dblp.uni-trier.dewww.uni-trier.de

Dimitris Gritzalis Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
50EEDimitris Gritzalis, Javier López: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings Springer 2009
49EEYannis Soupionis, George Tountas, Dimitris Gritzalis: Audio CAPTCHA for SIP-Based VoIP. SEC 2009: 25-38
48EEStelios Dritsas, Vicky Dritsou, Bill Tsoumas, Panos Constantopoulos, Dimitris Gritzalis: OntoSPIT: SPIT management through ontologies. Computer Communications 32(1): 203-212 (2009)
2008
47EEYannis Soupionis, Stelios Dritsas, Dimitris Gritzalis: An Adaptive Policy-Based Approach to SPIT Management. ESORICS 2008: 446-460
46EEStelios Dritsas, Yannis Soupionis, Marianthi Theoharidou, Yannis Mallios, Dimitris Gritzalis: SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. SEC 2008: 381-395
45EEDimitris Gritzalis, Yannis Mallios: A SIP-oriented SPIT Management Framework. Computers & Security 27(5-6): 136-153 (2008)
2007
44EEDimitrios Lekkas, Dimitris Gritzalis: E-Passports as a Means Towards the First World-Wide Public Key Infrastructure. EuroPKI 2007: 34-48
43EEGiannis F. Marias, Stelios Dritsas, Marianthi Theoharidou, John Mallios, Dimitris Gritzalis: SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment. ICCCN 2007: 597-604
42EEStelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis: Threat Analysis of the Session Initiation Protocol Regarding Spam. IPCCC 2007: 426-433
41EEAggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis: Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33
40EEMarianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis: A CBK for Information Security and Critical Infrastructure Protection. World Conference on Information Security Education 2007: 49-56
39EEDimitrios Lekkas, Dimitris Gritzalis: Long-term verifiability of the electronic healthcare records' authenticity. I. J. Medical Informatics 76(5-6): 442-448 (2007)
38EEMarianthi Theoharidou, Dimitris Gritzalis: Common Body of Knowledge for Information Security. IEEE Security & Privacy 5(2): 64-67 (2007)
2006
37EEBill Tsoumas, Dimitris Gritzalis: Towards an Ontology-based Security Management. AINA (1) 2006: 985-992
36EEBill Tsoumas, Panagiotis Papagiannakopoulos, Stelios Dritsas, Dimitris Gritzalis: Security-by-Ontology: A Knowledge-Centric Approach. SEC 2006: 99-110
35EEStelios Dritsas, John Tsaparas, Dimitris Gritzalis: A Generic Privacy Enhancing Technology for Pervasive Computing Environments. TrustBus 2006: 103-113
34EEStelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics and Informatics 23(3): 196-210 (2006)
2005
33EEBill Tsoumas, Stelios Dritsas, Dimitris Gritzalis: An Ontology-Based Approach to Information Systems Security Management. MMM-ACNS 2005: 151-164
32EEDimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos: Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Transactions on Information Technology in Biomedicine 9(3): 413-423 (2005)
2004
31EEGeorgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis: Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. EuroPKI 2004: 287-296
30EEDimitrios Lekkas, Dimitris Gritzalis: Cumulative notarization for long-term preservation of digital signatures. Computers & Security 23(5): 413-424 (2004)
29EEDimitris Gritzalis, Costas Lambrinoudakis: A security architecture for interconnecting health information systems. I. J. Medical Informatics 73(3): 305-309 (2004)
28EEDimitris Gritzalis: Embedding privacy in IT applications development. Inf. Manag. Comput. Security 12(1): 8-26 (2004)
2003
27 Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis K. Katsikas: Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece Kluwer 2003
26EECostas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas: Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471
25EESpyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis: A Knowledge-Based Repository Model for Security Policies Management. MMM-ACNS 2003: 112-121
24EEJohn Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis: Towards a framework for evaluating certificate status information mechanisms. Computer Communications 26(16): 1839-1850 (2003)
23EEJohn Iliadis, Stefanos Gritzalis, Dimitris Gritzalis: ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Computer Communications 26(16): 1851-1862 (2003)
2002
22EECostas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. DEXA Workshops 2002: 435
21 L. Mitrou, Dimitris Gritzalis, Sokratis K. Katsikas: Revisiting Legal and Regulatory Requirements for Secure E-Voting. SEC 2002: 469-480
20 S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou: Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520
19 Dimitris Gritzalis, Maria Karyda, Lazaros Gymnopoulos: Elaborating Quantitative Approaches for IT Security Evaluation. SEC 2002: 67-78
18 Diomidis Spinellis, Dimitris Gritzalis: Panoptis: Intrusion Detection Using a Domain-Specific Language. Journal of Computer Security 10(1/2): 159-176 (2002)
2001
17EEDimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis: A Privacy-Enhancing e-Business Model Based on Infomediaries. MMM-ACNS 2001: 72-83
16EEDimitris Gritzalis, Nikolaos Kyrloglou: Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. SCCC 2001: 115-123
15 Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos: Pythia: Towards Anonymity in Authentication. SEC 2001: 1-18
14EEStefanos Gritzalis, Dimitris Gritzalis: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Security 9(2): 71-79 (2001)
2000
13EEJohn Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas: Evaluating certificate status information mechanisms. ACM Conference on Computer and Communications Security 2000: 1-8
12 Theodore Tryfonas, Dimitris Gritzalis, Spyros Kokolakis: A Qualitative Approach to Information Availability. SEC 2000: 37-48
1999
11EEDiomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas: Trusted third party services for deploying secure telemedical applications over the WWW. Computers & Security 18(7): 627-639 (1999)
1997
10EEDimitris Gritzalis: A baseline security policy for distributed healthcare information systems. Computers & Security 16(8): 709-719 (1997)
1996
9 Sokratis K. Katsikas, Dimitris Gritzalis: Information Systems Security, Facing the information society of the 21st Century Chapman & Hall 1996
8 Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis: Attack Modelling in Open Network Environments. Communications and Multimedia Security 1996: 268-277
7EEDimitris Gritzalis, Sokratis K. Katsikas: Towards a formal system-to-system authentication protocol. Computer Communications 19(12): 954-961 (1996)
6EESokratis K. Katsikas, Thomas Spyrou, Dimitris Gritzalis, John Darzentas: Model for network behaviour under viral attack. Computer Communications 19(2): 124-132 (1996)
1995
5EEAnastasia Doumas, Konstantinos Mavroudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Design of a neural network for recognition and classification of computer viruses. Computers & Security 14(5): 435-448 (1995)
1994
4EEMichel Denault, Dimitris Karagiannis, Dimitris Gritzalis, Paul G. Spirakis: Intrusion detection: Approach and performance issues of the SECURENET system. Computers & Security 13(6): 495-508 (1994)
1992
3EEDimitris Gritzalis, Sokratis K. Katsikas, J. Keklikoglou, A. Tomaras: Determining access rights for medical information systems. Computers & Security 11(2): 149-161 (1992)
2EEDimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis: A zero knowledge probabilistic login protocol. Computers & Security 11(8): 733-745 (1992)
1991
1EEDimitris Gritzalis, A. Tomaras, Sokratis K. Katsikas, J. Keklikoglou: Data security in medical information systems: The Greek case. Computers & Security 10(2): 141-159 (1991)

