2013
Georgios Kambourakis, Dimitrios Damopoulos, A competent post-authentication and non-repudiation biometric-based scheme for m-Learning, The 10th IASTED International Conference on Web-based Education (WBE 2013), V. Uskov, YES, 821-827, Φεβρουάριος, 2013, Innsbruck, Austria, ACTA Press   
Stefanos Gritzalis, C. Kalloniatis, C. Mouratidis, V. Manousakis, Migrating into the Cloud: Identifying the Major Security and Privacy Concerns, I3E 2013 12th IFIP Conference on e-Business, e-Services, e-Society, C. Douligeris, N. Polemi, YES, 73-87, Απρίλιος, 2013, Piraeus, Greece, Springer   
Spyros Kokolakis, T. Tryfonas, Kallia Anastasopoulou, Analysis of strategic stakeholder interactions in cloudbased mobile app use by privacy-sensitive end users (invited paper), 15th International Conference on Human-Computer Interaction (HCII2013), Ιούλιος, 2013, Las Vegas, Nevada, USA, [The HCII 2013 Conference Proceedings will be published by Springer   
Stefanos Gritzalis, Panagiotis Rizomiliotis, Revisiting Lightweight Authentication Protocols based on Hard Learning Problems, ACM WiSec 2013 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, A.-R. Sadeghi, M. Gruteser, YES, 125-130, Απρίλιος, 2013, Budapest, Hungary, ACM Press   
Stefanos Gritzalis, E. Kavakli, C. Kalloniatis, V. Manousakis, Privacy in the Cloud: Bridging the Gap between Design and Implementation, WISSE 2013 3rd International Workshop on Information Systems Security Engineering, D. Rosado, N. Lammari, YES, 455-465, Ιούνιος, 2013, Valencia, Spain, Springer LNCS Lecture Notes in Computer Science   
Elisavet Konstantinou, An Efficient Constant Round ID-based Group Key Agreement Protocol for Ad hoc Networks, 7th International Conference on Network and System Security - NSS 2013, Ιούνιος, 2013, Madrid, Spain, Springer   
Emmanouil Kalligeros, N. Georgiadis, G. Dimitrakopoulos, C Nicopoulos, "Switch Folding: Network-on-Chip Routers with Time-Multiplexed Output Ports", Design Automation and Test in Europe (DATE) Conference, 344-349, Μάρτιος, 2013   
Stefanos Gritzalis, C. Kalloniatis, C. Mouratidis, S. Islam, M. Pavlidis, Trustworthy Selection of Cloud Providers based on Security and Privacy Requirements: Justifying Trust Assumptions, TRUSTBUS 2013 10th International Conference on Trust, Privacy and Security in Digital Business, S. Furnell, C. Lambrinoudakis, YES, 185-198, Αύγουστος, 2013, Prague, Czech, Springer LNCS Lecture Notes in Computer Science   
Georgios Kambourakis, Dimitris Geneiatakis, A. Keromytis, Zisis Tsiatsikas, Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP, The 8th International Conference on Availability, Reliability and Security (ARES), 224-229, Σεπτέμβριος, 2013, Regensburg, Germany, IEEE Press   
Maria Karyda, Konstantina Vemou, Α classification of factors influencing low adoption of PETs among SNS users, 10th International Conference on Trust, Privacy & Security in Digital Business, S. Furnell, C. Lambrinoudakis, and J. Lopez, YES, 74-84, Αύγουστος, 2013, Prague, Czech Republic, Springer