The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefanos Gritzalis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas
    An ontology for secure e-government applications. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:1033-1037 [Conf]
  2. Theodoros Balopoulos, Stefanos Gritzalis
    Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:396-401 [Conf]
  3. Stefanos Gritzalis, John Iliadis
    Addressing Security Issues in Programming Languages for Mobile Code. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:288-293 [Conf]
  4. Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis
    Incorporating Security Requirements Into the Software Development Process. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:21-28 [Conf]
  5. Lazaros Gymnopoulos, Stefanos Gritzalis
    Introducing Ontology-based Security Policy Management in the Grid. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:107-116 [Conf]
  6. John Argyrakis, Stefanos Gritzalis, Chris Kioulafas
    Privacy Enhancing Technologies: A Review. [Citation Graph (0, 0)][DBLP]
    EGOV, 2003, pp:282-287 [Conf]
  7. Konstantina Kabouraki, Stefanos Gritzalis, Konstantinos Moulinos
    Towards a Privacy Audit Programmes Comparison Framework. [Citation Graph (0, 0)][DBLP]
    EGOV, 2004, pp:328-331 [Conf]
  8. Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis
    Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks. [Citation Graph (0, 0)][DBLP]
    EGOV, 2004, pp:66-71 [Conf]
  9. Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas
    Towards an ISO-9000 compliant certification service provider. [Citation Graph (0, 0)][DBLP]
    HERCMA, 2001, pp:390-397 [Conf]
  10. Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Drakopoulos
    Implementing Knowledge Management Techniques for Security Purposes. [Citation Graph (0, 0)][DBLP]
    ICEIS (2), 2004, pp:535-540 [Conf]
  11. Georgia Frantzeskou, Stefanos Gritzalis
    Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:85-92 [Conf]
  12. Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis
    Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:283-290 [Conf]
  13. Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas
    Effective identification of source code authors using byte-level information. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:893-896 [Conf]
  14. Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas
    Source Code Author Identification Based on N-gram Author Profiles. [Citation Graph (0, 0)][DBLP]
    AIAI, 2006, pp:508-515 [Conf]
  15. Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas
    Optimized Multi-Domain Secure Interoperation using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    AIAI, 2006, pp:78-85 [Conf]
  16. Petros Belsis, Apostolos Malatras, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris
    Pervasive Secure Electronic Healthcare Records Management. [Citation Graph (0, 0)][DBLP]
    IWUC, 2005, pp:101-109 [Conf]
  17. Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
    GRID Security Review. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:100-111 [Conf]
  18. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:13-24 [Conf]
  19. Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris
    Enhancing Knowledge Management Through the Use of GIS and Multimedia. [Citation Graph (0, 0)][DBLP]
    PAKM, 2004, pp:319-329 [Conf]
  20. Meletis Belsis, Alkis Simitsis, Stefanos Gritzalis
    Workflow Based Security Incident Management. [Citation Graph (0, 0)][DBLP]
    Panhellenic Conference on Informatics, 2005, pp:684-694 [Conf]
  21. Stefanos Gritzalis, Costas Lambrinoudakis
    Security Requirements of e-Government Services: An Organizational Framework. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:127-131 [Conf]
  22. Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas
    SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:354-360 [Conf]
  23. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Delivering Attribute Certificates over GPRS. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:1166-1170 [Conf]
  24. John Iliadis, Stefanos Gritzalis, V. Oikonomou
    Towards Secure Downloadable Executable Content: The Java Paradigm. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 1998, pp:117-127 [Conf]
  25. G. Angelis, Stefanos Gritzalis, Costas Lambrinoudakis
    Security Policy Configuration Issues in Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2003, pp:331-341 [Conf]
  26. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Introducing PKI to Enhance Security in Future Mobile Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:109-120 [Conf]
  27. N. Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis
    Security profile for interconnected open distributed systems with varying vulnerability. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:428-437 [Conf]
  28. Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris
    Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:10-19 [Conf]
  29. Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas
    A Framework for Exploiting Security Expertise in Application Development. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:62-70 [Conf]
  30. Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas
    Specifying electronic voting protocols in typed MSR. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:35-39 [Conf]
  31. Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis
    Trust Establishment in Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:179-194 [Conf]
  32. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis, Dimitris Geneiatakis
    Support of subscribers' certificates in a hybrid WLAN-3G environment. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:11, pp:1843-1859 [Journal]
  33. Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis
    Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:697-709 [Journal]
  34. John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis
    ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1851-1862 [Journal]
  35. John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis
    Towards a framework for evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1839-1850 [Journal]
  36. Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul
    Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1873-1883 [Journal]
  37. Dimitris Fotakis, Stefanos Gritzalis
    Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:11, pp:2109-2122 [Journal]
  38. Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis
    A zero knowledge probabilistic login protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:8, pp:733-745 [Journal]
  39. Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro
    Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:8, pp:731-746 [Journal]
  40. Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas
    Trusted third party services for deploying secure telemedical applications over the WWW. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:627-639 [Journal]
  41. Stefanos Gritzalis
    Public Key Infrastructure: Research and Applications. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:1-2 [Journal]
  42. Stefanos Gritzalis, Dimitris Gritzalis
    A digital seal solution for deploying trust on commercial transactions. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:71-79 [Journal]
  43. Stefanos Gritzalis, John Iliadis, Spyros Oikonomopoulos
    Distributed component software security issues on deploying a secure electronic marketplace. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:1, pp:5-13 [Journal]
  44. Diomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis
    Security requirements, risks and recommendations for small enterprise and home-office environments. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1999, v:7, n:3, pp:121-128 [Journal]
  45. Stefanos Gritzalis, George Aggelis
    Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:2, pp:16-32 [Journal]
  46. Stefanos Gritzalis
    Developing a culture of privacy in the Global Village. [Citation Graph (0, 0)][DBLP]
    Telematics and Informatics, 2006, v:23, n:3, pp:157-163 [Journal]
  47. Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
    Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:261-267 [Conf]
  48. Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
    Using SSL/TLS in authentication and key agreement procedures of future mobile networks. [Citation Graph (0, 0)][DBLP]
    MWCN, 2002, pp:152-156 [Conf]
  49. Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis
    On RSN-Oriented Wireless Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1601-1615 [Conf]
  50. Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
    Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:125-134 [Conf]
  51. Georgios Kambourakis, Stefanos Gritzalis
    On Device Authentication in Wireless Networks: Present Issues and Future Challenges. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:135-144 [Conf]
  52. Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis
    Requirements and Challenges in the Design of Privacy-aware Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  53. Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis
    A framework for protecting a SIP-based infrastructure against malformed message attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2580-2593 [Journal]
  54. Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas
    Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:75-86 [Journal]
  55. Stefanos Gritzalis, A. N. Yannacopoulos, Costas Lambrinoudakis, P. Hatzopoulos, Sokratis K. Katsikas
    A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:4, pp:197-211 [Journal]

