dblp.uni-trier.dewww.uni-trier.de

Stefanos Gritzalis Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
92EEGeorgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park: Signaling-Oriented DoS Attacks in UMTS Networks. ISA 2009: 280-289
91EEEleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis: A Cluster-Based Framework for the Security of Medical Sensor Environments. TrustBus 2009: 52-62
90EEAlexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis: A generic accounting scheme for next generation networks. Computer Networks 53(14): 2408-2426 (2009)
89EEPetros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas: Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. Journal of Computer Security 17(3): 239-268 (2009)
2008
88EEEleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, Stefanos Gritzalis: Clustering Oriented Architectures in Medical Sensor Environments. ARES 2008: 929-934
87EEAthanassios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas: Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ESORICS 2008: 207-222
86EEGiorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Caller identity privacy in SIP heterogeneous realms: A practical solution. ISCC 2008: 37-43
85EEGiorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Privacy Protection in Context Transfer Protocol. PDP 2008: 590-596
84EEAlexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis: A new Accounting Mechanism for Modern and Future AAA Services. SEC 2008: 693-697
83EEPeter Mueller, Kaisa Nyberg, Stefanos Gritzalis, Costas Lambrinoudakis: Message from the SecPri Workshop Organizing Technical Co-chairs. WiMob 2008
82EEGiannakis Antoniou, Leon Sterling, Stefanos Gritzalis, Parampalli Udaya: Privacy and forensics investigation process: The ERPINA protocol. Computer Standards & Interfaces 30(4): 229-236 (2008)
81EETheodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying and implementing privacy-preserving cryptographic protocols. Int. J. Inf. Sec. 7(6): 395-420 (2008)
80EEPetros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas: Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification. Journal of Computer Security 16(6): 761-790 (2008)
79EEGeorgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos, Stefanos Gritzalis: Examining the significance of high-level programming features in source code author classification. Journal of Systems and Software 81(3): 447-460 (2008)
78EEChristos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13(3): 241-255 (2008)
77EEDemosthenes Vouyioukas, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis: Enabling the provision of secure web based m-health services utilizing XML based security models. Security and Communication Networks 1(5): 375-388 (2008)
2007
76EEChristos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. ARES 2007: 1009-1017
75EEGeorgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis: Securing Medical Sensor Environments: The CodeBlue Framework Case. ARES 2007: 637-643
74EEPetros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas: Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. ASIAN 2007: 261-267
73EEMaria Karyda, Stefanos Gritzalis, Jong Hyuk Park: A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. EUC Workshops 2007: 12-21
72EEAlexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis: On RSN-Oriented Wireless Intrusion Detection. OTM Conferences (2) 2007: 1601-1615
71EEGiorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Two privacy enhanced context transfer schemes. Q2SWinet 2007: 172-175
70EEPetros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas: Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. TrustBus 2007: 125-134
69EEGeorgios Kambourakis, Stefanos Gritzalis: On Device Authentication in Wireless Networks: Present Issues and Future Challenges. TrustBus 2007: 135-144
68EEDimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis: A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks 51(10): 2580-2593 (2007)
67EEGeorgios Kambourakis, Denise-Penelope N. Kontoni, Angelos N. Rouskas, Stefanos Gritzalis: A PKI approach for deploying modern secure distributed e-learning and m-learning environments. Computers & Education 48(1): 1-16 (2007)
66EEPetros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas: Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation. Electr. Notes Theor. Comput. Sci. 179: 75-86 (2007)
65EEGiorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis: Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks. IEEE Communications Surveys and Tutorials 9(1-4): 18-28 (2007)
64EEGeorgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Carole E. Chaski, Blake Stephen Howald: Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method. IJDE 6(1): (2007)
63EEMeletis A. Belsis, Ashish N. Dwivedi, Stefanos Gritzalis, Rajeev K. Bali, Raouf N. Gorgui-Naguib: Providing secure mAccess to medical information. IJEH 3(1): 51-71 (2007)
62EEStefanos Gritzalis, Athanassios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas: A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Int. J. Inf. Sec. 6(4): 197-211 (2007)
61EEMichael Backes, Stefanos Gritzalis, Bart Preneel: Preface. Int. J. Inf. Sec. 6(6): 359-360 (2007)
60EEJose Antonio Onieva, Javier Lopez, Rodrigo Roman, Jianying Zhou, Stefanos Gritzalis: Integration of non-repudiation services in mobile DRM scenarios. Telecommunication Systems 35(3-4): 161-176 (2007)
59EEEfthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Towards a flexible trust establishment framework for sensor networks. Telecommunication Systems 35(3-4): 207-213 (2007)
2006
58 Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Springer 2006
57EEGeorgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas: Source Code Author Identification Based on N-gram Author Profiles. AIAI 2006: 508-515
56EEPetros Belsis, Stefanos Gritzalis, Sokratis K. Katsikas: Optimized Multi-Domain Secure Interoperation using Soft Constraints. AIAI 2006: 78-85
55EEMaria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas: An ontology for secure e-government applications. ARES 2006: 1033-1037
54EEEfthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Trust Establishment in Ad Hoc and Sensor Networks. CRITIS 2006: 179-194
53EEEfthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis: Requirements and Challenges in the Design of Privacy-aware Sensor Networks. GLOBECOM 2006
52EEGeorgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas: Effective identification of source code authors using byte-level information. ICSE 2006: 893-896
51EEPetros Belsis, Kostas Fragos, Stefanos Gritzalis, Christos Skourlas: SF-HME system: a hierarchical mixtures-of-experts classification system for spam filtering. SAC 2006: 354-360
50EETheodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas: A Framework for Exploiting Security Expertise in Application Development. TrustBus 2006: 62-70
49EEDimitris Fotakis, Stefanos Gritzalis: Efficient heuristic algorithms for correcting the Cascade Vulnerability Problem for interconnected networks. Computer Communications 29(11): 2109-2122 (2006)
48EEGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis, Dimitris Geneiatakis: Support of subscribers' certificates in a hybrid WLAN-3G environment. Computer Networks 50(11): 1843-1859 (2006)
47EEDimitris Geneiatakis, Tasos Dagiuklas, Georgios Kambourakis, Costas Lambrinoudakis, Stefanos Gritzalis, Sven Ehlert, Dorgham Sisalem: Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys and Tutorials 8(1-4): 68-81 (2006)
46EEStefanos Gritzalis: Public Key Infrastructure: Research and Applications. Int. J. Inf. Sec. 5(1): 1-2 (2006)
45EEStefanos Gritzalis: Developing a culture of privacy in the Global Village. Telematics and Informatics 23(3): 157-163 (2006)
2005
44 Lazaros Gymnopoulos, Stefanos Gritzalis: Introducing Ontology-based Security Policy Management in the Grid. ECIW 2005: 107-116
43 Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis: Incorporating Security Requirements Into the Software Development Process. ECIW 2005: 21-28
42 Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis: Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. ICETE 2005: 283-290
41 Petros Belsis, Apostolos Malatras, Stefanos Gritzalis, Christos Skourlas, Ioannis Chalaris: Pervasive Secure Electronic Healthcare Records Management. IWUC 2005: 101-109
40EEMeletis A. Belsis, Alkis Simitsis, Stefanos Gritzalis: Workflow Based Security Incident Management. Panhellenic Conference on Informatics 2005: 684-694
39EEPetros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris: Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains. TrustBus 2005: 10-19
38EETheodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying electronic voting protocols in typed MSR. WPES 2005: 35-39
37EEGiorgos Gousios, Efthimia Aivaloglou, Stefanos Gritzalis: Distributed component architectures security issues. Computer Standards & Interfaces 27(3): 269-284 (2005)
36EETheodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas: Specifying Privacy-Preserving Protocols in Typed MSR. Computer Standards & Interfaces 27(5): 501-512 (2005)
35EECostas Lambrinoudakis, Stefanos Gritzalis, Petros Hatzopoulos, Athanassios N. Yannacopoulos, Sokratis K. Katsikas: A formal model for pricing information systems insurance contracts. Computer Standards & Interfaces 27(5): 521-532 (2005)
34EEStefanos Gritzalis: A good-practice guidance on the use of PKI services in the public sector of the European Union member states. Inf. Manag. Comput. Security 13(5): 379-398 (2005)
2004
33 Sokratis K. Katsikas, Stefanos Gritzalis, Javier Lopez: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings Springer 2004
32EEKonstantina Kabouraki, Stefanos Gritzalis, Konstantinos Moulinos: Towards a Privacy Audit Programmes Comparison Framework. EGOV 2004: 328-331
31EEChristos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis: Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks. EGOV 2004: 66-71
30 Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Ioannis Drakopoulos: Implementing Knowledge Management Techniques for Security Purposes. ICEIS (2) 2004: 535-540
29 Georgia Frantzeskou, Stefanos Gritzalis: Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process. ICETE (2) 2004: 85-92
28EEGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. NETWORKING 2004: 13-24
27EEPetros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris: Enhancing Knowledge Management Through the Use of GIS and Multimedia. PAKM 2004: 319-329
26EEGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Delivering Attribute Certificates over GPRS. SAC 2004: 1166-1170
25EEStefanos Gritzalis: Enhancing Web privacy and anonymity in the digital era. Inf. Manag. Comput. Security 12(3): 255-287 (2004)
2003
24EETheodoros Balopoulos, Stefanos Gritzalis: Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols. DEXA Workshops 2003: 396-401
23EEJohn Argyrakis, Stefanos Gritzalis, Chris Kioulafas: Privacy Enhancing Technologies: A Review. EGOV 2003: 282-287
22EELazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis: GRID Security Review. MMM-ACNS 2003: 100-111
21EEG. Angelis, Stefanos Gritzalis, Costas Lambrinoudakis: Security Policy Configuration Issues in Grid Computing Environments. SAFECOMP 2003: 331-341
20 Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Introducing PKI to Enhance Security in Future Mobile Networks. SEC 2003: 109-120
19EEJohn Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis: Towards a framework for evaluating certificate status information mechanisms. Computer Communications 26(16): 1839-1850 (2003)
18EEJohn Iliadis, Stefanos Gritzalis, Dimitris Gritzalis: ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information. Computer Communications 26(16): 1851-1862 (2003)
17EECostas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications 26(16): 1873-1883 (2003)
2002
16EEGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis: Using SSL/TLS in authentication and key agreement procedures of future mobile networks. MWCN 2002: 152-156
15 Stefanos Gritzalis, Costas Lambrinoudakis: Security Requirements of e-Government Services: An Organizational Framework. PDPTA 2002: 127-131
14EEDimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas: Quality assured trusted third parties for deploying secure internet-based healthcare applications. I. J. Medical Informatics 65(2): 79-96 (2002)
2001
13 Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. Katsikas: Towards an ISO-9000 compliant certification service provider. HERCMA 2001: 390-397
12EEStefanos Gritzalis, Dimitris Gritzalis: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Security 9(2): 71-79 (2001)
11EENikitas Nikitakos, Stefanos Gritzalis: Risk management for new information technology insertion in a shipping company. Operational Research 1(1): 7-16 (2001)
2000
10 Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydoro: Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture. Computers & Security 19(8): 731-746 (2000)
