2013 |
Georgios Kambourakis, Dimitrios Damopoulos, A competent post-authentication and non-repudiation biometric-based scheme for m-Learning, The 10th IASTED International Conference on Web-based Education (WBE 2013), V. Uskov, YES, 821-827, Φεβρουάριος, 2013, Innsbruck, Austria, ACTA Press |
| | |
Stefanos Gritzalis, C. Kalloniatis, C. Mouratidis, V. Manousakis, Migrating into the Cloud: Identifying the Major Security and Privacy Concerns, I3E 2013 12th IFIP Conference on e-Business, e-Services, e-Society, C. Douligeris, N. Polemi, YES, 73-87, Απρίλιος, 2013, Piraeus, Greece, Springer |
| | |
Spyros Kokolakis, T. Tryfonas, Kallia Anastasopoulou, Analysis of strategic stakeholder interactions in cloudbased mobile app use by privacy-sensitive end users (invited paper), 15th International Conference on Human-Computer Interaction (HCII2013), Ιούλιος, 2013, Las Vegas, Nevada, USA, [The HCII 2013 Conference Proceedings will be published by Springer |
| | |
Stefanos Gritzalis, Panagiotis Rizomiliotis, Revisiting Lightweight Authentication Protocols based on Hard Learning Problems, ACM WiSec 2013 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, A.-R. Sadeghi, M. Gruteser, YES, 125-130, Απρίλιος, 2013, Budapest, Hungary, ACM Press |
| | |
Stefanos Gritzalis, E. Kavakli, C. Kalloniatis, V. Manousakis, Privacy in the Cloud: Bridging the Gap between Design and Implementation, WISSE 2013 3rd International Workshop on Information Systems Security Engineering, D. Rosado, N. Lammari, YES, 455-465, Ιούνιος, 2013, Valencia, Spain, Springer LNCS Lecture Notes in Computer Science |
| | |
Elisavet Konstantinou, An Efficient Constant Round ID-based Group Key Agreement Protocol for Ad hoc Networks, 7th International Conference on Network and System Security - NSS 2013, Ιούνιος, 2013, Madrid, Spain, Springer |
| | |
Emmanouil Kalligeros, N. Georgiadis, G. Dimitrakopoulos, C Nicopoulos, "Switch Folding: Network-on-Chip Routers with Time-Multiplexed Output Ports", Design Automation and Test in Europe (DATE) Conference, 344-349, Μάρτιος, 2013 |
| | |
Stefanos Gritzalis, C. Kalloniatis, C. Mouratidis, S. Islam, M. Pavlidis, Trustworthy Selection of Cloud Providers based on Security and Privacy Requirements: Justifying Trust Assumptions, TRUSTBUS 2013 10th International Conference on Trust, Privacy and Security in Digital Business, S. Furnell, C. Lambrinoudakis, YES, 185-198, Αύγουστος, 2013, Prague, Czech, Springer LNCS Lecture Notes in Computer Science |
| | |
Georgios Kambourakis, Dimitris Geneiatakis, A. Keromytis, Zisis Tsiatsikas, Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP, The 8th International Conference on Availability, Reliability and Security (ARES), 224-229, Σεπτέμβριος, 2013, Regensburg, Germany, IEEE Press |
| | |
Maria Karyda, Konstantina Vemou, Α classification of factors influencing low adoption of PETs among SNS users, 10th International Conference on Trust, Privacy & Security in Digital Business, S. Furnell, C. Lambrinoudakis, and J. Lopez, YES, 74-84, Αύγουστος, 2013, Prague, Czech Republic, Springer |
| | |