  56. Securing Medical Sensor Environments: The CodeBlue Framework Case. [Citation Graph (, )][DBLP]


  57. Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. [Citation Graph (, )][DBLP]


  58. Clustering Oriented Architectures in Medical Sensor Environments. [Citation Graph (, )][DBLP]


  59. Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era. [Citation Graph (, )][DBLP]


  60. Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. [Citation Graph (, )][DBLP]


  61. A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. [Citation Graph (, )][DBLP]


  62. Employing Ontologies for the Development of Security Critical Applications. [Citation Graph (, )][DBLP]


  63. Trust-Based Data Disclosure in Sensor Networks. [Citation Graph (, )][DBLP]


  64. Caller identity privacy in SIP heterogeneous realms: A practical solution. [Citation Graph (, )][DBLP]


  65. Two privacy enhanced context transfer schemes. [Citation Graph (, )][DBLP]


  66. IS 2009 - PC Co-chairs' Message. [Citation Graph (, )][DBLP]


  67. Methods for Designing Privacy Aware Information Systems: A Review. [Citation Graph (, )][DBLP]


  68. Privacy Protection in Context Transfer Protocol. [Citation Graph (, )][DBLP]


  69. Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections. [Citation Graph (, )][DBLP]


  70. A new Accounting Mechanism for Modern and Future AAA Services. [Citation Graph (, )][DBLP]


  71. A Cluster-Based Framework for the Security of Medical Sensor Environments. [Citation Graph (, )][DBLP]


  72. An Agent Based Back-End RFID Tag Management System. [Citation Graph (, )][DBLP]


  73. Detecting DNS Amplification Attacks. [Citation Graph (, )][DBLP]


  74. End to end secure communication in ad-hoc assistive medical environments using secure paths. [Citation Graph (, )][DBLP]


  75. Message from the SecPri Workshop Organizing Technical Co-chairs. [Citation Graph (, )][DBLP]


  76. Signaling-Oriented DoS Attacks in UMTS Networks. [Citation Graph (, )][DBLP]


  77. A Hierarchical Model for Cross-Domain Communication of Health Care Units. [Citation Graph (, )][DBLP]


  78. A generic accounting scheme for next generation networks. [Citation Graph (, )][DBLP]


  79. Special issue on multimedia networking and security in convergent networks. [Citation Graph (, )][DBLP]


  80. Privacy-enhanced fast re-authentication for EAP-based next generation network. [Citation Graph (, )][DBLP]


  81. Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks. [Citation Graph (, )][DBLP]


  82. Survey of security vulnerabilities in session initiation protocol. [Citation Graph (, )][DBLP]


  83. Accurate and large-scale privacy-preserving data mining using the election paradigm. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002