• Article  

      Data-centric privacy protocol for intensive care grids 

      Luna, J.; Dikaiakos, Marios D.; Marazakis, M.; Kyprianou, T. (2010)
      Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid systems. In particular, intensive care medicine uses ...
    • Article  

      Do human cognitive differences in information processing affect preference and performance of CAPTCHA? 

      Belk, Marios; Fidas, Christos A.; Germanakos, Panagiotis; Samaras, George S. (2015)
      A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a widely used security defense mechanism that is utilized by service providers to determine whether the entity interacting with their ...
    • Article  

      A graph-theoretic network security game 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2005)
      Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. We model this practical network scenario as a non-cooperative multi-player game on ...
    • Article  

      A graph-theoretic network security game 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Philippou, Anna; Spirakis, Paul G. (2008)
      Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multi-player game on a graph, ...
    • Conference Object  

      IHIP: Towards a user centric Individual Human Interaction Proof framework 

      Fidas, Christos A.; Hussmann, H.; Belk, Marios; Samaras, George S. (Association for Computing Machinery, 2015)
      A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a widely used Human Interaction Proof mechanism to protect on-line services against automated software agents. Nowadays, there is a ...
    • Conference Object  

      A novel 3-d model for node and system trust 

      Hadjichristofi, G. C.; Kappos, G.; Hadjicostis, Christoforos N. (2011)
      Nowadays, there is an increasing demand for wireless and mobile networks that guarantee secure and reliable data communication among users. To enable data exchanges, authentication mechanisms need to be in place to dynamically ...
    • Conference Object  

      Opacity verification in stochastic discrete event systems 

      Saboori, A.; Hadjicostis, Christoforos N. (2010)
      Motivated by security and privacy considerations in applications of discrete event systems, various notions of opacity have been introduced. Specifically, a system is said to be current-state opaque if the entrance of the ...
    • Article  

      The price of defense and fractional matchings 

      Mavronicolas, Marios; Lesta, Vicky Papadopoulou; Persiano, Giuseppe; Philippou, Anna; Spirakis, Paul G. (2006)
      Consider a network vulnerable to security attacks and equipped with defense mechanisms. How much is the loss in the provided security guarantees due to the selfish nature of attacks and defenses? The Price of Defense was ...
    • Article  

      Security for diversity: Studying the effects of verbal and imagery processes on user authentication mechanisms 

      Belk, Marios; Fidas, Christos A.; Germanakos, Panagiotis; Samaras, George S. (2013)
      Stimulated by a large number of different theories on human cognition, suggesting that individuals have different habitual approaches in retrieving, recalling, processing and storing verbal and graphical information, this ...
    • Conference Object  

      Security in future mobile sensor networks - Issues and challenges 

      Stavrou, E.; Pitsillides, A.; Hadjichristofi, G.; Hadjicostis, Christoforos N. (2010)
      Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
    • Conference Object  

      Security in future mobile sensor networks - Issues and challenges 

      Stavrou, Eliana; Pitsillides, Andreas; Hadjichristofi, George C.; Hadjicostis, Christoforos N. (2010)
      Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that ...
    • Article  

      Security in the cache and forward architecture for the next generation Internet 

      Hadjichristofi, G. C.; Hadjicostis, Christoforos N.; Raychaudhuri, D. (2011)
      The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network ...
    • Article  

      Self-stabilizing virtual synchrony 

      Dolev, S.; Georgiou, Chryssis; Marcoullis, Ioannis; Schiller, E. M. (2015)
      Virtual synchrony (VS) is an important abstraction that is proven to be extremely useful when implemented over asynchronous, typically large, message-passing distributed systems. Fault tolerant design is critical for the ...
    • Article  

      A survey on secure multipath routing protocols in WSNs 

      Stavrou, Eliana; Pitsillides, Andreas (2010)
      Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN ...
    • Article  

      Using argumentation logic for firewall policy specification and analysis 

      Bandara, A. K.; Kakas, Antonis C.; Lupu, E. C.; Russo, A. (2006)
      Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...
    • Conference Object  

      Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks 

      Stavrou, Eliana; Pitsillides, Andreas (2011)
      Wireless sensor networks (WSNs) have become a hot research topic in recent years and are considered to be one of the building blocks of pervasive computing. Many diverse, mission-critical applications are deployed, including ...