.springer.com/chapter/10.1007%2F978-0-387-35691-4_10

281E. Konstantinou, Y. Stamatiou, C. Zaroliagis, On the Construction of Prime Order Elliptic Curves, Progress in Cryptology - INDOCRYPT 2003, pp. 309-322, 2003, LNCS Vol. 2904, Springer - Verlag

282G. Kambourakis, A. Rouskas, S. Gritzalis, Using SSL/TLS in Authentication and Key Agreement Procedures of Future Mobile Networks, 4th International IEEE Workshop on Mobile and Wireless Communications Networks (MWCN , pp. 152-156, September 2002, Stockholm, Sweden, IEEE CPS,
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1045713&queryText....

283P. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, Construction of sequences with four-valued autocorrelation from GMW sequences, 2002 IEEE International Symposium on Information Theory, pp. 183, June 2002, Lausanne, Switzerland, IEEE Press

284S. Gritzalis, C. Lambrinoudakis, Security Requirements of e-Government Services: An Organisational Framework, PDPTA, H. R. Arabnia , (ed), pp. 127-131, June 2002, Las Vegas, USA, CSREA Press,
http://dl.acm.org/citation.cfm?id=693549

285S. Ikonomopoulos, S. Gritzalis, Tool support for design patterns in the context of a reuse process, 6th SEA IASTED International Conference on Software Engineering and Applications, M. H. Hamza , (ed), pp. 175-181, May 2002, Cambridge, M.I.T. Boston, USA, IASTED Press

286S. Ikonomopoulos, C. Lambrinoudakis, D. Gritzalis, S. Kokolakis, K. Vassiliou, Functional Requirements for a Secure Electronic Voting System, IFIP TC11 17th International Conference on Information Security (IFIP/SEC2002), M.A. Ghonaimy, M. El-Hadidi, H. K. Aslan , (eds), pp. 507-519, May 2002, Cairo, Egypt, Kluwer Academic Publisher

287D. Gritzalis, M. Karyda, L. Gymnopoulos, Elaborating Quantitative Approaches for IT Security Evaluation, 17th International Conference on Information Security (SEC 2002), M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, and Heba K. Aslan , (eds), pp. 67-77, May 2002, Cairo, Egypt, Kluwer Academic Publishers

288E. Konstantinou, Y. Stamatiou, C. Zaroliagis, A Software Library for Elliptic Curve Cryptography, European Sumposium in Algorithms - ESA 2002, pp. 625-636, 2002, LNCS 2461, Springer - Verlag

289E. Konstantinou, Y. Stamatiou, C. Zaroliagis, On the Efficient Generation of Elliptic Curves over Prime Fields, Cryptographic Hardware and Embedded Systems - CHES 2002, pp. 333-348, 2002, LNCS Vol. 2523, Springer - Verlag

290L. Mitrou, D. Gritzalis, S. K. Katsikas, Revisiting legal and regulatory requirements for secure e-voting , Proceedings, IFIP SEC 2002, pp. 469-480, 2002, Cairo, Egypt

291L. Mitrou, Data Protection: a new constitutional right, Center for European Consitutional Law - Conferences, D. Tsatsos, V. Venizelos, X. Kontiadis, (eds), pp. 143-157, October 2001, Athens, Ekdoseis Sakkoula

292D. Lekkas, S. Gritzalis, S. K. Katsikas, Towards an ISO-9000 compliant Certification Service Provider, HERCMA, E. A. Lipitakis , (ed), pp. 390-397, September 2001, Athens, Greece, LEA Pubs,
http://pdf.aminer.org/000/243/066/towards_an_iso_compliant_certification_service....

293D. Lekkas, S. Gritzalis, S. K. Katsikas, Towards an ISO-9000 compliant Trusted Third Party in a Medical Environment: The Quality of Service Perspective, World Multiconference on Systemics, Cybernetics and Informatics, pp. 149-154, July 2001, Orlando, FL,
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.113.4103&rep=rep1&type=....

