Περιοδικό

2005
Stefanos Gritzalis, Constantinos Lambrinoudakis, S. Katsikas, A. Yannacopoulos, P. Hatzopoulos, A formal model for pricing information systems insurance contracts, Computer Standards and Interfaces, Vol = 27, pp. = 5, http://www.sciencedirect.com/science/article/pii/S0920548905000115/pdfft?md5=a48737e7da72acba41a6293242c43804&pid=1-s2.0-S0920548905000115-main.pdf, YES, 0.62, 521-532, 2005, Elsevier   
Stefanos Gritzalis, Constantinos Lambrinoudakis, D. Lekkas, S. Deftereos, Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments, IEEE Transactions on Information Technology in BioMedicine, Vol = 9, pp. = 3, http://link.springer.com/content/pdf/10.1023%2FB%3AJOMS.0000044956.55209.75.pdf, YES, 1.939, 413-423, 2005, IEEE Press   
Stefanos Gritzalis, A Good-Practice Guidance on the use of PKI Services in the Public Sector of the European Union Member States, Information Management and Computer Security, Vol = 13, pp. = 5, http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published/EmeraldFullTextArticle/Pdf/0460130504.pdf, 379-398, 2005, Emerald   
Stefanos Gritzalis, Lilian Mitrou, D. Lekkas, Withdrawing a Declaration of Will: Towards a Framework for Digital Signature Revocation, Internet Research, Vol = 15, pp. = 4, http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published/EmeraldFullTextArticle/Pdf/1720150403.pdf, YES, 0.688, 400-420, 2005, Emerald   
Stefanos Gritzalis, A. Roumboutsos, N. Nikitakos, Information Technology Network Security Risk Assessment and Management Framework for Shipping Companies, Maritime Policy and Management, Vol = 32, pp. = 4, http://www.tandfonline.com/doi/pdf/10.1080/03088830500301501, YES, 0.616, 421-432, 2005, Taylor and Francis Pubs   
Stefanos Gritzalis, Lazaros Gymnopoulos, V. Tsoumas, I. Soupionis, A generic Grid security policy reconciliation framework, Internet Research, Vol = 15, pp. = 5, http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=15&issue=5&articleid=1528692&show=pdf, YES, 0.688, 508-517, 2005, Emerald   
Stefanos Gritzalis, Theodoros Balopoulos, S. Katsikas, Specifying Privacy Preserving Protocols in Typed MSR, Computer Standards and Interfaces, Vol = 27, pp. = 5, http://www.sciencedirect.com/science/article/pii/S0920548905000097/pdfft?md5=97ade0b4b6a73a6ceaf37150987b22c2&pid=1-s2.0-S0920548905000097-main.pdf, YES, 0.62, 501-512, 2005, Elsevier   
Georgios Kambourakis, Aggelos Rouskas, I. Maglogiannis, PKI-based Secure Mobile Access to Electronic Health Services and Data, Technology and Health Care (T&HC), Vol = 13, http://iospress.metapress.com/content/5ten0ny42h74vmbl/, 511-526, 2005, IOS Press   
Panagiotis Rizomiliotis, N. Kalouptsidis, Results on the nonlinear span of binary sequences, IEEE Transactions on Information Theory, Vol = 51, pp. = 4, doi: 10.1109/TIT.2005.844090 , YES, 1555-1563, 2005, IEEE Press   
Panagiotis Rizomiliotis, N. Kalouptsidis, N. Kolokotronis, On the quadratic span of binary sequences, IEEE Transactions on Information Theory, Vol = 51, pp. = 5, doi: 10.1109/TIT.2005.846428 , YES, 1840-1848, 2005, IEEE Press