The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John Iliadis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas
    Evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:1-8 [Conf]
  2. Stefanos Gritzalis, John Iliadis
    Addressing Security Issues in Programming Languages for Mobile Code. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:288-293 [Conf]
  3. John Iliadis, Stefanos Gritzalis, V. Oikonomou
    Towards Secure Downloadable Executable Content: The Java Paradigm. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 1998, pp:117-127 [Conf]
  4. Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos
    Pythia: Towards Anonymity in Authentication. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:1-18 [Conf]
  5. John Iliadis, Stefanos Gritzalis, Dimitris Gritzalis
    ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1851-1862 [Journal]
  6. John Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis
    Towards a framework for evaluating certificate status information mechanisms. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1839-1850 [Journal]
  7. Diomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas
    Trusted third party services for deploying secure telemedical applications over the WWW. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:7, pp:627-639 [Journal]
  8. Stefanos Gritzalis, John Iliadis, Spyros Oikonomopoulos
    Distributed component software security issues on deploying a secure electronic marketplace. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:1, pp:5-13 [Journal]

Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002