{"id":1000,"date":"2018-12-25T22:44:03","date_gmt":"2018-12-25T20:44:03","guid":{"rendered":"http:\/\/ssl.ds.unipi.gr\/?page_id=1000"},"modified":"2019-01-28T18:47:38","modified_gmt":"2019-01-28T16:47:38","slug":"costaslambrinoudakis","status":"publish","type":"page","link":"https:\/\/laboratories.ds.unipi.gr\/ssl\/costaslambrinoudakis\/","title":{"rendered":"Prof. Costas Lambrinoudakis"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1000\" class=\"elementor elementor-1000 elementor-bc-flex-widget\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a15dddf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a15dddf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-869b1d5\" data-id=\"869b1d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d39649b elementor-widget elementor-widget-text-editor\" data-id=\"d39649b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><b style=\"font-size: 1rem;\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman',serif; mso-ascii-theme-font: major-bidi; mso-fareast-font-family: 'Times New Roman'; mso-hansi-theme-font: major-bidi; mso-bidi-theme-font: major-bidi;\"><a href=\"http:\/\/ssl.ds.unipi.gr\/wp-content\/uploads\/2019\/01\/Costas-Lambrinoudakis.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-1260 alignleft\" src=\"http:\/\/ssl.ds.unipi.gr\/wp-content\/uploads\/2019\/01\/Costas-Lambrinoudakis.jpg\" alt=\"\" width=\"247\" height=\"328\" \/><\/a><\/span><\/b><\/p><p><span style=\"color: #808080;\"><strong>Prof. Costas Lambrinoudakis<\/strong>\u00a0holds a B.Sc. (Electrical and Electronic Engineering) from the University of Salford (1985), an M.Sc. (Control Systems) from the University of London (Imperial College -1986), and a Ph.D. (Computer Science) from the University of London (Queen Mary and Westfield College &#8211; 1991). Currently, he is a Professor at the Department of Digital Systems, University of Piraeus, Greece. From 1998 until 2009 he has held teaching position with the University of the Aegean, Department of Information and Communication Systems Engineering, Greece.\u00a0 For the period 2012-2015, he was a member of the board of the Hellenic Authority for Communication Security and Privacy, while from 2016 he serves on the board of the Hellenic Data Protection Authority. Finally, from 2015, he is Head of the Department of Digital Systems and Director of the Systems Security Lab.\u00a0His current research interests are in the areas of Information and Communication Systems Security and of Privacy Enhancing Technologies. For many years he is working on issues related to the protection of personal data and the compliance of information systems to the National and European Legislation.\u00a0He is the author of more than 100 scientific publications in refereed international journals, books and conferences, most of them on ICT security and privacy protection issues. He has served as program committee chair of\u00a015\u00a0international scientific conferences and as a member on the program and organizing committees in more than\u00a0150\u00a0others. Also, he participates in the editorial board of two international scientific journals and he acts as a reviewer for more than 35\u00a0journals.\u00a0He has been involved in many national and EU funded R&amp;D projects in the area of Information and Communication Systems Security. He is\u00a0<span lang=\"TR\">a member of\u00a0<\/span>the\u00a0<span lang=\"TR\">ACM and the IEEE.<\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b35c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73b35c9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d1689c\" data-id=\"3d1689c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d154dd3 elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"d154dd3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-address-card\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Email: clam@unipi.gr<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4004de9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4004de9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7f3304f\" data-id=\"7f3304f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5359dcd elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"5359dcd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.linkedin.com\/in\/kostas-lamprinoudakis-b00905148\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-linkedin-square\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LinkedIn<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ce313f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ce313f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-87965ec\" data-id=\"87965ec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f7443a elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"2f7443a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/scholar.google.com\/citations?user=D-mfQXsAAAAJ&#038;hl=en\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-google\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Citations (as measured by Google Scholar)<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e00094c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e00094c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32181fb\" data-id=\"32181fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d2a54b elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"8d2a54b\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1481\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1481\" aria-expanded=\"false\">Courses<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1482\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1482\" aria-expanded=\"false\">Journals<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1483\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1483\" aria-expanded=\"false\">Conferences<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1484\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1484\" aria-expanded=\"false\">Books<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1485\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1485\" aria-expanded=\"false\">Editor <\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1481\" aria-expanded=\"false\">Courses<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1481\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1481\" tabindex=\"0\" hidden=\"false\"><p><strong>Undergraduate Program:<\/strong><\/p><ul><li>Security Policies and Security Management\u00a0<\/li><li>Information Systems Security\u00a0<\/li><li>Privacy Enhancing Technologies\u00a0<\/li><li>Operating Systems\u00a0<\/li><\/ul><p><strong>Postgraduate Program:<\/strong><\/p><ul><li>Information Systems Security and Privacy Protection<\/li><li>Research Methodology<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1482\" aria-expanded=\"false\">Journals<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1482\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1482\" tabindex=\"0\" hidden=\"hidden\"><ol><li style=\"text-align: justify;\">Lyvas C., Lambrinoudakis C., Geneiatakis D., \u201cDypermin: Dynamic Permission Mining Framework for Android Platform\u201d, <em>Computers and Security Journal<\/em> (indexed in ISI\/SCI-E), Elsevier, 2017 (<em>accepted<\/em>).