{"id":1512,"date":"2019-01-22T12:27:28","date_gmt":"2019-01-22T10:27:28","guid":{"rendered":"http:\/\/ssl.ds.unipi.gr\/?page_id=1512"},"modified":"2019-01-22T12:27:28","modified_gmt":"2019-01-22T10:27:28","slug":"books","status":"publish","type":"page","link":"https:\/\/laboratories.ds.unipi.gr\/ssl\/books\/","title":{"rendered":"Books"},"content":{"rendered":"\n<table id=\"tablepress-4\" class=\"tablepress tablepress-id-4\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Book\/Book chapter<\/th><th class=\"column-2\">Years<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Pitropakis N., Katsikas S., Lambrinoudakis C.,  \u201cCloud Security, Privacy and Trust Baselines\u201d, in the book Cloud Computing Security, Foundations and Challenges, John R. Vacca  (Ed.), pp. 45-59, CRC Press \u2013 Taylor and Francis, 2017. <\/td><td class=\"column-2\">2017<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis, \"Privacy-Preserving Aggregation in the Smart Grid,\" Chapter in Security Solutions and Applied Cryptography in Smart Grid Communications (Mohamed Amine Ferrag, Ahmed Ahmim), IGI Global, August 2016.<\/td><td class=\"column-2\">2016<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Vrakas N., Fotiadis G., Lambrinoudakis C., \u201cKey Management Techniques\u201d, in the book Contemporary Cryptography: Theory and Applications, Burmester M. et. al. (Eds.), pp. 541-598, Papasotiriou, Greece, 2011 (in Greek).<\/td><td class=\"column-2\">2011<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S., (Eds.), Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Papasotiriou, Athens, Greece, 2010 (in Greek). <\/td><td class=\"column-2\">2010<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Yannakopoulos A., Xanthopoulos S., Lambrinoudakis C., Gritzalis S., Katsikas S., \u201cPrivacy Protection Economics\u201d, in the book Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Lambrinoudakis  C. et.al. (Eds.), pp. 447-467, Papasotiriou, Greece, 2010 (in Greek).<\/td><td class=\"column-2\">2010<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Lambrinoudakis C., Gritzalis S., Katsikas S., \u201cA Review of Privacy Enhancing Technologies for the Internet\u201d, in the book Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Lambrinoudakis  C. et.al. (Eds.), pp. 3-48, Papasotiriou, Greece, 2010 (in Greek).<\/td><td class=\"column-2\">2010<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Christoforos Ntantogian, Christos Xenakis, \"Privacy Mechanisms in 4th Generation Networks,\" book chapter in \"Protection Privacy in Information and Communication Technologies: Technical and Legal Issues,\" Papasotiriou (2009), editor: K. Labrinoudakis, L. Mitrou, S. Gkritzalis, S. Katsikas.<\/td><td class=\"column-2\">2009<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Kambourakis G., Lambrinoudakis C., Katsikas S., \u201cIntrusion Detection Systems for Wireless Networks: A Survey\u201d, in the book Security and Privacy in Wireless and Mobile Computing, S. Gritzalis, T. Karygiannis and C. Skianis (Eds.), pp. 161-181, Troubador Publishing, 2009. <\/td><td class=\"column-2\">2009<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Christoforos Ntantogian, Christos Xenakis, \"Security Architectures for B3G Mobile Networks,\" book chapter in \"Handbook of Research on Wireless Security,\" Information Science Reference (2008), editor: Yan Zhang, Jun Zheng, Miao Ma, ISBN: 978-1-59904-899-4.<\/td><td class=\"column-2\">2008<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Christos Xenakis, \"Security in UMTS 3G Mobile Networks,\" book chapter in \"Handbook of Research on Wireless Security,\" Information Science Reference (2008), editor: Yan Zhang, Jun Zheng, Miao Ma, ISBN: 978-1-59904-899-4.<\/td><td class=\"column-2\">2008<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Christos Xenakis, \"Security in 2.5G Mobile Systems,\" book chapter in \"Handbook of Research on Wireless Security,\" Information Science Reference (2008), editor: Yan Zhang, Jun Zheng, Miao Ma, ISBN: 978-1-59904-899-4.<\/td><td class=\"column-2\">2008<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Acquisti A., Gritzalis S., Lambrinoudakis C., De Capitani di Vimercati S., (Eds.), Digital Privacy: Theory, Technologies and Practices, Auerbach Publications \u2013 Taylor and Francis, New York, 2008.