The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Georgios Kambourakis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis
    Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:287-296 [Conf]
  2. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:13-24 [Conf]
  3. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Delivering Attribute Certificates over GPRS. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:1166-1170 [Conf]
  4. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Introducing PKI to Enhance Security in Future Mobile Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:109-120 [Conf]
  5. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis, Dimitris Geneiatakis
    Support of subscribers' certificates in a hybrid WLAN-3G environment. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:11, pp:1843-1859 [Journal]
  6. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Using SSL/TLS in authentication and key agreement procedures of future mobile networks. [Citation Graph (0, 0)][DBLP]
    MWCN, 2002, pp:152-156 [Conf]
  7. Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis
    On RSN-Oriented Wireless Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1601-1615 [Conf]
  8. Georgios Kambourakis, Stefanos Gritzalis
    On Device Authentication in Wireless Networks: Present Issues and Future Challenges. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:135-144 [Conf]
  9. Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis
    A framework for protecting a SIP-based infrastructure against malformed message attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2580-2593 [Journal]

  10. Securing Medical Sensor Environments: The CodeBlue Framework Case. [Citation Graph (, )][DBLP]


  11. Clustering Oriented Architectures in Medical Sensor Environments. [Citation Graph (, )][DBLP]


  12. PANOPTIS: A System for Intelligent Monitoring of the Hellenic Broadcast Sector. [Citation Graph (, )][DBLP]


  13. A First Order Logic Security Verification Model for SIP. [Citation Graph (, )][DBLP]


  14. Caller identity privacy in SIP heterogeneous realms: A practical solution. [Citation Graph (, )][DBLP]


  15. Two privacy enhanced context transfer schemes. [Citation Graph (, )][DBLP]


  16. Privacy Protection in Context Transfer Protocol. [Citation Graph (, )][DBLP]


  17. A new Accounting Mechanism for Modern and Future AAA Services. [Citation Graph (, )][DBLP]


  18. A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony. [Citation Graph (, )][DBLP]


  19. A Cluster-Based Framework for the Security of Medical Sensor Environments. [Citation Graph (, )][DBLP]


  20. Detecting DNS Amplification Attacks. [Citation Graph (, )][DBLP]


  21. A pervasive wiki application based on VoiceXML. [Citation Graph (, )][DBLP]


  22. Signaling-Oriented DoS Attacks in UMTS Networks. [Citation Graph (, )][DBLP]


  23. A generic accounting scheme for next generation networks. [Citation Graph (, )][DBLP]


  24. Two layer Denial of Service prevention on SIP VoIP infrastructures. [Citation Graph (, )][DBLP]


  25. Privacy-enhanced fast re-authentication for EAP-based next generation network. [Citation Graph (, )][DBLP]


  26. An ontology-based policy for deploying secure SIP-based VoIP services. [Citation Graph (, )][DBLP]


  27. Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks. [Citation Graph (, )][DBLP]


  28. Survey of security vulnerabilities in session initiation protocol. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002