The SCEAS System
Navigation Menu

Search the dblp DataBase


Costas Lambrinoudakis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas
    An ontology for secure e-government applications. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:1033-1037 [Conf]
  2. Costas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas
    Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:435- [Conf]
  3. Costas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas
    Electronic Voting Systems: Security Implications of the Administrative Workflow. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:467-471 [Conf]
  4. Agapios N. Platis, Costas Lambrinoudakis, Assimakis K. Leros
    A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:149-159 [Conf]
  5. Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
    GRID Security Review. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:100-111 [Conf]
  6. Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis
    A Knowledge-Based Repository Model for Security Policies Management. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:112-121 [Conf]
  7. Stefanos Gritzalis, Costas Lambrinoudakis
    Security Requirements of e-Government Services: An Organizational Framework. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:127-131 [Conf]
  8. G. Angelis, Stefanos Gritzalis, Costas Lambrinoudakis
    Security Policy Configuration Issues in Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2003, pp:331-341 [Conf]
  9. Donald F. Beal, Costas Lambrinoudakis
    GPFP: an array processing element for the next generation of massively parallel supercomputer architectures. [Citation Graph (0, 0)][DBLP]
    SC, 1991, pp:348-357 [Conf]
  10. Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos
    Pythia: Towards Anonymity in Authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:1-18 [Conf]
  11. S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou
    Functional Requirements for a Secure Electronic Voting System. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:507-520 [Conf]
  12. Costas Lambrinoudakis
    Using Smart Cards in an Educational Environment: Services and Security Features. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:131-140 [Conf]
  13. Donald F. Beal, Costas Lambrinoudakis
    GPFP: A SIMD PE for Higher VLSI Densities. [Citation Graph (0, 0)][DBLP]
    VLSI, 1991, pp:347-356 [Conf]
  14. Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul
    Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1873-1883 [Journal]
  15. Costas Lambrinoudakis
    Smart card technology for deploying a secure information management framework. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:4, pp:173-183 [Journal]
  16. Ilias Maglogiannis, Elias P. Zafiropoulos, Agapios N. Platis, Costas Lambrinoudakis
    Risk analysis of a patient monitoring system using Bayesian Network modeling. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:637-647 [Journal]
  17. Stelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis
    Protecting privacy and anonymity in pervasive computing: trends and perspectives. [Citation Graph (0, 0)][DBLP]
    Telematics and Informatics, 2006, v:23, n:3, pp:196-210 [Journal]
  18. Dimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos
    Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Technology in Biomedicine, 2005, v:9, n:3, pp:413-423 [Journal]
  19. Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis
    A framework for protecting a SIP-based infrastructure against malformed message attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2580-2593 [Journal]
  20. Dimitris Geneiatakis, Costas Lambrinoudakis
    An ontology description for SIP security flaws. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:6, pp:1367-1374 [Journal]
  21. Stefanos Gritzalis, A. N. Yannacopoulos, Costas Lambrinoudakis, P. Hatzopoulos, Sokratis K. Katsikas
    A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:4, pp:197-211 [Journal]

  22. Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era. [Citation Graph (, )][DBLP]

  23. Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. [Citation Graph (, )][DBLP]

  24. Employing Ontologies for the Development of Security Critical Applications. [Citation Graph (, )][DBLP]

  25. A First Order Logic Security Verification Model for SIP. [Citation Graph (, )][DBLP]

  26. A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony. [Citation Graph (, )][DBLP]

  27. A Call Conference Room Interception Attack and Its Detection. [Citation Graph (, )][DBLP]

  28. Privacy Requirements Engineering for Trustworthy e-Government Services. [Citation Graph (, )][DBLP]

  29. Message from the SecPri Workshop Organizing Technical Co-chairs. [Citation Graph (, )][DBLP]

  30. A Hierarchical Model for Cross-Domain Communication of Health Care Units. [Citation Graph (, )][DBLP]

  31. An ontology-based policy for deploying secure SIP-based VoIP services. [Citation Graph (, )][DBLP]

  32. Utilizing bloom filters for detecting flooding attacks against SIP based services. [Citation Graph (, )][DBLP]

  33. Survey of security vulnerabilities in session initiation protocol. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002