2009 |
Theodoros Tzouramanis, T. Evdoridis, pp. = , Security Threats in Web-Powered Databases and Web Portals |
| | |
Theodoros Tzouramanis, T. Evdoridis, pp. = , Countermeasures for Protecting Legally Sensitive Web-powered Databases and Web Portals |
| | |
Theodoros Tzouramanis, T. Evdoridis, pp. = , Security Threats in Legally Sensitive Web-Powered Databases and Web Portals |
| | |
Theodoros Tzouramanis, T. Evdoridis, pp. = , A Generalized Comparison of Open Source and Commercial Database Management Systems |
| | |
Theodoros Tzouramanis, pp. = , SQL Code Poisoning |
| | |
Christos Gkoumopoulos, A. Kameas, H. Hagras, T. Heinroth, V. Callaghan, M. Weber, YES, pp. = [BC2] An architecture that supports task centered adaptation in intelligent environments.pdf##^^&&423485086.pdf, An architecture that supports task centered adaptation in intelligent environments |
| | |
2010 |
Stefanos Gritzalis, Georgios Kambourakis, YES, Key Management in 802.16e |
| | |
Stefanos Gritzalis, Constantinos Lambrinoudakis, S. Katsikas, YES, Privacy Enhancing Technologies: A review |
| | |
Stefanos Gritzalis, Panagiotis Rizomiliotis, Euaggelos Rekleitis, YES, Privacy Threats and countermeasures in RFID environments |
| | |
Stefanos Gritzalis, Efthimia Aivaloglou, S. Katsikas, YES, Privacy Mechanisms in Wireless Sensor Networks |
| | |