Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security
   
Publications
Journals
Conferences
Books
Chapter In Books
Conferences Proceedings Editor
Filter:

Year: Members:

Chapters in Books

1M. Sideri, A. Kitsiou , E. Tzortzaki, C. Kalloniatis, S. Gritzalis, "Privacy Protection and Digital Social Media, in:", chapter in Social and Cultural Sustainability, V. Papavasileiou, M. Kaila, (eds), pp. 134-174, 2017, Athens, Greece, Diadrasi Pubs. (in Greek)

2C. Kalloniatis, E. Kavakli, S. Gritzalis, "Addressing Privacy in Traditional and Cloud-based Systems", chapter in Kalloniatis C., Kavakli E., Gritzalis S., "in: Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, Mehdi Khosrow-Pour, (ed), pp. 1900-1930, 2017, Hershey, USA, IGI Global,
https://www.igi-global.com/book/computer-systems-software-engineering/181910#tab....

3S. K. Katsikas, S. Gritzalis, "Digitalization in Greece: State of play, barriers, challenges, solutions, in:", chapter in Beyond Bureaucracy: Towards Sustainable Governance Informatization, A. Paulin, L. Anthopoulos, C. Reddick, (eds), pp. 355-375, 2017, Berlin, Springer,
http://www.springer.com/gp/book/9783319541419#aboutAuthors

4R. Neisse, D. Geneiatakis, G. Steri, G. Kambourakis, I. N. Fovino, R. Satta, "Dealing with user privacy in mobile apps: issues and mitigation", chapter in Protecting Mobile Networks and Devices: Challenges and Solutions, Weizhi Meng, Xiapu Luo, Jianying Zhou, Steven Furnell, (eds), 2016, CRC Press - Taylor & Francis,
https://www.crcpress.com/Protecting-Mobile-Networks-and-Devices-Challenges-and-S....

5L. Mitrou, P. Drogkaris, G. Leventakis, "Perceptions of videosurveillance in Greece: a “Greek paradox” beyond the trade-off of security and privacy ?", chapter in Surveillance, Privacy and Security: Citizens’ Perspectives, M. Friedewald, J. P. Burgess, J. Cas, R. Bellanova, W. Peissl, (eds), pp. 123-138, 2016, Routledge,
https://www.routledge.com/products/9781138649248

6M. Sideri, A. Kitsiou , C. Kalloniatis, S. Gritzalis, "Freedom of expression, privacy and social control exercise in social media: The case of Greek student communities in Facebook, in:", chapter in Environmental Education for Sustainable Development, E. Theodoropoulou, P. Fokiali, V. Papavasileiou, M. Kaila , (eds), pp. 56-65, 2016, Athens, Diadrasi Pubs. (in Greek)

7M. Bertsima, I. Varlamis, P. Rizomiliotis, "Strengthening Privacy in Healthcare Social Networks", chapter in Medical Data Privacy Handbook, Aris Gkoulalas‐Divanis and Grigorios Loukides , (eds), 2015, Springer,
http://www.springer.com/us/book/9783319236322

8E. Konstantinou, A. Kontogeorgis, "Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves", chapter in Computation, Cryptography, and Network Security, NJ Daras, MT Rassias, (eds), pp. 299-318, 2015, Springer International Publishing

9S. Gritzalis, "Administrative reform for the citizens and entrepreneurship: Fundamental problems and a framework for solutions, now!, in:", chapter in From the University to Public Administration: A return journey, pp. 17-45, 2014, Athens, Papazisis Pubs. (in Greek)

10L. Mitrou, "Introduction (in Greek)", chapter in Facebook, blogs and Fundamental Rights, pp. 9-20, 2013, Athens

11C. Kolias, V. Kolias, G. Kambourakis, E. Kayafas, "A Client-Side Privacy Framework for Web Personalization", chapter in Semantic Hyper/Multimedia Adaptation: Schemes and Applications, I. Anagnostopoulos, M. Bielikova, P. Mylonas, N. Tsapatsoulis, (eds), pp. 297-316, 2013, Springer Series on Studies in Computational Intelligence, Vol. 418,
http://link.springer.com/chapter/10.1007%2F978-3-642-28977-4_11

