Modeling Security in Cyber-Physical Systems M Burmester, E Magkos, V Chrissikopoulos International Journal of Critical Infrastructure Protection 5 (3-4), 118-126, 2012 | 135 | 2012 |
Receipt-freeness in large-scale elections without untappable channels E Magkos, M Burmester, V Chrissikopoulos 1st IFIP Conference on E-Commerce / E-Business/ E-Government, 683-693, 2002 | 124 | 2002 |
Towards secure and practical e-elections in the new era M Burmester, E Magkos Advances in Information Security - Secure Electronic Voting, 63-76, 2003 | 104 | 2003 |
Strengthening privacy protection in VANETs M Burmester, E Magkos, V Chrissikopoulos WIMOB '08 - IEEE International Conference on Wireless and Mobile Computing …, 2008 | 78 | 2008 |
DEFeND architecture: a privacy by design platform for GDPR compliance L Piras, MG Al-Obeidallah, A Praitano, A Tsohou, H Mouratidis, ... Trust, Privacy and Security in Digital Business: 16th International …, 2019 | 53 | 2019 |
Privacy in statistical databases J Domingo-Ferrer, Y Saygin Springer, 2008 | 53 | 2008 |
A framework for secure and verifiable logging in public communication networks V Stathopoulos, P Kotzanikolaou, E Magkos CRITIS'06 - 1st International Workshop on Critical Information …, 2006 | 42 | 2006 |
Accurate and large-scale privacy-preserving data mining using the election paradigm E Magkos, M Maragoudakis, V Chrissikopoulos, S Gritzalis Data & Knowledge Engineering 68 (11), 1224-1236, 2009 | 41 | 2009 |
Lightweight private proximity testing for geospatial social networks P Kotzanikolaou, C Patsakis, E Magkos, M Korakakis Computer Communications 73, 263-270, 2016 | 40 | 2016 |
A digital twin-based cyber range for SOC analysts M Vielberth, M Glas, M Dietz, S Karagiannis, E Magkos, G Pernul IFIP Annual Conference on Data and Applications Security and Privacy, 293-311, 2021 | 39 | 2021 |
Cryptographic approaches for privacy preservation in location-based services: A survey E Magkos Systems approach applications for developments in information technology …, 2012 | 33 | 2012 |
Strong forward security M Burmester, V Chrissikopoulos, P Kotzanikolaou, E Magkos IFIP-SEC '01 Conference, 109-119, 2002 | 32 | 2002 |
Hybrid key establishment for multiphase self-organized sensor networks P Kotzanikolaou, E Magkos Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 31 | 2005 |
Engaging students in basic cybersecurity concepts using digital game-based learning: Computer games as virtual learning environments S Karagiannis, E Magkos Advances in Core Computer Science-Based Technologies: Papers in Honor of …, 2021 | 29 | 2021 |
Adapting CTF challenges into virtual cybersecurity learning environments S Karagiannis, E Magkos Information & Computer Security 29 (1), 105-132, 2020 | 27 | 2020 |
An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools S Karagiannis, E Maragkos-Belmpas, E Magkos IFIP World Conference on Information Security Education, 61-77, 2020 | 27 | 2020 |
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform A Tsohou, E Magkos, H Mouratidis, G Chrysoloras, L Piras, M Pavlidis, ... Information & Computer Security 28 (4), 531-553, 2020 | 24 | 2020 |
Secure fingerprint verification based on image processing segmentation using computational geometry algorithms M Poulos, E Magkos, V Chrissikopoulos, N Alexandris SPPRA '2003 - IASTED International Conference on Signal Processing, Pattern …, 2003 | 24 | 2003 |
Secure and practical key establishment for distributed sensor networks P Kotzanikolaou, E Magkos, D Vergados, M Stefanidakis Security and Communication Networks 2 (6), 595-610, 2009 | 23 | 2009 |
Parental Control and Children’s Internet Safety: The Good, the Bad and the Ugly E Magkos, E Kleisiari, P Chanias, V Giannakouris-Salalidis 6th International Conference on Information Law and Ethics (ICIL 2014), 2014 | 22 | 2014 |