<\/li><li style=\"text-align: justify;\">Georgiou D., Lambrinoudakis C., \u201cSecurity Policy Rules and Required Procedures for Two Crucial Threats of Cloud Computing\u201d, <em>International Journal of Electronic Governance<\/em>, Special Issue on Citizen Rights in the World of the New Computing Paradigms, Inderscience Publishers, 2017 (<em>under review<\/em>).<\/li><li style=\"text-align: justify;\">Drogkaris P., Gritzalis S., Kalloniatis C., Lambrinoudakis C., \u201cHierarchical Multitier Approach for Privacy Policies in e-Government Environments\u201d, <em>Future Internet <\/em>(indexed in ESCI), Vol. 7, pp. 500-515; DOI:10.3390\/fi7040500, MDPI, 2015.<\/li><li style=\"text-align: justify;\">Pitropakis N., Pikrakis A., Lambrinoudakis C., &#8220;Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments\u201d, <em>International Journal of Information Security <\/em>(indexed in ISI\/SCI-E), Volume 14, Issue\u00a04, pp 299\u2013305, Elsevier, 2015.<\/li><li style=\"text-align: justify;\">Pitropakis N., Anastasopoulou D., Pikrakis A., Lambrinoudakis C., &#8220;If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments\u201d, <em>Journal of Cloud Computing:<\/em> <em>Advances, Systems and Applications<\/em>, Vol.3:20, DOI: 10.1186\/s13677-014-0020-6, Springer, 2014.<\/li><li style=\"text-align: justify;\">Vrakas N., Geneiatakis D., Lambrinoudakis C., \u201cObscuring Users&#8217; Identity in VoIP\/IMS Environments\u201d, <em>Computers and Security Journal (indexed in ISI\/SCI-E),<\/em> 43, pp. 145-158, Elsevier, 2014.<\/li><li style=\"text-align: justify;\">Vrakas N., Lambrinoudakis C., \u201cAn Intrusion Detection and Prevention System for IMS and VoIP Services\u201d, <em>International Journal of Information Security <\/em>(indexed in ISI\/SCI-E), Vol. 12, No.3, pp. 201-217, Springer, 2013.<\/li><li style=\"text-align: justify;\">Drogkaris P., Gritzalis S., Lambrinoudakis C., \u201cEmploying privacy policies and preferences in modern e-government environments\u201d, <em>International Journal of Electronic Governance<\/em>, Vol. 6, No. 2, pp. 101-116, Inderscience Publishers, 2013.<\/li><li style=\"text-align: justify;\">Vrakas N., Geneiatakis D., Lambrinoudakis C., \u201cEvaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments\u201d, <em>IEEE Communications Surveys and Tutorials <\/em>(indexed in ISI\/SCI-E), Vol. 15, No.2, pp. 803-819, IEEE Press, 2013.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., \u201cEvaluating and Enriching Information and Communication Technologies Compliance Frameworks with Regard to Privacy\u201d, <em>Information Management &amp; Computer Security<\/em>, Vol.21, No.3, pp. 177-190, Emerald, 2013.<\/li><li style=\"text-align: justify;\">Vrakas N., Lambrinoudakis C., \u201cA Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services\u201d, <em>International Journal of Information Technologies and the Systems Approach, Special Issue on Privacy and Security Issues in IT<\/em>, Vol.4, Issue 2, pp. 32-47, IGI Global, 2011.<\/li><li style=\"text-align: justify;\">Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., \u201cPrivacy Preserving Context Transfer Schemes for 4G Networks\u201d, <em>Wireless Communications and Mobile Computing <\/em>(indexed in ISI\/SCI-E)<em>, Special Issue on Network Security and Digital Forensics in Next Generation Communications<\/em>, Vol.11, Issue 2, pp. 289-302, Wiley, 2011.<\/li><li style=\"text-align: justify;\">Tsohou \u0391., Kokolakis S., Lambrinoudakis C., Gritzalis S., \u201cA Security Standards&#8217; framework to facilitate best practices\u2019 Awareness and Conformity\u201d, <em>Information Management &amp; Computer Security<\/em>, Vol. 18, No.5, pp. 350-365, Emerald, 2010.<\/li><li style=\"text-align: justify;\">Kambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiuklas A., Ehlert S., Fiedler J., &#8220;High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation&#8221;, <em>International Journal of Disaster Recovery and Business Continuity,<\/em> 1, No.1, pp. 11-29, SERSC, 2010.<\/li><li style=\"text-align: justify;\">Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., \u201cThe Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy Aware Systems\u201d, <em>The European Journal of the Informatics Professional (UPGrade, <\/em>upgrade-cepis.org), <em>Special Issue: Privacy and Identity Management<\/em>, Vol. xi, No. 1, pp.32-37, <u>also<\/u> in <em>Novatica journal<\/em>, Issue 202 \u00a0(www.ati.es\/novatica), 2010.<\/li><li style=\"text-align: justify;\">Rizomiliotis P., Tsohou A., Lambrinoudakis C., Gritzalis S., &#8220;Security and Privacy Issues in Bipolar Disorder Research&#8221;, <em>The Journal on Information Technology in Healthcare<\/em>, Vo. 7, No. 4, 244-250 (republication of the C.28. article), HL7, 2009.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Vrakas N., Lambrinoudakis C., \u201cUtilizing Bloom Filters for Detecting Flooding Attacks against SIP Based Services\u201d, <em>Computers and Security<\/em><em> Journal <\/em>(indexed in ISI\/SCI-E), 28, Issue 7, pp. 578-591, Elsevier, 2009.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Lambrinoudakis C., Kambourakis, G., \u201cAn Ontology Based-Policy for Deploying Secure SIP- based VoIP Services\u201d, <em>Computers and Security<\/em><em> Journal <\/em>(indexed in ISI\/SCI-E), 27, Issues 7-8, pp. 285-297, Elsevier, 2008.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Lambrinoudakis C., \u201cA Lightweight Protection Mechanism against Signaling Attacks in a SIP-Based VoIP Environment\u201d, <em>Telecommunication Systems <\/em>(indexed in ISI\/SCI-E), Vol.36, No.4, pp. 153-159, Springer, 2007.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Lambrinoudakis C., \u201cAn Ontology Description for SIP Security Flaws\u201d, <em>Computer Communications <\/em>(indexed in ISI\/SCI-E), Vol. 30, Issue 6, pp. 1367-1374, Elsevier, 2007.<\/li><li style=\"text-align: justify;\">Gritzalis S., Yannacopoulos A., Lambrinoudakis C., Hatzopoulos P., Katsikas S., &#8220;A Probabilistic Model for Optimal Insurance Contracts against Security Risks and Privacy Violation in IT Outsourcing Environments&#8221;, <em>International Journal of Information Security <\/em>(indexed in ISI\/SCI-E), Vol.6, No.4, pp. 197-211, Springer, 2007.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Kambourakis G., Lambrinoudakis C., Dagiuklas A., Gritzalis S., \u201cA Framework for Protecting a SIP-based Infrastructure against Malformed Message Attacks\u201d, <em>Computer Networks Journal <\/em>(indexed in ISI\/SCI-E), Vol. 51, Issue 10, pp. 2580-2593, Elsevier, 2007.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Dagiuklas A., Kambourakis G., Lambrinoudakis C., Gritzalis S., Ehlert S., Sisalem D., \u00abSurvey of Security Vulnerabilities in Session Initiation Protocol\u00bb, <em>IEEE Communications Surveys and Tutorials <\/em>(indexed in ISI\/SCI-E), Vol.8, No.3, pp. 68-81, IEEE Press, 3<sup>rd<\/sup> Quarter 2006.