12M. Karyda, S. Kokolakis, "Ψηφιακά Κοινωνικά Δίκτυα: Ζητήματα ιδιωτικότητας και η τεχνολογική αντιμετώπισή τους ", chapter in Facebook, Blogs και δικαιώματα, Θ. Κ. Παπαχρίστου, Λ. Μήτρου, Τ. Βιδάλης, Θ. Ξηρός., (eds), pp. 117-, 2013, Εκδόσεις Σάκκουλα

13M. Anagnostopoulos, G. Kambourakis, E. Konstantinou, S. Gritzalis, "DNSsec vs. DNScurve: A side-by-side comparison, in:", chapter in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, Onwubiko C., Owens T., (eds), pp. 201-220, 2012, Hershey, USA, IGI Global ,
http://www.igi-global.com/chapter/dnssec-dnscurve-side-side-comparison/62383

14E. Konstantinou, P. Nastou, Y. Stamatiou, C. Zaroliagis, "Securing Embedded Computing Systems through Elliptic Curve Cryptography", chapter in Encyclopedia of Embedded Computing Systems, Mohamed Khalgui, Olfa Mosbahi, Antonio Valentini, (eds), 2012, IGI Global, (to appear)

15N. Vrakas, G. Fotiadis, "Key Management Techniques", chapter in Modern Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. K. Katsikas, V. Chryssikopoulos, (eds), 2011, Papasotiriou Pubs. (in Greek)

16J. Iliadis, "Message Authentication Codes (Κώδικες Αυθεντικοποίησης Μηνύματος)", chapter in Contemporary Cryptography: Theory and Applications (Σύγχρονη Κρυπτογραφία: Θεωρία και Εφαρμογές), M. Burmester, S. Gritzalis, S. Katsikas, V. Chrissikopoulos, (eds), pp. 423-439, 2011, Papasotiriou Publications

17M. Burmester, S. Gritzalis, S. K. Katsikas, V. Chryssikopoulos, "Introduction to Modern Cryptography, in:", chapter in Modern Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. Katsikas, V. Chryssikopoulos, (eds), pp. 1-44, 2011, Athens, Greece, Papasotiriou Pubs. (in Greek)

18E. Konstantinou, S. K. Katsikas, "Public Key Cryptography", chapter in Contemporary Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. Katsikas, V. Chryssikopoulos, (eds), 2011, Papasotiriou Pubs. (in Greek)

19T. Balopoulos, S. Gritzalis, "Identification and Authentication of Entities", chapter in Moden Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. Katsikas, V. Chryssikopoulos, (eds), pp. 469-498, 2011, Athens, Greece, Papasotiriou Pubs. (in Greek)

20P. Rizomiliotis, "Practical cryptography", chapter in Modern Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. K. Katsikas, V. Chryssikopoulos, (eds), 2011, Papasotiriou Pubs. (in Greek)

21C. Kalloniatis, E. Kavakli, S. Gritzalis, "Designing Privacy Aware Information Systems, in:", chapter in Software Engineering for Secure Systems: Industrial and Research Perspectives, H. Mouratidis, (ed), pp. 212-231, 2011, Hershey, USA, IGI Global,
https://www.igi-global.com/chapter/designing-privacy-aware-information-systems/4....

22P. Belsis, C. Skourlas, S. Gritzalis, "Secure electronic healthcare records distribution in wireless environments using low resource devices", chapter in Pervasive Computing and Communications Design and Deployment: Technologies, Trends, and Applications, A. Malatras, (ed), pp. 247-262, 2011, Hershey, USA, IGI Global,
https://dl.acm.org/citation.cfm?id=2447279

23G. Kambourakis, S. Gritzalis, "Key Management in 802.16e", chapter in WiMAX Security and Quality of Service: Providing an End-to-End Explanation, P. Mueller, S. Y. Tang, H. Sharif, (eds), pp. 63-86, 2010, New Jersey, USA, Wiley,
http://onlinelibrary.wiley.com/doi/10.1002/9780470665749.ch3/summary

