124 results on '"Gritzalis, D."'
Search Results
2. Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment
3. Browser Blacklists: The Utopia of Phishing Protection
4. SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned
5. Attack modeling in open network environments
6. Improving the security of medical database systems
7. A classification of health information systems security flaws
8. Browser Blacklists: The Utopia of Phishing Protection
9. OntoSPIT: SPIT management through ontologies
10. SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues
11. Access control in the industrial internet of things
12. Medical data protection: A proposal for a deontology code
13. Determining access rights for medical information systems
14. Cryptology and network security: 13th international conference, CANS 2014 Heraklion, Crete, Greece, October 22-24, 2014 Proceedings
15. Secure multiparty linear programming using fixed-point arithmetic
16. Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards*
17. Non-repudiation analysis with LYSA
18. SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned
19. Assessing Security in Energy-Efficient Sensor Networks
20. Secure Audit Logging with Tamper-Resistant Hardware
21. PINPAS: a tool for power analysis of smartcards
22. Kamouflage: loss-resistant password management
23. On a taxonomy of delegation
24. The Sphinx enigma in critical VoIP infrastructures: Human or botnet?
25. A Practical Steganographic Approach for Matroska Based High Quality Video Files
26. Partnership with customers in product improvement: Testing embedded software products in the field
27. Testing based on users' quality needs
28. User Involvement in RTD. Practics and Policy Lessons
29. Remote Voting via the Internet?
30. SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment
31. Threat Analysis of the Session Initiation Protocol Regarding Spam
32. Framing the digital territories - Editorial
33. The ambient intelligence paradigm: a review of security and privacy strategies in leading economies
34. Towards an Ontology-based Security Management
35. Introduction
36. Exploitation of auctions for outsourcing security-critical projects.
37. ASPF: Adaptive anti-SPIT Policy-based Framework.
38. BLAST: Off-the-Shelf Hardware for Building an Efficient Hash-Based Cluster Storage System.
39. Electronic voting systems: security implications of the administrative workflow.
40. An integrated architecture for deploying a virtual private medical network over the Web
41. Consumer online-privacy and anonymity protection using infomediary schemes.
42. Developing secure Web-based medical applications
43. Generic security policies for healthcare information systems
44. Data security in medical information systems: The Greek case
45. Data security in medical information systems: technical aspects of a proposed legislation
46. Common Body of Knowledge for Information Security.
47. A data protection scheme for a remote vital signs monitoring healthcare service.
48. Towards a formal system-to-system authentication protocol
49. Model for network behaviour under viral attack
50. Methods of responding to healthcare security incidents
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.