Politis, Ilias
109  results:
Search for persons X
?
 
?
 
?
4

TRUSTEE's Framework for DPIAs: Safeguarding personal inform..:

, In: 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD),
 
?
5

Multi-Attribute Decision Making-based Trust Score Calculati..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
6

An inclusive Lifecycle Approach for IoT Devices Trust and I..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
7

Towards building a Self-Sovereign Identity Framework for He..:

, In: 2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC),
 
?
8

OPSEC VS Leaked Credentials: Password reuse in Large-Scale ..:

, In: 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD),
 
?
9

TRUSTEE: Towards the creation of secure, trustworthy and pr..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
10

Enhancing 3GPP CAPIF Authentication and Authorization Acros..:

, In: ICC 2023 - IEEE International Conference on Communications,
 
?
11

Architectural Insights into TRUSTEE's Authentication Manage..:

, In: 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD),
 
?
12

Securing the Flow: Security and Privacy Tools for Flow-base..:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
13

Trusted and Secure Self-Sovereign Identity framework:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
14

Improving Network, Data and Application Security for SMEs:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
15

Secret sharing a key in a distributed way, Lagrange vs Newt..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
1-15