<\/td><td class=\"column-2\">2008<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Geneiatakis D., Kambourakis G., Lambrinoudakis C., \u201cSIP Security: Threats, Vulnerabilities and Countermeasures\u201d, in the book SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol, S. Ahson and M. Ilyas (Eds.), pp. 435-456, CRC Press, 2008. <\/td><td class=\"column-2\">2008<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Lambrinoudakis C., E. Magkos, Chrisikopoulos V., \u201cElectronic Voting Systems\u201d, in the book Securing Information and Communication Systems: Principles, Technologies and Applications, S. Furnell, S. Katsikas, J. Lopez, A. Patel (Eds.), pp. 307-322, Artech House, 2008.<\/td><td class=\"column-2\">2008<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Yannakopoulos A., Katsikas S., Lambrinoudakis C., Gritzalis S., Xanthopoulos S., \"\u0391 Risk Model for Privacy Insurance\", in the book Digital Privacy: Theory, Technologies and Practices, Acquisti A. et al (Eds), pp. 347-362, Auerbach Publications \u2013 Taylor and Francis, New York, 2008.<\/td><td class=\"column-2\">2008<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Christos Xenakis, Lazaros Merakos, \"Security in Mobile Telecom Networks,\" book chapter in \"Network Security: Current status and future directions,\" Wiley-IEEE Press, editor: Christos Douligeris and Dimitrios Serpanos, June 2007, ISBN: 978-0-471-70355-6.<\/td><td class=\"column-2\">2007<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">Gritzalis S., Lambrinoudakis C., \"Privacy in the Digital World\", in Encyclopedia of Internet Technologies and Applications, Freire M., Pereira M. (Eds.), pp. 411-417, Information Science Reference (formerly Idea Group Reference), 2007.<\/td><td class=\"column-2\">2007<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">Christos Xenakis et al., \"Security &amp; Trust\" book chapter in \"Technologies for the Wireless Future: Wireless World Research Forum (WWRF), volume 2, Wiley, editor: Rahim Tafazolli, 2006, ISBN: 0-470-02905-6.<\/td><td class=\"column-2\">2006<\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">Lambrinoudakis C., Gritzalis S., \u201cSecurity in IEEE 802.11 WLANs\u201d, in the book Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards, Ilyas, Ahson (Eds.), pp. 585-606, CRC Press, 2005.<\/td><td class=\"column-2\">2005<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">Lambrinoudakis C., \u201cAccess Control Mechanisms\u201d, in the book Computer and Information Systems Security, Katsikas S., Gritzalis D., Gritzalis S. (Eds.), pp. 113-142, \u0395\u03ba\u03b4\u03cc\u03c3\u03b5\u03b9\u03c2 \u039d\u03ad\u03c9\u03bd \u03a4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03b9\u03ce\u03bd, 2004 (in Greek).<\/td><td class=\"column-2\">2004<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">Katsikas S., Gritzalis. S., Lambrinoudakis C., Dritsas, S., \u03a4\u03bf \u0391\u03bb\u03c6\u03b1\u03b2\u03b7\u03c4\u03ac\u03c1\u03b9 \u03c4\u03bf\u03c5 \u0395\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03b7\u03bc\u03b1\u03c4\u03af\u03b1 \u03b3\u03b9\u03b1 \u03c4\u03b7\u03bd \u03a0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03b9\u03ba\u03ae \u03ba\u03b1\u03b9 \u03c4\u03bf Internet, \u0388\u03ba\u03b4\u03bf\u03c3\u03b7 eBusinessForum \u2013 \u0395\u0394\u0395\u03a4 \u0391\u0395 (\u03c3\u03b5\u03bb\u03af\u03b4\u03b5\u03c2 80), \u0391\u03b8\u03ae\u03bd\u03b1 2003.<\/td><td class=\"column-2\">2003<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">Lambrinoudakis C., Gritzalis D., Tsoumas V., Karyda M., Ikonomopoulos S., \u201cSecure Electronic Voting: The Current Landscape\u201d, in the book Secure Electronic Voting, D. Gritzalis (Ed.), pp. 101-122, Kluwer Academic Publishers, 2003.<\/td><td class=\"column-2\">2003<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">Republication of the article \u201cSmart Card Technology for Deploying a Secure Information Management Framework\u201d (J.37. ), in the Library Computing, Internet and Software Applications for Information Professionals, Vol.19, Nos 3\/4, pp. 147-158, MCB University Press, 2000.<\/td><td class=\"column-2\">2000<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-4 from cache -->\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1512"}],"collection":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/comments?post=1512"}],"version-history":[{"count":1,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1512\/revisions"}],"predecessor-version":[{"id":1513,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/1512\/revisions\/1513"}],"wp:attachment":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/media?parent=1512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}