Stefanos Gritzalis

Stefanos Gritzalis

Γκρίτζαλης Στέφανος

Fullname: Stefanos Gritzalis

Title: Professor

Department: Digital Systems

Office: 206 (Androutsou Building)

Email: sgritz@unipi.gr

Phone/Fax: 210-4142706

Website: https://www.ds.unipi.gr/faculty/sgritz/

Stefanos Gritzalis is a Professor of Information and Communication Systems Security, at the Lab. of Systems Security, Dept. of Digital Systems, University of Piraeus, Greece (2019+) and Director of the Postgraduate Programme “MSc in Law and Information & Communication Technologies” (2020+).

He is a Member of the Board of the Hellenic Authority for Communication Security and Privacy (2020+).

He is a Deputy Member of the National Commission for Human Rights (2022+)

He was the Rector of the University of the Aegean, Greece (2014-2018).

He has acted as Special Secretary for the Hellenic Ministry for Administrative Reform and Electronic Governance (2009-2012).

Previously, he was a Professor at the University of the Aegean, Greece, School of Engineering, Dept. of Information and Communication Systems Engineering, and member of the Info-Sec-Lab Laboratory of Information and Communication Systems Security (2002-2019). He was the Head of the Dept. of Information and Communication Systems Engineering (2005-2009), Deputy Head of the Dept. of Information and Communication Systems Engineering (2012-2014), and Director of the Lab. of Information and Communication Systems Security (2005-2009).

He holds a BSc in Physics, an MSc in Electronic Automation, and a PhD in Information and Communications Security from the Department of Informatics and Telecommunications, University of Athens, Greece.

His published scientific work includes more than 14 books (including the book “Digital Privacy: Theory, Technologies and Practices”, co-edited by A. Acquisti, S. Gritzalis, C. Lambrinoudakis and S. De Capitani di Vimercati, Auerbach Publications, Taylor and Francis Group) and 37 book chapters. Moreover, his work has been published in 329 papers (146 in refereed journals and 183 in the proceedings of international refereed conferences and workshops). He has co-authored papers with more than 200 researchers from 30 countries during the last 30 years. The focus of his publications is on Information and Communications Security and Privacy. His most frequently cited papers have more than 10.000 citations, h-index=54, i10-index=170, as measured by Google Scholar.

He is listed, again, in the top 2% of the most cited researchers in the ICT domain around the globe, as ranked by Stanford and Elsevier (October 2023)

He acts as Area Editor for the prestigious “IEEE Communications Surveys and Tutorials” journal (IF=35.6 in the Clarivate JCR report, ranked 1st in Telecommunications and Computer Science domains for 2022, 2021, 2020, 2019, 2018, 2017). He is the Editor-in-Chief or Editor or Editorial Board member in 35 journals and a Reviewer in more than 80 scientific journals. He has acted as Guest Editor in 35 journal special issues, he has been General Chair or Program Committee Chair in more than 50 international conferences and workshops, he has served as a Program Committee Member of more than 600 international conferences and workshops.

He has been the advisor of 17 completed PhD theses and has acted as external evaluator/examiner for more than 60 PhD students from Germany, Italy, Spain, India, Pakistan, Greece, etc.

Moreover, he has supervised more than 90 Master Theses and 160 First Diploma / BSc Theses.

He has been involved in several National and EU funded R&D projects receiving research and development grants of over € 6.0 million.

He has acted as External Evaluator for research proposals submitted to: ERC European Research Council, Swiss National Science Foundation (SNSF), Italian Ministry of University and Research, The Netherlands Organisation for Scientific Research, Belgian Fund for Scientific Research, Czech Science Foundation, FFG Austrian Research Promotion Agency, ETH Zurich Research Commission, Croatian Ministry of Science and Education, Slovenian Research Agency, South Africa’s National Research Foundation, Qatar Foundation – Qatar National Research Fund, Cyprus Research Promotion Foundation, The University of Nicosia Research Foundation in Cyprus, Hellenic Foundation for Research and Innovation, Hellenic General Secretariat for Research and Technology, Hellenic Ministry of Economy and Development ESF Operational Programme “HR Development, Education and Life Long Learning” etc. Moreover, he has acted as member of the 2015 IEEE Technical Recognition Award Selection Committee for the “IEEE Communications & Information Security Technical Recognition Award”.

His professional experience includes senior consulting and researcher positions in a number of private and public institutions. He was elected twice as Member of the Board (Secretary General, Treasurer) of the Greek Computer Society. He acts as member of the Hellenic Association for Information Systems AIS – Hellenic Chapter, the Association for Computing Machinery ACM, the Institute of Electrical and Electronics Engineers IEEE and the IEEE Communications Society “Communications and Information Security Technical Committee”.

Network Security — 5th semester
Information Systems Security — 6th semester
Security Policies and Security Management — 5th semester
Privacy on the Internet — 8th semester

