You are here

Publications

Christoforos Panos, Chirstoforos Ntantogian, Stefanos Malliaros, Christos Xenakis. Analyzing, Quantifying, and Detecting the Blackhole attack in Infrastructure-less Networks. Computer Networks (journal), Volume 113, 11 February 2017, Pages 94–110

Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir M. Rahmani, Pasi Liljeberg. On the Feasibility of Attribute-Based Encryption on Internet of Things Devices - IEEE Micro 36(6), November 2016.

Mihai Togan, Bogdan Chifor, Ionut Florea, and George Gugulea. certSign Romania and Military Technical Academy, Computer Science Dept., Bucharest, Romania. "A privacy preserving authentication service using mobile devices". Information Security Solutions Europe – ISSE 2016, 15th-16th November 2016, Paris, France

Luigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi and Giuseppe Bianchi (University of Rome “Tor Vergata”, Italy), "FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication", In proc. 11th International Conference on Availability, Reliability and Security (ARES), 2016.

Stefanos Malliaros, Christoforos Ntantogian, Christos Xenakis, "Protecting sensitive information in the volatile memory from disclosure attacks", In proc. 11th International Conference on Availability, Reliability and Security (ARES), 2016

Christos Xenakis, Christoforos Ntantogian, Orestis Panos, "(U)SimMonitor: a mobile application for security evaluation of cellular networks," Computers & Security, Elsevier Science, Vol. 60, Issue 1, pp: 62-70, July 2016

Claudio Pisa, Alberto Caponi, Tooska Dargahi, Giuseppe Bianchi,  Nicola Blefari-Melazzi. WI-FAB: Attribute-Based WLAN Access Control, Without Pre-shared Keys and Backend Infrastructures, In proc. International Workshop on Hot Topics in Planet-­scale mObile computing and online Social neTworking (HotPOST’16). 2016 Paderborn, Germany.

K. Papadamou, R. Samaras, and M. Sirivianos. "Ensuring the Authenticity and Fidelity of Captured Photos using Trusted Execution and Mobile Application Licensing Capabilities". In Proc. ARES Workshop on Future Access Control, Identity Management and Privacy-preserving Solutions in Internet Services (FASES) 2016

Victor M. Lopez Millan, Vicent Cholvi, Antonio Fernandez Anta, Luis Lopez , “Resource location based on precomputed partial random walks in dynamic networks.”. Computer Networks, Volume 103, 5 July 2016, Pages 165–180.

 Papaodyssefs, F., Iordanou, C., Blackburn, J., Laoutaris, N., & Papagiannaki, K., “Web Identity Translator: Behavioral Advertising and Identity Privacy with WIT”. In Proc. 14th ACM Workshop on Hot Topics in Networks Article No. 3. 2015.

Pages