dblp.uni-trier.dewww.uni-trier.de

Costas Lambrinoudakis Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
35EESimone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings Springer 2009
34EESimone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis: Exploring Trust, Security and Privacy in Digital Business. T. Large-Scale Data- and Knowledge-Centered Systems 1: 191-210 (2009)
2008
33EEAthanassios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas: Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ESORICS 2008: 207-222
32EEDimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis: A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony. TrustBus 2008: 59-68
31EEPeter Mueller, Kaisa Nyberg, Stefanos Gritzalis, Costas Lambrinoudakis: Message from the SecPri Workshop Organizing Technical Co-chairs. WiMob 2008
30EEDimitris Geneiatakis, Costas Lambrinoudakis, Georgios Kambourakis: An ontology-based policy for deploying secure SIP-based VoIP services. Computers & Security 27(7-8): 285-297 (2008)
2007
29 Costas Lambrinoudakis, Günther Pernul, A. Min Tjoa: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Springer 2007
28EEDimitris Geneiatakis, Costas Lambrinoudakis: An ontology description for SIP security flaws. Computer Communications 30(6): 1367-1374 (2007)
27EEDimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis: A framework for protecting a SIP-based infrastructure against malformed message attacks. Computer Networks 51(10): 2580-2593 (2007)
26EEStefanos Gritzalis, Athanassios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas: A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Int. J. Inf. Sec. 6(4): 197-211 (2007)
25EEDimitris Geneiatakis, Costas Lambrinoudakis: A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment. Telecommunication Systems 36(4): 153-159 (2007)
2006
24 Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings Springer 2006
23EEMaria Karyda, Theodoros Balopoulos, Lazaros Gymnopoulos, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis, Stelios Dritsas: An ontology for secure e-government applications. ARES 2006: 1033-1037
22EEDimitris Geneiatakis, Tasos Dagiuklas, Georgios Kambourakis, Costas Lambrinoudakis, Stefanos Gritzalis, Sven Ehlert, Dorgham Sisalem: Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys and Tutorials 8(1-4): 68-81 (2006)
21EEDimitrios Lekkas, Costas Lambrinoudakis: Outsourcing digital signatures: a solution to key management burden. Inf. Manag. Comput. Security 14(5): 436-449 (2006)
20EEIlias Maglogiannis, Elias P. Zafiropoulos, Agapios N. Platis, Costas Lambrinoudakis: Risk analysis of a patient monitoring system using Bayesian Network modeling. Journal of Biomedical Informatics: 637-647 (2006)
19EEStelios Dritsas, Dimitris Gritzalis, Costas Lambrinoudakis: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics and Informatics 23(3): 196-210 (2006)
2005
18EECostas Lambrinoudakis, Stefanos Gritzalis, Petros Hatzopoulos, Athanassios N. Yannacopoulos, Sokratis K. Katsikas: A formal model for pricing information systems insurance contracts. Computer Standards & Interfaces 27(5): 521-532 (2005)
17EEDimitris Gritzalis, Costas Lambrinoudakis, Dimitrios Lekkas, S. Deftereos: Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Transactions on Information Technology in Biomedicine 9(3): 413-423 (2005)
2004
16EEAgapios N. Platis, Costas Lambrinoudakis, Assimakis K. Leros: A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions. EuroPKI 2004: 149-159
15EEDimitris Gritzalis, Costas Lambrinoudakis: A security architecture for interconnecting health information systems. I. J. Medical Informatics 73(3): 305-309 (2004)
2003
14EECostas Lambrinoudakis, Spyros Kokolakis, Maria Karyda, Vassilis Tsoumas, Dimitris Gritzalis, Sokratis K. Katsikas: Electronic Voting Systems: Security Implications of the Administrative Workflow. DEXA Workshops 2003: 467-471
13EELazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis: GRID Security Review. MMM-ACNS 2003: 100-111
12EESpyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis: A Knowledge-Based Repository Model for Security Policies Management. MMM-ACNS 2003: 112-121
11EEG. Angelis, Stefanos Gritzalis, Costas Lambrinoudakis: Security Policy Configuration Issues in Grid Computing Environments. SAFECOMP 2003: 331-341
10EECostas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Günther Pernul: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communications 26(16): 1873-1883 (2003)
2002
9EECostas Lambrinoudakis, Dimitris Gritzalis, Sokratis K. Katsikas: Building a Reliable e-Voting System: Functional Requirements and Legal Constraints. DEXA Workshops 2002: 435
8 Stefanos Gritzalis, Costas Lambrinoudakis: Security Requirements of e-Government Services: An Organizational Framework. PDPTA 2002: 127-131
7 S. Ikonomopoulos, Costas Lambrinoudakis, Dimitris Gritzalis, Spyros Kokolakis, K. Vassiliou: Functional Requirements for a Secure Electronic Voting System. SEC 2002: 507-520
2001
6 Dimitris Gritzalis, Konstantinos Moulinos, John Iliadis, Costas Lambrinoudakis, S. Xarhoulacos: Pythia: Towards Anonymity in Authentication. SEC 2001: 1-18
2000
5 Costas Lambrinoudakis: Using Smart Cards in an Educational Environment: Services and Security Features. SEC 2000: 131-140
4EECostas Lambrinoudakis: Smart card technology for deploying a secure information management framework. Inf. Manag. Comput. Security 8(4): 173-183 (2000)
1995
3EEDonald F. Beal, Costas Lambrinoudakis: Design of a Processor Element for a High Performance Massively Parallel SIMD System. International Journal of High Speed Computing 7(3): 365-390 (1995)
1991
2EEDonald F. Beal, Costas Lambrinoudakis: GPFP: an array processing element for the next generation of massively parallel supercomputer architectures. SC 1991: 348-357
1 Donald F. Beal, Costas Lambrinoudakis: GPFP: A SIMD PE for Higher VLSI Densities. VLSI 1991: 347-356

