2007
Stefanos Gritzalis, Constantinos Lambrinoudakis, S. Katsikas, A. Yannacopoulos, P. Hatzopoulos, A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments, International Journal of Information Security, Vol = 6, pp. = 4, http://link.springer.com/content/pdf/10.1007%2Fs10207-006-0010-x.pdf, YES, 1.094, 197-211, 2007, Springer   
Stefanos Gritzalis, M. Belsis, A. Dwivedi, R. Bali, R. Naguib, Providing Secure mAccess to Medical Information, International Journal of Electronic Healthcare, Vol = 3, pp. = 1, http://inderscience.metapress.com/content/07khkxmmbplm1nyh/fulltext.pdf, 51-71, 2007, InderScience Publishers   
Stefanos Gritzalis, S. Katsikas, Petros Belsis, Partial and fuzzy constraint satisfaction to support coalition formation, ENTCS Electronic Notes on Theoretical Computer Science, Vol = 179, pp. = 1, http://www.sciencedirect.com/science/article/pii/S1571066107003040/pdf?md5=2e70ad7bacffc41a4aeb566420b7758d&pid=1-s2.0-S1571066107003040-main.pdf, 75-86, 2007, Elsevier   
Stefanos Gritzalis, Georgios Kambourakis, Georgios Karopoulos, Survey of Secure Hand-off Optimization Schemes for Multimedia Services over all-IP Wireless Heterogeneous Networks, IEEE Communications Surveys and Tutorials, Vol = 9, pp. = 3, https://heim.ifi.uio.no/paalee/referencing_publications/ref-sec-karopoulos-commsurveys-2007.pdf, YES, 6.348, 18-28, 2007, IEEE Press   
Stefanos Gritzalis, J. Lopez, J. Onieva, R. Rodrigo, J. Zhou, Integration of Non-repudiation Services in Mobile Digital Rights Management Scenarios, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol = 35, pp. = 3, http://link.springer.com/content/pdf/10.1007%2Fs11235-007-9050-4.pdf, YES, 0.423, 161-176, 2007, Springer   
Stefanos Gritzalis, E. Kavakli, C. Kalloniatis, Protecting Privacy in System Design: The electronic voting case, Tranforming Government: People, Process and Policy journal, Vol = 1, pp. = 4, http://www.emeraldinsight.com/journals.htm?issn=1750-6166&volume=1&issue=4&articleid=1631522&show=pdf, 307-332, 2007, Emerald   
2006
Stefanos Gritzalis, Georgios Kambourakis, Aggelos Rouskas, Dimitris Geneiatakis, Support of Subscribers Certificates in a Hybrid WLAN-3G Environment, Computer Networks, Vol = 50, pp. = 11, http://www.sciencedirect.com/science/article/pii/S1389128605002653/pdfft?md5=7321381a9d935cb95b0bf52c8f5f47ab&pid=1-s2.0-S1389128605002653-main.pdf, YES, 0.631, 1843-1859, 2006, Elsevier   
Stefanos Gritzalis, Georgios Kambourakis, Constantinos Lambrinoudakis, Dimitris Geneiatakis, A. Dagiouklas, S. Ehlert, D. Sisalem, Survey of Security Vulnerabilities in Session Initiation Protocol, IEEE Communications Surveys and Tutorials, Vol = 8, pp. = 3, http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4020603, 68-81, 2006, IEEE Press   
Stefanos Gritzalis, Dimitrios Fotakis, Efficient Heuristic Algorithms for Correcting the Cascade Vulnerability Problem for Interconnected Networks, Computer Communications, Vol = 29, pp. = 11, http://www.sciencedirect.com/science/article/pii/S0140366406000326/pdfft?md5=7ecb32b6e5ca8b91e17a07e0733a52ce&pid=1-s2.0-S0140366406000326-main.pdf, YES, 0.444, 2109-2122, 2006, Elsevier   
Stefanos Gritzalis, S. Katsikas, K. Lamprou, Security Architectures for Online Distance Learning and Training: A review, THEMES in Education, Vol = 7, pp. = 1, http://earthlab.uoi.gr/theste/index.php/theste, 63-77, 2006