Giannetsos, Thanassis
27  results:
Search for persons X
?
2

Achieving Higher Level of Assurance in Privacy Preserving I..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
 
?
3

ZEKRA: Zero-Knowledge Control-Flow Attestation:

, In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security,
 
?
4

Explainable Artificial Intelligence to Enhance Data Trustwo..:

, In: 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT),
 
?
5

RETRACT: Expressive Designated Verifier Anonymous Credentia..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
6

ID-Based Self-encryption via Hyperledger Fabric Based Smart..:

, In: Blockchain Technology and Emerging Technologies; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
 
?
 
?
8

Combining ID's, Attributes, and Policies in Hyperledger Fab..:

, In: Blockchain Technology and Emerging Technologies; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
 
?
9

Towards Privacy-First Security Enablers for 6G Networks: Th..:

, In: Lecture Notes in Computer Science; Embedded Computer Systems: Architectures, Modeling, and Simulation,
 
?
10

ZEKRO: Zero-Knowledge Proof of Integrity Conformance:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
11

Root-of-Trust Abstractions for Symbolic Analysis: Applicati..:

, In: Security and Trust Management; Lecture Notes in Computer Science,
 
?
12

STARdom: An Architecture for Trusted and Secure Human-Cente..:

, In: Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems; IFIP Advances in Information and Communication Technology,
Rožanec, Jože M. ; Zajec, Patrik ; Kenda, Klemen... - p. 199-207 , 2021
 
?
13

Direct anonymous attestation on the road : efficient and..:

, In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
14

Modelling Audiological Preferences using Federated Learning:

, In: Adjunct Publication of the 28th ACM Conference on User Modeling, Adaptation and Personalization,
 
?
15

CloudVaults: Integrating Trust Extensions into System Integ..:

, In: Computer Security; Lecture Notes in Computer Science,
 
1-15