1992 |
Stefanos Gritzalis, S. Katsikas, D. Gritzalis, A Zero Knowledge Probabilistic Login Protocol, Computers and Security, Vol = 11, pp. = 8, http://www.sciencedirect.com/science/article/pii/016740489290129F/pdf?md5=a792be862197c3ecf633b5ea7b2b7e94&pid=1-s2.0-016740489290129F-main.pdf, YES, 0.743, 733-745, 1992, Elsevier |
| | |
1998 |
Stefanos Gritzalis, D. Spinellis, The Cascade Vulnerability problem: The Detection problem and a Simulated Annealing approach for its Correction problem, Microprocessors and Microsystems, Vol = 21, pp. = 10, http://www.sciencedirect.com/science/article/pii/S0141933198000647/pdf?md5=e2d6ae5b2bfc1e58fd42156347cdde63&pid=1-s2.0-S0141933198000647-main.pdf, YES, 0.263, 621-627, 1998, Elsevier |
| | |
Stefanos Gritzalis, G. Aggelis, Security Issues Surrounding Programming Languges for Mobile Code: JAVA vs. Safe-Tcl, ACM Operating Systems Review, Vol = 32, pp. = 2, http://dl.acm.org/ft_gateway.cfm?id=506137&type=pdf&CFID=265073195&CFTOKEN=10352292, 16-32, 1998, ACM Press |
| | |
1999 |
Stefanos Gritzalis, Spyros Kokolakis, D. Spinellis, Security requirements, risks, and recommendations for small enterprise and home-office environments, Information Management and Computer Security, Vol = 7, pp. = 3, http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published/EmeraldFullTextArticle/Pdf/0460070302.pdf, 121-128, 1999, MCB University Press |
| | |
Stefanos Gritzalis, D. Spinellis, P. Georgiadis, Security Protocols over open networks and distributed systems: Formal Methods for their Analysis, Design, and Verification , Computer Communications, Vol = 22, pp. = 8, http://www.sciencedirect.com/science/article/pii/S0140366499000304/pdfft?md5=167638713cc1c4055f2c501c080abe79&pid=1-s2.0-S0140366499000304-main.pdf, YES, 0.556, 697-709, 1999, Elsevier |
| | |
Stefanos Gritzalis, S. Katsikas, D. Spinellis, D. Gritzalis, Iliadis John Iliadis John, Developing Secure Web based Medical Applications, Medical Informatics and the Internet in Medicine Journal, Vol = 24, pp. = 1, http://informahealthcare.com/doi/pdf/10.1080/146392399298537, YES, 0.419, 75-90, 1999, Taylor & Francis Publications |
| | |
Stefanos Gritzalis, S. Katsikas, D. Spinellis, D. Gritzalis, Iliadis John Iliadis John, Trusted third Party services for deploying secure telemedical applications over the Web, Computers & Security, Vol = 18, pp. = 7, http://www.sciencedirect.com/science/article/pii/S0167404899820410/pdf?md5=25d4c52504dd459fbe293df73c49dc8a&pid=1-s2.0-S0167404899820410-main.pdf, YES, 0.743, 627-639, 1999, Elsevier |
| | |
Stefanos Gritzalis, D. Spinellis, G. Aggelis, Architectures for secure portable executable content, Internet Research, Vol = 9, pp. = 1, http://www.emeraldinsight.com/Insight/viewPDF.jsp?Filename=html/Output/Published/EmeraldFullTextArticle/Pdf/1720090102.pdf, YES, 0.688, 16-24, 1999, MCB University Press |
| | |
2000 |
Stefanos Gritzalis, Iliadis John Iliadis John, S. Oikonomopoulos, Distributed Component Software Security Issues on Deploying a Secure Electronic Marketplace, Information Management and Computer Security, Vol = 8, pp. = 1, http://www.emeraldinsight.com/journals.htm?issn=0968-5227&volume=8&issue=1&articleid=862755&show=pdf, 5-13, 2000, MCB University Press |
| | |
Stefanos Gritzalis, Constantinos Lambrinoudakis, Managing Medical and Insurance Information through a Smart Card Based Information System, Journal of Medical Systems, Vol = 24, pp. = 4, http://link.springer.com/content/pdf/10.1023%2FA%3A1005549330655.pdf, YES, 0.674, 213-234, 2000, Kluwer Academic Publishers - Plenum Corp. |
| | |