<\/li><li style=\"text-align: justify;\">Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Katsikas S., \u201cA knowledge-based approach to security requirements for e-health applications\u201d, <em>The electronic Journal for E-Commerce Tools &amp; Applications (eJETA), Special Issue on Emerging Security Paradigms in the Knowledge Era<\/em>, October 2006.<\/li><li style=\"text-align: justify;\">Lekkas D., Lambrinoudakis C., \u201cOutsourcing Digital Signatures: A solution to key management burden\u201d, <em>Information Management and Computer Security Journal, Special issue on Security Issues of IT Outsourcing<\/em>, Vol. 14, No. 5, pp. 436-449, Emerald, 2006.<\/li><li style=\"text-align: justify;\">Maglogiannis I., Za\ufb01ropoulos E., Platis A., Lambrinoudakis C., \u201cRisk analysis of a patient monitoring system using Bayesian Network modeling\u201d, <em>Journal of Biomedical Informatics <\/em>(indexed in ISI\/SCI-E), Vol. 39, No. 6, pp. 637-647, Elsevier, 2006.<\/li><li style=\"text-align: justify;\">Dritsas S., Gritzalis D., Lambrinoudakis C., \u201cProtecting privacy and anonymity in pervasive computing: trends and perspectives\u201d, <em>Telematics and Informatics Journal, Special Issue on Privacy and Anonymity in the Global Village<\/em>, Vol. 23, No. 3, pp. 196-210, Elsevier, 2006.<\/li><li style=\"text-align: justify;\">Kokolakis S., Lambrinoudakis C., \u201cICT Security Standards for Healthcare Applications\u201d, <em>The European Journal of the Informatics Professional (UPGrade, <\/em>upgrade-cepis.org), <em>Special Issue: Standardization for ICT Security<\/em>, Vol. 6, No. 4, pp. 47-54, <u>also<\/u> in <em>Novatica journal, Issue 176<\/em> (www.ati.es\/novatica), 2005.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Gritzalis S., Hatzopoulos P., Yannacopoulos A., Katsikas S., \u201cA formal model for pricing information systems insurance contracts\u201d, <em>Computer Standards and Interfaces <\/em>(indexed in ISI\/SCI-E), Vol. 7, No. 5, pp. 521-532, Elsevier, 2005.<\/li><li style=\"text-align: justify;\">Gritzalis S., Lambrinoudakis C., Lekkas D., Deftereos S., \u201cTechnical Guidelines for Enhancing Privacy and Data Protection in Modern Electronic Medical Environments\u201d, <em>IEEE Transactions on Information Technology in BioMedicine <\/em>(indexed in ISI\/SCI-E), Vol. 9, No. 3, pp. 413-423, IEEE Press, 2005.<\/li><li style=\"text-align: justify;\">Aggelis G., Gritzalis S., Lambrinoudakis C., &#8220;Mechanisms for Controlling Access in the Global Grid Environment&#8221;, <em>Internet Research <\/em>(indexed in ISI\/SCI-E), Vol. 14, No. 5, pp. 347-352, Emerald, 2004.<\/li><li style=\"text-align: justify;\">Gritzalis D., Lambrinoudakis C., \u201cA Security Architecture for Interconnecting Health Information Systems\u201d, <em>International Journal of Medical Informatics <\/em>(indexed in ISI\/SCI-E), Vol. 73, Issue 3, pp. 305-309, Elsevier, 2004.<\/li><li style=\"text-align: justify;\">Deftereos S., Lambrinoudakis C., Gritzalis S., Andriopoulos P., Georgonikou D., Aessopos A., \u201cA macro-directive mechanism to automate updating and processing of the contents of CEN-compatible Electronic Healthcare Records\u201d, <em>Medical Informatics and the Internet in Medicine International Journal <\/em>(indexed in ISI\/SCI-E)<em>, <\/em>28, No. 1, pp. 21-41, Taylor and Francis Publications, 2003.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Gritzalis S., Dridi F., Pernul G., \u201cSecurity Requirements for e-Government Services: A methodological approach for developing a common PKI based security policy\u201d, <em>Computer Communications <\/em>(indexed in ISI\/SCI-E), Vol. 26, Issue 16, pp. 1873-1883, Elsevier, 2003.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Maistros G., Bofilios D., Darzentas J., \u201cAn Architecture for an Intelligent Support System for Design Validation and Manufacturing of Aerospace Components\u201d, <em>International Transactions in Operational Research <\/em>(indexed in ISI\/SCI-E), Vol. 10(4), pp. 351-363, Blackwell Publishers, 2003.<\/li><li style=\"text-align: justify;\">Deftereos S., Lambrinoudakis C., Andriopoulos P., Farmakis D., Aessopos A., \u201cA Java-based Electronic Healthcare Record software for beta-Thalassaemia\u201d, <em>Journal of Medical Internet Research <\/em>(indexed in ISI\/SCI-E)<em>, <\/em>Vol<em>.<\/em>3(4):e33, 2001.<\/li><li style=\"text-align: justify;\">Konstantopoulos, M., Spyrou, T., Koutsabasis, P., Darzentas, J.S., Lambrinoudakis, C., Darzentas, J., \u201cThe Role of Directory Services in Online Education Delivery: The GESTALT Example\u201d, <em>International Journal of Continuing Engineering Education and Life-Long Learning<\/em>, Vol.11, Nos 1\/2, pp. 5-24, Inderscience Enterprises Ltd, 2001.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Gritzalis S., \u201cManaging Medical and Insurance Information through a Smart Card Based Information System\u201d, <em>Journal of Medical Systems <\/em>(indexed in ISI\/SCI-E), Vol. 24, No. 4, pp. 213-234, Kluwer Academic Publisher, 2000.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., \u201cSmart Card Technology for Deploying a Secure Information Management Framework\u201d, <em>Information Management and Computer Security Journal<\/em>, Vol. 8, Issue 4, pp. 173-183, MCB University Press, 2000.<\/li><li style=\"text-align: justify;\">Gritzalis, D., Lambrinoudakis C., \u201cA Data Protection Scheme for a Remote Vital Signs Monitoring Healthcare Service\u201d, <em>Medical Informatics and the Internet in Medicine International Journal <\/em>(indexed in ISI\/SCI-E), Vol.25, No.3, pp. 207-224, Taylor and Francis Publications, 2000.<\/li><li style=\"text-align: justify;\">Beal D. and Lambrinoudakis C., \u201cDesign of a Reconfigurable High Performance Massively Parallel SIMD System\u201d, <em>International Journal of High Speed Computing <\/em>(indexed in ISI\/SCI-E), Vol.7, No.3, pp. 365-390, World Scientific Publishing Company, 1995.<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1483\" aria-expanded=\"false\">Conferences<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1483\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1483\" tabindex=\"0\" hidden=\"hidden\"><ol><li style=\"text-align: justify;\">Pitropakis N., Lyvas C., Lambrinoudakis C., \u201cThe greater the power, the more dangerous the abuse: Facing Malicious Insiders in the Cloud \u201d, Proceedings of the 8th International Conference on Cloud Computing, GRIDs, and Virtualization, Track Security and Privacy in Cloud Computing (SEPRICC 2017), IARIA Xpert Publishing Services, Athens, February 2017.<\/li><li style=\"text-align: justify;\">Georgiopoulou Z., Lambrinoudakis C., \u201cTrust Management Parameters in Cloud Computing Environments\u201d, Proceedings of the 8th International Conference on Cloud Computing, GRIDs, and Virtualization, Track Security and Privacy in Cloud Computing (SEPRICC 2017), 152-155, IARIA Xpert Publishing Services, Athens, February 2017.<\/li><li style=\"text-align: justify;\">Lyvas C., Pitropakis N., Lambrinoudakis C., \u201cThe Far Side of Mobile Application Integrated Development Environments\u201d, Proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201916), pp. 111-122, Springer LNCS 9830, Porto, Portugal, September 2016.