


Остановите войну!
for scientists:
Vasilios Katos
Vasileios Katos – Vasilis Katos
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j45]Ge Zheng
, Wei Koong Chai
, Vasilis Katos
:
A dynamic spatial-temporal deep learning framework for traffic speed prediction on large-scale road networks. Expert Syst. Appl. 195: 116585 (2022) - 2021
- [j44]Fran Casino
, Nikolaos Lykousas
, Vasilios Katos
, Constantinos Patsakis
:
Unearthing malicious campaigns and actors from the blockchain DNS ecosystem. Comput. Commun. 179: 217-230 (2021) - [j43]Theodoros Apostolopoulos, Vasilios Katos, Kim-Kwang Raymond Choo
, Constantinos Patsakis:
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. Future Gener. Comput. Syst. 116: 393-405 (2021) - [j42]Ge Zheng, Wei Koong Chai, Vasilis Katos, Michael Walton:
A joint temporal-spatial ensemble model for short-term traffic prediction. Neurocomputing 457: 26-39 (2021) - [j41]George Hatzivasilis
, Othonas Soultatos
, Panos Chatziadam
, Konstantinos Fysarakis
, Ioannis G. Askoxylakis, Sotiris Ioannidis, George Alexandris, Vasilios Katos
, George Spanoudakis:
WARDOG: Awareness Detection Watchdog for Botnet Infection on the Host Device. IEEE Trans. Sustain. Comput. 6(1): 4-18 (2021) - [c54]Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis
, Ioannis Kompatsiaris:
Web Bot Detection Evasion Using Generative Adversarial Networks. CSR 2021: 115-120 - [c53]Amalia Damianou, M. Amir Khan, Constantinos Marios Angelopoulos, Vasilios Katos:
Threat Modelling of IoT Systems Using Distributed Ledger Technologies and IOTA. DCOSS 2021: 404-413 - [c52]Dimitrios Mallis, Constantinos Marios Angelopoulos, Vasilios Katos, Konstantinos Vogklis:
ISUMS: Indoor Space Usage Monitoring System for Sustainable Built Environment Using LoRaWAN. DCOSS 2021: 473-482 - [c51]Abigael Okikijesu Bada, Amalia Damianou, Constantinos Marios Angelopoulos, Vasilios Katos:
Towards a Green Blockchain: A Review of Consensus Mechanisms and their Energy Consumption. DCOSS 2021: 503-511 - [c50]Sophia McCall, Cagatay Yucel, Vasilios Katos:
Education in Cyber Physical Systems Security: The Case of Connected Autonomous Vehicles. EDUCON 2021: 1379-1385 - [c49]Ge Zheng, Wei Koong Chai, Vasilis Katos:
The Sequence-to-Sequence Architecture with An Embedded Module for Long-Term Traffic Speed Forecasting with Missing Data. ICAC 2021: 1-6 - 2020
- [j40]Constantinos Patsakis
, Fran Casino
, Nikolaos Lykousas
, Vasilios Katos
:
Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS. IEEE Access 8: 118559-118571 (2020) - [j39]Constantinos Patsakis, Fran Casino
, Vasilios Katos
:
Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Comput. Secur. 88 (2020) - [j38]Konstantinos Rantos
, Arnolnt Spyros
, Alexandros Papanikolaou
, Antonios Kritsas
, Christos Ilioudis
, Vasilios Katos
:
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Comput. 9(1): 18 (2020) - [j37]Mohammed Al Qurashi, Constantinos Marios Angelopoulos, Vasilios Katos:
An architecture for resilient intrusion detection in ad-hoc networks. J. Inf. Secur. Appl. 53: 102530 (2020) - [j36]George Hatzivasilis
, Othonas Soultatos, Sotiris Ioannidis, George Spanoudakis, Vasilios Katos, Giorgos Demetriou:
MobileTrust: Secure Knowledge Integration in VANETs. ACM Trans. Cyber Phys. Syst. 4(3): 33:1-33:25 (2020) - [j35]Ioannis Tsimperidis
, Paul D. Yoo
, Kamal Taha
, Alexios Mylonas
, Vasilis Katos
:
R2BN: An Adaptive Model for Keystroke-Dynamics-Based Educational Level Classification. IEEE Trans. Cybern. 50(2): 525-535 (2020) - [j34]Andreas I. Miaoudakis, Konstantinos Fysarakis
, Nikolaos E. Petroulakis
, Sofia Alexaki, George Alexandirs, Sotiris Ioannidis, George Spanoudakis, Vasilis Katos
, Christos V. Verikoukis
:
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of ?Looping Smart Assets? IEEE Veh. Technol. Mag. 15(3): 20-31 (2020) - [c48]Vasiliki Danilatou, Despoina Antonakaki
