Survey of security vulnerabilities in session initiation protocol D Geneiatakis, T Dagiuklas, G Kambourakis, C Lambrinoudakis, ... IEEE Communications Surveys & Tutorials 8 (3), 68-81, 2006 | 227 | 2006 |
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy C Lambrinoudakis, S Gritzalis, F Dridi, GN Pernul Computer Communications 26 (16), 1873-1883, 2003 | 181 | 2003 |
Trust as a facilitator in cloud computing: a survey SM Habib, S Hauke, S Ries, M Mühlhäuser Journal of Cloud Computing: Advances, Systems and Applications 1 (1), 19, 2012 | 153 | 2012 |
A security architecture for interconnecting health information systems D Gritzalis, C Lambrinoudakis International Journal of Medical Informatics 73 (3), 305-309, 2004 | 98 | 2004 |
Risk analysis of a patient monitoring system using Bayesian Network modeling I Maglogiannis, E Zafiropoulos, A Platis, C Lambrinoudakis Journal of Biomedical Informatics 39 (6), 637-647, 2006 | 96 | 2006 |
Digital privacy: theory, technologies, and practices A Acquisti, S Gritzalis, C Lambrinoudakis, S di Vimercati CRC Press, 2007 | 80 | 2007 |
A framework for protecting a SIP-based infrastructure against malformed message attacks D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ... Computer Networks 51 (10), 2580-2593, 2007 | 79 | 2007 |
SIP Security Mechanisms: A state-of-the-art review D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ... Proceedings of the Fifth International Network Conference (INC 2005), 147-155, 2005 | 78 | 2005 |
Utilizing bloom filters for detecting flooding attacks against SIP based services D Geneiatakis, N Vrakas, C Lambrinoudakis computers & security 28 (7), 578-591, 2009 | 74 | 2009 |
Introducing traffic analysis G Danezis, R Clayton Digital Privacy, 117-138, 2007 | 67 | 2007 |
Managing medical and insurance information through a smart-card-based information system C Lambrinoudakis, S Gritzalis Journal of Medical Systems 24 (4), 213-234, 2000 | 67 | 2000 |
Protecting privacy and anonymity in pervasive computing: trends and perspectives S Dritsas, D Gritzalis, C Lambrinoudakis Telematics and informatics 23 (3), 196-210, 2006 | 66 | 2006 |
An ontology description for SIP security flaws D Geneiatakis, C Lambrinoudakis Computer Communications 30 (6), 1367-1374, 2007 | 54 | 2007 |
An ontology for secure e-government applications M Karyda, T Balopoulos, S Dritsas, L Gymnopoulos, S Kokolakis, ... First International Conference on Availability, Reliability and Security …, 2006 | 54 | 2006 |
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment D Geneiatakis, C Lambrinoudakis Telecommunication Systems 36 (4), 153-159, 2007 | 53 | 2007 |
Secure electronic voting: The current landscape C Lambrinoudakis, D Gritzalis, V Tsoumas, M Karyda, S Ikonomopoulos Secure electronic voting, 101-122, 2003 | 53 | 2003 |
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments S Gritzalis, C Lambrinoudakis, D Lekkas, S Deftereos IEEE Transactions on Information Technology in Biomedicine 9 (3), 413-423, 2005 | 50 | 2005 |
A framework for detecting malformed messages in SIP networks D Geneiatakis, G Kambourakis, T Dagiuklas, C Lambrinoudakis, ... 2005 14th IEEE Workshop on Local & Metropolitan Area Networks, 5 pp.-5, 2005 | 49 | 2005 |
SIP message tampering: The SQL code injection attack D Geneiatakis, G Kambourakis, C Lambrinoudakis, T Dagiuklas, ... Proceedings of 13th International Conference on Software, Telecommunications …, 2005 | 46 | 2005 |
Cryptography goes to the cloud I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis FTRA International Conference on Secure and Trust Computing, Data Management …, 2011 | 42 | 2011 |