24G. Papadimitriou, S. Petridou, S. Sarigiannidis, S. Gritzalis, A. Pomportsis, "Communications Privacy", chapter in Privacy Protection and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 49-71, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek)

25E. Aivaloglou, S. Gritzalis, S. K. Katsikas, "Privacy Mechanisms in Wireless Sensor Networks", chapter in Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 221-244, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek)

26T. Balopoulos, S. Gritzalis, "Linkability and Selective Disclosure in Privacy-preserving Cryptographic Protocols", chapter in Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 267-282, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek)

27L. Mitrou, "The Impact of Communications Data Retention on Fundamental Rights and Democracy ", chapter in Surveillance & Democracy, Κ. Haggerty and M. Samatas, pp. 127-147, 2010, London, Routledge

28G. Frantzeskou, S. MacDonell, E. Stamatatos, "Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process", chapter in Handbook of Research on Computational Forensics, Digital Crime, and Investigation, Chang-Tsun Li, (ed), pp. 470-495, 2010, IGI Global

29A. Yannacopoulos, S. Xanthopoulos, C. Lambrinoudakis, S. Gritzalis, S. K. Katsikas, "Privacy Economics", chapter in Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 447-467, 2010, Athens, Greece, Papasotiriou Pubs (in Greek)

30C. Lambrinoudakis, S. Gritzalis, S. K. Katsikas, "Privacy Enhancing Technologies: A review", chapter in Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 3-47, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek)

31E. Rekleitis, P. Rizomiliotis, S. Gritzalis, "Privacy Threats and countermeasures in RFID environments", chapter in Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 193-220, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek)

32I. Chatzigiannakis, E. Konstantinou, "Key Establishment Protocols for Wireless Sensor Networks", chapter in Security in RFID and Sensor Networks, Y. Zhang and P. Kitsos, (eds), 2009, Taylor and Francis Group

33S. Kokolakis, P. Rizomiliotis, A. Benameur, S.-K. Sinha, "Security and Dependability Solutions for Web Services and Workflows", chapter in Security and Dependability for Ambient Intelligence, G. Spanoudakis, A. Mana, S. Kokolakis, (eds), pp. 97-106, 2009, Springer

34G. Kambourakis, C. Lambrinoudakis, S. K. Katsikas, "Intrusion Detection Systems for Wireless Networks: A Survey", chapter in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, C. Skianis, (eds), pp. 161-181, 2009, Troubador Publishing,
http://bookshop.blackwell.co.uk/jsp/display_product_info.jsp?isbn=9781905886906

35G. Kambourakis, E. Konstantinou, "Threats and Privacy-preserving mechanisms in Mobile and Wireless Communication Networks", chapter in Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S.K. Katsikas, (eds), 2009, Athens, Greece, Papasotiriou Pubs. (in Greek),
http://www.papasotiriou.gr/product/prostasia-tis-idiotikotitas--texnologies-plir....

36L. Mitrou, M. Karyda, " Bridging the gap between employee’s surveillance and privacy protection ", chapter in Social and Human Elements of Information Security: Emerging Trends and Countermeasures, Gupta M. and R. Sharman(ed.), pp. 283-300, 2009, Hershey-New York , Information Science Reference (IGI Gl

37S. Gritzalis, L. Mitrou, "Content Filtering Technologies and the Law", chapter in Securing Information and Communication Systems: Principles, Technologies and Applications, J. Lopez, S. K. Katsikas, S. Furnell, A. Patel, (eds), pp. 243-265, 2008, Boston, USA, Artech House,
https://books.google.gr/books?id=VAUtQ9MjcLUC&pg=PA243&lpg=PA243&dq=Content+Filt....

38E. Aivaloglou, S. Gritzalis, S. K. Katsikas, "Privacy Protection Mechanisms for Sensor Networks", chapter in Wireless Sensor Networks, J. Lopez, J. Zhou, (eds), pp. 223-250, 2008, Amsterdam, The Netherlands, Cryptology & Information Security Series, IOS Press,
http://wsn-group.weebly.com/uploads/2/7/3/9/273942/wireless_sensor_network_secur....