9EEStefanos Gritzalis, John Iliadis, Spyros Oikonomopoulos: Distributed component software security issues on deploying a secure electronic marketplace. Inf. Manag. Comput. Security 8(1): 5-13 (2000)
1999
8EEStefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis: Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications 22(8): 697-709 (1999)
7EEDiomidis Spinellis, Stefanos Gritzalis, John Iliadis, Dimitris Gritzalis, Sokratis K. Katsikas: Trusted third party services for deploying secure telemedical applications over the WWW. Computers & Security 18(7): 627-639 (1999)
6EEDiomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis: Security requirements, risks and recommendations for small enterprise and home-office environments. Inf. Manag. Comput. Security 7(3): 121-128 (1999)
1998
5 Stefanos Gritzalis, John Iliadis: Addressing Security Issues in Programming Languages for Mobile Code. DEXA Workshop 1998: 288-293
4EEJohn Iliadis, Stefanos Gritzalis, V. Oikonomou: Towards Secure Downloadable Executable Content: The Java Paradigm. SAFECOMP 1998: 117-127
3 Stefanos Gritzalis, George Aggelis: Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl. Operating Systems Review 32(2): 16-32 (1998)
1996
2 Nikitas Nikitakos, Stefanos Gritzalis, Panagiotis Georgiadis: Security profile for interconnected open distributed systems with varying vulnerability. SEC 1996: 428-437
1992
1EEDimitris Gritzalis, Sokratis K. Katsikas, Stefanos Gritzalis: A zero knowledge probabilistic login protocol. Computers & Security 11(8): 733-745 (1992)

Coauthor Index

1George Aggelis [3]
2Efthimia Aivaloglou [37] [53] [54] [59]
3G. Angelis [21]
4Giannakis Antoniou [82]
5John Argyrakis [23]
6Michael Backes [58] [61]
7Rajeev K. Bali [63]
8Theodoros Balopoulos [24] [36] [38] [43] [50] [55] [81]
9Meletis A. Belsis [40] [63]
10Petros Belsis [27] [30] [39] [41] [51] [56] [66] [70] [74] [80] [89]
11Ioannis Chalaris [27] [39] [41]
12Carole E. Chaski [64]
13Danny De Cock [19]
14Tasos Dagiuklas [47] [68]
15Ioannis Drakopoulos [30]
16Fredj Dridi [17]
17Stelios Dritsas [22] [43] [55]
18Ashish N. Dwivedi [63]
19Sven Ehlert [47]
20Dimitris Fotakis [49]
21Kostas Fragos [51] [80] [89]
22Georgia Frantzeskou [29] [42] [52] [57] [64] [79]
23Dimitris Geneiatakis [47] [48] [68]
24Panagiotis Georgiadis [2] [8]
25Raouf N. Gorgui-Naguib [63]
26Giorgos Gousios [37]
27Dimitris Gritzalis [1] [7] [12] [18] [19]
28Lazaros Gymnopoulos [22] [43] [44] [50] [55]
29Petros Hatzopoulos [35] [62]
30Blake Stephen Howald [64]
31John Iliadis [4] [5] [7] [9] [18] [19]
32Konstantina Kabouraki [32]
33Christos Kalloniatis [31] [76] [78]
34Georgios Kambourakis [16] [20] [26] [28] [47] [48] [65] [67] [68] [69] [71] [72] [75] [77] [84] [85] [86] [88] [90] [91] [92]
35Giorgos Karopoulos [65] [71] [85] [86]
36Maria Karyda [43] [50] [55] [73]
37Sokratis K. Katsikas [1] [7] [10] [13] [14] [33] [35] [36] [38] [50] [52] [56] [57] [58] [62] [66] [81] [87]
38Evangelia Kavakli [31] [76] [78]
39Chris Kioulafas [23]
40Eleni Klaoudatou [75] [88] [91]
41Spyros Kokolakis [6] [43] [50] [55]
42Constantinos Kolias [77] [92]
43Elisavet Konstantinou [88] [91]
44Denise-Penelope N. Kontoni [67]
45Costas Lambrinoudakis [15] [17] [21] [22] [35] [47] [55] [62] [68] [83] [87]
46Dimitrios Lekkas [10] [13] [14]
47Javier Lopez [33] [58] [60]
48Stephen G. MacDonell [79]
49Ilias Maglogiannis [77]
50Apostolos Malatras [27] [39] [41]
51Konstantinos Moulinos [10] [32]
52Peter Mueller [83]
53Nikitas Nikitakos [2] [11]
54Kaisa Nyberg [83]
55Spyros Oikonomopoulos [9]
56V. Oikonomou [4]
57Jose Antonio Onieva [60]
58Jong Hyuk Park [73] [92]
59Günther Pernul [17]
60Eleni Polydoro [10]
61Bart Preneel [19] [58] [61]
62Rodrigo Roman [60]
63Angelos N. Rouskas [16] [20] [26] [28] [48] [67] [77]
64Alkis Simitsis [40]
65Dorgham Sisalem [47]
66Charalabos Skianis [53] [54] [59]
67Christos Skourlas [27] [30] [39] [41] [51] [70] [74] [80] [89]
68Diomidis Spinellis [6] [7] [8] [19]
69Efstathios Stamatatos [42] [52] [57] [64] [79]
70Leon Sterling [82]
71Alexandros Tsakountakis [72] [84] [90]
72Vassilis Tsoukalas [70] [74]
73Parampalli Udaya [82]
74Demosthenes Vouyioukas [77]
75Stylianos Z. Xanthopoulos [87]
76Athanassios N. Yannacopoulos [35] [62] [87]
77Jianying Zhou [60]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)