Coauthor Index

1G. Angelis [11]
2Theodoros Balopoulos [23]
3Donald F. Beal [1] [2] [3]
4Tasos Dagiuklas [22] [27]
5S. Deftereos [17]
6Fredj Dridi [10]
7Stelios Dritsas [13] [19] [23]
8Sven Ehlert [22]
9Simone Fischer-Hübner [24] [34] [35]
10Steven Furnell [24] [34]
11Dimitris Geneiatakis [22] [25] [27] [28] [30] [32]
12Dimitris Gritzalis [6] [7] [9] [12] [14] [15] [17] [19]
13Stefanos Gritzalis [8] [10] [11] [13] [18] [22] [23] [26] [27] [31] [33]
14Lazaros Gymnopoulos [13] [23]
15Petros Hatzopoulos [18] [26]
16S. Ikonomopoulos [7]
17John Iliadis [6]
18Georgios Kambourakis [22] [27] [30] [32]
19Maria Karyda [14] [23]
20Sokratis K. Katsikas [9] [14] [18] [26] [33]
21Spyros Kokolakis [7] [12] [14] [23]
22Dimitrios Lekkas [17] [21]
23Assimakis K. Leros [16]
24Ilias Maglogiannis [20]
25Konstantinos Moulinos [6]
26Peter Mueller [31]
27Kaisa Nyberg [31]
28Günther Pernul [10] [29] [35]
29Agapios N. Platis [16] [20]
30Dorgham Sisalem [22]
31A Min Tjoa (A. Min Tjoa) [29]
32Vassilis Tsoumas [14]
33K. Vassiliou [7]
34Stylianos Z. Xanthopoulos [33]
35S. Xarhoulacos [6]
36Athanassios N. Yannacopoulos [18] [26] [33]
37Elias P. Zafiropoulos [20]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)