I. JOURNALS

  1. Tsohou A., Diamantopoulou V., Gritzalis S., Lambrinoudakis C., “Cyberinsurance: State of the Art, Trends and Future Directions”, International Journal of Information Security, Vol.22, pp.737-748, 2023, Springer
  2. Chatzoglou E., Kouliaridis V., Kambourakis G., Karopoulos G., Gritzalis S., “A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset”, Computers and Security, Vol.125, 2023, Elsevier
  3. Molla E., Rizomiliotis P., Gritzalis S., “Efficient searchable symmetric encryption supporting range queries“, International Journal of Information Security, Vol.22, pp.785-798, 2023, Springer
  4. Kitsiou A., Despotidi C., Kalloniatis C., Gritzalis S., “The role of users’ sociodemographic profile for accepting Biometric Systems: A Greek case study”, Future Internet, Vol.14 (11), 328, 2022, MDPI
  5. Vgena A., Kitsiou A., Kalloniatis C., Gritzalis S., “Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media”, Future Internet, Vol.14(9), 249, 2022, MDPI
  6. Diamantatos P., Kavallieratou E., Gritzalis S., “Directional Hinge Features for Writer Identification: The importance of the Skeleton and the effects of character size and pixel intensity “, Springer Nature Computer Science, Vol.3, No.56, 2022, Springer
  7. Simou S., Kalloniatis C., Gritzalis S., Katos V., Psalidas M., “Revised Forensic Framework Validation and Cloud Forensic Readiness“, International Journal of Electronic Governance, Vol.14, No.1/2, pp.236-263, 2022, Inderscience Publishers
  8. Sideri M., Fontaras A., Gritzalis S., “Exploring data subjects’ knowledge on the rights GDPR guarantees. An exploratory research in Greece“, International Journal of Electronic Governance, Vol.14, No.1/2, pp.28-57, 2022, Inderscience Publishers
  9. Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., “Identifying privacy related requirements for the design of Self-adaptive privacy protections schemes in Social Networks”, Future Internet, 2021, Vol.13, No.23, MDPI
  10. Skarkala M. E., Maragkoudakis E., Gritzalis S., Mitrou L., “PP-TAN: A Privacy Preserving Multi-party Tree Augmented Naive Bayes Classifier”, Computation, Vol.9, No.1, 2021, MDPI
  11. Kalloniatis C., Lambrinoudakis C., Musahl M., Kanatas A., Gritzalis S., “Incorporating privacy by design in Body Sensor Networks for Medical Applications: A Privacy and Data Protection Framework”, Computer Science and Information SystemsVol. 18, No. 1, pp.323–350, 2021
  12. Chalaris E., Gritzalis S., “Data on Strategic Performance of Greek Universities during the economic recession: A Multiplecriteria Approach”, Data in Brief, 2020, Elsevier
  13. Diamantopoulou V., Androutsopoulou A., Gritzalis S., Charalambidis Y., “Preserving Digital Privacy in e-Participation Environments: Towards GDPR Compliance”, Information, Vol.11, No.2, 117, pp.1-27, 2020, MDPI
  14. Vgena A., Kitsiou A., Kalloniatis C., Kavroudakis D., Gritzalis S., “Towards addressing Location Privacy Issues: New affiliations with Social and Location Attributes”, Future Internet,11, No.234, pp.1-20, 2019, MDPI
  15. Giannakas F., Papasalouros A., Kambourakis G., Gritzalis S., “A comprehensive cybersecurity learning platform for elementary education”, Information Security Journal: A Global Perspective, Vol.28, No.3, pp.81-106, 2019, Taylor and Francis
  16. Mavroeidi A., Kitsiou A., Kalloniatis C., Gritzalis S., “Gamification vs Privacy: Identifying and analysing the major concerns”, Future Internet, 11, No.3, pp.1-17, 2019, MDPI
  17. Kalloniatis C., Kavroudakis D., Polydoropoulou A., Gritzalis S., “Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts”, International Journal of Applied Geospatial Research, Vol.10, No.1, pp.73-91, 2019, IGI Global
  18. Simou S., Kalloniatis C., Gritzalis S., Katos V., “A Framework for Designing Cloud Forensics-enabled Services”, Requirements Engineering, Vol.24, No.3, pp.403-430, 2019, Springer
  19. Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., “Enhancing University students’ privacy literacy through an educational intervention. A Greek case-study”, International Journal of Electronic Governance,11, No.3, pp.333-360, 2019, Inderscience Publishers
  20. Sideri M., Kitsiou A., Filippopoulou A., Kalloniatis C., Gritzalis S., “E-Governance in educational settings. Greek educational organizations leadership’s perspectives towards social media usage for participatory decision-making”, Internet Research, 29, No.4, pp.818-845, 2019, Emerald
  21. Giannakas F., Kambourakis G., Papasalouros A., Gritzalis S., “A critical review of 13 years of Mobile Game-based Learning”, Educational Technology Research & Development66, pp.341-384, 2018, Springer
  22. Roman R, Lopez J., Gritzalis S., “Evolution and Trends in the Security of the Internet of Things”, IEEE Computer, Vol.51, No.7, pp.16-25, 2018, IEEE
  23. Pattakou A. Kalloniatis C., Gritzalis S., “Security and Privacy under a Unified Framework: A Review”, International Journal on Advances in Security, 1, No.1-2, pp.39-51, 2018, IARIA
  24. Islam S., Ouedraogo M., Kalloniatis C., Mouratidis H., Gritzalis S., “Assurance of Security and Privacy Requirements for Cloud Deployment Model”, IEEE Transactions on Cloud Computing,6, No.2, pp.387-400, 2018, IEEE
  25. Tsekouras G., Tsimikas J., Kalloniatis C., Gritzalis S., “Interpretability Constraints for Fuzzy Modelling Implemented by Constrained Particle Swarm Optimization”, IEEE Transactions on Fuzzy Systems26, No.4, pp.2348-2361, 2018, IEEE
  26. Kalloniatis C., Pattakou A., Kavakli E., Gritzalis S., “Designing Secure and Privacy-aware Information Systems”, International Journal of Secure Software Engineering,8, No.2, pp.1-25, 2017, IGI Global
  27. Sideri M., Kitsiou A., Kalloniatis C., Gritzalis S., “Sharing secrets, revealing thoughts and feelings: Perceptions about disclosure practices and anonymity in a FB university students’ community”, International Journal of Electronic Governance,9, No.3-4, pp.361-384, 2017, Inderscience Publishers
  28. Rahman A., Islam S., Kalloniatis C., Gritzalis S., “A Risk Management Approach for a Sustainable Cloud Migration”, Journal of Risk and Financial Management,10, No.4, pp.1-19, 2017, MDPI
  29. Malagas K., Gritzalis S., Nikitakos N., Fragoudaki A. “The implementation of Goffee and Jones’s types of organizational culture in a Greek state-owned organization that introduced new technologies”, Foundations of Management journal, Vol.9, pp.225-245, 2017, De Gruyter Publishing House
  30. Kollias C., Kambourakis G., Stavrou A., Gritzalis S., “Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset”, IEEE Communications Surveys and Tutorials,18, No.1, pp.184-208, 2016, IEEE
  31. Giannakas F., Kambourakis G., Papasalouros A., Gritzalis S., “Security Education and Awareness for K-6 going mobile”, International Journal of Interactive Mobile Technologies,10, No.2, pp.41-48, 2016, ΙΑΟΕ
  32. Malagas K., Gritzalis S., Nikitakos N., “How Institutional Factors that Emerge Within a Public Organization Affect the Use of an Innovation by its Employees: A Case Study of Olympic”, TÉKHNE Review of Applied Management Studies, Vol.13, No.2, pp.158-171, 2016, Elsevier
  33. Anagnostopoulos M., Kambourakis G., Gritzalis S., “New facets of Mobile Botnet: Architecture and Evaluation”, International Journal of Information Security, Vol.15, No.5., pp.455-473, 2016, Springer
  34. Simou S., Kalloniatis C., Gritzalis S., Mouratidis H., “A Survey on Cloud Forensics Challenges and Solutions”, Security and Communication Networks, Vol.9, No.18, pp.6285-6134, 2016, Wiley
  35. Diamantatos P., Kavallieratou E., Gritzalis S., “Skeleton Hinge Distribution for Writer Identification”, International Journal on Artificial Intelligence Tools,25, No.3, pp. 1-14, 2016, Springer
  36. Drogkaris P., Gritzalis S., Kalloniatis C., Lambrinoudakis C., “A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments”, Future Internet,7, No.4, pp.500-515, 2015, MDPI Publishers
  37. Kavakli E., Kalloniatis C., Mouratidis H., Gritzalis S., “Privacy as an integral part for the implementation of cloud solutions”, The Computer Journal, Vol.58, No.10, pp.2213-2224, 2015, Oxford University Press
  38. Damopoulos , Kambourakis G., Gritzalis S.,Park S.-O., “Exposing mobile malware from the inside (or what is your mobile app really doing?)”, Peer-to-Peer Networking and Applications, Vol.7, No.4, pp.687-697, 2014, Springer
  39. Panteli A., Maragkoudakis E., Gritzalis S., “Privacy preserving data mining using Radial Basis Function on horizontally partitioned databases in the malicious model”, International Journal on Artificial Intelligence Tools, Vol.23, No.5, pp.1450007-1-22, 2014, World Scientific
  40. Kalloniatis C., Mouratidis C., Manousakis V., Islam S., Gritzalis S., Kavakli E., “Towards the Design of Secure and Privacy-oriented Information Systems in the Cloud: Identifying the major concepts”, Computer Standards and Interfaces, Vol.36, No.4, pp.759-775, 2014, Elsevier
  41. Rekleitis E., Rizomiliotis P., Gritzalis S., “How to Protect Security and Privacy in the Internet of Things: A Policy-based RFID tag management protocol”, Security and Communication Networks, Vol.7, No.12, pp.2669-2683, 2014, Wiley
  42. Kalloniatis C., Kavakli E., Gritzalis S., “Addressing Privacy in Traditional and Cloud-based Systems”, International Journal of Applied Industrial Engineering, pp.14-40, Vol.2, No.1, 2014, IGI Global
  43. Malagas K., Kourousis K., Baxter G., Nikitakos N., Gritzalis S., “Τhe Introduction of Innovative Services in a State Owned Airline: A Case Study of a IT migration project”, Journal of Technology Management & Innovation,8, No.2, pp.74-83, 2013, Inderscience
  44. Drogkaris P., Gritzalis S., Lambrinoudakis C., “Employing Privacy Policies and Preferences in modern eGovernment Environments”, International Journal of Electronic Governance, Vol.6, No.2, pp.101-116, 2013, Inderscience
  45. Damopoulos , Kambourakis G., Anagnostopoulos M., Gritzalis S.,Park J.-H., “User privacy and modern mobile services: Are they on the same path?”, Personal and Ubiquitous Computing, Vol.17, No.7, pp.1437-1448, 2013, Springer
  46. Pereniguez F., Marin-Lopez R., Kambourakis G., Gritzalis S., Gomez Scarmeta A. F., “KAMU: Providing Advanced User Privacy in Kerberos Multi-Domain Scenarios”, International Journal of Information Security,12, No.6, pp.505-525, 2013, Springer
  47. Anagnostopoulos M., Kambourakis G., Kopanos P., Louloudakis G., Gritzalis S., “DNS Amplification Attack Revisited”, Computers and Security,39, pp.475-485, 2013, Elsevier
  48. Damopoulos , Kambourakis G., Gritzalis S.,“From Keyloggers to Touchloggers: Take the rough with the smooth”, Computers and Security, Vol.32, No.1, pp.102-114 2013, Elsevier
  49. Mouratidis H., Islam S., Kalloniatis C., Gritzalis S., “A framework to support selection of cloud providers based on security and privacy requirements”, Journal of Systems and Software, 86, No.9, pp.2276-2293, 2013, Elsevier
  50. Kolias C., Kambourakis G., Gritzalis S., “Attacks and Countermeasures on 802.16: Analysis and Assessment”, IEEE Communications Surveys and Tutorials, Vol.15, No.1, pp.487-514, 2013, IEEE [IEEE COMSOC Best Readings Topics on Communications and Information Systems Security: WiMAX].
  51. Belsis P., Skourlas C., Gritzalis S., “A Wireless System for Secure Electronic Healthcare Records Management”, International Journal of Advanced Pervasive and Ubiquitous Computing,5, No.4, pp.16-32, 2013, IGI Global
  52. Rizomiliotis P., Gritzalis S., “On the security of AUTH, an authentication protocol based on the subspace LPN problem”, International Journal of Information Security, 12, No.2, pp.151-154, 2013, Springer
  53. Loukas A., Damopoulos D., Menesidou S., Skarkala M., Kambourakis G., Gritzalis S., “MILC: A secure and privacy-preserving mobile instant locator with chatting”, Information Systems Frontiers,14, No.3, pp.481-497, 2012, Springer
  54. Tsakountakis A., Kambourakis G., Gritzalis S., “SIPA: Generic and Secure Accounting for SIP”, Security and Communication Networks, Vol.5, No.9, pp.1006-1027, 2012, Wiley
  55. Damopoulos D., Menesidou S., Kambourakis G., Papadaki M., Clarke N., Gritzalis S., “Evaluation of Anomaly-based IDS for Mobile Devices using Machine Learning Classifiers”, Security and Communication Networks, Vol.5, No.1, pp.3-14, 2012, Wiley
  56. Mouratidis C., Kalloniatis C., Islam S., Huget M.-P., Gritzalis S., “Aligning Security and Privacy to support the development of Secure Information Systems”, Journal of Universal Computer Science, Vol.18, No.12, pp.1608-1627, 2012, JUCS
  57. Klaoudatou E., Konstantinou E., Kambourakis G., Gritzalis S., “A Survey on Cluster-based Group Key Agreement Protocols for WSNs”, IEEE Communications Surveys and Tutorials, Vol.13, No.3, pp.429-442, 2011, IEEE
  58. Kambourakis G., Kolias C., Gritzalis S., Park J.-H., “DoS Attacks exploiting signaling UMTS and IMS”, Computer Communications, 34, No.3, pp.226-235, 2011, Elsevier
  59. Pereniguez F., Marin-Lopez R., Kambourakis G., Gritzalis S., Gomez Scarmeta A. F., “PrivaKERB: A User Privacy Framework for Kerberos”, Computers and Security, Vol.30, No.6-7, pp.446-463, 2011, Elsevier
  60. Karopoulos G., Kambourakis G., Gritzalis S., “PrivaSIP: Ad-hoc Identity Privacy in Session Initiation Protocol”, Computer Standards and Interfaces, Vol.33, No.3, pp.301-314, 2011, Elsevier
  61. Luo X., Liu F., Lian S., Yang C., Gritzalis S., “On the Typical Statistic Features for Image Blind Steganalysis”, IEEE Journal on Selected Areas in Communications,27, No.7, pp.1404-1422, 2011, IEEE Press
  62. Belsis P., Skourlas C., Gritzalis S., “Secure electronic healthcare records management in wireless environments”, Journal of Information Technology Research, 4, No.4, pp.1-17, 2011, IGI Global
  63. Kalloniatis C., Belsis P., Gritzalis S., “A Soft Computing approach for Privacy Requirements Engineering”, Applied Soft Computing,11, No.7, pp.4341-4348, 2011, Elsevier
  64. Frantzeskou G., MacDonell S., Stamatatos E., Georgiou S., Gritzalis S., “The significance of user-defined identifiers in Java source code authorship identification”, International Journal of Computer Systems Science and Engineering, Vol.26, No.2, pp.139-148, 2011, CRL Publishing
  65. Mitseva A., Aivaloglou E., Marchitti M. A., Prasad R. N., Skianis C., Gritzalis S., Waller A., Bauge T., Pennington S., “Towards Adaptive Security for Convergent Wireless Sensor Networks in Beyond 3G Environments”, Wireless Communications and Mobile Computing, Vol.10, No.9, pp.1193-1207, 2010, Wiley
  66. Kambourakis G., Gritzalis S., Park J. H., “Device Authentication in Wireless and Pervasive Environments”, Intelligent Automation and Soft Computing Autosoft, Vol.16, No.3, pp.399-418, 2010, TSI Press
  67. Karopoulos G., Kambourakis G., Gritzalis S., Konstantinou E., “A Framework for Identity Privacy in Session Initiation Protocol”, Journal of Network and Computer Applications, Vol.33, No.1, pp.16-28, 2010, Elsevier
  68. Kosta E., Kalloniatis C., Mitrou L., Gritzalis S., “Data protection issues pertaining to social networking under EU law”, Transforming Government: People, Process, and Policy journal,4, No.2, pp.193-201, 2010, Emerald
  69. Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., Ehlert S., Fiedler J., “High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation”, International Journal of Disaster Recovery and Business Continuity, 1, No.1, pp.11-30, 2010, SERSC
  70. Tsochou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., “A Security Standards’ Framework to facilitate Best Practices’ Awareness and Conformity”, Information Management and Computer Security, Vol.18, No.5, pp.350-365, 2010, Emerald
  71. Pereniguez-Garcia F., Kambourakis G., Marin-Lopez R., Gritzalis S., Gomez-Skarmeta A. F., “Privacy-enhanced Fast Re-authentication for EAP-based Next Generation Networks”, Computer Communications, 33, No.14, pp.1682-1694, 2010, Elsevier
  72. Kambourakis G., Konstantinou E., Gritzalis S., “Revisiting WiMAX Multicast Broadcast Services (MBS) Security”, Computers and Mathematics with Applications,60, No.2, pp.217-223, 2010, Elsevier
  73. Tsochou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The importance of content-dependent privacy requirements and perceptions to the design of privacy-aware systems”, Upgrade on-line journal, 11, No.1, pp.32-37, 2010, CEPIS