Coauthor Index

1Danny De Cock [24]
2Panos Constantopoulos [48]
3John Darzentas [6]
4S. Deftereos [32]
5Michel Denault [4]
6Anastasia Doumas [5]
7Stelios Dritsas [33] [34] [35] [36] [42] [43] [46] [47] [48]
8Vicky Dritsou [48]
9Stefanos Gritzalis [2] [11] [14] [23] [24]
10Lazaros Gymnopoulos [19]
11S. Ikonomopoulos [20]
12John Iliadis [11] [13] [15] [23] [24]
13Georgios Kambourakis [31]
14Dimitris Karagiannis [4]
15Maria Karyda [19] [26]
16Sokratis K. Katsikas [1] [2] [3] [5] [6] [7] [8] [9] [11] [13] [21] [22] [26] [27]
17J. Keklikoglou [1] [3]
18Spyros Kokolakis [12] [20] [25] [26] [41]
19Konstantinos Kostis [17]
20Nikolaos Kyrloglou [16]
21Costas Lambrinoudakis [15] [20] [22] [25] [26] [29] [32] [34]
22Dimitrios Lekkas [30] [32] [39] [44]
23Javier López [50]
24John Mallios [42] [43]
25Yannis Mallios [45] [46]
26Giannis F. Marias [42] [43]
27Konstantinos Mavroudakis [5]
28L. Mitrou [21]
29Konstantinos Moulinos [15] [17]
30Panagiotis Papagiannakopoulos [36]
31Bart Preneel [13] [24]
32Angelos N. Rouskas [31]
33Pierangela Samarati [27]
34Yannis Soupionis [46] [47] [49]
35Diomidis Spinellis [11] [13] [18] [24]
36Paul G. Spirakis [4] [8]
37Thomas Spyrou [6]
38Eleftheria Stougiannou [40]
39Marianthi Theoharidou [38] [40] [41] [42] [43] [46]
40A. Tomaras [1] [3]
41George Tountas [49]
42Theodore Tryfonas [12]
43John Tsaparas [35]
44Aggeliki Tsohou [41]
45Bill Tsoumas [33] [36] [37] [48]
46Vassilis Tsoumas [26]
47K. Vassiliou [20]
48Sabrina De Capitani di Vimercati [27]
49S. Xarhoulacos [15]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)