Automated and On-Demand Cybersecurity Certification | 0 | 0.34 | 2021 |
DEFeND DSM - A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance. | 0 | 0.34 | 2020 |
Privacy, Security, Legal And Technology Acceptance Elicited And Consolidated Requirements For A Gdpr Compliance Platform | 0 | 0.34 | 2020 |
Game-Based Information Security/Privacy Education and Awareness - Theory and Practice. | 0 | 0.34 | 2020 |
The Privacy Paradox in the Context of Online Health Data Disclosure by Users. | 0 | 0.34 | 2017 |
SCN-SI-021 achieving privacy and access control in pervasive computing environments. | 0 | 0.34 | 2016 |
Critical Infrastructure Protection: A Holistic Methodology for Greece. | 0 | 0.34 | 2016 |
Lightweight private proximity testing for geospatial social networks. | 8 | 0.47 | 2016 |
Towards Secure And Practical Location Privacy Through Private Equality Testing | 5 | 0.43 | 2014 |
Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats | 1 | 0.39 | 2014 |
Automated CAPTCHA Solving: An Empirical Comparison of Selected Techniques | 4 | 0.41 | 2014 |
Toward early warning against Internet worms based on critical-sized networks | 2 | 0.40 | 2013 |
T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems | 3 | 0.38 | 2013 |
Secure and privacy-preserving, timed vehicular communications | 2 | 0.40 | 2012 |
A Model for Hybrid Evidence Investigation | 1 | 0.39 | 2012 |
Fair Anonymous Authentication for Location Based Services. | 3 | 0.43 | 2012 |
Modeling security in cyber-physical systems. | 17 | 0.92 | 2012 |
Uncertainty for Privacy and 2-Dimensional Range Query Distortion. | 1 | 0.35 | 2011 |
Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey | 6 | 0.45 | 2011 |
Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings | 23 | 4.48 | 2010 |
A distributed privacy-preserving scheme for location-based queries | 7 | 0.46 | 2010 |
Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments | 0 | 0.34 | 2010 |
Uncertainty for anonymity and 2-dimensional range query distortion | 0 | 0.34 | 2010 |
Accurate and large-scale privacy-preserving data mining using the election paradigm | 17 | 0.92 | 2009 |
A Novel Stochastic Approach for Modeling Random Scanning Worms | 1 | 0.35 | 2009 |
Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography | 2 | 0.38 | 2009 |
Treating scalability and modelling human countermeasures against local preference worms via gradient models | 4 | 0.42 | 2009 |
Secure and practical key establishment for distributed sensor networks | 8 | 0.54 | 2009 |
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections | 2 | 0.37 | 2008 |
Secure log management for privacy assurance in electronic communications | 4 | 0.58 | 2008 |
Multilayer key establishment for large-scale sensor networks | 8 | 0.42 | 2008 |
Strengthening Privacy Protection in VANETs | 16 | 0.82 | 2008 |
Towards secure online elections: models, primitives and open issues | 8 | 0.66 | 2007 |
A spatial stochastic model for worm propagation: scale effects | 6 | 0.60 | 2007 |
A framework for secure and verifiable logging in public communication networks | 15 | 1.14 | 2006 |
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks | 9 | 0.75 | 2005 |
Uncoercible e-Bidding Games | 1 | 0.36 | 2004 |
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions | 4 | 0.42 | 2001 |
Receipt-Freeness in Large-Scale Elections without Untappable Channels | 28 | 1.21 | 2001 |
Software-Based Receipt-Freeness in On-Line Elections | 0 | 0.34 | 2001 |
An Equitably Fair On-line Auction Scheme | 1 | 0.35 | 2000 |