  74. Boukas L., Kambourakis G., Gritzalis S., “Pandora: An SMS-oriented e-informational system for educational realms”, Journal of Network and Computer Applications, Vol.32, No.3, pp.684-702, 2009, Elsevier
  75. Magkos E., Maragkoudakis E., Chrissikopoulos V., Gritzalis S., “Accurate and Large-Scale Privacy-Preserving Data Mining using the Election Paradigm”, Data and Knowledge Engineering,68, No.11, pp.1224-1236, 2009, Elsevier
  76. Rizomiliotis P., Rekleitis E., Gritzalis S., “Security Analysis of the Song-Mitchell Authentication Protocol for Low-Cost RFID tags”, IEEE Communications Letters,13, No.4, pp.274-276, 2009, IEEE [IEEE COMSOC Best Readings Topics on Communications and Information Systems Security: RFID]
  77. Aivaloglou F., Gritzalis S., “Hybrid Trust and Reputation Management for Sensor Networks”, Wireless Networks, Vol.16, No.5, pp.1493-1510, 2009, Springer
  78. Tsakountakis A., Kambourakis G., Gritzalis S., “A Generic Accounting Scheme for Next Generation Networks”, Computer Networks,53, No.14, pp.2408-2426, 2009, Elsevier
  79. Karyda M., Gritzalis S., Park J.-H., Kokolakis S., “Privacy and Fair Information Practices in Ubiquitous Environments: Research Challenges and Future Directions”, Internet Research, Vol.19, No.2, pp.194-208, 2009, Emerald
  80. Rizomiliotis P., Tsochou A., Lambrinoudakis C., Gritzalis S., “Security and Privacy Issues in Bipolar Disorder Research”, Journal on Information Technology in Healthcare, 7, No.4, pp.244-250, 2009, HL7 Ramius Corp.
  81. Kalloniatis C., Kavakli E., Gritzalis S., “Addressing Privacy Requirements in System Design: The PriS Methodology”, Requirements Engineering, Vol.13, No.3, pp.241-255, 2008, Springer
  82. Roman R., Lopez J. Gritzalis S., “Situation Awareness Mechanisms for Wireless Sensor Networks”, IEEE Communications, Vol.46, No.4, pp.102-107, 2008, IEEE
  83. Antoniou G., Sterling L., Gritzalis S., Parampalli U., “Privacy and Forensics investigation process: The ERPINA protocol”, Computer Standards and Interfaces, Vol.30, No.4, pp.229-236, 2008, Elsevier
  84. Balopoulos T., Gritzalis S., Katsikas S., “Specifying and Implementing Privacy-preserving protocols”, International Journal of Information Security, Vol.7, No.6, pp.395-420, 2008, Springer
  85. Aivaloglou E., Gritzalis S., Skianis C., “Trust Establishment in Sensor Networks: Behavior-based, Certificate-based, and a Combinational Approach”, International Journal of System of Systems Engineering, 1, No.1-2, pp. 128-148, 2008, Inderscience Publishers
  86. Belsis P., Fragos K., Gritzalis S., Skourlas C., “Applying effective feature selection techniques with Hierarchical Mixtures of Experts for spam classification”, Journal of Computer Security, 16, No.6, pp.761-790, 2008, IOS Press
  87. Vouyioukas D., Kambourakis G., Maglogiannis I., Rouskas A., Kolias C., Gritzalis S., “Enabling the Provision of Secure Web based M-Health Services utilizing XML based Security Models”, Security and Communication Networks, Vol.1, No.5, pp.375-388, 2008, Wiley
  88. Bouras C., Papagiannopoulos J., Katsikas S., Gritzalis S., “The Broadband Status of the Western Greece: A study on the offer and the demand of broadband services for eGovernment promotion”, International Journal of Electronic Governance,1, No.3, pp.326-344, 2008, Inderscience Publishers
  89. Frantzeskou G., MacDonell S., Stamatatos E., Gritzalis S., “Examining the Significance of high-level programming features in Source-code Author Classification”, Journal of Systems and Software, Vol.81, No.3, pp.447-460, 2008, Elsevier
  90. Frantzeskou G., Stamatatos E., Gritzalis S., Chaski C., Howald B., “Identifying Authorship by Byte-Level N-Grams: The SCAP Source Code Author Profile method”, International Journal of Digital Evidence, 6, No.1, pp.1-15, 2007, Economic Crime Institute
  91. Gritzalis S., Belsis P., Katsikas S., “Interconnecting Autonomous Medical Domains: Security, Interoperability and Semantic-Driven Perspectives”, IEEE Engineering in Medicine and Biology, 26, No.5, pp.23-28, 2007, IEEE
  92. Geneiatakis D., Kambourakis G., Lambrinoudakis C., Dagiouklas A., Gritzalis S., “A framework for protecting SIP-based infrastructure against Malformed Message Attacks”, Computer Networks, Vol.51, No.10, pp.2580-2593, 2007, Elsevier
  93. Kambourakis G., Kontoni D. P., Rouskas A., Gritzalis S., “A PKI approach for deploying modern secure distributed eLearning and mLearning environments”, Computers and Education, Vol.48, No.1, pp.1-16, 2007, Elsevier
  94. Gritzalis S., Yannacopoulos A., Lambrinoudakis C., Hatzopoulos P., Katsikas S., “A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments”, International Journal of Information Security, Vol.6, No.4, pp.197-211, 2007, Springer
  95. Belsis M., Dwivedi A., Gritzalis S., Bali R., Naguib R., “Providing Secure mAccess to Medical Information”, International Journal of Electronic Healthcare,3, No.1, pp.51-71, 2007, Inderscience Publishers
  96. Karopoulos G., Kambourakis G., Gritzalis S., “Survey of Secure Hand-off Optimization Schemes for Multimedia Services over all-IP Wireless Heterogeneous Networks”, IEEE Communications Surveys and Tutorials, Vol.9, No.3, pp.18-28, 2007, IEEE
  97. Belsis P., Gritzalis S., Katsikas S., “Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation”, Electronic Notes in Theoretical Computer Science, Vol.179, No.1, pp.75-86, 2007, Elsevier
  98. Kavakli E., Gritzalis S., Kalloniatis C., “Protecting Privacy in System Design: The Electronic Voting Case”, Transforming Government: People, Process, and Policy journal,1, No.4, pp.307-332, 2007, Emerald
  99. Onieva J. A., Lopez J., Rodrigo R., Zhou J., Gritzalis S., “Integration of Non-Repudiation Services in Mobile Digital Rights Management Scenarios”, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol.35, No.3-4, pp.161-176, 2007, Springer
  100. Aivaloglou E., Gritzalis S., Skianis C., “Towards a flexible Trust Establishment Framework for Sensor Networks”, Telecommunication Systems: Modelling, Analysis, Design and Management, Vol.35, No.3-4, pp.207-213, 2007, Springer
  101. Geneiatakis D., Dagiouklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., “Survey of Security Vulnerabilities in SIP”, IEEE Communications Surveys and Tutorials, 8, No.3, pp.68-81, 2006, IEEE
  102. Kambourakis G., Rouskas A., Gritzalis S., Geneiatakis D., “Support of Subscriber’s Certificates in a Hybrid WLAN-3G Environment”, Computer Networks, Vol.50, No.11, pp.1843-1859, 2006, Elsevier
  103. Kavakli E., Kalloniatis C., Loucopoulos P., Gritzalis S., “Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework”, Internet Research, 16, No.2, pp.140-158, 2006, Emerald
  104. Fotakis D., Gritzalis S., “Efficient Heuristic Algorithms for Correcting the Cascade Vulnerability Problem for Interconnected Networks”, Computer Communications, Vol.29, No.11, pp.2109-2122, 2006, Elsevier
  105. Lamprou K., Gritzalis S., Katsikas S., “Security Architectures for Online Distance Learning and Training: A review”, THEMES in Education, Vol.7, No.1, pp.63-77, 2006
  106. Gritzalis S., “Developing a Culture of Privacy in the Global Village”, Telematics and Informatics,23, No.3, pp.157-163, 2006, Elsevier (Editorial)
  107. Gritzalis S., “Public Key Infrastructure: Research and Applications”, International Journal of Information Security, 5, No.1, pp.1-3, 2006, Springer (Editorial)
  108. Gritzalis S., “A Policy-ruled Knowledge Dissemination Architecture for Supporting multi-domain Secure Interoperation”, The eJournal for Electronic Commerce Tools and Applications, Vol.1, No.4, 2006
  109. Gousios G., Aivaloglou E., Gritzalis S., “Distributed Component Architectures Security issues”, Computer Standards and Interfaces, 27, No.3, pp.269-284, 2005, Elsevier
  110. Belsis P., Malatras A., Gritzalis S., Skourlas C., Chalaris I., “Flexible Secure Heterogeneous File Management in Distributed Environments”, in IADAT Journal of Advanced Technology,1, No.2, pp.66-69, 2005, published by IADAT International Association for the Development of Advances in Technology
  111. Malatras A., Pavlou G., Belsis P., Gritzalis S., Skourlas C., Chalaris I., “Deploying Pervasive Secure Knowledge Management Infrastructures”, International Journal of Pervasive Computing and Communications,1, No.4, pp.265-276, 2005, Troubador Publishing
  112. Gymnopoulos L., Tsoumas V., Soupionis J., Gritzalis S., “A Generic Grid Security Policy Reconciliation Framework”, Internet Research, Vol.15, No.5, pp.508-517, 2005, Emerald
  113. Gritzalis S., Lambrinoudakis C., Lekkas D., Deftereos S., “Technical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments”, IEEE Transactions on Information Technology in Biomedicine, Vol.9, No.3, pp.413-423, 2005, IEEE
  114. Lekkas D., Gritzalis S., Mitrou L., “Withdrawing a Declaration of Will: Towards a framework for Digital Signature Revocation”, Internet Research, Vol.15, No.4, pp.400-420, 2005, Emerald (Highly Commended Award 2006)
  115. Balopoulos T., Gritzalis S., Katsikas S., “Specifying Privacy Preserving Protocols in Typed MSR”, Computer Standards and Interfaces, 27, No.5, pp.501-512, 2005, Elsevier
  116. Roumboutsos A., Nikitakos N., Gritzalis S., “Information Technology Network Security Risk Assessment and Management Framework for Shipping Companies”, Maritime Policy and Management,32, No.4, pp.421-432, 2005, Taylor and Francis Pubs.
  117. Lambrinoudakis C., Gritzalis S., Hatzopoulos P., Yannacopoulos A., Katsikas S., “A Formal Model for Pricing Information Systems Insurance Contracts”, Computer Standards and Interfaces, 27, No.5, pp.521-532, 2005, Elsevier
  118. Gritzalis S., “A Good-Practice Guidance on the use of PKI Services in the Public Sector of the European Union Member States”, Information Management and Computer Security,13, No.5, pp.379-398, 2005, Emerald
  119. Gritzalis S., “Enhancing Privacy and Data Protection in Electronic Medical Transactions”, Journal of Medical Systems, Vol.28, No.6, pp.535-547, 2004, Springer
  120. Gritzalis S., “Enhancing Web Privacy and Anonymity in the Digital Era”, Information Management and Computer Security,12, No.3, pp.255-287, 2004, Emerald
  121. Kambourakis G., Rouskas A., Kormentzas G., Gritzalis S., “Advanced SSL/TLS based Authentication for Secure WLAN-3G Interworking”, IEE Proceedings Communications, Vol.151, No.5, pp.501-506, 2004, IEE
  122. Kambourakis G., Rouskas A., Gritzalis S., “Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems”, EURASIP Journal on Wireless Communications and Networking, 1, No.1, pp.184-197, 2004, Hindawi Publishing Corporation
  123. Kambourakis G., Rouskas A., Gritzalis S., “Experimental Analysis of an SSL-based Authentication and Key Agreement mechanism in 3G-and-beyond Wireless Networks”, Wireless Personal Communications, Vol.29, No.3-4, pp.303-321, 2004, Kluwer Academic Publishers
  124. Aggelis G., Gritzalis S., Lambrinoudakis C., “Mechanisms for Controlling Access in the Global Grid Environment”, Internet Research, Vol.14, No.5, pp.347-352, 2004, Emerald
  125. Iliadis J., Gritzalis S., Gritzalis D., “ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status Information”, Computer Communications (indexed in Thomson’s ISI Web of Science), Vol.26, No.16, pp.1851-1862, 2003, Elsevier
  126. Iliadis J., Gritzalis S., Spinellis D., de Cock D., Preneel B., Gritzalis D., “Towards a Framework for Evaluating Certificate Status Information Mechanisms”, Computer Communications, Vol.26, No.16, pp.1839-1850, 2003, Elsevier
  127. Deftereos S., Lambrinoudakis C., Gritzalis S., Andriopoulos P., Georgonikou D., Aessopos A., “A macro-directive mechanism that facilitates automating updating and processing of the contents of Electronic Healthcare Records: an extension to the CEN architecture”, Medical Informatics and the Internet in Medicine, Vol.28, No.1, pp.21-41, 2003, Cambridge University Press – Taylor & Francis Publications
  128. Lambrinoudakis C., Gritzalis S., Dridi F., Pernul G., “Security Requirements for e-Government Services: A methodological approach for developing a common PKI based security policy”, Computer Communications, Vol.26, No.16, pp.1873-1883, 2003, Elsevier
  129. Katsikas S., Gritzalis S., “A Best Practice Guide for Secure Electronic Commerce”, Upgrade online journal, Vol.3, No.6, 2002, CEPIS
  130. Spinellis D., Moulinos K., Iliadis J., Gritzalis D., Gritzalis S., Katsikas S., “Deploying a Secure Cyberbazaar by adding Trust on Commercial Transactions”, eJETA The eJournal for Electronic Commerce Tools and Applications, 1, No.2, 2002, eJETA.org
  131. Lekkas D., Gritzalis S., Katsikas S., “Deploying Quality Management in Trusted Third Parties within a Medical Environment”, Health Informatics, Vol.8, No.1, pp.4-14, 2002, SAGE Publications
  132. Lekkas D., Gritzalis S., Katsikas S., “Quality Assured Trusted Third Parties for deploying secure Internet-based healthcare applications”, International Journal of Medical Informatics, Vol.65, No.2, pp.79-96, 2002, Elsevier
  133. Nikitakos N., Gritzalis S., “Risk Management for New Information Technology Insertion in a Shipping Company”, Operational Research: An International Journal, Vol.1, No.1, pp.1-10, 2001, Hellenic Operational Research Society
  134. Gritzalis S., Gritzalis D., “A Digital Seal solution for deploying Trust on Commercial Transactions”, Information Management and Computer Security,9, No.2, pp.71-79, 2001, MCB University Press
  135. Gritzalis S., Gritzalis D., Moulinos K., Iliadis J., “An integrated Architecture for deploying a Virtual Private Medical Network over the Web”, Medical Informatics and the Internet in Medicine, Vol.26, No.1, pp.49-72, 2001, Cambridge University Press – Taylor & Francis Publications
  136. Gritzalis S., Iliadis J., Oikonomopoulos S., “Distributed Component Software Security Issues on Deploying a Secure Electronic Marketplace”, Information Management and Computer Security,8, No.1, pp.5-13, 2000, MCB University Press
  137. Lambrinoudakis C., Gritzalis S., “Managing Medical and Insurance Information through a Smart Card based Information System”, Journal of Medical Systems, Vol.24, No.4, pp.213-234, 2000, Kluwer Academic Publishers
  138. Gritzalis S., Katsikas S., Lekkas D., Moulinos K., Polydorou E., “Securing the electronic market: The KEYSTONE Public Key Infrastructure Architecture”, Computers and Security, Vol.19, No.8, pp.731-746, 2000, Elsevier
  139. Spinellis D., Kokolakis S., Gritzalis S., “Security requirements, risks, and recommendations for small enterprise and home-office environments”, Information Management and Computer Security, Vol.7, No.3, pp.121-128, 1999, MCB University Press
  140. Gritzalis S., Iliadis J., Gritzalis D., Spinellis D., Katsikas S., “Developing Secure Web-based Medical Applications”, Medical Informatics and the Internet in Medicine, Vol.24, No.1, pp.75-90, 1999, Cambridge University Press – Taylor & Francis Publications
  141. Spinellis D., Gritzalis S., Iliadis J., Gritzalis D., Katsikas S., “Trusted Third Party services for deploying secure telemedical applications over the Web”, Computers and Security, Vol.18, No.7, pp.627-639, 1999, Elsevier
  142. Gritzalis S., Spinellis D., Georgiadis P., “Security Protocols over open networks and distributed systems: Formal Methods for their Analysis, Design, and Verification”, Computer Communications, Vol.22, No.8, pp.697-709, 1999, Elsevier
  143. Gritzalis S., Aggelis G., Spinellis D., “Architectures for Secure Portable Executable Content”, Internet Research, Vol.9, No.1, pp.16-24, 1999, MCB University Press
  144. Gritzalis S., Spinellis D., “The Cascade Vulnerability problem: The Detection problem and a Simulated Annealing approach for its Correction problem”, Microprocessors and Microsystems, Vol.21, No.10, pp.621-627, 1998, Elsevier
  145. Gritzalis S., Aggelis G., “Security issues surrounding programming languages for mobile code: Java vs. Safe-Tcl”, ACM Operating Systems Review, Vol.32, No.2, pp.16-32, 1998, ACM Press
  146. Gritzalis D., Katsikas S., Gritzalis S., “A Zero-Knowledge Probabilistic Login Protocol”, Computers and Security, Vol.11, No.8, pp.733-745, 1992, Elsevier