294C. Lambrinoudakis, S. Kokolakis, D. Gritzalis, Recurrent IT Security Issues and Recommendations: Learning from Risk Assessment Reviews, IFIP WG 9.6/11.7 Working Conference on Security and Control of IT in Society II (SCITS-II), pp. 185-195, June 2001, Bratislava, Slovakia

295M. Karyda, S. Kokolakis, E. Kiountouzis, Redefining Information Systems Security: Viable Information Systems, 16th IFIP International Conference on Information Security (SEC 2001), M. Dupuy, P. Paradinas , (eds), pp. 453-467, June 2001, Paris, France, Kluwer Academic Publishers

296N. Kolokotronis, P. Rizomiliotis, N. Kalouptsidis, First-order optimal approximation of binary sequences, 2001 Conference on Sequences and Their Applications, T. Helleseth, P. V. Kumar, and K. Yang , (eds), pp. 242-256, May 2001, Bergen, Norway, Series in Discrete Mathematics and Theoretical Computer Science, Springer

297D. Lekkas, S. Gritzalis, S. K. Katsikas, Deploying Quality Management in Trusted Third Parties within a Medical Environment: Towards ISO9000 Compliance, 6th International Symposium on Health Information Management Research, pp. 137-151, May 2001, Chalkidiki, Greece, Sheffield Academic Press,
http://jhi.sagepub.com/content/8/1/4.full.pdf

298D. Gritzalis, K. Moulinos, J. Iliadis, C. Lambrinoudakis, S. Xarhoulacos, PyTHIA: Towards Anonymity in Authentication, IFIP 16th International Conference on Information Security, M. Dupuy, P. Paradinas, (eds), pp. 1-17, 2001, Paris, France, Kluwer Academic Publishers

299N. Nikitakos, S. Gritzalis, Risk Management for new Information Technology insertion in a Shipping Company, 13th National Conference in Operational Research, E. Sambrakos , (ed), December 2000, Piraeus, Greece, University of Piraeus Pubs,
http://link.springer.com/content/pdf/10.1007%2FBF02936396.pdf

300S. Kokolakis, M. Karyda, D. Gritzalis, Information systems security management in virtual organizations, 4th International Conference on Security in Information Systems (SIS2000), (eds), pp. 109-125, October 2000, Zurich, Switzerland

301J. Iliadis, D. Spinellis, S. K. Katsikas, D. Gritzalis, B. Preneel, Evaluating Certificate Status Information Mechanisms, Information Security Solutions Europe ISSE 2000, European Forum for Electronic Business, September 2000, Barcelona, Spain

302T. Tryfonas, D. Gritzalis, S. Kokolakis, A qualitative approach to information availability, 15th International Information Security Conference (IFIP/SEC 00), (eds), August 2000, Beijing, China

303A. Patel, P. Gladychev, S. K. Katsikas, S. Gritzalis, Towards a Cross-Domain Trusted Third Party Infrastructure, ISAS/ISC ’99 5th International Conference on Information Systems, Analysis and Synthesis , N. Gallaos , (ed), pp. 412-414, July 1999, Orlando, USA

304A. Patel, P. Gladychev, S. K. Katsikas, S. Gritzalis, D. Lekkas, Support for Legal Relationships and Anonymity in the KEYSTONE Public Key Infrastructure Architecture, IFIP WG 8.5/9.6 Working Conference on User Identification and Privacy Protection, S. Fischer-Hubner, G. Quirchmayer, L. Yngstrom , (eds), pp. 243-254, June 1999, Stockholm, Sweden,
http://www.researchgate.net/publication/228988735_Support_for_Legal_Framework_an....

305L. Mitrou, Privacy Protection on the Internet, EETT, pp. 71-85, May 1999, Athens, EETT

306L. Mitrou, Technology, Commerce and Data Proetction, Conference of the Association of the Greek Commercialista, pp. 173-198, November 1998, Delfoi

307J. Iliadis, S. Gritzalis, V. Oikonomou, Towards Secure Downloadable Executable Content: The Java Paradigm, SAFECOMP, W. D. Ehrenberger, (ed), pp. 117-127, October 1998, Heidelberg, Germany, Springer LNCS 1516,
http://link.springer.com/content/pdf/10.1007%2F3-540-49646-7_9.pdf

308Ch. Tsagaris, A. Douma, T. Spyrou, J. Darzentas, Simulation of the University of the Aegean Network, 12th Operations Research National Conference on "Business and New Technologies", September 1998, Samos, Greece

309S. Gritzalis, J. Iliadis, V. Oikonomou, Security issues surrounding the Java programming language, 14th IFIPSEC , G. Papp, R. Posch, (eds), pp. 3-14, September 1998, Vienna, Austria, IFIP & Austrian Computer Society,
http://delivery.acm.org/10.1145/510000/506137/p16-gritzalis.pdf?ip=195.251.163.1....

