|
Search the dblp DataBase
Costas Lambrinoudakis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas
An ontology for secure e-government applications. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:1033-1037 [Conf]
- Costas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas
Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2002, pp:435- [Conf]
- Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas
Electronic Voting Systems: Security Implications of the Administrative Workflow. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:467-471 [Conf]
- Agapios N. Platis, Costas Lambrinoudakis, Assimakis K. Leros
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions. [Citation Graph (0, 0)][DBLP] EuroPKI, 2004, pp:149-159 [Conf]
- Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
GRID Security Review. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:100-111 [Conf]
- Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis
A Knowledge-Based Repository Model for Security Policies Management. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:112-121 [Conf]
- Stefanos Gritzalis, Costas Lambrinoudakis
Security Requirements of e-Government Services: An Organizational Framework. [Citation Graph (0, 0)][DBLP] PDPTA, 2002, pp:127-131 [Conf]
- G. Angelis, Stefanos Gritzalis, Costas Lambrinoudakis
Security Policy Configuration Issues in Grid Computing Environments. [Citation Graph (0, 0)][DBLP] SAFECOMP, 2003, pp:331-341 [Conf]
- Donald F. Beal, Costas Lambrinoudakis
GPFP: an array processing element for the next generation of massively parallel supercomputer architectures. [Citation Graph (0, 0)][DBLP] SC, 1991, pp:348-357 [Conf]
- Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos
Pythia: Towards Anonymity in Authentication. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:1-18 [Conf]
- S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou
Functional Requirements for a Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:507-520 [Conf]
- Costas Lambrinoudakis
Using Smart Cards in an Educational Environment: Services and Security Features. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:131-140 [Conf]
- Donald F. Beal, Costas Lambrinoudakis
GPFP: A SIMD PE for Higher VLSI Densities. [Citation Graph (0, 0)][DBLP] VLSI, 1991, pp:347-356 [Conf]
- Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:16, pp:1873-1883 [Journal]
- Costas Lambrinoudakis
Smart card technology for deploying a secure information management framework. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2000, v:8, n:4, pp:173-183 [Journal]
- Ilias Maglogiannis, Elias P. Zafiropoulos, Agapios N. Platis, Costas Lambrinoudakis
Risk analysis of a patient monitoring system using Bayesian Network modeling. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:637-647 [Journal]
- Stelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis
Protecting privacy and anonymity in pervasive computing: trends and perspectives. [Citation Graph (0, 0)][DBLP] Telematics and Informatics, 2006, v:23, n:3, pp:196-210 [Journal]
- Dimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Technology in Biomedicine, 2005, v:9, n:3, pp:413-423 [Journal]
- Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis
A framework for protecting a SIP-based infrastructure against malformed message attacks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:10, pp:2580-2593 [Journal]
- Dimitris Geneiatakis, Costas Lambrinoudakis
An ontology description for SIP security flaws. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:6, pp:1367-1374 [Journal]
- Stefanos Gritzalis, A. N. Yannacopoulos, Costas Lambrinoudakis, P. Hatzopoulos, Sokratis K. Katsikas
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:4, pp:197-211 [Journal]
Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era. [Citation Graph (, )][DBLP]
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. [Citation Graph (, )][DBLP]
Employing Ontologies for the Development of Security Critical Applications. [Citation Graph (, )][DBLP]
A First Order Logic Security Verification Model for SIP. [Citation Graph (, )][DBLP]
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony. [Citation Graph (, )][DBLP]
A Call Conference Room Interception Attack and Its Detection. [Citation Graph (, )][DBLP]
Privacy Requirements Engineering for Trustworthy e-Government Services. [Citation Graph (, )][DBLP]
Message from the SecPri Workshop Organizing Technical Co-chairs. [Citation Graph (, )][DBLP]
A Hierarchical Model for Cross-Domain Communication of Health Care Units. [Citation Graph (, )][DBLP]
An ontology-based policy for deploying secure SIP-based VoIP services. [Citation Graph (, )][DBLP]
Utilizing bloom filters for detecting flooding attacks against SIP based services. [Citation Graph (, )][DBLP]
Survey of security vulnerabilities in session initiation protocol. [Citation Graph (, )][DBLP]
Search in 0.082secs, Finished in 0.083secs
|