II. CONFERENCES

  1. Routzouni A., Gritzalis S., Vasilakis N.-D., Pouloudi N., Public sector innovation through design thinking: Applying a participatory policy design practice to support the formulation of a national digital transformation strategy”, Proceedings of the ICEGOV 2021 14th International Conference on Theory and Practice of Electronic Governance, Loukis, E., Macadar, M. A., Meyerhoff, N. M. (Eds.), October 2021, Athens, Greece, ACM Press
  2. Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., “Self Adaptive Privacy in Cloud Computing Environments: Identifying the major socio-technical concepts”, Proceedings of the CyberICPS 2020 6th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, F. Cuppens (Ed.), pp.117-132, September 2020, London, UK, Springer LNCS
  3. Skarkala M.-E., Maragkoudakis E., Gritzalis S., Mitrou L., “PP-TAN: a Privacy Preserving Multi-party Tree Augmented Naive Bayes Classifier”, Proceedings of the SEEDA CECNSM 2020 5th South East Europe Design, Automation, Computer Engineering, Computer Networks and Social Media Conference, September 2020, Corfu, Greece, IEEE CPS Conference Publishing Services
  4. Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., “Measuring users’ socio-contextual attributes for Self-Adaptive Privacy within Cloud-Computing Environments”, Proceedings of the TRUSTBUS 2020 16th International Conference on Trust, Privacy and Security in Digital Business, E. Weippl (Ed.), September 2020, Regensburg, Germany, Springer LNCS
  5. Sideri M., Gritzalis S., “Are We Really Informed on the Rights GDPR Guarantees?“, Proceedings of the HAISA 2020 International Symposium on Human Aspects of Information Security & Assurance, N. Clarke, S. Furnell (Eds.), July 2020, Springer IFIP Advances in Information and Communication Technology series
  6. Simou S., Kalloniatis C., Gritzalis S., Katos V., “A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-enabled Cloud Services“, Proceedings of the 8thInternational Conference one-Democracy 2019, S. Katsikas, V. Zorkadis (Eds.), pp.161-177, December 2019, Athens, Greece, Springer Communications in Computer and Information Science
  7. Sideri M., Fontaras A., Gritzalis S., “What Do We Know about our Rights to Data Protection? A Greek Case Study“, Proceedings of the 8thInternational Conference one-Democracy 2019, S. Katsikas, V. Zorkadis (Eds.), pp.18-33, December 2019, Athens, Greece, Springer Communications in Computer and Information Science
  8. Routzouni A., Deligiannis A., Gritzalis S., “A Generalized co-evaluation Model of Public Policies”, Proceedings of the MCIS 2019 13th Mediterranean Conference on Information Systems, September 2019, Naples, Italy, Springer Lecture Notes in Information Systems and Organisation
  9. Rizomiliotis P., Gritzalis S., “Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with constant number of Roundtrips“, Proceedings of the ACM CCSW 2019 11th ACM Cloud Computing Security Workshop, C. Papamanthou, R. Sion (Eds.), pp.141-152, November 2019, London, UK, ACM Press
  10. Routzouni A., Deligiannis A., Peristeras V., Gritzalis S., ” An intercountry survey of participatory practices used for Open Government Partnership National Action Plan development”, Proceedings of the EGOV-CeDEM-ePart, pp.82-93, September 2019, San Benedetto Del Tronto, Italy, Springer LNCS
  11. Polydropoulou A., Kalloniatis C., Kavroudakis D., Gritzalis S., “Secure and Privacy-Aware Intelligent Transport Systems and their Role on Smart Cities Development”, Proceedings of the Transportation Research Board TRB’s 98th Meeting, January 2019, Washington, USA, TRB
  12. Routzouni A., Gritzalis S., “The Civil Society as an Innovation Partner in public policy making: Co-creating the Greek National Action Plan on Open Government”, Proceedings of the MCIS 2018 12th Mediterranean Conference on Information Systems, P. Kourouthanassis et al. (Eds.), September 2018, Corfu, Greece, AIS
  13. Pattakou A., Mavroidi A., Diamantopoulou V., Kalloniatis C., Gritzalis S., “Towards the Design of Usable Privacy by Design Methodologies“, Proceedings of the ESPRE 2018 5th International Workshop on Evolving Security and Privacy Requirements Engineering, S. Faily et al. (Eds.), August 2018, Banff, Canada, IEEE CPS Conference Publishing Services
  14. Simou S., Troumbis I., Kalloniatis C., Kavroudakis D., Gritzalis S., “A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness”, Proceedings of the TRUSTBUS 2018 14th International Conference on Trust, Privacy and Security in Digital Business, S. Furnell (Ed.), pp.150-164, September 2018, Regensburg, Germany, Springer LNCS
  15. Diamantopoulou V., Androutsopoulou A., Gritzalis S., Charalabidis Y., “An Assessment of Privacy Preservation in Crowdsourcing Approaches: Towards GDPR Compliance”, Proceedings of the IEEE RCIS 12th International Conference on Research Challenges in Information Science, B. Le Grand (Ed.), pp.1-9, May 2018, Nande, France, IEEE CPS Conference Publishing Services
  16. Anagnostopoulos M., Kambourakis G., Gritzalis S., Yau D., “Never say Never: Authoritative TLD name server-powered DNS amplification”, Proceedings of the IEEE/IFIP NOMS 2018 Network Operations and Management Symposium, Y.-T. Kim, C. Marquezan, C.-W. Yi (Eds.), pp.1-9, April 2018, Taipei, Taiwan, IEEE CPS Conference Publishing Services
  17. Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., “I have learned that I must think twice before: An educational intervention for enhancing students’ privacy awareness in Facebook”, Proceedings of the 7thInternational Conference on e-Democracy, Katsikas, A. Sideridis (Eds.), pp.79-95, December 2017, Athens, Greece, Springer CCIS Communications in Computer and Information Science Vol.792
  18. Rizomiliotis P., Molla E., Gritzalis S., “REX: a Searchable Symmetric Encryption Scheme Supporting Range Queries”, Proceedings of the ACM CCSW 2017 9th ACM Cloud Computing Security Workshop,29-37, A. Stavrou, G. Karame (Eds.), November 2017, Dallas, Texas, USA, ACM Press
  19. Kalloniatis C., Kavroudakis D., Polydoropoulou A., Gritzalis S., “Designing Privacy-Aware Intelligent Transport Systems: A Roadmap for Identifying the Major Privacy Concepts”, Proceedings of the 2nd SMART-MED Euro-Mediterranean Conference on Smart, Inclusive and Resilient Small and Medium-sized Cities and Island Communities in the Mediterranean, Nikolaidis (Ed.), September 2017, Heraklion, Greece, Springer
  20. Chalaris E., Chalaris I., Gritzalis S., Sgouropoulou C., “Maturity Level of the Quality Assurance Evaluation Procedures in Higher Education: A qualitative research”, Proceedings of the PCI 2017 21st Pan-Hellenic Conference on InformaticsAnagnostopoulos et al. (Eds.), September 2017, Larisa, Greece, ACM Press
  21. Diamantopoulou V., Tsochou A., Loukis E., Gritzalis S., “Does the Development of Information Systems Resources Lead to the Development of Information Security Resources? An Empirical Investigation”, Proceedings of the AMCIS 2017 the 23rd Americas Conference on Information Systems, D. Strong, J. Gogan (Eds.), August 2017, Boston, USA, AIS
  22. Simou S., Kalloniatis C., Gritzalis S., “Modelling Cloud Forensic-Enabled Services”, Proceedings of the TRUSTBUS 2017 13th International Conference on Trust, Privacy and Security in Digital Business,147-163, S. Fischer-Huebner, C. Lambrinoudakis (Eds.), August 2017, Lyon, France, Springer LNCS
  23. Diamantopoulou V., Kalloniatis C., Gritzalis S., Mouratidis H., “Supporting Privacy by Design using Privacy Process Patterns”, Proceedings of the IFIP SEC 2017 32nd IFIP International Information Security Conference, 491-505, S. De Capitani di Vimercati, F. Martinelli, May 2017, Rome, Italy, Springer
  24. Diamantopoulou V., Argyropoulos N., Kalloniatis C., Gritzalis S., “Supporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns”, Proceedings of the IEEE RCIS 11th International Conference on Research Challenges in Information Science187-198, S. Assar, O. Pastor (Eds.), May 2017, Brighton, UK, IEEE CPS Conference Publishing Services
  25. Zagouras P., Kalloniatis C., Gritzalis S., “Managing User Experience: Usability and Security in a New Era Supremacy”, Proceedings of the HCII 2017 19th International Conference on Human-Computer Interaction, Tryfonas (Ed.), pp.174-188, July 2017, Vancouver, Canada, Springer LNCS
  26. Pattakou A., Kalloniatis C., Gritzalis S., “Security and Privacy Requirements Engineering Methods for Traditional and Cloud-Based Systems: A Review”, Proceedings of the CLOUD COMPUTING 2017 8thInternational Conference on Cloud Computing, GRIDs, and Virtualization,145-151, P. Dini (Ed.), February 2017, Athens, Greece, IARIA
  27. Sideri M., Filippopoulou A., Rouvalis G., Kalloniatis C., Gritzalis S., “Social media use for decision making process in educational settings: The Greek case for Leadership’s views and attitudes in Secondary and Tertiary Education”, Proceedings of the HICSS-50 2017 Hawaii International Conference on System Sciences,2875–2884, T. Bui, R. Sprague (Eds.), January 2017, Waikoloa, Hawaii, USA, IEEE CPS Conference Publishing Services
  28. Spiliotopoulou L., Damopoulos D., Charalabidis Y., Maragkoudakis E., Gritzalis S., “Europe in the shadow of financial crisis: Policy Making via Stance Classification”, Proceedings of the HICSS-50 2017 Hawaii International Conference on System Sciences,2835–2844, T. Bui, R. Sprague (Eds.), January 2017, Waikoloa, Hawaii, USA, IEEE CPS Conference Publishing Services
  29. Argyropoulos N., Shei S., Kalloniatis C., Mouratidis H., Delaney A., Fish A., Gritzalis S., “A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements”, Proceedings of the HICSS-50 2017 Hawaii International Conference on System Sciences,4827-4836, T. Bui, R. Sprague (Eds.), January 2017, Waikoloa, Hawaii, USA, IEEE CPS Conference Publishing Services
  30. Kitsiou A., Tzortzaki E., Sideri M., Gritzalis S., “Digital Privacy and Social Capital on Social Network Sites. Friends or Foes?”, Proceedings of the STAST 2016 6th International Workshop on Socio-Technical Aspects of Security and Trust, 3-16, Z. Benenson, C. Gates (Eds.), December 2016, Los Angeles, USA, ACM Press
  31. Tzortzaki E., Kitsiou A., Sideri M., Gritzalis S., “Self-disclosure, Privacy concerns and Social Capital benefits interaction in Facebook: A case study”, Proceedings of the PCI 2016 20th Pan-Hellenic Conference on Informatics, Verykios et al. (Eds.), November 2016, Patras, Greece, ACM Press
  32. Tsiatsikas Z., Geneiatakis D., Kambourakis G., Gritzalis S., “Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade”, Proceedings of the NSS 2016 10th International Conference on Network and System Security126-139, M. Yung et al. (Eds.), September 2016, Taipei, Taiwan, Springer LNCS
  33. Simou S., Kalloniatis C., Mouratidis H., Gritzalis S., “Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems”, Proceedings of the TRUSTBUS ‘16 13th International Conference on Trust, Privacy and Security in Digital Business,35-47, S. Katsikas, C. Lambrinoudakis (Eds.), September 2016, Porto, Portugal, Springer LNCS
  34. Pattakou A., Kalloniatis C., Gritzalis S., “Reasoning about security and privacy in cloud computing under a unified meta-model”, Proceedings of the HAISA 2016 10th International Symposium on Human Aspects of Information Security & Assurance,56-66, N. Clarke, S. Furnell (Eds.), July 2016, Frankfurt, Germany, HAISA
  35. Sideri M., Kitsiou A., Kalloniatis C., Gritzalis S., “Privacy and Facebook Universities students’ communities for confessions and secrets: The Greek case”, Proceedings of the 6th International Conference on e-Democracy, 77-94, S. Katsikas, A. Sideridis (Eds.), December 2015, Athens, Greece, Springer CCIS Communications in Computer and Information Science
  36. Giannakas F., Kambourakis G., Gritzalis S., “CyberAware: A Mobile Game-based app for Cybersecurity Education and Awareness”, Proceedings of the IMCL 2015 International Conference on Interactive Mobile Communication, Technologies and Learning, Auer (Ed.), pp.54-58, November 2015, Thessaloniki, Greece, IEEE CPS Conference Publishing Services
  37. Rizomiliotis P., Gritzalis S., “ORAM Oblivious RAM based forward privacy preserving Dynamic Searchable Symmetric Encryption Schemes”, Proceedings of the ACM CCSW 2015 7th ACM Cloud Computing Security Workshop,65-76, C. Nita-Rotaru, F. Kerschbaum (Eds.), October 2015, Denver, USA, ACM Press
  38. Simou S., Kalloniatis C., Mouratidis H., Gritzalis S., “A Meta-model for assisting a Cloud Forensics Process”, Proceedings of the CRiSIS 2015 10th International Conference on Risks and Security of Internet and Systems177-187, A. Gabillon (Ed.), July 2015, Mytilene, Greece, Springer LNCS
  39. Kavakli E., Bantimaroudis P., Kalloniatis C., Gritzalis S., Avgeri K., “Towards the Design of Trustworthy Websites for Cultural Organizations: A Visitor’s perspective”, Proceedings of the EMCIS 2015 12thMediterranean and Middle Eastern Conference on Information Systems1-11, V. Morabito (Ed.), June 2015, Athens, Greece, EMCIS
  40. Simou S., Kalloniatis C., Mouratidis H., Gritzalis S., “Towards the development of a Cloud Forensics Methodology: A Conceptual Model”, Proceedings of the WISSE 2015 5th International Workshop on Information Systems Security Engineering, Rosado (Ed.), pp.470-481, June 2015, Stockholm, Sweden, Springer LNCS
  41. Chalaris I., Chalaris E., Gritzalis S., “A holistic approach for quality assurance and advanced decision making for academic institutions using the balanced scorecard technique”, Proceedings of the PCI 2014 18th Pan-Hellenic Conference on Informatics1-6, E. Carayiannis, T. Varvarigou, M. Nikolaidou (Eds.), October 2014, Athens, Greece, ACM Press
  42. Diamantatos P., Gritzalis S., Kavallieratou E., “Writer Identification using Statistical and Model Based Approach”, Proceedings of the ICFHR 2014 14th International Conference on Frontiers in Handwriting Recognition, Llados, R. Manmatha, C. – L. Tan (Eds.), pp.589-594, September 2014, Crete, Greece, ICFHR
  43. Chalaris I., Chalaris E., Gritzalis S., “Process’ Standardization and change management in Higher Education: The case of TEI of Athens”, Proceedings of the IC-ININFO 4th International Conference on Integrated Information, September 2014, Madrid, Spain, AIP Publishing
  44. Chalaris E., Gritzalis S., Maragkoudakis E., Sgouropoulou C., Lykeridou A., “Examining students’ graduation issues using data mining techniques: The case of TEI of Athens”, Proceedings of the IC-ININFO 4th International Conference on Integrated Information, September 2014, Madrid, Spain, AIP Publishing
  45. Beckers K., Faßbender S., Gritzalis S., Heisel M., Kalloniatis C., Meis R., “Privacy-Aware Cloud Deployment Scenario Selection”, Proceedings of the TRUSTBUS ‘14 11th International Conference on Trust, Privacy and Security in Digital Business, Pernull, S. Katsikas (Eds.), pp.94-105, August 2014, Munich, Germany, Springer LNCS
  46. Simou S., Kalloniatis C., Kavakli E., Gritzalis S., “Cloud Forensics: Identifying the Major Issues and Challenges”, Proceedings of the CAiSE 2014 26th International Conference on Advanced Information Systems Engineering, Jarke, J. Mylopoulos, C. Quix (Eds.), pp.271-284, Thessaloniki, Greece, June 2014, Proceedings by Springer LNCS Lecture Notes in Computer Science
  47. Simou S., Kalloniatis C., Kavakli E., Gritzalis S., “Cloud Forensics Solutions: A Review”, Proceedings of the WISSE 2014 4th International Workshop on Information Systems Security Engineering, Mouratidis (Ed.), pp.299-309, June 2014, Thessaloniki, Greece, Springer LNCS
  48. Pavlidis M., Kavakli E., Bantimaroudis F., Mouratidis C., Kalloniatis C., Gritzalis S., “The role of trust for the development of cultural internet-based systems”, Proceedings of the EMCIS 2013 European, Mediterranean, and Middle Eastern Conference on Information Systems, Ghoneim, M. Kamal (Eds.), pp.429-435, October 2013, London, UK, EMCIS [Best Theoretical Paper Award]
  49. Belsis P., Gritzalis S., Lambrinoudakis C., Skourlas C., Tsoukalas V., Vassis D., “An agent based architecture benchmark”, Proceedings of the 3rd IC-ININFO International Conference on Integrated Information, D. Sakas et al. (Eds.), September 2013, Prague, Czech, Procedia, Elsevier
  50. Chalaris E., Gritzalis S., Maragkoudakis E., Sgouropoulou C., Tsolakidis A., “Improving quality of educational processes providing new knowledge using data mining techniques”, Proceedings of the 3rd IC-ININFO International Conference on Integrated Information, D. Sakas et al. (Eds.), pp.390-397, September 2013, Prague, Czech, Procedia, Elsevier
  51. Pavlidis M., Mouratidis C., Kalloniatis C., Islam S., Gritzalis S., “Trustworthy Selection of Cloud Providers based on Security and Privacy Requirements: Justifying Trust Assumptions”, Proceedings of the TRUSTBUS 2013 10th International Conference on Trust, Privacy and Security in Digital Business, Furnell, C. Lambrinoudakis (Eds.), pp.185-198, August 2013, Prague, Czech, Springer LNCS
  52. Manousakis V., Kalloniatis C., Kavakli E., Gritzalis S., “Privacy in the Cloud: Bridging the Gap between Design and Implementation”, Proceedings of the WISSE 2013 3rd International Workshop on Information Systems Security Engineering, Rosado, N. Lammari (Eds.), pp.455-465, June 2013, Valencia, Spain, Springer LNCS
  53. Kalloniatis C., Manousakis V., Mouratidis C., Gritzalis S., “Migrating into the Cloud: Identifying the Major Security and Privacy Concerns”, Proceedings of the I3E 2013 12th IFIP Conference on e-Business, e-Services, e-SocietyDouligeris, N. Polemi (Eds.), pp.73-87, April 2013, Piraeus, Greece, Springer
  54. Rizomiliotis P., Gritzalis S., “Revisiting Lightweight Authentication Protocols based on Hard Learning Problems”, Proceedings of the ACM WiSec 2013 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Gruteser, A.R. Sadeghi (Eds.), pp.125-130, April 2013, Budapest, Hungary, ACM Press
  55. Belsis P., Gritzalis S., Marinagi K., Skourlas C., Vassis D., “Secure Wireless Infrastructures and Mobile Learning for Deaf and Hard-of-Hearing Students”, Proceedings of the PCI 2012 16th Pan-Hellenic Conference on Informatics, Vergados D., Lambrinoudakis C. (Eds.), pp.369-374, October 2012, Piraeus, Greece, IEEE CPS Conference Publishing Services
  56. Skarkala M. E., Toivonen H., Moen P., Maragkoudakis E., Gritzalis S., Mitrou L., “Privacy Preservation by k-Anonymization of Weighted Social Networks”, Proceedings of the 2012 IEEE/ACM ASONAM International Conference on Advances in Social Networks Analysis and Mining, Yu, K. Carley et al. (eds.), pp.423-428, August 2012, Istanbul, Turkey, IEEE CPS
  57. Rizomiliotis P., Gritzalis S., “GHB#: a provably secure HB-like lightweight authentication protocol”, Proceedings of the ACNS 2012 10th International Conference on Applied Cryptography and Network Security,489-506, F. Bao, P. Samarati (Eds.), June 2012, Singapore, Springer LNCS
  58. Damopoulos , Kambourakis G., Gritzalis S.,Park S.-O., “Lifting the veil on mobile malware: A complete dynamic solution for iOS”, Proceedings of the ACSA 2012 International Symposium on Advances in Cryptography, Security and Applications for Future Computing, N. Zhang et al. (Eds.), June 2012, Vancouver, Canada, FTRA
  59. Kalloniatis C., Belsis P., Kavakli E., Gritzalis S., “Applying soft computing technologies for implementing privacy-aware systems”, Proceedings of the WISSE 2012 2ndInternational Workshop on Information Systems Security Engineering, 31-45, H. Mouratidis (Ed.), June 2012, Gdansk, Poland, Springer Lecture Notes in Business Information Processing LNBIP
  60. Damopoulos , Kambourakis G., Anagnostopoulos M., Gritzalis S.,Park J.-H., “User-privacy and modern smartphones: A siri(ous) dilemma”, Proceedings of the FTRA AIM 2012 International Conference on Advanced IT, Engineering and Management, Seungmin Rho, Naveen Chilamkurti, Whai-En Chen, Sang Oh Park (Eds.), Seoul, Korea, February 2012, FTRA
  61. Rizomiliotis P., Rekleitis E., Gritzalis S., “Designing secure RFID authentication protocols is (still) a non-trivial task”, Proceedings of the NSS 2011 5th International Conference on Network and Systems Security, 73-80, P. Samarati, S. Foresti, J. Hu (Eds.), Milan, Italy, September 2011, IEEE CPS Conference Publishing Services
  62. Skarkala M., Maragkoudakis E., Gritzalis S., Mitrou L., “Privacy preserving Tree Augmented Naive Bayesian multi – party implementation on horizontally partitioned databases”, Proceedings of the TRUSTBUS’11 8th International Conference on Trust, Privacy and Security of Digital Business,62-73, Toulouse, France, August 2011, Springer Lecture Notes in Computer Science LNCS
