Name
Affiliation
Papers
CHRISTOFOROS NTANTOGIAN
Department of Informatics and Telecommunications, University of Athens, Panepistimioupolis, Ilisia, PC 15784 Athens, Greece
30
Collaborators
Citations 
PageRank 
31
86
13.03
Referers 
Referees 
References 
235
462
228
Search Limit
100462
Title
Citations
PageRank
Year
Distributed Key Management in Microgrids.10.392020
Transforming Malicious Code to ROP Gadgets for Antivirus Evasion00.342019
ObjectMap: detecting insecure object deserialization00.342019
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications10.342019
Evaluation of Password Hashing Schemes in Open Source Web Platforms10.342019
A survey of voice and communication protection solutions against wiretapping00.342019
Curex: Secure And Private Health Data Exchange00.342019
Barrett Blockchain Regulated Remote Attestation00.342019
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem.00.342018
RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance.00.342017
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks.50.442017
A Security Evaluation of FIDO's UAF Protocol in Mobile and Embedded Devices.00.342017
(U)SimMonitor: A mobile application for security evaluation of cellular networks.00.342016
Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software00.342015
Attacking the baseband modem of mobile phones to breach the users' privacy and network security40.422015
Gaithashing: A two-factor authentication scheme based on gait features80.472015
Evaluation of Cryptography Usage in Android Applications.60.542015
Evaluating the privacy of Android mobile applications under forensic analysis.100.702014
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks30.482014
Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices.110.692013
A Better Time Approximation Scheme for e-Passports.00.342013
Analysis And Modeling Of False Synchronizations In 3g-Wlan Integrated Networks00.342012
Questioning the Feasibility of UMTS-GSM Interworking Attacks10.382012
Mobility and energy-aware hierarchical intrusion detection system for mobile ad hoc networks10.342011
Reducing False Synchronizations in 3G-WLAN Integrated Networks.20.412011
A generic mechanism for efficient authentication in B3G networks30.472010
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks201.112009
A network-assisted mobile VPN for securing users data in UMTS10.412008
Security architectures for B3G mobile networks50.512007
Efficient authentication for users autonomy in Next Generation All-IP networks30.542007