<\/li><li style=\"text-align: justify;\">Georgiopoulou Z., Lambrinoudakis C., \u201cLiterature Review of Trust Models for Cloud Computing\u201d, Proceedings of the 2016 International Conference on Cloud Computing and Big Data (CloudCom-Asia), IEEE Xplore, Hong Kong, China, June 2016.<\/li><li style=\"text-align: justify;\">Pitropakis N., Lambrinoudakis C., Geneiatakis D., \u201cTill All are One: Towards a Unified Cloud IDS\u201d, Proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201915), pp. 136-149, Springer LNCS 9264, Valencia, Spain, September 2015.<\/li><li style=\"text-align: justify;\">Makri E. L., Lambrinoudakis C., \u201cPrivacy Principles: Towards a Common Privacy Audit Methodology\u201d, Proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201915), pp. 219-234, Springer LNCS 9264, Valencia, Spain, September 2015.<\/li><li style=\"text-align: justify;\">Makri E. L., Lambrinoudakis C., \u201cTowards a Common Security and Privacy Requirements Elicitation Methodology\u201d, Proceedings of the 10th International Conference Global Security, Safety and Sustainability (ICGS3 2015), 151-160, Springer CCIS 534, London, UK, September 2015.<\/li><li style=\"text-align: justify;\">Kontoudis D., Fouliras P., Lambrinoudakis C., \u201cStatistics-driven Datacenter Resources Provisioning\u201d, Proceedings of the 19th Panhellenic Conference on Informatics (PCI 2015), pp. 185-190, ACM Digital Library (doi 10.1145\/2801948.2801971), Athens, October 2015.<\/li><li style=\"text-align: justify;\">Georgiou D., Lambrinoudakis C., \u201cCloud Computing Security Requirements and a Methodology for their Auditing\u201d, Proceedings of the 6th International Conference on e-Democracy \u2013 Citizen Rights in the World of the New Computing Paradigms (eDemocracy 2015), 51-61, Springer CCIS 570, Athens, Greece, December 2015.<\/li><li style=\"text-align: justify;\">Georgiou D., Lambrinoudakis C., \u201cA Security Policy for Cloud Providers\u201d, Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP 2014), pp. 13-21, IARIA, ISBN: 978-1-61208-362-9, Paris France, 2014.<\/li><li style=\"text-align: justify;\">Pitropakis N., Yfantopoulos N., Geneiatakis D., Lambrinoudakis C., \u201cTowards an Augmented Authenticator in the Cloud\u201d, Proceedings of the 14th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT\u201914), pp. 296-300, IEEE Computer Society Press, Noida, India, December 2014.<\/li><li style=\"text-align: justify;\">Drogkaris P., Gritzalis A., Lambrinoudakis C., \u201cEmpowering Users to Specify and Manage Their Privacy Preferences in e-Government Environments\u201d, Proceedings of the EGOVIS&#8217;14 International Conference on Electronic Government and the Information Systems Perspective, A. K\u0151 and E. Francesconi (Eds.), pp. 237-245, Springer LNCS 8650, Munich, Germany, 2014.<\/li><li style=\"text-align: justify;\">Belsis P., Gritzalis S., Lambrinoudakis C., Skourlas C., Tsoukalas V., Vassis D., &#8220;An Agent Based Architecture Benchmark&#8221;, Proceedings of the 3rd IC-ININFO International Conference on Integrated Information, pp. 429-435, Elsevier, Procedia, Prague, Czech, 2014.<\/li><li style=\"text-align: justify;\">Pitropakis N., Darra E., Vrakas N., Lambrinoudakis C., &#8220;It\u2019s all in the Cloud: Reviewing Cloud Security&#8221;, IEEE 10th International Conference on Autonomic &amp; Trusted Computing (ATC-2013), pp. 355-362, IEEE Computer Society, Vietri sul Mare, Italy, December 2013.<\/li><li style=\"text-align: justify;\">Lalas E., Mitrou L., Lambrinoudakis C., \u201cProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence\u201d, Proceedings of the 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201913), pp. 137-148, Springer LNCS 8058, Prague, Czech Republic, August 2013.<\/li><li style=\"text-align: justify;\">Pitropakis N., Lambrinoudakis C., Geneiatakis D., Gritzalis D., &#8220;A Practical Steganographic Approach for Matroska based High Quality Video files&#8221;, 7th International Symposium on Security and Multimodality in Pervasive Environment (SMPE-2013), pp. 684-688, IEEE Computer Society Press, Barcelona, Spain, March 2013.<\/li><li style=\"text-align: justify;\">Lalas E., Papathanasiou A., Lambrinoudakis C., &#8220;Privacy and Traceability in Social Networking Sites&#8221;, Proceedings of the 16th Panhellenic Conference on Informatics (PCI 2012), 127-132, IEEE Xplore, Piraeus, Greece, October 2012.<\/li><li style=\"text-align: justify;\">Vrakas N., Geneiatakis D., Lambrinoudakis C., &#8220;Is IP Multimedia Subsystem Affected by \u2018Malformed Message&#8217; Attacks? &#8211; An Evaluation of OpenIMS&#8221;, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2011), pp. 275-280, Science and Technology Publications Digital Library, Seville, Spain, 2011.<\/li><li style=\"text-align: justify;\">Agudo I., Nu\u00f1ez D., Giammatteo G., Rizomiliotis P., Lambrinoudakis C., &#8220;Cryptography goes to the Cloud&#8221;, Proceedings of the 1st International Workshop on Security &amp; Trust for Applications in Virtualised Environments (STAVE 2011), pp. 190-197, Springer, Loutraki, Greece, 2011.<\/li><li style=\"text-align: justify;\">Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., \u201cUnifying ISO Security Standards Practices into a Single Security Framework\u201d, Proceedings of the 12th Annual IFIP Workshop on Information Security Management (South African Information Security Multi-Conference), pp. 188-203, Port Elizabeth, South Africa, May 2010.<\/li><li style=\"text-align: justify;\">Drogkaris P., Gritzalis S., Lambrinoudakis C., \u201cTransforming the Greek e-Government Environment towards the e-Gov 2.0 Era\u201d, Proceedings of the EGOVIS&#8217;10 International Conference on Electronic Government and the Information Systems Perspective, K. N. Andersedn, et al. (Eds.), pp. 142-149, Springer LNCS 6267, Bilbao, Spain, September 2010.\u00a0\u00a0<\/li><li style=\"text-align: justify;\">Vrakas \u039d., Geneiatakis D., Lambrinoudakis C., \u201cA Call Conference Room Interception Attack and its Detection\u201d, Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201910), 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.<\/li><li style=\"text-align: justify;\">Vrakas \u039d., Kalloniatis C., Tsohou A., Lambrinoudakis C., \u201cPrivacy Requirements Engineering for Trustworthy e-government Services\u201d, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST\u201910), 298-307, Springer LNCS 6101, Berlin, Germany, June 2010.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Lambrinoudakis C., Gritzalis S., &#8220;A Hierarchical Model for Cross-Domain Communication of Health-Care Units&#8221;, Proceedings of NSS 2009 &#8211; 3rd International Conference on Network and System Security, Y. Xiang, J. Lopez, H. Wang (Eds.), pp. 123-129. IEEE Computer Society Press, Gold Coast, Australia, October 2009.