  63. Nunez D., Agudo I., Drogkaris P., Gritzalis S., “Identity Management Challenges for Intercloud Applications”, Proceedings of the STAVE 2011 1st International Workshop on Security and Trust for Applications in Virtualized Environments, in conjunction with STA 2011 8th FTRA international conference on Secure and Trust computing, data management, and Applications, Skianis et al. (Eds.), pp.198-204, June 2011, Loutraki, Greece, Springer CCIS Communications in Computer and Information Science Series
  64. Damopoulos D., Kambourakis G., Gritzalis S., “iSAM: An iPhone Stealth Airborne Malware”, Proceedings of the IFIP SEC 2011 26th IFIP International Information Security Conference, 17-28, J. Camenisch, S. Fischer-Huebner, Y. Murayama, June 2011, Lucerne, Switzerland, Springer [Nominated for Best Student Paper award] [IEEE COMSOC Best Readings Topics on Communications and Information Systems Security: Smartphone]
  65. Rekleitis E., Rizomiliotis P., Gritzalis S., “A Holistic Approach to RFID Security and Privacy”, Proceedings of the SecIoT 1st International Workshop on the Security of the Internet of Things, Zhou et al. (Eds.), November 2010, Tokyo, Japan
  66. Drogkaris P., Gritzalis S., “Attaching Multiple Personal Identifiers in X.509 Digital Certificates”, Proceedings of the EUROPKI 2010 7th European Workshop on Public Key Services, Applications and Infrastructures, Camenisch, C. Lambrinoudakis (Eds.), pp.171-177, September 2010, Athens, Greece, Springer Lecture Notes in Computer Science LNCS
  67. Drogkaris P., Gritzalis S., Lambrinoudakis C., “Transforming the Greek eGovernment Environment towards the eGov 2.0 Era”, Proceedings of the EGOVIS’10 International Conference on Electronic Government and the Information Systems Perspective, Wagner et al. (Eds.), pp.142-149, September 2010, Bilbao, Spain, Springer Lecture Notes in Computer Science LNCS
  68. Rekleitis E., Rizomiliotis P., Gritzalis S., “An Agent Based Back-end RFID Tag Management System”, Proceedings of the TrustBus’10 7th International Conference on Trust, Privacy and Security in Digital Business, Lopez, S. Katsikas (Eds.), pp.165-176, September 2010, Bilbao, Spain, Springer Lecture Notes in Computer Science LNCS
  69. Tsochou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Unifying ISO Security Standards Practices into a Single Security Framework”, Proceedings of the 12th Annual IFIP Workshop on Information Security Management, Clarke, S. Furnell (Eds.), pp.188-203, South Africa, May 2010, Emerald
  70. Kambourakis G., Konstantinou E., Gritzalis S., “Revisiting WiMAX Multicast Broadcast Services (MBS) Security”, Proceedings of the FTRG ACSA 2009 International Workshop on Advances in Cryptography, Security and Applications for Future Computing, Mu, J.-H. Park (Eds.), Jeju, Korea, December 2009, IEEE CPS Conference Publishing Services [Nominated for Best Paper award]
  71. Geneiatakis D., Lambrinoudakis C., Gritzalis S., “A Hierarchical Model for Cross-Domain Communication of Health-Care Units”, Proceedings of the NSS 2009 3rd International Conference on Network and System Security, Xiang, J. Lopez, H. Wang (Eds.), pp.123-129, October 2009, Gold Coast, Australia, IEEE CPS Conference Publishing Services
  72. Drogkaris P., Lambrinoudakis C., Gritzalis S., “Introducing Federated Identities to One-Stop-Shop e-Government Environments: The Greek Case”, Proceedings of the eChallenges 2009 Conference, Cunningham (Ed.), October 2009, Istanbul, Turkey, IEEE CPS Conference Publishing Services
  73. Kalloniatis C., Kavakli E., Gritzalis S., “Methods for Designing Privacy Aware Information Systems: A review”, Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics, 185-194, V. Chrissikopoulos, N. Alexandris, C. Douligeris, S. Sioutas (Eds.), September 2009, Corfu, Greece, IEEE CPS Conference Publishing Services
  74. Klaoudatou E., Konstantinou E., Kambourakis G., Gritzalis S., “A Cluster-based Framework for the Security of Medical Sensor Environments”, Proceedings of the TrustBus’09 6th International Conference on Trust, Privacy and Security in Digital Business,52-62, S. Fischer-Huebner, C. Lambrinoudakis (Eds.), September 2009, Linz, Austria, Springer Lecture Notes in Computer Science LNCS
  75. Drogkaris P., Gritzalis S., Lambrinoudakis C., “Enabling Secure Data Management in eGovernment environments: The Greek case”, Proceedings of the EGOV 2009 8th International Conference on Electronic Government, Wimmer et al. (Eds.), pp.138-144, September 2009, Linz, Austria, Trauner Druck
  76. Tsochou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Information Systems Security Management: A review and a classification of the ISO standards”, Proceedings of the 3rd Conference on Electronic Democracy – Next Generation Society: Technological and Legal Issues,220-235, A. Sideridis C. Pratikakis (Eds.), September 2009, Athens, Greece, Springer Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering
  77. Tsochou A., Rizomiliotis P., Lambrinoudakis C., Gritzalis S., “Security and Privacy Issues in Bipolar Disorder Research”, Proceedings of the ICICTH 7th International Conference on Information and Communication Technologies in Health, July 2009, Samos, Greece, INEAG
  78. Vassis D., Belsis P., Skourlas C., Gritzalis S., “End to end secure communication in ad-hoc assistive medical environments using secure paths”, Proceedings of the 1st Workshop on Privacy and Security in Pervasive e-Health and Assistive Environments, in conjunction with PETRA 2009 2nd International Conference on Pervasive Technologies related to Assistive Environments, Pantziou (Ed.), June 2009, Corfu, Greece, ACM Press
  79. Aivaloglou E., Gritzalis S., “Trust-based data disclosure in Sensor Networks”, Proceedings of the IEEE ICC 2009 International Conference on Communications – Communication and Information Systems Security Symposium, Boutaba, S. Gritzalis, J. Hu, P. Mueller (Eds.), pp.1-6, June 2009, Dresden, Germany, IEEE CPS Conference Publishing Services
  80. Kambourakis G., Kolias C., Gritzalis S., Park J. H., “Signaling-oriented DoS Attacks in UMTS Networks”, Proceedings of the ISA 2009 3rd International Conference on Information Security and Assurance, J. Zhan, et al. (Eds.), pp.280-289, Seoul, Korea, June 2009, Springer Lecture Notes in Computer Science LNCS
  81. Belsis P., Vassis D., Gritzalis S., Skourlas C., “W-EHR: A wireless distributed framework for secure dissemination of electronic healthcare records”, Proceedings of the IWSSIP 2009 16th International Conference on Systems, Signals and Image Processing, June 2009, Chalkida, Greece, IEEE CPS Conference Publishing Services
  82. Yiannakopoulos A., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., Katsikas S., “Modeling Privacy Insurance contracts and their utilization in Risk Management for ICT firms”, Proceedings of the ESORICS 2008 13th European Symposium on Research in Computer Security, Jajodia, J. Lopez (Eds.), pp.207-222, September 2008, Malaga, Spain, Springer Lecture Notes in Computer Science LNCS 5283
  83. Kambourakis G., Konstantinou E., Gritzalis S., “Binary Tree Based Public-Key Management for Mobile Ad Hoc Networks”, Proceedings of the ISWCS’08 5th IEEE International Symposium on Wireless Communications Systems,687-692, K. Gudmundsson, B. S. Yeo (Eds.), October 2008, Reykjavik, Iceland, IEEE CPS Conference Publishing Services
  84. Magkos E., Maragkoudakis E., Chrissikopoulos V., Gritzalis S., “Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections”, Proceedings of the PSD 2008 Privacy in Statistical Databases,284-297, J. Domingo-Ferrer (Ed.), September 2008, Istanbul, Turkey, Springer Lecture Notes in Computer Science LNCS
  85. Drogkaris P., Geneiatakis P., Gritzalis S., Lambrinoudakis C., Mitrou L., “Towards an Enhanced Authentication Framework for eGovernment Services: The Greek case”, Proceedings of the EGOV’08 7th International Conference on Electronic Government, Ferro, J. Scholl, M. Wimmer et al. (Eds.), pp.189-196, Turin, Italy, September 2008, Trauner Verlag
  86. Tsakountakis A., Kambourakis G., Gritzalis S., “A new Accounting Mechanism for Modern and Future AAA Services”, Proceedings of the IFIP SEC 2008 23rd International Conference on Information Security,693-697, S. Jajodia, P. Samarati (Eds.), Milan, Italy, September 2008, Springer
  87. Karopoulos G., Kambourakis G., Gritzalis S., “Caller Identity Privacy in SIP heterogeneous realms: A practical solution”, Proceedings of the MediaWin 2008 3rd Workshop on Multimedia Applications over Wireless Networks, Zanella et al. (Eds.) (in conjunction with ISCC 2008 13th IEEE Symposium on Computers and Communications), pp.37-43, Marrakech, Morocco, July 2008, IEEE CPS Conference Publishing Services (invited paper)
  88. Klaoudatou E., Konstantinou E., Kambourakis G., Gritzalis S., “Clustering Oriented Architectures in Medical Sensor Environments”, Proceedings of the ARES 2008 3rd International Conference on Availability, Reliability and Security – WSPE International Workshop on Security and Privacy in e-Health, Muck (Ed.), pp.929-934, Barcelona, Spain, March 2008, IEEE CPS Conference Publishing Services
  89. Karopoulos G., Kambourakis G., Gritzalis S., “Privacy Protection in Context Transfer Protocol”, Proceedings of the PDP 2008 16th Euromicro International Conference on Parallel, Distributed and Network based Processing – Special Session on Security in Networked and Distributed Systems, El Baz, F. Spies (Eds.), pp.590-596, Toulouse, France, February 2008, IEEE CPS Conference Publishing Services
  90. Belsis P., Gritzalis S., Skourlas C., Tsoukalas V., “Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments”, Proceedings of the 20th Annual Asian Computing Science Conference, Cervesato (Eds.), pp.261-267, December 2007, Doha, Qatar, Springer Lecture Notes in Computer Science LNCS 4846
  91. Aivaloglou E., Mitseva A., Skianis C., Gritzalis S., Prasad N., Waller A., “Scalable Security Management for Wireless Sensor Networks for Medical Scenarios”, Proceedings of the WPMC 2007 10th International Symposium on Wireless Personal Multimedia Communications, Desai et al. (Eds.), Jaipur, India, December 2007 (invited paper)
  92. Tsakountakis A., Kambourakis G., Gritzalis S., “On RSN-oriented Wireless Intrusion Detection”, Proceedings of the OTM IS’07 2nd International Conference on Information Security, Freire, J.H. Park et al. (Eds.), pp.1601-1615, December 2007, Algarve, Portugal, Springer Lecture Notes in Computer Science LNCS 4804
  93. Karyda M., Gritzalis S., Park J. H., “A Critical Approach to Privacy Research in Ubiquitous Environments: Issues and Underlying Assumptions”, Proceedings of the TRUST’07 2nd International Workshop on Trustworthiness, Reliability, and Services in Ubiquitous and Sensor Networks, H. Park et al (Eds.), pp.12-21, December 2007, Taipei, Taiwan, Springer Lecture Notes in Computer Science LNCS 4809
  94. Karopoulos G., Kambourakis G., Gritzalis S., “Two privacy-enhanced context transfer schemes”, Proceedings of the ACM Q2SWinet 2007 3rd ACM International Workshop on Quality of Service and Security for Wireless and Mobile Networks, Bononi (Ed.), pp.172-175 (in conjunction with the 10th ACM/IEEE International Symposium on Modelling, Analysis and Simulation of Wireless and Mobile Systems), October 2007, Chania, Greece, ACM Press
  95. Kambourakis G., Moschos A., Geneiatakis D., Gritzalis S., “Detecting DNS Amplifications Attacks”, Proceedings of the CRITIS’07 2nd IEEE/IFIP International Workshop on Critical Information Infrastructures Security, Lopez, B. Hammerli (Eds.), pp.185-196, October 2007, Malaga, Spain, Springer Lecture Notes in Computer Science LNCS 5141
  96. Belsis P., Gritzalis S., Skourlas C., Tsoukalas V., “Designing and implementation of distributed access control infrastructure for dynamic coalitions”, Proceedings of the TrustBus’07 4th International Conference on Trust, Privacy and Security in Digital Business,125-134, G. Pernul, C. Lambrinoudakis, M. Tjoa (Eds.), Regensburg, Germany, September 2007, Springer Lecture Notes in Computer Science LNCS 4657
  97. Karopoulos G., Kambourakis G., Gritzalis S., “Privacy preserving Context Transfer in All-IP Networks”, Proceedings of the MMM-ACNS-2007 4th International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security,390-395, I. Kotenko et al. (Eds.), St. Petersburg, Russia, September 2007, Springer Communications in Computer and Information Science Series CCIS 1
  98. Kambourakis G., Gritzalis S., “On Device Authentication in Wireless Networks: Present issues and future challenges”, Proceedings of the TrustBus’07 4th International Conference on Trust, Privacy and Security in Digital Business,135-144, G. Pernul, C. Lambrinoudakis, M. Tjoa (Eds.), Regensburg, Germany, September 2007, Springer Lecture Notes in Computer Science LNCS 4657
  99. Kambourakis G., Moschos A., Geneiatakis D., Gritzalis S., “A Fair Solution to DNS Amplification Attacks”, Proceedings of the WDFIA’07 2nd International Workshop on Digital Forensics and Incident Analysis, Preneel, S. Gritzalis, S. Kokolakis, T. Tryfonas (Eds.), pp.38-47, August 2007, Samos, Greece, IEEE CPS Conference Publishing Services
  100. Tsakountakis A., Kambourakis G., Gritzalis S., “Towards Effective Wireless Intrusion Detection in IEEE 802.11i”, Proceedings of the 3rd Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU’07 (in conjunction with IEEE International Conference on Pervasive Services ICPS 2007), 37-42, P. Georgiadis, et al. (Eds.), July 2007, Istanbul, Turkey, IEEE CPS Conference Publishing Services
  101. Aivaloglou E., Mitseva A., Skianis C., Waller A., Prasad N. R., Gritzalis S., “Context-Aware Security Management for Wireless Sensor Networks”, CAPS 2007 3rd Workshop on Context Awareness for Proactive Systems, June 2007, Guildford, United Kingdom
  102. Kalloniatis C., Kavakli E., Gritzalis S., “Using Privacy Process Patterns for incorporating Privacy requirements into the System Design Process”, Proceedings of the SecSE 2007 Secure Software Engineering Workshop (in conjunction with ARES 2007 The International Conference on Availability, Reliability, and Security), 1009-1016, T. Skramstad et al. (Eds.), Vienna, Austria, April 2007, IEEE CPS Conference Publishing Services
  103. Kambourakis G., Andreadis A., Paganos C., Rouskas A., Gritzalis S., “Bluetooth Security Mechanisms for Handheld Devices: A Performance Evaluation Study”, Proceedings of the EW 2007 13th European Wireless Conference, Terre (Ed.), Paris, France, April 2007, VDE
  104. Kambourakis G., Klaoudatou E., Gritzalis S., “Securing Medical Sensor Environments: The Codeblue framework case”, Proceedings of the FARES 2007 1st International Symposium on Frontiers in Availability, Reliability and Security (in conjunction with ARES 2007 The 2nd International Conference on Availability, Reliability, and Security, 637-643, R. Wagner et al. (Eds.), Vienna, Austria, April 2007, IEEE CPS Conference Publishing Services
  105. Antoniou G., Gritzalis S., “Uncontrollable Privacy: The right that every attacker desires”, Proceedings of the 4th Australian Information Security Management Conference, Hutchinson, C. Valli (Eds.), Mount Lawley, Australia, December 2006, published by Australian Computer Society
  106. Antoniou G., Gritzalis S., “Network Forensics and Privacy Enhancing Technologies “living” together in harmony”, Proceedings of the 4th Australian Information Security Management Conference, Hutchinson, C. Valli (Eds.), Mount Lawley, Australia, December 2006, published by Australian Computer Society
  107. Aivaloglou E., Gritzalis S., Skianis C., “Requirements and Challenges in the Design of Privacy-aware Sensor Networks”, Proceedings of the IEEE GLOBECOM 2006 49th IEEE Globecom Conference – World Class Solutions: Networking the Globe Technical Symposium, 25, No.1, pp.1217-1221, P. Lorenz et al. (Eds.), San Francisco, USA, November 2006, IEEE CPS Conference Publishing Services
  108. Antoniou G., Gritzalis S., “RPINA: Network Forensics protocol embedding Privacy Enhancing Technologies”, Proceedings of the ISCIT 2006 International Symposium on Communications and Information Technologies 2006, A. Taguchi et al. (Eds.), Bangkok, Thailand, October 2006, IEEE CPS Conference Publishing Services
  109. Aivaloglou E., Gritzalis S., Skianis C., “Trust Establishment in Ad Hoc and Sensor Networks”, Proceedings of the CRITIS’06 1st International Workshop on Critical Information Infrastructure Security,179-194, J. Lopez (Ed.), September 2006, Samos, Greece, Springer Lecture Notes in Computer Science LNCS 4347
  110. Balopoulos T., Gymnopoulos L., Karyda M., Kokolakis S., Gritzalis S., Katsikas S., “A Framework for Exploiting Security Expertise in Application Development”, Proceedings of the DEXA’06 TrustBus’06 3rd International Conference on Trust, Privacy, and Security in the Digital Business, Furnell, C. Lambrinoudakis, S. Fischer-Huebner (Eds.), pp.62-70, September 2006, Krakow, Poland, Springer Lecture Notes in Computer Science LNCS 4083
  111. Belsis P., Gritzalis S., Katsikas S., “Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation”, Proceedings of the STM 2006 2nd Workshop on Security and Trust Management (in conjunction with ESORICS 2006),75-81, P. Samarati, S. Etalle (Eds.), Hamburg, Germany, September 2006, ENTCS
  112. Geneiatakis D., Dagiouklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., “Novel Protecting Mechanism for SIP-based Infrastructure against Malformed Message Attacks: Performance Evaluation Study”, Proceedings of the CSNDSP’06 5th International Symposium on Communication Systems, Networks and Digital Signal Processing, Logothetis et al. (Eds.), July 2006, Patras, Greece
  113. Gymnopoulos L., Karyda M., Balopoulos T., Dritsas S., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Developing a Security Patterns Repository for Secure Applications Design”, Proceedings of the ECIW 2006 5th European Conference on Information Warfare and Security, Remenyi (Eds.), pp.51-60, June 2006, Helsinki, Finland, published by ACL Academic Conferences Limited
  114. Frantzeskou G., Stamatatos E., Gritzalis S., Katsikas S., “Source Code Author Identification based on N-gram Author Profiles”, Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Maglogiannis, K. Karpouzis, M. Bramer (Eds.), pp.508-515, June 2006, Athens, Greece, Springer, Vol.204
  115. Kambourakis G., Geneiatakis D., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “Towards Effective SIP load balancing: the SNOCER approach”, Proceedings of the 3rd Annual VoIP Security Workshop, Sisalem et al. (Eds.), June 2006, Berlin, Germany, ACM Press
  116. Belsis P., Gritzalis S., Katsikas S., “Optimized Multi-domain Secure Interoperation using Soft Constraints”, Proceedings of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI 2006), Maglogiannis, K. Karpouzis, M. Bramer (Eds.), pp.78-85, June 2006, Athens, Greece, Springer, Vol.204
  117. Frantzeskou G., Stamatatos E., Gritzalis S., Katsikas S., “Effective Identification of Source Code Authors Using Byte-Level Information”, Proceedings of the 28th International Conference on Software Engineering ICSE 2006 – Emerging Results Track, Cheng, B. Shen (Eds.), pp.893-896, May 2006, Shanghai, China, ACM Press
  118. Belsis P., Fragos K., Gritzalis S., Skourlas C., “SF-HME system: A Hierarchical Mixtures-of-Experts classification system for Spam Filtering”, Proceedings of the 21st ACM Symposium on Applied Computing ACM SAC 2006 – Computer Security Track, Bella, P. Ryan (Eds.), pp.354-360, April 2006, Dijon, France, ACM Press
  119. Karyda M., Balopoulos T., Dritsas S., Gymnopoulos L., Kokolakis S., Lambrinoudakis C., Gritzalis S., “An Ontology for Secure e-Government applications”, Proceedings of the DeSeGov’06 Workshop on Dependability and Security in eGovernment,1033-1037 (in conjunction with ARES 2006 1st International Conference on Availability, Reliability, and Security), A. Tjoa, E. Schweighofer (Eds.), April 2006, Vienna, Austria, IEEE CPS Conference Publishing Services
  120. Belsis P., Gritzalis S., Pantziou G., Skourlas C., “Knowledge Sharing and Reusability within the Public Sector: Security Challenges and potential Solutions”, Proceedings of the 2nd Conference on Electronic Democracy – Challenges of the Digital Era, Sideridis (Ed.), pp. 389-399, March 2006, Athens, Greece
