2009 |
Stefanos Gritzalis, Spyros Kokolakis, Maria Karyda, J. Park, Privacy and Fair Information Practices in Ubiquitous Environments: Research Challenges and Future Directions, Internet Research, Vol = 19, pp. = 2, http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=19&issue=2&articleid=1784451&show=pdf, YES, 0.844, 194-208, 2009, Emerald |
| | |
Stefanos Gritzalis, Panagiotis Rizomiliotis, Euaggelos Rekleitis, Security Analysis of the Song-Mitchell Authentication Protocol for Low-Cost RFID tags, IEEE Communications Letters, Vol = 13, pp. = 4, http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4815081, YES, 0.982, 274-276, 2009, IEEE Press |
| | |
Stefanos Gritzalis, Aleksandros Tsakountakis, Georgios Kambourakis, A Generic Accounting Scheme for Next Generation Networks, Computer Networks, Vol = 53, pp. = 14, http://www.sciencedirect.com/science/article/pii/S138912860900156X/pdfft?md5=da3679464a8091a96d6e904cb7d9ea66&pid=1-s2.0-S138912860900156X-main.pdf, YES, 1.201, 2408-2426, 2009, Elsevier |
| | |
Stefanos Gritzalis, Constantinos Lambrinoudakis, Panagiotis Rizomiliotis, Aggeliki Tsohou, Security and Privacy Issues in Bipolar Disorder Research, The Journal on Information Technology in Healthcare, Vol = 7, pp. = 4, 244-250, 2009, HL7 Ramius Corp |
| | |
Stefanos Gritzalis, Emmanouil Maragoudakis, E. Magkos, V. Chryssikopoulos, Accurate and Large-Scale Privacy-Preserving Data Mining using the Election Paradigm, Data and Knowledge Engineering, Vol = 68, pp. = 11, http://www.sciencedirect.com/science/article/pii/S0169023X09000950/pdfft?md5=c646e72436a84941cb2536018007b374&pid=1-s2.0-S0169023X09000950-main.pdf, YES, 1.745, 1224-1236, 2009, Elsevier |
| | |
Stefanos Gritzalis, Efthimia Aivaloglou, Hybrid Trust and Reputation Management for Sensor Networks, Wireless Networks, Vol = 16, pp. = 5, http://link.springer.com/content/pdf/10.1007%2Fs11276-009-0216-8.pdf, YES, 1.088, 1493-1510, 2009, Springer |
| | |
2008 |
Stefanos Gritzalis, L. Sterling, G. Antoniou, U. Parampalli, Privacy and Forensics investigation process: The ERPINA protocol, Computer Standards and Interfaces, Vol = 30, pp. = 4, http://www.sciencedirect.com/science/article/pii/S0920548907000979/pdfft?md5=6229592b682bd62ac64cffe8b0026ca1&pid=1-s2.0-S0920548907000979-main.pdf, YES, 1.074, 229-236, 2008, Elsevier |
| | |
Stefanos Gritzalis, R. Roman, J. Lopez, Situation Awareness Mechanisms for Wireless Sensor Networks, IEEE Communications, Vol = 46, pp. = 4, http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4481348&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D4481348, YES, 2.799, 102-107, 2008, IEEE Press |
| | |
Stefanos Gritzalis, Theodoros Balopoulos, S. Katsikas, Specifying and Implementing Privacy-preserving protocols, International Journal of Information Security, Vol = 7, pp. = 6, http://link.springer.com/content/pdf/10.1007%2Fs10207-008-0057-y.pdf, YES, 1.094, 395-420, 2008, Springer |
| | |
Stefanos Gritzalis, Efstathios Stamatatos, Georgia Frantzeskou, S. MacDonell, Examining the Significance of high-level programming features in Source-code Author Classification, Journal of Systems and Software, Vol = 81, pp. = 3, http://www.sciencedirect.com/science/article/pii/S0164121207000829/pdfft?md5=90040a5360af7c35c3b8fd0a92d404fb&pid=1-s2.0-S0164121207000829-main.pdf, YES, 1.241, 447-460, 2008, Elsevier |
| | |