The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dimitris Gritzalis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bill Tsoumas, Dimitris Gritzalis
    Towards an Ontology-based Security Management. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:985-992 [Conf]
  2. John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas
    Evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:1-8 [Conf]
  3. Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis
    Attack Modelling in Open Network Environments. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:268-277 [Conf]
  4. Costas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas
    Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:435- [Conf]
  5. Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas
    Electronic Voting Systems: Security Implications of the Administrative Workflow. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:467-471 [Conf]
  6. Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis
    Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:287-296 [Conf]
  7. Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis
    An Ontology-Based Approach to Information Systems Security Management. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:151-164 [Conf]
  8. Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis
    A Privacy-Enhancing e-Business Model Based on Infomediaries. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:72-83 [Conf]
  9. Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis
    A Knowledge-Based Repository Model for Security Policies Management. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:112-121 [Conf]
  10. Dimitris Gritzalis, Nikolaos Kyrloglou
    Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. [Citation Graph (0, 0)][DBLP]
    SCCC, 2001, pp:115-123 [Conf]
  11. Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos
    Elaborating Quantitative Approaches for IT Security Evaluation. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:67-78 [Conf]
  12. Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos
    Pythia: Towards Anonymity in Authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:1-18 [Conf]
  13. S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou
    Functional Requirements for a Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:507-520 [Conf]
  14. L. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas
    Revisiting Legal and Regulatory Requirements for Secure E-Voting. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:469-480 [Conf]
  15. Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis
    A Qualitative Approach to Information Availability. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:37-48 [Conf]
  16. Bill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis
    Security-by-Ontology: A Knowledge-Centric Approach. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:99-110 [Conf]
  17. Stelios Dritsas, John Tsaparas, Dimitris Gritzalis
    A Generic Privacy Enhancing Technology for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:103-113 [Conf]
  18. Dimitris Gritzalis, Sokratis K. Katsikas
    Towards a formal system-to-system authentication protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:12, pp:954-961 [Journal]
  19. John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis
    ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1851-1862 [Journal]
  20. John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis
    Towards a framework for evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1839-1850 [Journal]
  21. Sokratis K. Katsikas, Thomas Spyrou, Dimitris Gritzalis, John Darzentas
    Model for network behaviour under viral attack. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:2, pp:124-132 [Journal]
  22. Michel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis
    Intrusion detection: Approach and performance issues of the SECURENET system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:6, pp:495-508 [Journal]
  23. Anastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas
    Design of a neural network for recognition and classification of computer viruses. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:5, pp:435-448 [Journal]
  24. Dimitris Gritzalis
    A baseline security policy for distributed healthcare information systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:8, pp:709-719 [Journal]
  25. Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis
    A zero knowledge probabilistic login protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:8, pp:733-745 [Journal]
  26. Dimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras
    Determining access rights for medical information systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:2, pp:149-161 [Journal]
  27. Dimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou
    Data security in medical information systems: The Greek case. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:2, pp:141-159 [Journal]
  28. Dimitrios Lekkas, Dimitris Gritzalis
    Cumulative notarization for long-term preservation of digital signatures. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:5, pp:413-424 [Journal]
  29. Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas
    Trusted third party services for deploying secure telemedical applications over the WWW. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:627-639 [Journal]
  30. Dimitris Gritzalis
    Embedding privacy in IT applications development. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2004, v:12, n:1, pp:8-26 [Journal]
  31. Stefanos Gritzalis, Dimitris Gritzalis
    A digital seal solution for deploying trust on commercial transactions. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:71-79 [Journal]
  32. Diomidis Spinellis, Dimitris Gritzalis
    Panoptis: Intrusion Detection Using a Domain-Specific Language. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:159-176 [Journal]
  33. Stelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis
    Protecting privacy and anonymity in pervasive computing: trends and perspectives. [Citation Graph (0, 0)][DBLP]
    Telematics and Informatics, 2006, v:23, n:3, pp:196-210 [Journal]
  34. Dimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos
    Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Technology in Biomedicine, 2005, v:9, n:3, pp:413-423 [Journal]
  35. Dimitrios Lekkas, Dimitris Gritzalis
    E-Passports as a Means Towards the First World-Wide Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:34-48 [Conf]
  36. Marianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis
    A CBK for Information Security and Critical Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:49-56 [Conf]
  37. Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis
    Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:24-33 [Conf]

  38. An Adaptive Policy-Based Approach to SPIT Management. [Citation Graph (, )][DBLP]


  39. SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment. [Citation Graph (, )][DBLP]


  40. BLAST: Off-the-Shelf Hardware for Building an Efficient Hash-Based Cluster Storage System. [Citation Graph (, )][DBLP]


  41. SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. [Citation Graph (, )][DBLP]


  42. Audio CAPTCHA for SIP-Based VoIP. [Citation Graph (, )][DBLP]


  43. An Insider Threat Prediction Model. [Citation Graph (, )][DBLP]


  44. Attack Modeling of SIP-Oriented SPIT. [Citation Graph (, )][DBLP]


  45. Threat Analysis of the Session Initiation Protocol Regarding Spam. [Citation Graph (, )][DBLP]


  46. OntoSPIT: SPIT management through ontologies. [Citation Graph (, )][DBLP]


  47. A SIP-oriented SPIT Management Framework. [Citation Graph (, )][DBLP]


  48. Editorial. [Citation Graph (, )][DBLP]


  49. Editorial. [Citation Graph (, )][DBLP]


  50. Editorial. [Citation Graph (, )][DBLP]


  51. Editorial. [Citation Graph (, )][DBLP]


  52. Editorial. [Citation Graph (, )][DBLP]


  53. Editorial. [Citation Graph (, )][DBLP]


  54. Editorial. [Citation Graph (, )][DBLP]


  55. Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. [Citation Graph (, )][DBLP]


  56. A multi-layer Criticality Assessment methodology based on interdependencies. [Citation Graph (, )][DBLP]


Search in 0.068secs, Finished in 0.070secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002