  121. Papapanagiotou K., Marias Y., Georgiadis P., Gritzalis S., “Performance Evaluation of a distributed OCSP protocol over MANETs”, Proceedings of the IEEE CCNC’2006 Consumer Communications and Networking Conference – Special Session on Ad Hoc and Sensor Network Security, 1-5, January 2006, Las Vegas, USA, Proceedings by IEEE CPS Conference Publishing Services (invited paper)
  122. Kalloniatis C., Kavakli E., Gritzalis S., “Dealing with Privacy Issues during the System Design Process”, Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT’05),546-551, December 2005, Athens, Greece, IEEE CPS Conference Publishing Services (invited paper)
  123. Belsis P., Gritzalis S., Katsikas S., “A Scalable Security Architecture enabling Coalition Formation between Autonomous Domains”, Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT’05),560-565, December 2005, Athens, Greece, IEEE CPS Conference Publishing Services (invited paper)
  124. Katsikas S., Yiannakopoulos A., Gritzalis S., Lambrinoudakis C., Hatzopoulos P., “How much should we pay for security?”, Proceedings of the IFIP WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, Dowland, S. Furnell, B. Thuraisingham, X. C. Wang (Eds.), pp.59-70, December 2005, Fairfax, USA, Vol.193, Springer (invited paper)
  125. Kambourakis G., Geneiatakis D., Gritzalis S., Dagiouklas A., Lambrinoudakis C., “Security and Privacy issues towards ENUM protocol”, Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT’05),478-483, December 2005, Athens, Greece, IEEE CPS Conference Publishing Services (invited paper)
  126. Balopoulos T. Gritzalis S., Katsikas S., “Specifying e-Voting Protocols in Typed MSR”, Proceedings of the ACM CCS 2005 Computer and Communications Security Conference – Workshop on Privacy in the Electronic Society,35-39, S. De Capitani di Vimercati, R. Dingledine (Eds.) Alexandria, USA, November 2005, ACM Press
  127. Belsis M., Simitsis A., Gritzalis S., “Workflow Based Security Incident Management”, Proceedings of the PCI 2005 10th Pan-Hellenic Conference of Informatics, Houstis (Ed.), pp.684-694, November 2005, Volos, Greece, Springer Lecture Notes in Computer Science LNCS Vol.3746
  128. Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Employing Ontologies for the Development of Security Critical Applications: The Secure e-Poll Paradigm”, Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernment, Funabashi M., Grzech A. (Eds.), pp.187-201, October 2005, Poznan, Poland, Springer
  129. Frantzeskou G., Stamatatos E., Gritzalis S., “Supporting the Digital Crime Investigation Process: Effective Discrimination of Source Code Authors based on Byte-level Information”, Proceedings of the ICETE 2005 International Conference on eBusiness and Telecommunication Networks – Security and Reliability in Information Systems and Networks Track, pp.283-290, October 2005, Reading, UK, Springer
  130. Trochoutsos F., Gritzalis S., Katsikas S., Charamis G., “Information Systems Security Effective Guidelines for “Participants”“, Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, September 2005, Athens, Greece, LEA Publisher
  131. Kavakli E., Kalloniatis C., Gritzalis S., “Matching user Privacy Requirements to Implementation Techniques”, Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, September 2005, Athens, Greece, LEA Publisher
  132. Gritzalis S., Belsis P. Karyda M., Chalaris M., Skourlas C., Chalaris I., “Designing the Provision of PKI services for eGovernment”, Proceedings of the HERCMA 2005 7th Hellenic European Research on Computer Mathematics and its Applications Conference, September 2005, Athens, Greece, LEA Publisher
  133. Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “SIP Message Tampering: The SQL code INJECTION attack”, Proceedings of the 13th IEEE International Conference on Software Telecommunications and Computer Networks SoftCOM 2005, Rozic et al. (Eds.), pp.176-181, September 2005, Croatia, IEEE CPS Conference Publishing Services
  134. Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “A Framework for Detecting Malformed Messages in SIP Networks”, Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks LANMAN 2005, Ramakrishnan K. (Ed.), September 2005, Chania, Greece, IEEE CPS Conference Publishing Services
  135. Doukas N., Klaoudatou E., Kambourakis G., Rouskas A., Gritzalis S., “Evaluation of Digital Certificates Acquisition in large-scale 802.11-3GPP hybrid environments”, Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks LANMAN 2005, Ramakrishnan K. (Ed.), pp.176-181, September 2005, Chania, Greece, IEEE CPS Conference Publishing Services
  136. Belsis P., Gritzalis S., Malatras A., Skourlas C., Chalaris I., “Sec-Shield: Security Preserved Distributed Knowledge Management between Autonomous Domains” Proceedings of the DEXA’05 TrustBus’05 2nd International Conference on Trust, Privacy, and Security in the Digital Business, Lopez, G. Pernul, (Eds.), pp.10-19, August 2005, Copenhagen, Denmark, Springer Lecture Notes in Computer Science LNCS 3592
  137. Kalloniatis C., Kavakli E., Gritzalis S., “PriS Methodology: Incorporating Privacy Requirements into the System Design Process”, Proceedings of the 13th IEEE International Requirements Engineering Conference – Symposium on Requirements Engineering for Information Security (SREIS 2005), Mylopoulos, G. Spafford (Eds.) Paris, France, August 2005, IEEE CPS Conference Publishing Services
  138. Belsis P., Gritzalis S., “Security Control Schemes for Pervasive Medical Environments”, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005 – Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU’05, Georgiadis, S. Gritzalis, Y. Marias (Eds.), pp.35-41, July 2005, Santorini, Greece, Diaylos Press
  139. Malatras A., Pavlou G., Belsis P., Gritzalis S., Skourlas C., Chalaris I., “Secure and Distributed Knowledge Management in Pervasive Environments”, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005, Kalogeraki (Ed.), pp.79-87, July 2005, Santorini, Greece, IEEE CPS Conference Publishing Services
  140. Belsis P., Gritzalis S., Skourlas C., “Security Enhanced Distributed Knowledge Management Architecture”, Proceedings of the I-KNOW’05 5th International Conference on Knowledge Management, Tochtermann, H. Maurer (Eds.), pp.327-334, July 2005, Graz, Austria, Springer
  141. Gymnopoulos L., Gritzalis S., “Introducing Ontology-based Security Policy Management in the GRID”, Proceedings of the ECIW 2005 4th European Conference on Information Warfare and Security, Jone, B. Hutchinson (Eds.), pp.107-116, July 2005, Glamorgan, UK, published by University of Glamorgan
  142. Gymnopoulos L., Tsoumas V., Soupionis J., Gritzalis S., “Enhancing Security Policy Negotiation in the GRID”, Proceedings of the INC’2005 5th International Network Conference, Furnell, S. K. Katsikas (Eds.), pp.175-182, July 2005, Samos, Greece, Ziti Pubs.
  143. Geneiatakis D., Kambourakis G., Dagiouklas A., Lambrinoudakis C., Gritzalis S., “Session Initiation Protocol Security Mechanisms: A state-of-the-art review”, Proceedings of the INC’2005 5th International Network Conference, Furnell, S. K. Katsikas (Eds.), pp.147-156, July 2005, Samos, Greece, Ziti Pubs.
  144. Balopoulos T., Dritsas S., Gymnopoulos L., Karyda M., Kokolakis S., Gritzalis S., “Incorporating Security Requirements into the Software Development Process”, Proceedings of the ECIW 2005 4th European Conference on Information Warfare and Security, Jone, B. Hutchinson (Eds.), July 2005, Glamorgan, UK, published by University of Glamorgan
  145. Frantzeskou G., Stamatatos E., Gritzalis S., “Source Code Authorship Analysis using N-grams”, Proceedings of the 7th Biennial Conference on Forensic Linguistics, July 2005, Cardiff, UK
  146. Belsis P., Malatras A., Gritzalis S., Skourlas C., Chalaris I., “Pervasive Secure Electronic Healthcare Records Management”, Proceedings of the ICEIS 7th International Conference on Enterprise Information Systems – Workshop on Ubiquitous Computing, K. Mostefaoui, Z. Maamar (Ed.), pp.101-109, May 2005, Miami, USA, published by ICEIS
  147. Belsis P., Malatras A., Gritzalis S., Skourlas C., Chalaris I., “Semantically enabled Secure Multimedia content delivery using GIS principles”, Proceedings of the IADAT-micv2005 International Conference on Multimedia, Image Processing and Computer Vision, Larrauri et al. (Eds.), April 2005, Madrid, Spain, Proceedings by IADAT International Association for the Development of Advances in Technology
  148. Belsis P., Gritzalis S., “Distributed Autonomous Knowledge Acquisition and Dissemination Ontology based Framework” Proceedings of the PAKM 2004 5th International Conference on Practical Aspects of Knowledge Management – Workshop on Enterprise Modeling and Ontology: Ingredients for Interoperability, Kuhn (Ed.), pp.319-329, December 2004, Vienna, Austria, University of Vienna
  149. Belsis P., Gritzalis S., Malatras A., Skourlas C., Chalaris I., “Enhancing Knowledge through the use of GIS and Multimedia”, Proceedings of the PAKM 2004 5th International Conference on Practical Aspects of Knowledge Management, Reimer, D. Karagiannis (Eds.), pp.319-329, December 2004, Vienna, Austria, Springer Lecture Notes in Artificial Intelligence LNAI 3336
  150. Ikonomopoulos S., Gritzalis S., “Integration of Security Engineering into the Rational Unified Process – An Early Iteration”, Proceedings of the 19th IEEE International Conference on Automated Software Engineering – SAPS’04 Workshop on Specification and Automated Processing of Security Requirements, Mapa, C. Rudolph (Eds.), pp.167-178, September 2004, Linz, Austria, IEEE CPS Conference Publishing Services and Austrian Computer Society
  151. Balopoulos T., Gritzalis S., Katsikas S., “An Extension of Typed MSR for specifying Esoteric Protocols and their Dolev-Yao Intruder”, Proceedings of the CMS’2004 IFIP TC6/TC11 8th International Conference on Communications and Multimedia Security, D. Chadwick B. Preneel (Eds.), Vol.175, pp.209-221, September 2004, Salford, UK, Springer
  152. Kalloniatis C., Kavakli E., Gritzalis S., “Security Requirements Engineering for eGovernment Applications: Analysis of Current Frameworks”, Proceedings of the DEXA’04 EGOV’04 3rd International Conference on Electronic Government, Traunmuller (Ed.), pp.66-71, September 2004, Zaragoza, Spain, Springer Lecture Notes in Computer Science LNCS 3183
  153. Kambouraki D., Gritzalis S., Moulinos K., “A Privacy Audit Methodologies Comparison Framework”, Proceedings of the DEXA’04 EGOV’04 3rd International Conference on Electronic Government, Traunmuller (Ed.), pp.328-331, September 2004, Zaragoza, Spain, Springer Lecture Notes in Computer Science LNCS 3183
  154. Frantzeskou G., Gritzalis S., MacDonell S., “Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process”, Proceedings of the ICETE 2004 International Conference on eBusiness and Telecommunication Networks – Security and Reliability in Information Systems and Networks Track, Belo, L. Vasiu (Eds.), pp.163-173, August 2004, Setubal, Portugal, Kluwer Academic Publishers
  155. Karafasoulis C., Gritzalis S., “An IP marking mechanism for the Privacy Enhancing Technologies: the right to choose”, Proceedings of the INC’2004 4th International Network Conference, Furnell (Ed.) pp.409-416, July 2004, Plymouth, UK, published by IEE & University of Plymouth
  156. Aggelis G., Gritzalis S., Lambrinoudakis C., “Addressing Authentication and Authorization Issues in the Grid”, Proceedings of the INC’2004 4th International Network Conference, Furnell (Ed.) pp.319-326, July 2004, Plymouth, UK, published by IEE & University of Plymouth
  157. Kambourakis G., Rouskas A., Gritzalis S., “Delivering Attribute Certificates over GPRS”, Proceedings of the 19th ACM Symposium on Applied Computing – Mobile Computing and Applications Track, V. Leong, A. Chan (Eds.), pp.1166-1170, May 2004, Nicosia, Cyprus, ACM Press
  158. Kambourakis G., Rouskas A., Gritzalis S., “Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems”, Proceedings of the NETWORKING’04 IFIP TC-6 International Conference on Networking, Mitrou et al. (Eds.), pp.13-24, May 2004, Athens, Greece, Springer Lecture Notes in Computer Science LNCS 3042
  159. Belsis P., Gritzalis S., Skourlas C., Drakopoulos J., “Implementing Knowledge Management Techniques for Security Purposes”, in ICEIS’04 Proceedings of the 6th International Conference on Enterprise Information Systems, Hammoudi, J. Cordeiro (Eds.), Vol.II, pp.535-540, April 2004, Porto, Portugal, published by ICEIS
  160. Argyrakis J., Gritzalis S., Kioulafas C., “Privacy Enhancing Technologies: A review”, Proceedings of the EGOV03 2nd International Conference on Electronic Government, Traunmuller (Ed.), pp.282-287, September 2003, Prague, Czech Republic, Springer Lecture Notes in Computer Science LNCS 2739
  161. Aggelis G., Gritzalis S., Lambrinoudakis C., “Security Policy Configuration Issues in GRID Computing Environments”, Proceedings of the SAFECOMP’03 22nd International Conference on Computer Safety, Reliability and Security, Littlewood (Ed.), pp.331-341, September 2003, Edinburgh, UK, Springer Lecture Notes in Computer Science LNCS 2788
  162. Gymnopoulos L., Dritsas S., Gritzalis S., Lambrinoudakis C., “Grid Security Review”, Proceedings of the MMM-ACNS-2003 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, V. Gorodetski, L. Popyack, V. Skormin (Eds.), pp.100-111, September 2003, St. Petersburg, Russia, Springer Lecture Notes in Computer Science LNCS 2776
  163. Balopoulos T., Gritzalis S., “Towards a Logic of Privacy – Preserving Selective Disclosure Credential Protocols”, Proceedings of the DEXA 2003 14th International Conference on Database and Expert Systems Applications – TRUSTBUS‘03 2nd International Workshop on Trust and Privacy in Digital Business, Lopez, G. Pernul (Eds.), pp.396-401, September 2003, Prague, Czech Republic, IEEE CPS Conference Publishing Services
  164. Kambourakis G., Rouskas A., Gritzalis S., “Introducing PKI to enhance Security in Future Mobile Networks”, Proceedings of the IFIPSEC’2003 18th IFIP International Information Security Conference, Gritzalis P. Samarati, S. K. Katsikas, S. De Capitani di Vimercati (Eds.), pp.109-120, May 2003, Athens, Greece, Kluwer Academic Publishers
  165. Kambourakis G., Rouskas A., Gritzalis S., “Using SSL/TLS in Authentication and Key Agreement Procedures of Future Mobile Networks”, Proceedings of the MWCN’2002 4th IEEE Conference on Mobile and Wireless Communications Networks, M. Gerla, C. G. Omidyar (Eds.), pp.152-156, September 2002, Stockholm, Sweden, IEEE CPS Conference Publishing Services
  166. Gritzalis S., Lambrinoudakis C., “Security Requirements of eGovernment Services: An Organisational Framework”, Proceedings of the PDPTA’2002 International Conference on Parallel and Distributed Processing Techniques and Applications, R. Arabnia (Ed.). Vol.I, pp.127-131, June 2002, Las Vegas, USA, CSREA Press
  167. Oikonomopoulos S., Gritzalis S., “Tool support for design patterns in the context of a reuse process”, Proceedings of the 6th SEA IASTED International Conference on Software Engineering and Applications, M. H. Hamza (Ed.), 175-181, November 2002, Cambridge, M.I.T. Boston, USA, IASTED Press
  168. Lekkas D., Gritzalis S., Katsikas S., “Towards an ISO-9000 compliant Certification Service Provider”, Proceedings of the HERCMA’2001 5th Hellenic European Research on Computer Mathematics and its Applications Conference, A. Lipitakis (Ed.), pp.390-397, September 2001, Athens, Greece, LEA Pubs.
  169. Lekkas D., Gritzalis S., Katsikas S., “Towards an ISO-9000 compliant Trusted Third Party in a Medical Environment: The Quality of Service perspective”, Proceedings of the SCI’2001 5th World Multiconference on Systemics, Cybernetics & Informatics, Gallaos, A.L.J. Teixera, K.Y. Wong, J. Carretero (Eds.), pp.149-154, July 2001, Orlando, USA, International Institute of Informatics and Systemics (IIIS) and IEEE Computer Society
  170. Lekkas D., Gritzalis S., Katsikas S., “Deploying Quality Management in Trusted Third Parties within a Medical Environment”, Proceedings of the SHIMR’2001 6th International Symposium on Health Information Management Research, Dowd, B. Eaglestone (Eds.), pp.137-151, May 2001, Halkidiki, Greece, Sheffield Academic Press
  171. Nikitakos N., Gritzalis S., “Risk Management for new Information Technology insertion in a Shipping Company”, Proceedings of the 13th National Conference in Operational Research, Sambrakos (Ed.), pp.7-16, December 2000, Piraeus, Greece, University of Piraeus Pubs.
  172. Patel A., Gladychev P., Katsikas S., Gritzalis S., “Towards a cross-domain Trusted Third Party Infrastructure”, Proceedings of the SCI’99 3rd World Multiconference on Systemics, Cybernetics & Informatics, Gallaos (Ed.), pp.412-424, July 1999, Orlando, USA, International Institute of Informatics and Systemics (IIIS) publications
  173. Patel A., Gladychev P., Katsikas S., Gritzalis S., Lekkas D., “Support for Legal Relationships and Anonymity in the KEYSTONE Public Key Infrastructure Architecture”, Proceedings of the UIPP’99 IFIP International join Working Conference on User Identification and Privacy Protection, Fischer-Hubner, G. Quirchmayr, L. Yngstrom (Eds.), pp.243-254, June 1999, Stockholm, Sweden, published by IFIP & Stockholm University
  174. Iliadis J., Gritzalis S., Oikonomou V., “Towards Secure Downloadable Executable Content: The Java paradigm”, Proceedings of the SAFECOMP’98 IFIP & EWICS 17th International Conference on Computer Safety, Reliability and Security, Ehrenberger (Ed.), pp.117-127, October 1998, Heidelberg, Germany, Springer Lecture Notes in Computer Science LNCS 1516
  175. Gritzalis S., Iliadis J., Oikonomou V., “Security issues surrounding the JAVA programming language”, Proceedings of the IFIPSEC’98 14th International Information Security Conference, Papp, R. Posch (Eds.), pp.3-14, September 1998, Budapest, Hungary, and Vienna, Austria, published by IFIP & Austrian Computer Society
  176. Gritzalis S., Iliadis J., “Addressing security issues in programming languages for mobile code”, Proceedings of the DEXA’98 9th International Workshop on Database and Expert Systems Applications, Workshop on Security and Integrity of Data Intensive Applications, Wagner, G. Pernul (Eds.), pp.288-293, August 1998, Vienna, Austria, IEEE CPS Conference Publishing Services
  177. Gritzalis S., Aggelis G., Spinellis D., “Programming languages for mobile code: A problems viewpoint”, Proceedings of the IEE INC’98 1st International Network Conference, Sanders (Ed.), pp.210-217, July 1998, Plymouth, United Kingdom, published by IEE & University of Plymouth
  178. Gritzalis S., Nikitakos N., Georgiadis P., “Cryptographic Protocol Flaws”, Proceedings of the PCI 1997 6th Pan-Hellenic Informatics Conference, Pangalos, T. Sellis (Eds.), pp.27-40, December 1997, Athens, Greece, New Technologies Publications
  179. Gritzalis S., Spinellis D., “Cryptographic Protocols over open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools”, Proceedings of the SAFECOMP’97 IEE & EWICS 16th International Conference on Computer Safety, Reliability and Security, Daniel (Ed.), pp.123-137, September 1997, York, United Kingdom, Springer
  180. Gritzalis S., Nikitakos N., Georgiadis P., “Formal Methods for the Analysis and Design of Cryptographic Protocols: A state-of-the-art review”, Proceedings of the CMS’97 3rd IFIP TC6/TC11 International Conference on Communications and Multimedia Security, S. Katsikas (Ed.), pp.119-132, September 1997, Athens, Greece, Chapman & Hall
  181. Gritzalis S., Spinellis D., “Addressing Threats and Security Issues in World Wide Web Technology”, Proceedings of the CMS’97 3rd IFIP TC6/TC11 International Conference on Communications and Multimedia Security, Katsikas (Ed.), pp.33-46, September 1997, Athens, Greece, Chapman & Hall
  182. Gritzalis S., Katsikas S., Spinellis D., “The Cascade Vulnerability Problem for Open Distributed Systems”, Proceedings of the ENCRESS’97 3rd IFIP TC5 International Conference on Reliability, Quality & Safety of Software-Intensive Systems, Gritzalis, T. Anderson (Eds.), pp.175-185, May 1997, Athens, Greece, Chapman & Hall
  183. Nikitakos N., Gritzalis S., Georgiadis P., “Security Profile for interconnected open distributed systems with varying Vulnerability”, Proceedings of the IFIP SEC’96 12th IFIP International Information Security Conference, S. Katsikas (Ed.), pp.428-437, May 1996, Samos, Greece, Chapman & Hall

