2001 |
Stefanos Gritzalis, D. Gritzalis, Iliadis John Iliadis John, K. Moulinos, An integrated Architecture for deploying a Virtual Private Medical Network over the Web, Medical Informatics and the Internet in Medicine journal, Vol = 26, pp. = 1, http://informahealthcare.com/doi/pdf/10.1080/14639230117731, YES, 0.419, 49-72, 2001, Taylor & Francis Publications |
| | |
2000 |
Stefanos Gritzalis, Iliadis John Iliadis John, S. Oikonomopoulos, Distributed Component Software Security Issues on Deploying a Secure Electronic Marketplace, Information Management and Computer Security, Vol = 8, pp. = 1, http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=1&articleid=862755&show=pdf, 5-13, 2000, MCB University Press |
| | |
Stefanos Gritzalis, Constantinos Lambrinoudakis, Managing Medical and Insurance Information through a Smart Card Based Information System, Journal of Medical Systems, Vol = 24, pp. = 4, http://link.springer.com/content/pdf/10.1023%2FA%3A1005549330655.pdf, YES, 0.674, 213-234, 2000, Kluwer Academic Publishers - Plenum Corp. |
| | |
Stefanos Gritzalis, S. Katsikas, D. Lekkas, K. Moulinos, E. Polydorou, Securing the electronic market: The KEYSTONE Public Key Infrastructure Architecture”, Computers and Security, Vol = 19, pp. = 8, http://www.sciencedirect.com/science/article/pii/S0167404800080226/pdfft?md5=4bc0141931d242b558aa144870b79b05&pid=1-s2.0-S0167404800080226-main.pdf, YES, 0.743, 731-746, 2000, Elsevier |
| | |
1999 |
Stefanos Gritzalis, Spyros Kokolakis, D. Spinellis, Security requirements, risks, and recommendations for small enterprise and home-office environments, Information Management and Computer Security, Vol = 7, pp. = 3, http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published/EmeraldFullTextArticle/Pdf/0460070302.pdf, 121-128, 1999, MCB University Press |
| | |
Stefanos Gritzalis, D. Spinellis, P. Georgiadis, Security Protocols over open networks and distributed systems: Formal Methods for their Analysis, Design, and Verification , Computer Communications, Vol = 22, pp. = 8, http://www.sciencedirect.com/science/article/pii/S0140366499000304/pdfft?md5=167638713cc1c4055f2c501c080abe79&pid=1-s2.0-S0140366499000304-main.pdf, YES, 0.556, 697-709, 1999, Elsevier |
| | |
Stefanos Gritzalis, S. Katsikas, D. Spinellis, D. Gritzalis, Iliadis John Iliadis John, Developing Secure Web based Medical Applications, Medical Informatics and the Internet in Medicine Journal, Vol = 24, pp. = 1, http://informahealthcare.com/doi/pdf/10.1080/146392399298537, YES, 0.419, 75-90, 1999, Taylor & Francis Publications |
| | |
Stefanos Gritzalis, S. Katsikas, D. Spinellis, D. Gritzalis, Iliadis John Iliadis John, Trusted third Party services for deploying secure telemedical applications over the Web, Computers & Security, Vol = 18, pp. = 7, http://www.sciencedirect.com/science/article/pii/S0167404899820410/pdf?md5=25d4c52504dd459fbe293df73c49dc8a&pid=1-s2.0-S0167404899820410-main.pdf, YES, 0.743, 627-639, 1999, Elsevier |
| | |
Stefanos Gritzalis, D. Spinellis, G. Aggelis, Architectures for secure portable executable content, Internet Research, Vol = 9, pp. = 1, http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published/EmeraldFullTextArticle/Pdf/1720090102.pdf, YES, 0.688, 16-24, 1999, MCB University Press |
| | |
1998 |
Stefanos Gritzalis, D. Spinellis, The Cascade Vulnerability problem: The Detection problem and a Simulated Annealing approach for its Correction problem, Microprocessors and Microsystems, Vol = 21, pp. = 10, http://www.sciencedirect.com/science/article/pii/S0141933198000647/pdf?md5=e2d6ae5b2bfc1e58fd42156347cdde63&pid=1-s2.0-S0141933198000647-main.pdf, YES, 0.263, 621-627, 1998, Elsevier |
| | |