Εκπαίδευση - Σπουδές

Δίπλωμα Μηχανικού Πληροφορικής
Μεταπτυχιακό Ασφάλειας Πληροφοριακών και Επικοινωνιακών Συστημάτων

Ερευνητικά Ενδιαφέροντα

Ασφάλεια Πληροφοριακών Συστημάτων και Δικτύων
Μηχανική μάθηση
Τεχνολογία λογισμικού


 

 

Διδασκαλία

  • Εργαστήριο Αντικειμενοστρεφής Προγραμματισμός Ι, 2ο εξάμηνο, (Ακ. έτος 2009-10 έως σήμερα)
  • Εργαστήριο Αντικειμενοστρεφής Προγραμματισμός IΙ, 3ο εξάμηνο, (Ακ. έτος 2010-11 έως σήμερα)
  • Εργαστήριο Δομές Δεδομένων, 3ο εξάμηνο, (Ακ. έτος 2011-12 έως σήμερα)
  • Εργαστήριο Κατανεμημένα Συστήματα, 6ο εξάμηνο (Ακ. έτος 2012-13 έως σήμερα)
  • Εργαστήριο Ασφάλεια Πληροφοριακών και Επικοινωνιακών Συστημάτων, 6ο εξάμηνο, (Ακ. έτος 2009-10 έως σήμερα)

 

Δημοσιεύσεις σε Διεθνή Περιοδικά (Journals)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


G. Kambourakis, E. Konstantinou, A. Douma, M. Anagnostopoulos, G. Fotiadis, Efficient Certification Path Discovery for MANET, EURASIP Journal on Wireless Communications and Networking, Vol. 2010, pp. 1-16, 2010, Hindawi Publishing Corporation, http://jwcn.eurasipjournals.com/, indexed in SCI-E, IF = 0.815
 

Abstract
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitioning, and wireless connections. These properties make traditional wireline security solutions not straightforwardly applicable in MANETs, and of course, constitute the establishment of a Public Key Infrastructure (PKI) in such networks a cumbersome task. After surveying related work, we propose a novel public key management scheme using the well-known web-of-trust or trust graph model. Our scheme is based on a binary tree formation of the network’s nodes. The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided.We compare our scheme with related work and show that it presents several advantages, especially when a fair balancing between security and performance is desirable. Simulations of the proposed scheme under different scenarios demonstrate that it is effective in terms of tree formation, join and leave occurrences, and certificate chain establishment.

[2]
A. Douma, Mavroudakis Konstantinos, S. K. Katsikas, D. Gritzalis, Design of a neural network for recognition and classification of computer viruses, Computers & Security, Vol. 14, No. 5, pp. 435-448, 1995

Επιστημονικά Συνέδρια (Conferences)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
Ch. Tsagaris, A. Douma, T. Spyrou, J. Darzentas, Simulation of the University of the Aegean Network, 12th Operations Research National Conference on "Business and New Technologies", Sep, 1998, Samos, Greece,
[2]
T. Spyrou, E. Sutinen, A. Douma, H. Putkonen, I. Darzentas, Applying SICS: A technique for software modules Communication, 5th Greek National Conference on IS, pp. 165-176, Dec, 1995,

Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
M. Anagnostopoulos, A. Douma, G. Kambourakis, Network Security, chapter in: Information and System Security in the Cyberspace, S. Katsikas, S. Gritzalis, C Lambrinoudakis, (eds), 2021, Athens, NewTech Pub (in Greek), https://newtech-pub.com/βιβλία/πληροφορι...

Επιμέλεια Πρακτικών Διεθνών Συνεδρίων


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.