<\/li><li style=\"text-align: justify;\">Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., &#8220;Information Systems Security Management: A review and a classification of the ISO standards&#8221;, Proceedings of the e-Democracy 2009 &#8211; 3rd Conference on Electronic Democracy \u2013 Next Generation Society: Technological and Legal Issues, A. Sideridis, C. Patrikakis (Eds.), Vol. 26, pp. 220-235, Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Athens, Greece, September 2009.<\/li><li style=\"text-align: justify;\">Drogkaris P., Gritzalis S., Lambrinoudakis C., &#8220;Enabling Secure Data Management in e-Government Environments: The Greek Case&#8221;, Proceedings of ongoing research and projects of EGOV 09 &#8211; 8th International Conference, EGOV 2009, H. J. Scholl, M. Janssen, R. Traunm\u00fcller, M. A. Wimmer (Eds.), Trauner Verlag, Linz, Austria, September 2009.<\/li><li style=\"text-align: justify;\">Drogkaris P., Lambrinoudakis C., Gritzalis S., &#8220;Introducing Federated Identities to One-Stop-Shop e-Government Environments: The Greek Case&#8221;, Proceedings of the eChallenges 2009 Conference, P. Cunningham, M. Cunningham (Eds.), IIMC International Information Management Corporation Ltd, Istanbul, Turkey, October 2009.<\/li><li style=\"text-align: justify;\">Rizomiliotis P., Tsohou A., Lambrinoudakis C., Gritzalis S., &#8220;Security and Privacy Issues in Bipolar Disorder Research&#8221;, Proceedings of the 7th International Conference on Information and Communication Technologies in Health (ICICTH), Hasman et al. (Eds.), INEAG, Samos, Greece, July 2009.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Lambrinoudakis C., Kambourakis G., Kafkalas A., Ehlert S., \u201cA First Order Logic Security Verification Model for SIP\u201d, Proceedings of the IEEE International Conference on Communications, Communications and Information Systems Security Symposium (ICC\u201909-CISS), 937-942, IEEE Press, Dresden, Germany, June 2009.<\/li><li style=\"text-align: justify;\">Drogkaris P., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Mitrou L., \u201cTowards an Enhanced Authentication Framework for eGovernment Services: The Greek case\u201d, Proceedings of ongoing research and projects of EGOV 08 &#8211; 7th International Conference, EGOV 2008, E. Ferro, J. Scholl, M. Wimmer et al. (Eds.), pp.189-196, Trauner Verlag, Turin, Italy, September 2008.<\/li><li style=\"text-align: justify;\">Yannakopoulos A., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., Katsikas S., \u201cModeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms\u201d, Proceedings of the 13th European Symposium on Research in Computer Security \u2013 ESORICS 2008, Jajodia S., Lopez J. (Eds), pp. 207-222, Springer LNCS 5283, Malaga, Spain, October 2008.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Kambourakis G., Lambrinoudakis C., \u201cA Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony\u201d, Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201908), 59-68, Springer LNCS 5185, Turin, Italy, September 2008.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Lambrinoudakis C., \u201cA Cost-Effective Mechanism for Protecting SIP Based Internet Telephony Services Against Signaling Attacks\u201d, Proceedings of the IMS and Mobile Multimedia Workshop, in conjunction with the 4th International Mobile Multimedia Communications Conference &#8211; MobiMedia 2008, ACM International Conference Proceedings, Oulu, Finland, 2008.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Kambourakis G., Gritzalis S., \u201cNovel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study\u201d Proceedings of the 5th International Conference on Communication Systems, Networks and Digital Signal Processing (CSNDSP\u201906), M. Logothetis et al. (Eds), Patras, Greece, July 2006.<\/li><li style=\"text-align: justify;\">Kambourakis G., Geneiatakis D., Dagiuklas A., Lambrinoudakis C., Gritzalis S., \u201cTowards effective SIP load Balancing: The SNOCER approach\u201d, Proceedings of the Third Annual VoIP Security Workshop, in cooperation with ACM SIGCOMM, D. Sisalem et al. (Eds), ACM Press, Berlin, Germany, June 2006.<\/li><li style=\"text-align: justify;\">Gymnopoulos L., Karyda M., Balopoulos T., Dritsas S., Kokolakis S., Lambrinoudakis C., Gritzalis S., &#8220;Developing a Security Patterns Repository for Secure Applications Design&#8221;, Proceedings of the ECIW 2006 5th European Conference on Information Warfare and Security, D. Remenyi et al. (Eds.), pp. 51-60, published by ACL Academic Conferences Limited, Helsinki, Finland, June 2006.<\/li><li style=\"text-align: justify;\">Karyda M., Balopoulos T., Dritsas S., Gymnopoulos L., Kokolakis S., Lambrinoudakis C., Gritzalis S., \u201cAn Ontology for Secure e-Government Applications\u201d, Proceedings of the DeSeGov\u201906 Workshop on Dependability and Security in eGovernment (in conjunction with ARES 2006 1st International Conference on Availability, Reliability, and Security), A. Tjoa, E. Schweighofer (Eds.), pp. 1033-1037, IEEE Computer Society Press, Vienna, Austria, April 2006.<\/li><li style=\"text-align: justify;\">Dritsas S., Gymnopoulos L., Karyda M., Balopoulos T., Kokolakis S., Lambrinoudakis C., Gritzalis S., \u201cEmploying Ontologies for the Development of Security Critical Applications: The Secure e-Poll Paradigm\u201d, Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernemnt, Funabashi M., Grzech A. (Eds.), pp.187-201, Springer, Poznan, Poland, October 2005.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Kambourakis G., Dagiuklas A., Lambrinoudakis C., Gritzalis S., \u201cSIP Message Tampering: The SQL code INJECTION attack\u201d, Proceedings of the 13th IEEE International Conference on Software Telecommunications and Computer Networks (SoftCOM 2005), N. Rozic et al. (Eds.), pp. 176-181, IEEE Press, Split, Croatia, September 2005.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Kambourakis G., Dagiuklas A., Lambrinoudakis C., Gritzalis S., \u201cA Framework for Detecting Malformed Messages in SIP Networks\u201d, Proceedings of the 14th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2005), Ramakrishnan K. (Ed.), IEEE Press, Chania, Greece, September 2005.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Platis A., Leros A., \u201cA PKI Security reliability assessment methodology\u201d, Proceeding of the European Safety &amp; Reliability Conference (ESREL 2005), Poland, 2005.<\/li><li style=\"text-align: justify;\">Dritsas S., Mallios J., Gritzalis D., Lambrinoudakis C., \u201cApplicability of Privacy Enhancing Technologies in Ubiquitous Computing Environments\u201d, Proceedings of the 1st IEEE International Conference on Pervasive Services ICPS 2005 \u2013 Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing SecPerU\u201905, P. Georgiadis, S. Gritzalis, Y. Marias (Eds.), pp. 61-70, Diaylos Press, Santorini, Greece, July 2005.<\/li><li style=\"text-align: justify;\">Geneiatakis D., Kambourakis G., Dagiuklas T., Lambrinoudakis C., Gritzalis S., \u201cSIP Security Mechanisms: A state-of-the-art review\u201d, Proceedings of the 5th International Network Conference (INC\u20192005), S. Furnell, S. Katsikas (Eds.), pp. 147-156, Samos, Greece, July 2005.