Search results for: Stefanos Gritzalis
Requirements Engineering > 2019 > 24 > 3 > 403-430
Educational Technology Research and Development > 2018 > 66 > 2 > 341-384
Security and Communication Networks > 9 > 18 > 6285 - 6314
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Cyber-attack and Cyber-terrorism > 280-289
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Session 4: Authentication and Access Control > 135-144
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Security and Privacy in Real Life Applications > 52-62
Lecture Notes in Computer Science > Trust, Privacy, and Security in Digital Business > Digital Business > 10-19
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Trustworthiness, Reliability and Services in Ubiquitous and Sensor Networks > 12-21
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Reliability and Security of Content and Data > 62-73
Lecture Notes in Computer Science > Public Key Infrastructures, Services and Applications > Session 5: Identity Management > 171-177
Lecture Notes in Computer Science > Computer Safety, Reliability, and Security > Dependability of Critical Infrastructures > 331-341
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems: OTM 2010 > International Symposium on Information Security (IS) International Conference 2010 > 582-582
Lecture Notes in Computer Science > Electronic Government and the Information Systems Perspective > E-Government Services and Web 2.0 (I) > 142-149
Lecture Notes in Computer Science > Trust and Privacy in Digital Business > Session 3: Security Requirements and Development > 62-70
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Access Control > 165-176