关注
Emmanouil (Manos) Magkos
Emmanouil (Manos) Magkos
Professor, Department of Informatics, Ionian University
在 ionio.gr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Modeling Security in Cyber-Physical Systems
M Burmester, E Magkos, V Chrissikopoulos
International Journal of Critical Infrastructure Protection 5 (3-4), 118-126, 2012
1352012
Receipt-freeness in large-scale elections without untappable channels
E Magkos, M Burmester, V Chrissikopoulos
1st IFIP Conference on E-Commerce / E-Business/ E-Government, 683-693, 2002
1242002
Towards secure and practical e-elections in the new era
M Burmester, E Magkos
Advances in Information Security - Secure Electronic Voting, 63-76, 2003
1042003
Strengthening privacy protection in VANETs
M Burmester, E Magkos, V Chrissikopoulos
WIMOB '08 - IEEE International Conference on Wireless and Mobile Computing …, 2008
782008
DEFeND architecture: a privacy by design platform for GDPR compliance
L Piras, MG Al-Obeidallah, A Praitano, A Tsohou, H Mouratidis, ...
Trust, Privacy and Security in Digital Business: 16th International …, 2019
532019
Privacy in statistical databases
J Domingo-Ferrer, Y Saygin
Springer, 2008
532008
A framework for secure and verifiable logging in public communication networks
V Stathopoulos, P Kotzanikolaou, E Magkos
CRITIS'06 - 1st International Workshop on Critical Information …, 2006
422006
Accurate and large-scale privacy-preserving data mining using the election paradigm
E Magkos, M Maragoudakis, V Chrissikopoulos, S Gritzalis
Data & Knowledge Engineering 68 (11), 1224-1236, 2009
412009
Lightweight private proximity testing for geospatial social networks
P Kotzanikolaou, C Patsakis, E Magkos, M Korakakis
Computer Communications 73, 263-270, 2016
402016
A digital twin-based cyber range for SOC analysts
M Vielberth, M Glas, M Dietz, S Karagiannis, E Magkos, G Pernul
IFIP Annual Conference on Data and Applications Security and Privacy, 293-311, 2021
392021
Cryptographic approaches for privacy preservation in location-based services: A survey
E Magkos
Systems approach applications for developments in information technology …, 2012
332012
Strong forward security
M Burmester, V Chrissikopoulos, P Kotzanikolaou, E Magkos
IFIP-SEC '01 Conference, 109-119, 2002
322002
Hybrid key establishment for multiphase self-organized sensor networks
P Kotzanikolaou, E Magkos
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
312005
Engaging students in basic cybersecurity concepts using digital game-based learning: Computer games as virtual learning environments
S Karagiannis, E Magkos
Advances in Core Computer Science-Based Technologies: Papers in Honor of …, 2021
292021
Adapting CTF challenges into virtual cybersecurity learning environments
S Karagiannis, E Magkos
Information & Computer Security 29 (1), 105-132, 2020
272020
An analysis and evaluation of open source capture the flag platforms as cybersecurity e-learning tools
S Karagiannis, E Maragkos-Belmpas, E Magkos
IFIP World Conference on Information Security Education, 61-77, 2020
272020
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
A Tsohou, E Magkos, H Mouratidis, G Chrysoloras, L Piras, M Pavlidis, ...
Information & Computer Security 28 (4), 531-553, 2020
242020
Secure fingerprint verification based on image processing segmentation using computational geometry algorithms
M Poulos, E Magkos, V Chrissikopoulos, N Alexandris
SPPRA '2003 - IASTED International Conference on Signal Processing, Pattern …, 2003
242003
Secure and practical key establishment for distributed sensor networks
P Kotzanikolaou, E Magkos, D Vergados, M Stefanidakis
Security and Communication Networks 2 (6), 595-610, 2009
232009
Parental Control and Children’s Internet Safety: The Good, the Bad and the Ugly
E Magkos, E Kleisiari, P Chanias, V Giannakouris-Salalidis
6th International Conference on Information Law and Ethics (ICIL 2014), 2014
222014
系统目前无法执行此操作,请稍后再试。
文章 1–20