III. BOOKS

  1. Papadatos K., Rantos K., Makrygeorgou A., Koulouris K., Klontza S., Lambrinoudakis C., Gritzalis S., Xenakis C., Katsikas S., Karyda M., Tsohou A., Zacharis A., “Interoperable EU Risk Management Toolbox”, EU ENISA, 2023
  2. Lambrinoudakis C., Gritzalis S., Xenakis C., Katsikas S., Karyda M., Tsohou A., “Interoperable EU Risk Management Framework”, EU ENISA, 2022
  3. Lambrinoudakis C., Gritzalis S., Xenakis C., Katsikas S., Karyda M., Tsohou A., Papadatos K., Rantos K., Pavlosoglou Y., Gasparinatos S., Pantazis A., Zacharis A., “Compendium of Risk Management Frameworks with potential interoperability”, EU ENISA, 2022
  4. Katsikas S., Gritzalis S., Lambrinoudakis C., (Eds.), “Information and Systems Security in the Cyberspace”, 2021, New Technologies Pubs. (in Greek)
  5. Burmester M., Gritzalis S., Katsikas S., Chryssikopoulos V., (Eds.), “Modern Cryptography: Theory and Applications”, 2011, Papasotiriou Pubs.
  6. Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S., (Eds.), “Privacy Protection and Information and Communication Technologies: Technical and Legal Issues”, 2010, Papasotiriou Pubs.
  7. Gritzalis S., Karygiannis T., Skianis C. (Eds.), “Security and Privacy in Mobile and Wireless Networking”, Troubador Publishing Ltd., Leicester, UK, 2009
  8. Acquisti A., Gritzalis S., Lambrinoudakis C., De Capitani di Vimercati S. (Eds.), “Digital Privacy: Theory, Technologies and Practices”, Auerbach Publications – Taylor and Francis, New York, 2008 [IEEE COMSOC Best Readings Topics on Communications and Information Systems Security: Books].
  9. Kambourakis G., Gritzalis S., Katsikas S., “Wireless and Mobile Communication Networks Security: Autonomous and Heterogenous Environments Bluetooth, IEEE 802.11, 802.16, UMTS”, 2006, Papasotiriou Pubs.
  10. Katsikas S., Gritzalis D., Gritzalis S., (Eds.), “Information Systems Security“, 2004, New Technologies Pubs. (in Greek)
  11. Gritzalis S., Katsikas S., Gritzalis D., “Communication and Network Security: Technologies and Services”, 2003 (2nd 2004), Papasotiriou Pubs. (in Greek)
  12. Katsikas S., Gritzalis S., Lambrinoudakis C., Dritsas S., “eBusiness practices for SMEs”, 2003, eBusinessForum Pubs. (in Greek)
  13. Vakali A., Gritzalis S., Douligeris C., Patsa C., Soultis G., “Internet Programming Tools”, writing assignment by Institute of Educational Policy: Student book (405 pages), Teacher book (145 pages), Laboratory book (192 pages), B’ Lyceum class, Technical Vocational Schools (TEE), Informatics Sector, Systems and Computer Networks division, 2000, Livanis Pubs. (in Greek)
  14. Gritzalis D., Gritzalis S., “Operating Systems Security: Unix – DOS”, 1991 (2nd ed. 1994), New Technology Pubs. (in Greek)