<\/li><li style=\"text-align: justify;\">Aggelis G., Gritzalis S., Lambrinoudakis C., &#8220;Addressing Authentication and Authorization Issues in the Grid&#8221;, Proceedings of the 4th International Network Conference (INC&#8217;2004), S. Furnell (Ed.), pp. 319-326, published by IEE &amp; University of Plymouth, Plymouth, UK, July 2004.<\/li><li style=\"text-align: justify;\">Platis A., Lambrinoudakis C., Leros A., \u201cA Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions\u201d, Proceedings of the 1st European PKI Workshop (EuroPKI\u20192004), S. Katsikas, S. Gritzalis, J. Lopez (Eds), pp. 149-160, Springer, Lecture Notes in Computer Science LNCS 3093, Samos, Greece, June 2004.<\/li><li style=\"text-align: justify;\">Kokolakis S., Lambrinoudakis C., Gritzalis D., &#8220;A Knowledge-Based Repository Model for Security Policies Management&#8221;, Proceedings of the MMM-ACNS-2003 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, V. Gorodetski, L. Popyack, V. Skormin (Eds), pp. 112-121, Springer, Lecture Notes in Computer Science LNCS 2776, St. Petersburg, Russia, September 2003.<\/li><li style=\"text-align: justify;\">Gymnopoulos L., Dritsas S., Gritzalis S., Lambrinoudakis C., &#8220;Grid Security Review&#8221;, Proceedings of the MMM-ACNS-2003 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, V. Gorodetski, L. Popyack, V. Skormin (Eds), pp. 100-111, Springer, Lecture Notes in Computer Science LNCS 2776, St. Petersburg, Russia, September 2003.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Kokolakis S., Karyda M., Tsoumas V., Gritzalis D., Katsikas S., \u201cElectronic Voting Systems: Security Implications of the Administrative Workflow\u201d, Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA 2003), W06: International Workshop on Trust and Privacy in Digital Business (TrustBus), pp. 467-471, IEEE Computer Society Press, Prague, Czech Republic, September 2003.<\/li><li style=\"text-align: justify;\">Aggelis G., Gritzalis S., Lambrinoudakis C., &#8220;Security Policy Configuration Issues in GRID Computing Environments&#8221;, Proceedings of the SAFECOMP&#8217;03 22nd International Conference on Computer Safety, Reliability and Security, B. Littlewood (Ed.), pp. 331-341, Springer, Lecture Notes in Computer Science LNCS 2788, Edinburgh, UK, September 2003.<\/li><li style=\"text-align: justify;\">Gritzalis S., Lambrinoudakis C., &#8220;Security Requirements of e-Government Services: An Organisational Framework&#8221;, Proceedings of the PDPTA&#8217;2002 International Conference on Parallel and Distributed Processing Techniques and Applications, H. R. Arabnia (Ed.). Vol. I, pp. 127-131, CSREA Press, Las Vegas, USA, June 2002.<\/li><li style=\"text-align: justify;\">Ikonomopoulos S., Lambrinoudakis C., Gritzalis D., Kokolakis S. and Vassiliou K., \u201cFunctional Requirements for a Secure Electronic Voting System\u201d, Proceedings of the IFIP TC11 17th International Conference on Information Security (IFIP\/SEC2002), Ghonaimy M.A., El-Hadidi M., Aslan H.K. (Eds.), pp. 507-519, Kluwer Academic Publisher, Egypt, Cairo, May 2002.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Kokolakis S., Gritzalis D., \u201cRecurrent IT Security Issues and Recommendations: Learning from Risk Assessment Reviews\u201d, Proceedings of the IFIP WG 9.6\/11.7 Working Conference on Security and Control of IT in Society II (SCITS-II), pp. 185-195, Bratislava, Slovakia, 15-16 June 2001.<\/li><li style=\"text-align: justify;\">Gritzalis, D., Moulinos, K., Iliadis, J., Lambrinoudakis C., Xarhoulakos, S., \u201cPyTHIA: Towards Anonymity in Authentication\u201d, Proceedings of the 16th International Conference on Information Security (IFIP\/SEC2001), M. Dupuy, P. Paradinas (Eds.), pp. 1-17, Kluwer Academic Publisher, Paris, France, 11-13 June 2001.<\/li><li style=\"text-align: justify;\">Koutsabasis, P., Darzentas, J.S., Spyrou, T., Lambrinoudakis, C., Darzentas, J., \u201cAiding Designers to Design for All: The IRIS Approach\u201d, Proceedings of the 6th ERCIM Workshop, User Interfaces for All, Special Theme: Information Society for All, pp. 345-347, Florence, Italy, 25-26 October 2000 (Poster Paper).<\/li><li style=\"text-align: justify;\">Lambrinoudakis, C., \u201cUsing Smart Cards in an Educational Environment: Services and Security Features\u201d, Information Security for Global Information Infrastructures, IFIP International Conference on Information Security (IFIP\/SEC2000), 16th IFIP World Computer Congress 2000, J. Eloff, Q. Sihan (Eds.), pp. 131-140, Kluwer Academic Publisher, P.R. of China, August 2000.<\/li><li style=\"text-align: justify;\">Pavlopoulos, S., Anagnostaki, A., Koutsouris, D., Lymberis, A., Levene, P., Reynolds, M., Georgiadis, N., Lambrinoudakis, C., Gritzalis, D., \u201cVital Signs Monitoring from Home with Open Systems\u201d, Proceedings of the MIE2000 &#8211; GMDS2000 Medical Infobahn for Europe, XVI International Congress of the European Federation for Medical Informatics and 45 Annual Congress of the German Association for Medical Informatics, Biometry and Epidemiology, pp. 1141-1145, IOS Press, Hanover, Germany, August 27 &#8211; September 1, 2000.<\/li><li style=\"text-align: justify;\">Lambrinoudakis, C., Bofilios, D., Maistros, G., Darzentas, J., \u201cAn Intelligent Design Validation and Manufacturing Support System for Aerospace Components Manufacturers\u201d, Proceedings of the IFORS SPC9 Conference, Intelligent Systems and Active DSS, pp. 78-85, Turku\/\u00c5bo, Finland, April 25-27, 1999.<\/li><li style=\"text-align: justify;\">Lambrinoudakis, C., Kontoravdis, D. and Kalkani, X., \u201c\u03a4\u03b7\u03bb\u03b5\u03bc\u03b1\u03c4\u03b9\u03ba\u03ae \u03ba\u03b1\u03b9 \u0394\u03b7\u03bc\u03cc\u03c3\u03b9\u03b1 \u0394\u03b9\u03bf\u03af\u03ba\u03b7\u03c3\u03b7 -\u03a4\u03b7\u03bb\u03b5\u03b4\u03b9\u03bf\u03af\u03ba\u03b7\u03c3\u03b7 \u0391\u03bd\u03b1\u03c4\u03bf\u03bb\u03b9\u03ba\u03ae\u03c2 \u039c\u03b1\u03ba\u03b5\u03b4\u03bf\u03bd\u03af\u03b1\u03c2-\u0398\u03c1\u03ac\u03ba\u03b7\u03c2 \u03ba\u03b1\u03b9 \u0392\u03bf\u03c1\u03b5\u03af\u03bf\u03c5 \u0391\u03b9\u03b3\u03b1\u03af\u03bf\u03c5\u201d, 30 \u03a3\u03c5\u03bd\u03ad\u03b4\u03c1\u03b9\u03bf \u0395\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ce\u03bd \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2 \u03ba\u03b1\u03b9 \u0395\u03c0\u03b9\u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03b9\u03ce\u03bd, \u039c\u03b5\u03c4\u03b1\u03c1\u03c1\u03cd\u03b8\u03bc\u03b9\u03c3\u03b7 \u03c3\u03c4\u03bf \u0394\u03b7\u03bc\u03cc\u03c3\u03b9\u03bf \u03a4\u03bf\u03bc\u03ad\u03b1 \u03ba\u03b1\u03b9 \u0395\u03bb\u03bb\u03b7\u03bd\u03b9\u03ba\u03ad\u03c2 \u0395\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2 \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae\u03c2, pp. 107-117, \u0398\u03b5\u03c3\u03c3\u03b1\u03bb\u03bf\u03bd\u03af\u03ba\u03b7, 3-4 \u039f\u03ba\u03c4\u03c9\u03b2\u03c1\u03af\u03bf\u03c5 1997.