39M. Karyda, S. Kokolakis, "Privacy Perceptions Among Members of Online Communities", chapter in Digital Privacy: Theory, Technologies and Practices, A. Acquisti, S. De Capitani di Vimercati, S. Gritzalis, C. Lambrinoudakis , (eds), 2008, Auerbach Publications (Taylor and Francis Group)

40M. Karyda, "The Socioeconomic Background of Electronic Crime", chapter in Socioeconomic and Legal Implications of Electronic Intrusion, D. Politis, P. Kozyris and I. Iglezakis, (eds), 2008, IGI Global pub

41L. Mitrou, "Data retention: a Pandora Box for Rights and Liberties?", chapter in Digital Privacy: Theory, Technologies and Practices, A. Acquisti,S. De Capitani di Vimercati,S. Gritzalis,C. Lambrinoudakis, (eds), pp. 410-433, 2008, Auerbach Publications

42G. Kambourakis, A. Rouskas, S. Gritzalis, "Evaluating Security Mechanisms in different protocol layers for Bluetooth Connections", chapter in Handbook of Research in Wireless Security, Y. Zhang, J. Zheng, Ma M., (eds), pp. 666-680, 2008, Pennsylvania, USA, Idea Group Reference,
http://www.igi-global.com/chapter/evaluating-security-mechanisms-different-proto....

43G. Kambourakis, "On Mobile Wiki Systems Security", chapter in Securing Information and Communication Systems: Principles, Technologies and Applications, J. Lopez, S. Katsikas, A. Patel, S. Furnell, (eds), pp. 323-334, 2008, Boston, USA, Artech House,
http://www.artechhouse.com/International/Books/On-Mobile-Wiki-Systems-Security-1....

44D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, "SIP Security: Threats, Vulnerabilities and Countermeasures", chapter in SIP Handbook: Services, Technologies, and Security, Ahson and M. Ilyas, (eds), pp. 435-455, 2008, CRC Press,
http://www.crcpress.com/product/isbn/9781420066036

45G. Marias, L. Mitrou, M. Theoharidou, I. Soupionis, S. Ehlert, D. Gritzalis, "SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues", chapter in SIP Handbook: Services, Technologies and Security of Session Initiation Protocol, Syed Ahson and Mohammad Ilyas (Εds.), pp. 457-480, 2008, CRC Press

46A. Yannacopoulos, S. K. Katsikas, S. Gritzalis, C. Lambrinoudakis, S. Xanthopoulos, "A Risk Model for Privacy Insurance", chapter in Digital Privacy: Theory, Technologies, and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. De Capitani di Vimercati, (eds), pp. 347-362, 2007, New York, Auerbach Publications - Taylor and Francis Group,
https://www.crcpress.com/Digital-Privacy-Theory-Technologies-and-Practices/Acqui....

47M. Belsis, A. Simitsis, S. Gritzalis, "Wireless Security: Common Protocols and Vulnerabilities", chapter in Encyclopedia of Mobile Computing and Commerce, D. Taniar, (ed), pp. 1028-1034, 2007, Pennsylvania, USA, Idea Group Reference,
https://www.igi-global.com/book/encyclopedia-mobile-computing-commerce/366

48S. Gritzalis, C. Lambrinoudakis, "Privacy in the Digital World", chapter in Encyclopedia of Internet Technologies and Applications, M. Freire, M. Pereira, (eds), pp. 411-417, 2007, Pennsylvania, USA, Idea Group Reference,
https://www.igi-global.com/book/encyclopedia-internet-technologies-applications/....