310S. Gritzalis, J. Iliadis, Addressing security issues in programming languages for mobile code, DEXA , R. Wagner, (ed), pp. 288-293, August 1998, Vienna, Austria, IEEE CPS,
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=707415&url=http%3A%2F%2Fie....

311S. Gritzalis, G. Aggelis, D. Spinellis, Programming Languages for Mobile Code: A problems Viewpoint, INC 1998 1st International Network Conference, P. Sanders , (ed), pp. 210-217, July 1998, Plymouth, UK, published by University of Plymouth

312L. Mitrou, Privacy: The hesitant and uncertain course of personal data protection, Twenty years of the Greek Constitution, Sakkoulas, (ed), pp. 33-52, 1998, Athens-Komotini

313S. Gritzalis, N. Nikitakos, P. Georgiadis, Cryptographic Protocol Flaws, PCI 1997 6th Pan-Hellenic Informatics Conference, G. Pangalos, T. Sellis , (eds), pp. 27-40, December 1997, Athens, Greece, New Technologies Publications

314S. K. Katsikas, D. Spinellis, J. Iliadis, B. Blobel, Using trusted third parties for secure telemedical applications over the WWW: The EUROMED-ETS approach, Pre-Proceedings of the IMIA WG4 working Conference on Common Security Solutions for Communicating Patient Data, International Medical Informatics Association (IMIA), November 1997, Osaka/Kobe, Japan

315S. Gritzalis, D. Spinellis, Addressing Threats and Security Issues in World Wide Web Technology, CMS, S. K. Katsikas, (ed), pp. 33-46, September 1997, Athens, Greece, Chapman & Hall,
http://www.spinellis.gr/pubs/conf/1997-CMS-WebSec/html/w3sec.pdf

316S. Gritzalis, D. Spinellis, Cryptographic Protocols over open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools, SAFECOMP, P. Daniel , (ed), pp. 123-137, September 1997, York, United Kingdom, Springer,
http://link.springer.com/chapter/10.1007/978-1-4471-0997-6_10

317S. Gritzalis, N. Nikitakos, P. Georgiadis, Formal Methods for the Analysis and Design of Cryptographic Protocols: A state-of-the-art review, CMS, S. K. Katsikas, (ed), pp. 119-132, September 1997, Athens, Greece, Chapman & Hall,
http://www.google.gr/books?hl=en&lr=&id=UaX31ovFoHcC&oi=fnd&pg=PA119&dq=Gritzali....

318S. Gritzalis, S. K. Katsikas, D. Spinellis, The Cascade Vulnerability Problem for Open Distributed Systems: A review, ENCRESS ‘97 3rd IFIP TC5 International Conference on Reliability, Quality & Safety of Software-Intensive Systems, D. Gritzalis, T. Anderson, (eds), pp. 175-185, May 1997, Athens, Greece, Chapman & Hall,
http://link.springer.com/chapter/10.1007/978-0-387-35097-4_14

319S. Kokolakis, Is there a need for new information security models?, 2nd Communications and Multimedia Security Conference (CMS 96), (eds), September 1996, Hessen, Germany

320E. Kiountouzis, S. Kokolakis, An analyst's view of information systems security, 12th International Information Security Conference (IFIP/SEC 96), (eds), May 1996, Samos, Greece

321N. Nikitakos, S. Gritzalis, P. Georgiadis, Security Profile for interconnected open distributed systems with varying Vulnerability, IFIP SEC, S. K. Katsikas, (ed), pp. 428-437, May 1996, Samos, Greece, Chapman & Hall,
http://dl.acm.org/citation.cfm?id=265550

322T. Spyrou, E. Sutinen, A. Douma, H. Putkonen, I. Darzentas, Applying SICS: A technique for software modules Communication, 5th Greek National Conference on IS, pp. 165-176, 1995



University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2017