<\/li><li style=\"text-align: justify;\">Lambrinoudakis, C. and Bofilios D., \u201cSmart Cards: An Innovative Architecture, Technology Issues and Applications\u201d, \u03a0\u03c1\u03b1\u03ba\u03c4\u03b9\u03ba\u03ac \u0394\u03b9\u03b7\u03bc\u03b5\u03c1\u03af\u03b4\u03b1\u03c2 \u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c3\u03c4\u03b9\u03c2 \u03a4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b5\u03c2 \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ce\u03bd \u03ba\u03b1\u03b9 \u0395\u03c0\u03b9\u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03b9\u03ce\u03bd \u03c0\u03bf\u03c5 \u03b4\u03b9\u03bf\u03c1\u03b3\u03b1\u03bd\u03ce\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc \u03c4\u03bf \u03b1\u03bd\u03b8\u03c1\u03ce\u03c0\u03b9\u03bd\u03bf \u03b4\u03af\u03ba\u03c4\u03c5\u03bf \u03b4\u03b9\u03ac\u03b4\u03bf\u03c3\u03b7\u03c2 \u03c4\u03b7\u03c2 \u0395&amp;\u03a4 \u03b3\u03bd\u03ce\u03c3\u03b7\u03c2 \u0399\u039a\u0391\u03a1\u039f\u03a3, \u03a0\u03c5\u03b8\u03b1\u03b3\u03cc\u03c1\u03b5\u03b9\u03bf \u2013 \u03a3\u03ac\u03bc\u03bf\u03c2, 23-24 \u039c\u03b1\u0390\u03bf\u03c5 1996.<\/li><li style=\"text-align: justify;\">Beal D. and Lambrinoudakis C., \u201cGPFP: A SIMD PE for Higher VLSI Densities than Current Machines\u201d, Proceedings of the VLSI&#8217;91 Conference, IFIP wg 10.5, pp. 8b.1.1-8b.1.10, Edinburgh, August 1991.<\/li><li style=\"text-align: justify;\">Beal D. and Lambrinoudakis C., \u201cGPFP: An Array Processing Element for the Next Generation of Massively Parallel Supercomputer Architectures\u201d, Proceedings of the Supercomputing&#8217;91 Conference, ACM, IEEE Computer Society Press, pp. 348-357, Albuquerque, New Mexico, November 1991.<\/li><li style=\"text-align: justify;\">Beal D. and Lambrinoudakis C., \u201cArray Processors with FP Support and RLC: A Cost-Effective Massively Parallel Computer Architecture\u201d, Proceedings of the Fourth ISMM International Conference on Parallel and Distributed Computing and Systems, pp. 165-169, Washington D.C., October 1991.<\/li><li style=\"text-align: justify;\">Beal D. and Lambrinoudakis C., \u201cEnhancing the Number Crunching and General Purpose Capability of Array Processors\u201d, Proceedings of the Sixth International Symposium on Computer and Information Sciences, IEEE Turkish Section, pp. 703-712, Elsevier, Antalya, Turkey, November 1991.<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1484\" aria-expanded=\"false\">Books<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1484\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1484\" tabindex=\"0\" hidden=\"hidden\"><p style=\"text-align: justify;\"><strong>Chapters in Books<\/strong><\/p><ol style=\"text-align: justify;\"><li>Pitropakis N., Katsikas S., Lambrinoudakis C., \u201cCloud Security, Privacy and Trust Baselines\u201d, in the book Cloud Computing Security, Foundations and Challenges, John R. Vacca\u00a0 (Ed.), pp. 45-59, CRC Press \u2013 Taylor and Francis, 2017.<\/li><li>Vrakas N., Fotiadis G., Lambrinoudakis C., \u201cKey Management Techniques\u201d, in the book Contemporary Cryptography: Theory and Applications, Burmester M. et. al. (Eds.), pp. 541-598, Papasotiriou, Greece, 2011 (in Greek).<\/li><li>Yannakopoulos A., Xanthopoulos S., Lambrinoudakis C., Gritzalis S., Katsikas S., \u201cPrivacy Protection Economics\u201d, in the book Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Lambrinoudakis et.al. (Eds.), pp. 447-467, Papasotiriou, Greece, 2010 (in Greek).<\/li><li>Lambrinoudakis C., Gritzalis S., Katsikas S., \u201cA Review of Privacy Enhancing Technologies for the Internet\u201d, in the book Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Lambrinoudakis et.al. (Eds.), pp. 3-48, Papasotiriou, Greece, 2010 (in Greek).<\/li><li>Kambourakis G., Lambrinoudakis C., Katsikas S., \u201cIntrusion Detection Systems for Wireless Networks: A Survey\u201d, in the book Security and Privacy in Wireless and Mobile Computing, S. Gritzalis, T. Karygiannis and C. Skianis (Eds.), pp. 161-181, Troubador Publishing, 2009.<\/li><li>Geneiatakis D., Kambourakis G., Lambrinoudakis C., \u201cSIP Security: Threats, Vulnerabilities and Countermeasures\u201d, in the book SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol, S. Ahson and M. Ilyas (Eds.), pp. 435-456, CRC Press, 2008.<\/li><li>Lambrinoudakis C., E. Magkos, Chrisikopoulos V., \u201cElectronic Voting Systems\u201d, in the book Securing Information and Communication Systems: Principles, Technologies and Applications, Furnell, S. Katsikas, J. Lopez, A. Patel (Eds.), pp. 307-322, Artech House, 2008.<\/li><li>Yannakopoulos A., Katsikas S., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., &#8220;\u0391 Risk Model for Privacy Insurance&#8221;, in the book Digital Privacy: Theory, Technologies and Practices, Acquisti A. et al (Eds), pp. 347-362, Auerbach Publications \u2013 Taylor and Francis, New York, 200<\/li><li>Gritzalis S., Lambrinoudakis C., &#8220;Privacy in the Digital World&#8221;, in Encyclopedia of Internet Technologies and Applications, Freire M., Pereira M. (Eds.), pp. 411-417, Information Science Reference (formerly Idea Group Reference), 2007.<\/li><li>Lambrinoudakis C., Gritzalis S., \u201cSecurity in IEEE 802.11 WLANs\u201d, in the book Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards, Ilyas, Ahson (Eds.), pp. 585-606, CRC Press, 2005.<\/li><li>Lambrinoudakis C., \u201cAccess Control Mechanisms\u201d, in the book Computer and Information Systems Security, Katsikas S., Gritzalis D., Gritzalis S. (Eds.), pp. 113-142, \u0395\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2 \u039d\u03ad\u03c9\u03bd \u03a4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03b9\u03ce\u03bd, 2004 (in Greek).<\/li><li>Lambrinoudakis C., Gritzalis D., Tsoumas V., Karyda M., Ikonomopoulos S., \u201cSecure Electronic Voting: The Current Landscape\u201d, in the book Secure Electronic Voting, D. Gritzalis (Ed.), pp. 101-122, Kluwer Academic Publishers, 2003.<\/li><li>Republication of the article \u201cSmart Card Technology for Deploying a Secure Information Management Framework\u201d (37. ), in the Library Computing, Internet and Software Applications for Information Professionals, Vol.19, Nos 3\/4, pp. 147-158, MCB University Press, 2000.<\/li><\/ol><p style=\"text-align: justify;\">\u00a0<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1485\" aria-expanded=\"false\">Editor <\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1485\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1485\" tabindex=\"0\" hidden=\"hidden\"><p style=\"text-align: justify;\"><strong>Editor of International Conference Proceedings<\/strong><\/p><ol><li style=\"text-align: justify;\">\u00a0Cuppens-Bulahia N., Lambrinoudakis C. (Eds.), Proceedings of the 4th Workshop on the Security of Industrial Control Systems &amp; of Cyber-Physical Systems (CPICSSec 2017), Springer LNCS 11387, Barcelona, Spain, 2018.<\/li><li style=\"text-align: justify;\">Cuppens-Bulahia N., Lambrinoudakis C. (Eds.), Proceedings of the 3rd Workshop on the Security of Industrial Control Systems &amp; of Cyber-Physical Systems (CPICSSec 2017), Springer LNCS 10683, Oslo, Norway, 2017.<\/li><li style=\"text-align: justify;\">\u00a0 Fischer-H\u00fcbner S., Lambrinoudakis C. (Eds.), Proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2017), Springer LNCS 10440 Lyon, France, 2017.