|
Search the dblp DataBase
Stefanos Gritzalis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Maria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas
An ontology for secure e-government applications. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:1033-1037 [Conf]
- Theodoros Balopoulos, Stefanos Gritzalis
Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:396-401 [Conf]
- Stefanos Gritzalis, John Iliadis
Addressing Security Issues in Programming Languages for Mobile Code. [Citation Graph (0, 0)][DBLP] DEXA Workshop, 1998, pp:288-293 [Conf]
- Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis
Incorporating Security Requirements Into the Software Development Process. [Citation Graph (0, 0)][DBLP] ECIW, 2005, pp:21-28 [Conf]
- Lazaros Gymnopoulos, Stefanos Gritzalis
Introducing Ontology-based Security Policy Management in the Grid. [Citation Graph (0, 0)][DBLP] ECIW, 2005, pp:107-116 [Conf]
- John Argyrakis, Stefanos Gritzalis, Chris Kioulafas
Privacy Enhancing Technologies: A Review. [Citation Graph (0, 0)][DBLP] EGOV, 2003, pp:282-287 [Conf]
- Konstantina Kabouraki, Stefanos Gritzalis, Konstantinos Moulinos
Towards a Privacy Audit Programmes Comparison Framework. [Citation Graph (0, 0)][DBLP] EGOV, 2004, pp:328-331 [Conf]
- Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis
Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks. [Citation Graph (0, 0)][DBLP] EGOV, 2004, pp:66-71 [Conf]
- Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas
Towards an ISO-9000 compliant certification service provider. [Citation Graph (0, 0)][DBLP] HERCMA, 2001, pp:390-397 [Conf]
- Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Drakopoulos
Implementing Knowledge Management Techniques for Security Purposes. [Citation Graph (0, 0)][DBLP] ICEIS (2), 2004, pp:535-540 [Conf]
- Georgia Frantzeskou, Stefanos Gritzalis
Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process. [Citation Graph (0, 0)][DBLP] ICETE (2), 2004, pp:85-92 [Conf]
- Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis
Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:283-290 [Conf]
- Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas
Effective identification of source code authors using byte-level information. [Citation Graph (0, 0)][DBLP] ICSE, 2006, pp:893-896 [Conf]
- Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas
Source Code Author Identification Based on N-gram Author Profiles. [Citation Graph (0, 0)][DBLP] AIAI, 2006, pp:508-515 [Conf]
- Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas
Optimized Multi-Domain Secure Interoperation using Soft Constraints. [Citation Graph (0, 0)][DBLP] AIAI, 2006, pp:78-85 [Conf]
- Petros Belsis, Apostolos Malatras, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris
Pervasive Secure Electronic Healthcare Records Management. [Citation Graph (0, 0)][DBLP] IWUC, 2005, pp:101-109 [Conf]
- Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
GRID Security Review. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:100-111 [Conf]
- Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. [Citation Graph (0, 0)][DBLP] NETWORKING, 2004, pp:13-24 [Conf]
- Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris
Enhancing Knowledge Management Through the Use of GIS and Multimedia. [Citation Graph (0, 0)][DBLP] PAKM, 2004, pp:319-329 [Conf]
- Meletis Belsis, Alkis Simitsis, Stefanos Gritzalis
Workflow Based Security Incident Management. [Citation Graph (0, 0)][DBLP] Panhellenic Conference on Informatics, 2005, pp:684-694 [Conf]
- Stefanos Gritzalis, Costas Lambrinoudakis
Security Requirements of e-Government Services: An Organizational Framework. [Citation Graph (0, 0)][DBLP] PDPTA, 2002, pp:127-131 [Conf]
- Petros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas
SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:354-360 [Conf]
- Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
Delivering Attribute Certificates over GPRS. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:1166-1170 [Conf]
- John Iliadis, Stefanos Gritzalis, V. Oikonomou
Towards Secure Downloadable Executable Content: The Java Paradigm. [Citation Graph (0, 0)][DBLP] SAFECOMP, 1998, pp:117-127 [Conf]
- G. Angelis, Stefanos Gritzalis, Costas Lambrinoudakis
Security Policy Configuration Issues in Grid Computing Environments. [Citation Graph (0, 0)][DBLP] SAFECOMP, 2003, pp:331-341 [Conf]
- Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
Introducing PKI to Enhance Security in Future Mobile Networks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:109-120 [Conf]
- N. Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis
Security profile for interconnected open distributed systems with varying vulnerability. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:428-437 [Conf]
- Petros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:10-19 [Conf]
- Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas
A Framework for Exploiting Security Expertise in Application Development. [Citation Graph (0, 0)][DBLP] TrustBus, 2006, pp:62-70 [Conf]
- Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas
Specifying electronic voting protocols in typed MSR. [Citation Graph (0, 0)][DBLP] WPES, 2005, pp:35-39 [Conf]
- Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis
Trust Establishment in Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP] CRITIS, 2006, pp:179-194 [Conf]
- Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis, Dimitris Geneiatakis
Support of subscribers' certificates in a hybrid WLAN-3G environment. [Citation Graph (0, 0)][DBLP] Computer Networks, 2006, v:50, n:11, pp:1843-1859 [Journal]
- Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:8, pp:697-709 [Journal]
- John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis
ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:16, pp:1851-1862 [Journal]