, Christos Tzagkarakis, Alexandros Kanterakis
, Vasilios Katos, Theodoros Kostoulas:
Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning. BIBE 2020: 247-254 - [c47]Mohammed Al Qurashi, Constantinos Marios Angelopoulos, Vasilios Katos:
An Architecture for Resilient Intrusion Detection in IoT Networks. ICC 2020: 1-7 - [c46]Shahin Rostami, Agnieszka Kleszcz, Daniel Dimanov, Vasilios Katos:
A Machine Learning Approach to Dataset Imputation for Software Vulnerabilities. MCSS 2020: 25-36 - [c45]Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Evangelos Karagiannis, Deniz Cetinkaya, Vasilios Katos:
On the Assessment of Completeness and Timeliness of Actionable Cyber Threat Intelligence Artefacts. MCSS 2020: 51-66 - [i4]Constantinos Marios Angelopoulos, Amalia Damianou, Vasilios Katos:
DHP Framework: Digital Health Passports Using Blockchain - Use case on international tourism during the COVID-19 pandemic. CoRR abs/2005.08922 (2020)
2010 – 2019
- 2019
- [j33]Marcus Walshe, Gregory Epiphaniou, Haider M. Al-Khateeb
, Mohammad Hammoudeh
, Vasilios Katos, Ali Dehghantanha:
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks 95 (2019) - [j32]Nikolaos Serketzis
, Vasilios Katos, Christos Ilioudis
, Dimitrios A. Baltatzis, George Pangalos:
Improving Forensic Triage Efficiency through Cyber Threat Intelligence. Future Internet 11(7): 162 (2019) - [j31]Nikolaos Serketzis
, Vasilios Katos, Christos Ilioudis
, Dimitrios A. Baltatzis, George J. Pangalos:
Actionable threat intelligence for digital forensics readiness. Inf. Comput. Secur. 27(2): 273-291 (2019) - [j30]Stavros Simou
, Christos Kalloniatis, Stefanos Gritzalis
, Vasilios Katos:
A framework for designing cloud forensic-enabled services (CFeS). Requir. Eng. 24(3): 403-430 (2019) - [j29]Anastasios Valkanis, Athanasios C. Iossifides, Periklis Chatzimisios
, Marios Angelopoulos, Vasilis Katos
:
IEEE 802.11ax Spatial Reuse Improvement: An Interference-Based Channel-Access Algorithm. IEEE Veh. Technol. Mag. 14(2): 78-84 (2019) - [c44]Christos Iliou, Theodoros Kostoulas
, Theodora Tsikrika
, Vasilis Katos, Stefanos Vrochidis
, Yiannis Kompatsiaris:
Towards a framework for detecting advanced Web bots. ARES 2019: 18:1-18:10 - [c43]Constantinos Marios Angelopoulos, Vasilios Katos, Theodoros Kostoulas
, Andreas I. Miaoudakis, Nikolaos E. Petroulakis
, George Alexandris, Giorgos Demetriou, Giuditta Morandi, Urszula Rak, Karolina Waledzik, Marios Panayiotou, Christos Iraklis Tsatsoulis:
IDEAL-CITIES - A Trustworthy and Sustainable Framework for Circular Smart Cities. DCOSS 2019: 443-450 - [c42]Amalia Damianou, Constantinos Marios Angelopoulos, Vasilis Katos:
An Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities. DCOSS 2019: 465-472 - [c41]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis
, Vasilis Katos:
A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services. e-Democracy 2019: 161-177 - [c40]Mohammad Heydari, Alexios Mylonas
, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi:
Uncertainty-Aware Authentication Model for IoT. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 224-237 - [c39]Mohammad Heydari, Alexios Mylonas
, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
Uncertainty-Aware Authentication Model for Fog Computing in IoT. FMEC 2019: 52-59 - [c38]Ge Zheng, Wei Koong Chai, Vasilis Katos:
An Ensemble Model for Short-Term Traffic Prediction in Smart City Transportation System. GLOBECOM 2019: 1-6 - [c37]Mohammad Heydari, Alexios Mylonas
, Vasilios Katos, Emili Balaguer-Ballester, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa:
A Location-Aware Authentication Model to Handle Uncertainty in IoT. IoTSMS 2019: 43-50 - [p1]Mohammad Heydari, Alexios Mylonas, Vasileios Katos, Dimitris Gritzalis:
Towards Indeterminacy-Tolerant Access Control in IoT. Handbook of Big Data and IoT Security 2019: 53-71 - [i3]Constantinos Marios Angelopoulos, Vasilios Katos, Theodoros Kostoulas, Andreas I. Miaoudakis, Nikolaos E. Petroulakis, George Alexandris, Giorgos Demetriou, Giuditta Morandi, Karolina Waledzik, Urszula Rak, Marios Panayiotou, Christos Iraklis Tsatsoulis:
IDEAL-CITIES: A Trustworthy and Sustainable Framework for Circular Smart Cities. CoRR abs/1907.11042 (2019) - [i2]Constantinos Patsakis, Fran Casino, Vasilios Katos:
Encrypted and Covert DNS Queries for Botnets: Challenges and Countermeasures. CoRR abs/1909.07099 (2019) - [i1]Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos:
Unravelling Ariadne's Thread: Exploring the Threats of Decentalised DNS. CoRR abs/1912.03552 (2019) - 2018
- [j28]Antonia Nisioti
, Alexios Mylonas
, Paul D. Yoo
, Vasilios Katos
:
From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods. IEEE Commun. Surv. Tutorials 20(4): 3369-3388 (2018) - [c36]Sofia Alexaki, George Alexandris, Vasilis Katos, Nikolaos E. Petroulakis
:
Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions. CAMAD 2018: 1-6 - [c35]George Alexandris, Vasilis Katos, Sofia Alexaki, George Hatzivasilis:
Blockchains as Enablers for Auditing Cooperative Circular Economy Networks. CAMAD 2018: 1-7 - 2017
- [j27]Nikolaos Tsalis, Alexios Mylonas
, Antonia Nisioti, Dimitris Gritzalis, Vasilios Katos:
Exploring the protection of private browsing in desktop browsers. Comput. Secur. 67: 181-197 (2017) - [j26]Sofia-Anna Menesidou
, Vasilios Katos, Georgios Kambourakis
:
Cryptographic Key Management in Delay Tolerant Networks: A Survey. Future Internet 9(3): 26 (2017) - [j25]Ioannis Tsimperidis
, Shahin Rostami
, Vasilios Katos:
Age Detection Through Keystroke Dynamics from User Authentication Failures. Int. J. Digit. Crime Forensics 9(1): 1-16 (2017) - [j24]Sofia-Anna Menesidou, Vasilios Katos:
Opportunistic key management in delay tolerant networks. Int. J. Inf. Comput. Secur. 9(3): 212-228 (2017) - [c34]Jodie Ward, Huseyin Dogan
, Edward Apeh, Alexios Mylonas
, Vasilios Katos:
Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme. HCI (22) 2017: 396-413 - [c33]Antonia Nisioti, Alexios Mylonas
, Vasilios Katos, Paul D. Yoo
, Anargyros Chryssanthou:
You can run but you cannot hide from memory: Extracting IM evidence of Android apps. ISCC 2017: 457-464 - [c32]Antonia Nisioti, Mohammad Heydari, Alexios Mylonas
, Vasilios Katos, Vahid Heydari Fami Tafreshi
:
TRAWL: Protection against rogue sites for the masses. RCIS 2017: 120-127 - [c31]Theodora Tsikrika
, Babak Akhgar, Vasilis Katos, Stefanos Vrochidis
, Pete Burnap, Matthew L. Williams:
1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web. WSDM 2017: 823-824 - [e2]Markos Zampoglou, Stefanos Vrochidis, Anderson Rocha, Vasilis Katos:
Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, MFSec@ICMR 2017, Bucharest, Romania, June 6, 2017. ACM 2017, ISBN 978-1-4503-5034-1 [contents] - 2016
- [j23]Sofia-Anna Menesidou
, Dimitrios Vardalis, Vasilios Katos
:
Automated key exchange protocol evaluation in delay tolerant networks. Comput. Secur. 59: 1-8 (2016) - [j22]Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos
:
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment. Inf. Comput. Secur. 24(1): 2-19 (2016) - [c30]Shamal Faily, Georgia Lykou, Anton Partridge, Dimitris Gritzalis, Alexios Mylonas, Vasilios Katos:
Human-Centered Specification Exemplars for Critical Infrastructure Environments. BCS HCI 2016 - [c29]Antonios Dimitriadis, Pavlos S. Efraimidis, Vasilios Katos
:
Malevolent app pairs: an Android permission overpassing scheme. Conf. Computing Frontiers 2016: 431-436 - [c28]Konstantinos Fysarakis
, Ioannis G. Askoxylakis, Othonas Soultatos, Ioannis Papaefstathiou
, Charalampos Manifavas, Vasilios Katos:
Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application. GLOBECOM 2016: 1-7 - [c27]Nitin Naik, Paul Jenkins, Nick Savage, Vasilios Katos:
Big data security analysis approach using Computational Intelligence techniques in R for desktop users. SSCI 2016: 1-8 - 2015
- [j21]Ioannis Tsimperidis
, Vasilios Katos
, Nathan L. Clarke
:
Language-independent gender identification through keystroke analysis. Inf. Comput. Secur. 23(3): 286-301 (2015) - [j20]Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos, Lilian Mitrou:
Reengineering the user: privacy concerns about personal data on smartphones. Inf. Comput. Secur. 23(4): 394-405 (2015) - [j19]Ioannis Psaroudakis, Vasilios Katos
, Pavlos S. Efraimidis:
A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. Secur. Commun. Networks 8(3): 486-500 (2015) - [c26]Raian Ali
, John McAlaney
, Shamal Faily, Keith Phalp, Vasilios Katos
:
Mitigating Circumstances in Cybercrime: A Position Paper. CIT/IUCC/DASC/PICom 2015: 1972-1976 - [c25]Shamal Faily, George Stergiopoulos, Vasilios Katos
, Dimitris Gritzalis:
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar. CRITIS 2015: 243-246 - 2014
- [j18]Ioannis Psaroudakis, Vasilios Katos
, Panagiotis Saragiotis, Lilian Mitrou:
A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol. Int. J. Electron. Secur. Digit. Forensics 6(4): 241-267 (2014) - [c24]Moufida Sadok, Vasilios Katos, Peter M. Bednar:
Developing contextual understanding of information security risks. HAISA 2014: 1-10 - [c23]Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos:
Reengineering the user: Privacy concerns about personal data on smartphones. HAISA 2014: 80-89 - 2013
- [j17]Stavros N. Shiaeles
, Anargyros Chryssanthou, Vasilios Katos
:
On-scene triage open source forensic tool chests: Are they effective? Digit. Investig. 10(2): 99-115 (2013) - [j16]Athina Provataki, Vasilios Katos
:
Differential malware forensics. Digit. Investig. 10(4): 311-322 (2013) - [j15]Konstantia Barmpatsalou
, Dimitrios Damopoulos, Georgios Kambourakis
, Vasilios Katos
:
A critical review of 7 years of Mobile Device Forensics. Digit. Investig. 10(4): 323-349 (2013) - [j14]Vasilios Katos
, Frank Stowell, Peter M. Bednar
:
Macroeconomics of Privacy and Security for Identity Management and Surveillance. Kybernetes 42(1): 140-163 (2013) - [c22]Ioannis Tsimperidis
, Vasilios Katos
:
Keystroke forensics: are you typing on a desktop or a laptop? BCI 2013: 89-94 - [c21]Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos
, Ioannis Psaroudakis, Panajotis Katsaros
, Anakreon Mentis:
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? IISA 2013: 1-6 - [e1]Steven Furnell, Nathan L. Clarke, Vasilios Katos:
European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings. Plymouth University 2013, ISBN 978-1-84102-345-8 [contents] - 2012
- [j13]Stavros N. Shiaeles
, Vasilios Katos
, Alexandros S. Karakos, Basil K. Papadopoulos:
Real time DDoS detection using fuzzy estimators. Comput. Secur. 31(6): 782-790 (2012) - [j12]Stavroula Karayianni, Vasilios Katos
, Christos K. Georgiadis
:
A framework for password harvesting from volatile memory. Int. J. Electron. Secur. Digit. Forensics 4(2/3): 154-163 (2012) - [j11]Vasilios Katos
:
An integrated model for online transactions: illuminating the black box. Inf. Manag. Comput. Secur. 20(3): 184-206 (2012) - [c20]Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos:
User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. HAISA 2012: 139-149 - [c19]Alexandra Maria Varka, Vasilios Katos:
On the user acceptance of graphical passwords. HAISA 2012: 150-159 - [c18]Sofia-Anna Menesidou
, Vasilios Katos
:
Authenticated Key Exchange (AKE) in Delay Tolerant Networks. SEC 2012: 49-60 - [c17]Ioannis Psaroudakis, Vasilios Katos
, Pavlos S. Efraimidis:
A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network. SEC 2012: 543-548 - [c16]Anargyros Chryssanthou, Vasilios Katos:
Assessing forensic readiness. WDFIA 2012: 107-118 - [c15]Nathan L. Clarke
, Vasilios Katos
, Sofia-Anna Menesidou
, Bogdan V. Ghita
, Steven Furnell
:
A Novel Security Architecture for a Space-Data DTN. WWIC 2012: 342-349 - 2011
- [j10]Theodoros Spyridopoulos
, Vasilios Katos
:
Requirements for a Forensically Ready Cloud Storage Service. Int. J. Digit. Crime Forensics 3(3): 19-36 (2011) - [c14]Vasilios Katos
, Dimitris Vrakas, Panagiotis Katsaros
:
A Framework for Access Control with Inference Constraints. COMPSAC 2011: 289-297 - [c13]Stavroula Karayianni, Vasilios Katos
:
Practical Password Harvesting from Volatile Memory. ICGS3/e-Democracy 2011: 17-22 - [c12]Theodoros Spyridopoulos, Vasilios Katos:
Towards a forensically ready cloud storage service. WDFIA 2011: 93-107 - 2010
- [j9]Theodoros Kavallaris, Vasilios Katos
:
On the detection of pod slurping attacks. Comput. Secur. 29(6): 680-685 (2010) - [c11]Vasilios Katos
, Frank Stowell, Peter M. Bednar
:
Surveillance, Privacy and the Law of Requisite Variety. DPM/SETOP 2010: 123-139
2000 – 2009
- 2009
- [j8]Vasilios Katos
, Frank Stowell, Peter M. Bednar
:
From Synergy to Symbiosis: New Directions in Security and Privacy? Int. J. Inf. Technol. Syst. Approach 2(2): 1-14 (2009) - [c10]Aimilia Tasidou, Pavlos S. Efraimidis, Vasilios Katos
:
Economics of Personal Data Management: Fair Personal Information Trades. e-Democracy 2009: 151-160 - [c9]Georgios J. Pangalos, Vasilios Katos
:
Information Assurance and Forensic Readiness. e-Democracy 2009: 181-188 - [c8]Peter M. Bednar, Vasilios Katos:
Addressing The Human Factor In Information Systems Security. MCIS 2009: 72 - [c7]Theodoros Kavallaris, Vasilios Katos:
Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP Platform. WDFIA 2009: 1-8 - [c6]Peter M. Bednar, Vasilios Katos:
Diversity Networks in Digital Investigations. WDFIA 2009: 63-71 - 2008
- [j7]Vasilios Katos
, Peter M. Bednar
:
A cyber-crime investigation framework. Comput. Stand. Interfaces 30(4): 223-228 (2008) - [j6]Peter M. Bednar
, Christine E. Welch, Vasilios Katos
:
Innovation management through the use of diversity networks. Int. J. Knowl. Learn. 4(4): 357-369 (2008) - [j5]Vasilios Katos
, Ahmed Patel:
A partial equilibrium view on security and privacy. Inf. Manag. Comput. Secur. 16(1): 74-83 (2008) - [c5]James S. Briggs, Vasilios Katos, Azzri Bhaludin:
On the Security Controls of Portable Computing Devices in Healthcare Environments. INC 2008: 161-170 - 2007
- [j4]Vasilios Katos
, Bernard S. Doherty:
Exploring confusion in product ciphers through regression analysis. Inf. Sci. 177(8): 1789-1795 (2007) - [j3]Vasilios Katos
:
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Inf. Sci. 177(15): 3060-3073 (2007) - [c4]Peter M. Bednar, Vasilios Katos, Christine E. Welch:
Systems Analysis: Exploring the Spectrum of Diversity. ECIS 2007: 647-657 - [c3]Clare Wilson, Vasilios Katos
, Caroline Strevens
:
An Interdisciplinary Approach to Forensic IT and Forensic Psychology Education. World Conference on Information Security Education 2007: 65-71 - 2005
- [j2]Vasilios Katos
:
A randomness test for block ciphers. Appl. Math. Comput. 162(1): 29-35 (2005) - [j1]Vasilios Katos
, Carl Adams:
Modelling corporate wireless security and privacy. J. Strateg. Inf. Syst. 14(3): 307-321 (2005) - [c2]Carl Adams, Vasilios Katos
:
Privacy Challenges for Location Aware Technologies. MOBIS 2005: 303-310 - 2004
- [c1]Vasilios Katos:
Diffusion Behaviour of Cryptographic Primitives in Feistel Networks. WOSIS 2004: 79-87
1990 – 1999
- 1999
- [b1]Vasilios Katos:
Product cipher negotiation with on-line evaluation for private communication over computer networks. Aston University, Birmingham, UK, 1999
Coauthor Index
Constantinos Marios Angelopoulos
aka: Marios Angelopoulos
aka: Marios Angelopoulos