<\/li><li style=\"text-align: justify;\">\u00a0 Katsikas S., Lambrinoudakis C., Proceedings of the Security and Privacy in Cloud Computing (SEPRICC 2017), special track in CLOUD COMPUTING 2017, IARIA, Athens, Greece, 2017.<\/li><li style=\"text-align: justify;\">\u00a0Katsikas S., Lambrinoudakis C. (Eds.), Proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2016), Springer LNCS 9830, Porto, Portugal, 2016.<\/li><li style=\"text-align: justify;\">\u00a0\u00a0Cuppens-Bulahia N., Lambrinoudakis C. (Eds.), Proceedings of the 2nd Workshop on the Security of Industrial Control Systems &amp; Cyber-Physical Systems \u00a0(CyberICPS 2016), Springer LNCS 10166, Crete, Greece, 2016.<\/li><li style=\"text-align: justify;\">\u00a0 Fischer-H\u00fcbner S., Lambrinoudakis C. (Eds.), Proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015), Springer LNCS 9264, Valencia, Spain, 2015.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Gabillon A. (Eds.), Proceedings of the 10th International Conference on Risks and Security of Internet and Systems (CRISIS 2015), Springer LNCS 9572, Lesvos, Greece, 2015<\/li><li style=\"text-align: justify;\">\u00a0Katsikas S., Lambrinoudakis C. (Eds.), Proceedings of the 1st Workshop on the Security of Cyber Physical Systems (WOS-CPS 2015), Springer LNCS 9588, Vienna, Austria, 2015.<\/li><li style=\"text-align: justify;\">\u00a0Furnell S., Lambrinoudakis C., Lopez J. (Eds.), Proceedings of the 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2013), Springer LNCS 8058, Prague, Czech Republic, 2013.<\/li><li style=\"text-align: justify;\">Vergados D., Lambrinoudakis C. (Eds), Proceedings of the 16th Pan-Hellenic Conference on Informatics (PCI 2012), IEEE CPS, Piraeus, Greece, 2012.<\/li><li style=\"text-align: justify;\">\u00a0Lambrinoudakis C., Rizomiliotis P., Wlodarczyk T. W. (Eds), Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2011), IEEE Press, Athens, Greece, 2011.<\/li><li style=\"text-align: justify;\">Furnell S., Lambrinoudakis C., Pernul G. (Eds.), Proceedings of the 8th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2011), Springer LNCS 6863, Toulouse, France, 2011.<\/li><li style=\"text-align: justify;\">Shon T., Lambrinoudakis C., Taniar D., Wombacher A. (Eds), Proceedings of the 8th FTRA International Conference on Secure and Trust Computing, data management and Applications (STA 2011), Springer CCIS 186, Loutraki, Greece, 2011.<\/li><li style=\"text-align: justify;\">Camenisch, J., Lambrinoudakis, C. (Eds), Proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications (EuroPKI 2010), Springer LNCS 6711, Athens, Greece, 2010.<\/li><li style=\"text-align: justify;\">\u00a0Fischer-H\u00fcbner S., Lambrinoudakis C. (Eds.), Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201909), Springer LNCS 5695, Linz, Austria, 2009.<\/li><li style=\"text-align: justify;\">Lambrinoudakis C., Pernul G., Tjoa A (Eds.), Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201907), Springer LNCS 4657 Regensburg, Germany, 2007.<\/li><li style=\"text-align: justify;\">\u00a0Fischer-H\u00fcbner S., Furnell S., Lambrinoudakis C. (Eds.), Proceedings of the 3rd International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u201906), Springer LNCS 4083, Krakow, Poland, 2006.<\/li><li style=\"text-align: justify;\">\u00a0Gritzalis S., Lambrinoudakis C. (Eds.), Invited Session on Security and Privacy in eBusiness, eCommerce, eGovernment Environments &#8211; 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT\u201905), IEEE Computer Society Press, Athens, Greece, 2005.<\/li><\/ol><p style=\"text-align: justify;\"><strong>Guest Editor in Scientific Journal<\/strong><\/p><ol style=\"text-align: justify;\"><li>Furnell S., Katsikas S., Lambrinoudakis C. (Guest Eds.), \u201cTrust, Privacy and Security in Digital Business\u201d, Special Issue of Information (ISSN 2078-2489), Open Access Information Science Journal, MDPI, 2016.<\/li><li>Camenisch J., Lambrinoudakis C. (Guest Eds.), \u201cPublic Key Services and Infrastructures\u201d, Special Issue of the Mathematical and Computer Modelling journal, Vol.57, No. 7-8, Elsevier,2013.<\/li><li>Shon T., Park J.H., Lambrinoudakis C., Seigneur J. (Guest Eds.), &#8220;Advanced Information Security&#8221;, Special Issue of the Computers &amp; Mathematics with Applications Journal, Vol.65, Iss.9, pp.1233, Elsevier, May 2013.<\/li><li>Jaatun M.G., Lambrinoudakis C., Rong C. (Guest Eds.), \u201cSecurity in Cloud Computing\u201d, Special Issue of the Journal of Cloud Computing: Advances, Systems and Applications, Vol.1, Issue 1, Springer,2012.<\/li><li>Shon T., Lambrinoudakis C., Zhou X. (Guest Eds.), \u201cNext Generation Communication and Network Security\u201d, Special Issue of the Security and Communication Networks Journal, Vol.5, No. 10, Wiley,2012.<\/li><li>Fischer-H\u00fcbner S., Furnell S., Lambrinoudakis C. (Guest Eds.), \u201cTrust, Privacy and Security in Digital Business -2006\u201d, Special Issue of the International Journal of Computer Systems, Science and Engineering, Vol.22, No. 5, CRL Publishing,2007.<\/li><\/ol><p style=\"text-align: justify;\"><strong>Books Editor \u2013 Collection of Chapters<\/strong><\/p><ol style=\"text-align: justify;\"><li style=\"text-align: justify;\"><p>Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S., (Eds.), Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Papasotiriou, Athens, Greece, 2010 (in Greek).<\/p><\/li><li style=\"text-align: justify;\"><p>Acquisti A., Gritzalis S., Lambrinoudakis C., De Capitani di Vimercati S., (Eds.), Digital Privacy: Theory, Technologies and Practices, Auerbach Publications \u2013 Taylor and Francis, New York, 2008.<\/p><\/li><li><p style=\"text-align: justify;\">Katsikas S., Gritzalis. S., Lambrinoudakis C., Dritsas, S., \u03a4\u03bf \u0391\u03bb\u03c6\u03b1\u03b2\u03b7\u03c4\u03ac\u03c1\u03b9 \u03c4\u03bf\u03c5 \u0395\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03b7\u03bc\u03b1\u03c4\u03af\u03b1 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae \u03ba\u03b1\u03b9 \u03c4\u03bf Internet, \u0388\u03ba\u03b4\u03bf\u03c3\u03b7 eBusinessForum \u2013 \u0395\u0394\u0395\u03a4 \u0391\u0395 (\u03c3\u03b5\u03bb\u03af\u03b4\u03b5\u03c2 80), \u0391\u03b8\u03ae\u03bd\u03b1<\/p><\/li><\/ol><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Prof. Costas Lambrinoudakis\u00a0holds a B.Sc. (Electrical and Electronic Engineering) from the University of Salford (1985), an M.Sc. (Control Systems) from the University of London (Imperial College -1986), and a Ph.D. (Computer Science) from the University of London (Queen Mary and Westfield College &#8211; 1991). Currently, he is a Professor at the Department of Digital Systems, [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1000"}],"collection":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/comments?post=1000"}],"version-history":[{"count":48,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1000\/revisions"}],"predecessor-version":[{"id":1634,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1000\/revisions\/1634"}],"wp:attachment":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/media?parent=1000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}