49L. Mitrou, "The right to participate to Information Society", chapter in The right to participate to Information Society, G. Papadimitriou, (ed), pp. 35-56, 2006, Athens-Thessaloniki

50P. Belsis, K. Fragos, S. Gritzalis, C. Skourlas, "Information filtering and effective resources taxonomy", chapter in Parallel, Content based, Cross Language Information Retrieval, C. Skourlas, (ed), pp. 159-170, 2006, Athens, Greece, New Technologies Publishers (in Greek)

51L. Mitrou, "Regulation in Cyberspace?", chapter in Self-regulation, G. Papadimitriou, (ed), pp. 75-97, 2005, Athens-Thessaloniki

52C. Lambrinoudakis, S. Gritzalis, "Security in IEEE 802.11 Wireless Local Networks", chapter in Handbook of Wireless Local Area Networks, M. Ilyas, S. Ahson, (eds), pp. 579-600, 2005, Florida, USA, CRC Press, Taylor and Francis Group,
https://www.taylorfrancis.com/books/9780203492512

53L. Mitrou, "Personal Data Protection", chapter in Information and Data Security, S. Katsikas, D.Gritzalis, S. Gritzalis, (eds), pp. 443-525, 2004, Athens-Greece, Ekdoseis Neon Technologion

54J. Iliadis, "Malicious Software (Κακόβουλο Λογισμικό)", chapter in Information Systems Security (Ασφάλεια Πληροφοριακών Συστημάτων), Katsikas S., Gritzalis D., Gritzalis S., (eds), pp. 235-265, 2004, New Technology Publications

55S. Gritzalis, "Security Evaluation and Assurance", chapter in Information Systems Security, S. K. Katsikas, D. Gritzalis, S. Gritzalis, (eds), pp. 267-333, 2004, Athens, Greece, New Technologies Publishers (in Greek)

56C. Lambrinoudakis, D. Gritzalis, V. Tsoumas, M. Karyda, S. Ikonomopoulos, "Secure Electronic Voting: The Current Landscape", chapter in Secure Electronic Voting, D. Gritzalis, (ed), pp. 101-122, 2003, Kluwer Academic Publishers

57S. K. Katsikas, S. Kokolakis, "High-level Security Policies for Health Care Establishments,", chapter in Health Informatics, B. Blobel, (ed), pp. 98-104, 2003, Amsterdam, The Netherlands, IOS Press

58M. Karyda, "Πολιτικές Ασφάλειας Πληροφοριακών Συστημάτων", chapter in Ασφάλεια Πληροφοριακών Συστημάτων, Κάτσικας Σ., Γκρίτζαλης Δ., Γκρίτζαλης Σ., (eds), pp. 377-406, 2003, Αθήνα, Εκδόσεις Νέων Τεχνολογιών

59L. Mitrou, D. Gritzalis, S. K. Katsikas, G. Quirchmayr, "Electronic voting: Constitutional and legal requirements and their technical implications ", chapter in Secure Electronic Voting, D. A. Gritzalis , (ed), pp. 43-60, 2003, Boston, Dordrecht, London, Kluwer Academic Publishers

60L. Mitrou, "Worker's Personal Data Protection", chapter in The Data Protection Authority and Its Decisions , G. Papadimitriou, (ed), pp. 21-44, 2002, Thessaloniki-Greece, Ekdoseis Sakkoula

61L. Mitrou, "Data Protection in Greece", chapter in The Global Data Protection Regulation, Holvast, Madsen, Roth, (eds), pp. 8, 2000, The Hague, London, Boston, Kluwer Law International

62L. Mitrou, "Access to Archives and Data", chapter in Archives and Confidentiality, Z. Synodinos, (ed), pp. 23-50, 1998, Thessaloniki-Greece, Greek Archives Society

63S. Gritzalis, P. Georgiadis, "Operating Systems Security", chapter in Information Security: Technical, Legal and Social Issues , N. Alexandris, E. Kiountouzis, B. Trapezanoglou, (eds), pp. 35-59, 1995, Athens, Greece, Greek Computer Society (in Greek)

64L. Mitrou, "The Data Protection Insitutional Control", chapter in Data Security, Alexandris, Kiountouzis, Trapezanoglou, (eds), pp. 341-367, 1995, Athens, Greece, EPY



University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2018