Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: John Iliadis
@article{DBLP:journals/imcs/MoulinosIT04, author = {Konstantinos Moulinos and John Iliadis and Vassilis Tsoumas}, title = {Towards secure sealing of privacy policies}, journal = {Inf. Manag. Comput. Secur.}, volume = {12}, number = {4}, pages = {350--361}, year = {2004}, url = {https://doi.org/10.1108/09685220410553569}, doi = {10.1108/09685220410553569}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MoulinosIT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/IliadisGSCPG03, author = {John Iliadis and Stefanos Gritzalis and Diomidis Spinellis and Danny De Cock and Bart Preneel and Dimitris Gritzalis}, title = {Towards a framework for evaluating certificate status information mechanisms}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1839--1850}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00079-3}, doi = {10.1016/S0140-3664(03)00079-3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/IliadisGSCPG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/IliadisGG03, author = {John Iliadis and Stefanos Gritzalis and Dimitris Gritzalis}, title = {ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1851--1862}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00080-X}, doi = {10.1016/S0140-3664(03)00080-X}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/IliadisGG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GritzalisMILX01, author = {Dimitris Gritzalis and Konstantinos Moulinos and John Iliadis and Costas Lambrinoudakis and S. Xarhoulacos}, editor = {Michel Dupuy and Pierre Paradinas}, title = {Pythia: Towards Anonymity in Authentication}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {1--18}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 26 Jul 2002 13:05:24 +0200}, biburl = {https://dblp.org/rec/conf/sec/GritzalisMILX01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GritzalisIO00, author = {Stefanos Gritzalis and John Iliadis and Spyros Oikonomopoulos}, title = {Distributed component software security issues on deploying a secure electronic marketplace}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {5--13}, year = {2000}, url = {https://doi.org/10.1108/09685220010312290}, doi = {10.1108/09685220010312290}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GritzalisIO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IliadisSGPK00, author = {John Iliadis and Diomidis Spinellis and Dimitris Gritzalis and Bart Preneel and Sokratis K. Katsikas}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Evaluating certificate status information mechanisms}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {1--8}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352603}, doi = {10.1145/352600.352603}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IliadisSGPK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpinellisGIGK99, author = {Diomidis Spinellis and Stefanos Gritzalis and John Iliadis and Dimitris Gritzalis and Sokratis K. Katsikas}, title = {Trusted third party services for deploying secure telemedical applications over the {WWW}}, journal = {Comput. Secur.}, volume = {18}, number = {7}, pages = {627--639}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)82041-0}, doi = {10.1016/S0167-4048(99)82041-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpinellisGIGK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/KatsikasSIB98, author = {Sokratis K. Katsikas and Diomidis D. Spinellis and John Iliadis and Bernd Blobel}, title = {Using trusted third parties for secure telemedical applications over the {WWW:} The {EUROMED-ETS} approach}, journal = {Int. J. Medical Informatics}, volume = {49}, number = {1}, pages = {59--68}, year = {1998}, url = {https://doi.org/10.1016/S1386-5056(98)00011-2}, doi = {10.1016/S1386-5056(98)00011-2}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/KatsikasSIB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/GritzalisI98, author = {Stefanos Gritzalis and John Iliadis}, editor = {Roland R. Wagner}, title = {Addressing Security Issues in Programming Languages for Mobile Code}, booktitle = {Ninth International Workshop on Database and Expert Systems Applications, Vienna, Austria, August 24-28, 1998, Proceedings}, pages = {288--293}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/DEXA.1998.707415}, doi = {10.1109/DEXA.1998.707415}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/GritzalisI98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/IliadisGO98, author = {John Iliadis and Stefanos Gritzalis and V. Oikonomou}, editor = {Wolfgang D. Ehrenberger}, title = {Towards Secure Downloadable Executable Content: The Java Paradigm}, booktitle = {Computer Safety, Reliability and Security, 17th International Conference, SAFECOMP'98, Heidelberg, Germany, October 5-7, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1516}, pages = {117--127}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49646-7\_9}, doi = {10.1007/3-540-49646-7\_9}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/IliadisGO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.