- John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis
Towards a framework for evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:16, pp:1839-1850 [Journal]
- Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. [Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:16, pp:1873-1883 [Journal]
- Dimitris Fotakis, Stefanos Gritzalis
Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2109-2122 [Journal]
- Dimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis
A zero knowledge probabilistic login protocol. [Citation Graph (0, 0)][DBLP] Computers & Security, 1992, v:11, n:8, pp:733-745 [Journal]
- Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:8, pp:731-746 [Journal]
- Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas
Trusted third party services for deploying secure telemedical applications over the WWW. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:7, pp:627-639 [Journal]
- Stefanos Gritzalis
Public Key Infrastructure: Research and Applications. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:1-2 [Journal]
- Stefanos Gritzalis, Dimitris Gritzalis
A digital seal solution for deploying trust on commercial transactions. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:71-79 [Journal]
- Stefanos Gritzalis, John Iliadis, Spyros Oikonomopoulos
Distributed component software security issues on deploying a secure electronic marketplace. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2000, v:8, n:1, pp:5-13 [Journal]
- Diomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis
Security requirements, risks and recommendations for small enterprise and home-office environments. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1999, v:7, n:3, pp:121-128 [Journal]
- Stefanos Gritzalis, George Aggelis
Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1998, v:32, n:2, pp:16-32 [Journal]
- Stefanos Gritzalis
Developing a culture of privacy in the Global Village. [Citation Graph (0, 0)][DBLP] Telematics and Informatics, 2006, v:23, n:3, pp:157-163 [Journal]
- Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:261-267 [Conf]
- Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis
Using SSL/TLS in authentication and key agreement procedures of future mobile networks. [Citation Graph (0, 0)][DBLP] MWCN, 2002, pp:152-156 [Conf]
- Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis
On RSN-Oriented Wireless Intrusion Detection. [Citation Graph (0, 0)][DBLP] OTM Conferences (2), 2007, pp:1601-1615 [Conf]
- Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:125-134 [Conf]
- Georgios Kambourakis, Stefanos Gritzalis
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:135-144 [Conf]
- Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis
Requirements and Challenges in the Design of Privacy-aware Sensor Networks. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis
A framework for protecting a SIP-based infrastructure against malformed message attacks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:10, pp:2580-2593 [Journal]
- Petros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:75-86 [Journal]
- Stefanos Gritzalis, A. N. Yannacopoulos, Costas Lambrinoudakis, P. Hatzopoulos, Sokratis K. Katsikas
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:4, pp:197-211 [Journal]
Securing Medical Sensor Environments: The CodeBlue Framework Case. [Citation Graph (, )][DBLP]
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. [Citation Graph (, )][DBLP]
Clustering Oriented Architectures in Medical Sensor Environments. [Citation Graph (, )][DBLP]
Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era. [Citation Graph (, )][DBLP]
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. [Citation Graph (, )][DBLP]
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. [Citation Graph (, )][DBLP]
Employing Ontologies for the Development of Security Critical Applications. [Citation Graph (, )][DBLP]
Trust-Based Data Disclosure in Sensor Networks. [Citation Graph (, )][DBLP]
Caller identity privacy in SIP heterogeneous realms: A practical solution. [Citation Graph (, )][DBLP]
Two privacy enhanced context transfer schemes. [Citation Graph (, )][DBLP]
IS 2009 - PC Co-chairs' Message. [Citation Graph (, )][DBLP]
Methods for Designing Privacy Aware Information Systems: A Review. [Citation Graph (, )][DBLP]
Privacy Protection in Context Transfer Protocol. [Citation Graph (, )][DBLP]
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections. [Citation Graph (, )][DBLP]
A new Accounting Mechanism for Modern and Future AAA Services. [Citation Graph (, )][DBLP]
A Cluster-Based Framework for the Security of Medical Sensor Environments. [Citation Graph (, )][DBLP]
An Agent Based Back-End RFID Tag Management System. [Citation Graph (, )][DBLP]
Detecting DNS Amplification Attacks. [Citation Graph (, )][DBLP]
End to end secure communication in ad-hoc assistive medical environments using secure paths. [Citation Graph (, )][DBLP]
Message from the SecPri Workshop Organizing Technical Co-chairs. [Citation Graph (, )][DBLP]
Signaling-Oriented DoS Attacks in UMTS Networks. [Citation Graph (, )][DBLP]
A Hierarchical Model for Cross-Domain Communication of Health Care Units. [Citation Graph (, )][DBLP]
A generic accounting scheme for next generation networks. [Citation Graph (, )][DBLP]
Special issue on multimedia networking and security in convergent networks. [Citation Graph (, )][DBLP]
Privacy-enhanced fast re-authentication for EAP-based next generation network. [Citation Graph (, )][DBLP]
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks. [Citation Graph (, )][DBLP]
Survey of security vulnerabilities in session initiation protocol. [Citation Graph (, )][DBLP]
Accurate and large-scale privacy-preserving data mining using the election paradigm. [Citation Graph (, )][DBLP]
Search in 0.086secs, Finished in 0.092secs
|