IV. BOOK CHAPTERS

  1. Giannakas F., Papasalouros A., Kambourakis G., Gritzalis S., Voyiatzis I., “Mobile Games for Learning, chapter in: The Cambridge Handbook of Cyber Behavior, Y. Zheng (Ed.), pp.285-318, 2022, Cambridge University Press
  2. Diamantopoulou V., Lambrinoudakis C., King J., Gritzalis S.,  EU GDPR: Towards a regulatory initiative for deploying a private digital era”, chapter in: Modern Socio-Technical Perspectives on PrivacyBart Knijnenburg et al. (Eds.), pp.427-448, 2022, Springer
  3. Katsikas S., Gritzalis S., Lambrinoudakis C., “Introduction to Information and Systems Security”, chapter in: Information and Systems Security in the Cyberspace, S. Katsikas, S. Gritzalis, C. Lambrinoudakis (Eds.), pp.31-46, 2021, New Technologies Pubs. (in Greek)
  4. Sideri M., Gritzalis S., Diamantopoulou V., Data collection techniques used as mechanisms for citizens’ surveillance and control: Vulnerable citizens – the new class”, chapter in: The Social Dimension of Sustainability, Kaila et al. (Eds.), 2020, Diadrasi Pubs. (in Greek)
  5. Gritzalis S., Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., “Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy”, chapter in: Recent Advances in Core Technologies in Informatics – Selected Papers in Honor of Professor Nikolaos Alexandris, G. Tsihrintzis, M. Virvou (Eds.), pp.177-198, 2020, Springer Learning and Analytics in Intelligent Systems
  6. Sideri M., Diamantopoulou V., Gritzalis S., “Privacy preservation in modern e-Participation environments: The Crowdsourcing case”, chapter in: The Digital FutureDoukidis (Ed.), pp. 297-306, 2019, Sideri Pubs. (in Greek)
  7. Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., Towards an integrated socio-technical approach for designing adaptive Privacy-Aware Services in Cloud computing, chapter in: Cyber Influence and Congitive Threats, V. Benson, J. McAlaney (Eds.), pp.9-27, 2019, Academic Press, Elsevier
  8. Kalloniatis C., Pattakou A., Kavakli E., Gritzalis S., “Designing Secure and Privacy-aware Information Systems”, chapter in: Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, 1, pp.390-418, 2019, IGI Global
  9. Sideri M., Kitsiou A., Filippopoulou A., Kalloniatis C., Gritzalis S.“E-governance model in Education. Citizenship cultivation, enhancing participation and collective decision making in Greek educational structures through the use of social media”, chapter in: Innovation, Sustainability and Educational Design, Kaila et al. (Eds.), pp.88-107, 2019, Diadrasi Pubs. (in Greek)
  10. Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., “‘… having freedom of speech, does not mean that we can write whatever we want. Our freedom stops where others’ rights of begin’. An educational intervention for enhancing privacy awareness in digital social networks”, chapter in: Sustainability, Sustainable Development, Nature and Human Nature: Our World? Quo Vadis?, Kaila et al. (Eds.), pp. 98-116, 2018, Diadrasi Pubs. (in Greek)
  11. Kalloniatis C., Kavakli E., Gritzalis S., “Addressing Privacy in Traditional and Cloudbased Systems“, chapter in: Computer Systems and Software EngineeringConceptsMethodologiesToolsand Applications, Mehdi Khosrow-Pour (Ed.), pp. 1900-19302017, IGI Global
  12. Sideri M., Kitsiou A., Tzortzaki E., Kalloniatis C., Gritzalis S., “Privacy Protection in Digital Social Networks. A necessary condition for maintaining social cohesion in the Information Society?”, chapter in: Social and Cultural Sustainability, Papavasiliou, P. Fokiali, E. Nikolaou, D. Mantzanos, M. Kaila (Eds.), pp. 134-174, 2017, e-book (in Greek)
  13. Katsikas S., Gritzalis S., Digitalization in GreeceState of playbarrierschallengessolutions, chapter in: Beyond BureaucracyTowards Sustainable Governance Informatization, A. Paulin, L. Anthopoulos, C. Reddick (Eds.), pp.355-375, 2017, Springer
  14. Sideri M., Kitsiou A., Kalloniatis C., Gritzalis S.“Free expression and social control enforcement in social media: The Greek Students’ online communities on Facebook case” chapter in: Environmental Training and Sustainable Development. Concern Texts with innovative approaches, Theodoropoulou, P. Fokiali, V. Papavasiliou, M. Kaila (Ed.), pp. 56-65, 2016, Diadrasi Pubs. (in Greek)
  15. Gritzalis S., “Administrative Reform for the Citizens and the Businesses: Problems and Solutions”, chapter in: From the University to the Public Management, 17-45, 2014, Papazisi Pubs. (in Greek)
  16. Anagnostopoulos M., Kambourakis G., Konstantinou E., Gritzalis S., “DNSsec vs. DNScurve: A side-by-side comparison”, chapter in: Situational Awareness in Computer Network DefensePrinciplesMethods and Applications, Onwubiko C., Owens (Eds.), pp.201-220, 2012, IGI Global
  17. Belsis P., Skourlas C., Gritzalis S., Secure electronic healthcare records distribution in wireless environments using low resource devices“, chapter in: Pervasive Computing and Communications Design and Deployment: Technologies, Trends, and Applications, Malatras A. (Ed.), pp. 247-262, 2011, IGI Global
  18. Kalloniatis C., Kavakli E., Gritzalis S., “Designing Privacy Aware Information Systems”, chapter in: Software Engineering for Secure Systems: Industrial and Research Perspectives, Mouratidis H. (Ed.), pp. 212-231, 2011, IGI Global
  19. Burmester M., Gritzalis S., Katsikas S., Cryssikopoulos V. “Essentials of Modern Cryptography”, chapter in: Modern Cryptography: Theory and Applications, Burmester M., Gritzalis S., Katsikas S., Chryssikopoulos V., (Eds.), pp. 1-44, 2011, Papasotiriou Pubs. (in Greek)
  20. Balopoulos T., Gritzalis S., “Identification and Authentication”, chapter in: Modern Cryptography: Theory and Applications, Burmester M., Gritzalis S., Katsikas s., Chryssikopoulos V., (Eds.), pp. 469-498, 2011, Papasotiriou Pubs. (in Greek)
  21. Kambourakis G., Gritzalis S., Key Management in 802.16e“, chapter in: WiMAX Security and Quality of Service: An End to End Perspective, Mueller P., Tang S.-Y., Sharif (Eds.), pp. 63-86, 2010, Wiley
  22. Lambrinoudakis C., Gritzalis S., Katsikas S., “Privacy Enhancing Technologies: A review”, chapter in: Privacy Protection and Information and Communication Technologies: Technical and Legal issues, Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S. (Eds.), pp. 3-47, 2010, Papasotiriou Pubs. (in Greek)
  23. Papadimitriou G., Petridou s., Sarigiannidis S., Gritzalis S., Pomportsis A., “Communication Privacy”, chapter in: Privacy Protection and Information and Communication Technologies: Technical and Legal issues, Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S. (Eds.), pp. 49-71, 2010, Papasotiriou Pubs. (in Greek)
  24. Rekleitis E., Rizomiliotis P., Gritzalis S., “RFID: Privacy Threats and Countermeasures”, chapter in: Privacy Protection and Information and Communication Technologies: Technical and Legal issues, Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S. (Eds.), pp. 193-220, 2010, Papasotiriou Pubs. (in Greek)
  25. Aivaloglou E., Gritzalis S., Katsikas S., “Privacy Protection Mechanisms in Wireless Sensor Networks”, chapter in: Privacy Protection and Information and Communication Technologies: Technical and Legal issues, Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S. (Eds.), pp. 221-244, 2010, Papasotiriou Pubs. (in Greek)
  26. Balopoulos T., Gritzalis S., “Linkability and Selective Disclosure in Privacy Preserving Cryptographic Protocols”, chapter in: Privacy Protection and Information and Communication Technologies: Technical and Legal issues, Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S. (Eds.), pp. 267-282, 2010, Papasotiriou Pubs. (in Greek)
  27. Giannakopoulos A., Xanthopoulos A., Lambrinoudakis C., Gritzalis S., Katsikas S., “Privacy Economics”, chapter in: Privacy Protection and Information and Communication Technologies: Technical and Legal issues, Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S. (Eds.), pp. 447-467, 2010, Papasotiriou Pubs. (in Greek)
  28. Gritzalis S., Mitrou L., “Content Filtering Technologies and the Law”, chapter in Securing Information and Communication Systems: Principles, Technologies and Applications, Furnell S., Katsikas S., Lopez J., Patel A. (Eds.), pp.243-265, 2008, Artech House
  29. Aivaloglou F., Gritzalis S., Katsikas S., “Privacy Protection Mechanisms for Sensor Networks”, chapter in Wireless Sensor Networks, Lopez J., Zhou J. (Eds.), pp. 223-250, 2008, IOS Press
  30. Yannacopoulos A., Katsikas S., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., “A Risk Model for Privacy Insurance”, chapter in: Digital Privacy: Theory, Technologies and Practices, Acquisti A., Gritzalis S., Lambrinoudakis C., De Capitani di Vimercati S. (Eds.), pp. 347-362, 2008, Auerbach Publications – Taylor and Francis
  31. Kambourakis G., Rouskas A., Gritzalis S., “Evaluating Security Mechanisms in different protocol layers for Bluetooth Connections”, chapter in: Handbook of Research in Wireless Security, Zhang Y., Zheng J., Ma M., (Eds.), 666-680, 2008, Idea Group Reference
  32. Belsis M., Simitsis A., Gritzalis S., “Wireless Security: Common Protocols and Vulnerabilities”, chapter in: Encyclopedia of Mobile Computing and Commerce, Taniar D. (Ed.), pp.1028-1034, 2007, Idea Group Reference
  33. Gritzalis S., Lambrinoudakis C., “Privacy in the Digital World”, chapter in: Encyclopedia of Internet Technologies and Applications, Freire M., Pereira M. (Eds.), 411-417, 2007, Idea Group Reference
  34. Belsis P., Fraggos K. Gritzalis S., Skourlas C. “Information Filtering and Effective Resource Classification “, chapter in: Parallel, Content based cross Language Informaion Retrieval, Skourlas C. (Ed.), pp. 159-170, 2006, New Technologies Pubs. (in Greek)
  35. Lambrinoudakis C, Gritzalis S., “Security in IEEE 802.11 Wireless Local Area Networks”, chapter in: Handbook of Wireless Local Area Networks: Applications, Technology, Security and Standards, Ilyas M., Ahson (Eds.), pp.579-600, 2005, CRC Press
  36. Gritzalis S.“Secure Systems and Products Evaluation”, chapter in Information Systems Security, Katsikas S., Gritzalis D., Gritzalis S., (Eds.), pp. 267-316, 2004, New Technologies Pubs. (in Greek)
  37. Gritzalis S., Georgiadis P., “Operating systems Security”, chapter in Information Security: Technical, Legal and Societal Issues, Alexandris N., Kiountouzis, E., Trapezanoglou V. (Eds.), pp. 35-59, 1995 (2nd ed. 1998, 3rd ed. 2000) New Technologies Pubs. (in Greek)

Socrates Katsikas, Stefanos Gritzalis, Konstantinos Lambrinoudakis, Information & Systems Security in Cyberspace, New Technologies Publications, 2021, 816, ISBN: 9789605780647 (In Greek) 

Stefanos Gritzalis, Socrates Katsikas, Achilleas Mitsos, Nikos Polyzos, Diomidis Spinellis, Maria Stratigaki, Andreas Takis, From university to public administration – A return journey, Papazisis Publications, 2014, 200,ISBN:978-960-02-2979-0 (In Greek)

Mike Burmester, Stefanos Gritzalis, Socrates Katsikas, Vasilios Chrysikopoulos, Modern Cryptography, Papasotiriou Publications, 2011, 728, ISBN:9607182766 (In Greek) 

Lambrinoudakis Konstantinos, Mitrou Lilian, Gritzalis Stefanos, Katsikas Socrates, Privacy & Information and Communication Technologies: Technical and Legal Issues, Papasotiriou Publications, 2010, 816, ISBN: 9789607182708 (In Greek)

Stefanos Gritzalis, Tom Karygiannis, Charalabos Skianis, Security and Privacy in Mobile and Wireless Networking, 2009, ISBN:978-190-5886-90-6 Alessandro Acquisti, Stefanos Gritzalis, Costas Lamprinoudakis, Sabrina De Capitani di Vimercati, Digital Privacy: Theory, Technologies, and Practices, Auerbach Publications, 2007, 496, ISBN: 978-1420052176

 

Sokratis K. Katsikas, Javier López, Michael Backes, Stefanos Gritzalis, Bart Preneel, Information Security, Springer, 2006, 559, ISBN: 978-3-540-38341-3

Kambourakis George, Gritzalis Stefanos, Katsikas Socrates K., Security of Wireless & Mobile Communication Networks, PAPASOTIRIOU, 2006, 508, ISBN: 9607530810 (In Greek)

 Socrates Katsikas, Dimitris Grizalis, Stefanos Grizalis, Information Systems Security, New Technologies Publications, 2004, 560, ISBN: 9789608105577 (In Greek)

Sokratis K. Katsikas, Stefanos Gritzalis, Javier López, Public Key Infrastructure, Springer, 2004, 392, ISBN:978-3-540-22216-3

Dimitris A. Gritzalis, Stefanos Gritzalis, Operating System Security (UNIX – DOS), Mit, 1993, 252 (In Greek)

Wednesday 11:00-13:00