{"id":998,"date":"2018-12-25T22:43:07","date_gmt":"2018-12-25T20:43:07","guid":{"rendered":"http:\/\/ssl.ds.unipi.gr\/?page_id=998"},"modified":"2020-01-15T21:49:40","modified_gmt":"2020-01-15T19:49:40","slug":"christosxenakis","status":"publish","type":"page","link":"https:\/\/laboratories.ds.unipi.gr\/ssl\/christosxenakis\/","title":{"rendered":"Prof. Christos Xenakis"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"998\" class=\"elementor elementor-998\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-604507fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"604507fe\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b9d4b04\" data-id=\"b9d4b04\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1eccb883 elementor-widget elementor-widget-text-editor\" data-id=\"1eccb883\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #808080;\"><strong><a href=\"http:\/\/ssl.ds.unipi.gr\/wp-content\/uploads\/2019\/01\/christosxenakis.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-1315 alignleft\" src=\"http:\/\/ssl.ds.unipi.gr\/wp-content\/uploads\/2019\/01\/christosxenakis-225x300.jpg\" alt=\"\" width=\"225\" height=\"300\" srcset=\"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-content\/uploads\/2019\/01\/christosxenakis-225x300.jpg 225w, https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-content\/uploads\/2019\/01\/christosxenakis.jpg 300w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/a><\/strong><\/span><\/p><p style=\"text-align: justify;\"><strong>Prof. Christos Xenakis<\/strong> received his B.Sc degree in computer science in 1993 and his M.Sc degree in telecommunication and computer networks in 1996, both from the Department of Informatics and Telecommunications, University of Athens, Greece. In 2004 he received his Ph.D. from the University of Athens (<a href=\"http:\/\/www.di.uoa.gr\/\">Department of Informatics and Telecommunications<\/a>). From 1998 \u2013 2001 he was with a Greek telecoms system development firm, where he was involved in the design and development of advanced telecommunications subsystems. From 1996 \u2013 2007 he was a member of the <a href=\"http:\/\/cnl.di.uoa.gr\/\">Communication Networks Laboratory<\/a> of the University of Athens. Since 2007 he is a faculty member of the <a href=\"http:\/\/www.ds.unipi.gr\/\">Department of Digital Systems<\/a> of the University of Piraeus, Greece, where currently is a Professor, a member of the <a href=\"http:\/\/ssl.ds.unipi.gr\/\">Systems Security Laboratory<\/a> and the director of the Postgraduate Degree Programme, on <a href=\"http:\/\/www.ds.unipi.gr\/security\/en\/\">&#8220;Digital Systems Security&#8221;<\/a>. He has participated in numerous projects realized in the context of EU Programs (ACTS, ESPRIT, IST, AAL, DGHOME, Marie Curie, Horizon2020) as well as National Programs (Greek). He is the project manager the <a href=\"https:\/\/curex-project.eu\/\">CUREX<\/a>, <a href=\"https:\/\/secondo-h2020.eu\/\">SECONDO<\/a>, <a href=\"https:\/\/incognito.socialcomputing.eu\/\">INCOGNITO<\/a> and <a href=\"https:\/\/www.sgrid.eu\/\">SealedGRID<\/a> projects, funded by Horizon2020, while he was the project manager of the ReCRED project funded by Horizon 2020 and the technical manager of the UINFC2 project funded by DGHOME\/ISEC. He is also a steering committee member of the <a href=\"https:\/\/europeancybersecuritychallenge.eu\/\">European Cyber Security Challenge (ECSC)<\/a> and the leader of the <a href=\"http:\/\/www.ecsc.gr\/\">Hellenic Cyber Security Team<\/a>. He is a member of the editorial board of three Thomson Reuters indexed journals: a) Computers &amp; Security Journal of the Elsevier publishing, b) Computer Communications Journal of the Elsevier publishing, and c) IET Information Security of the Institute of Engineering and Technology. His research interests are in the field of systems, networks and applications security. He has authored more than 90 papers in peer-reviewed journals and international conferences.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ad0576 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ad0576\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-17acfed\" data-id=\"17acfed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1bf0bf elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"a1bf0bf\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-address-card\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">E-mail: xenakis@unipi.gr<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c18f121 elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"c18f121\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.linkedin.com\/in\/christos-xenakis-1939b13\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-linkedin-square\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LinkedIn<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-beda4ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"beda4ad\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b114b53\" data-id=\"b114b53\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d9a27d elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"8d9a27d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/index.html\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-info\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Personal Website<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-684fa0c elementor-button-info elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"684fa0c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/scholar.google.gr\/citations?user=TXyjpUUAAAAJ&#038;hl=en\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-google\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Citations (as measured by Google Scholar)<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c2c4165 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c2c4165\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b2b4e8\" data-id=\"8b2b4e8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c180431 elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"c180431\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2021\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-2021\" aria-expanded=\"false\">Courses<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2022\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2022\" aria-expanded=\"false\">Journals<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2023\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2023\" aria-expanded=\"false\">Conferences<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2024\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2024\" aria-expanded=\"false\">Books<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2025\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2025\" aria-expanded=\"false\">Invited talks<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2026\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2026\" aria-expanded=\"false\"> Committees - Administrative Experience<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-2021\" aria-expanded=\"false\">Courses<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2021\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2021\" tabindex=\"0\" hidden=\"false\"><p><b>Undergraduate Program:<\/b><\/p><ul><li>Information Theory\u00a0<\/li><li style=\"font-weight: 400;\">Network Security\u00a0<\/li><li style=\"font-weight: 400;\">Cryptography\u00a0<\/li><li style=\"font-weight: 400;\">Mobile and Wireless Communications Security\u00a0<\/li><\/ul><p><b>Postgraduate Program:<\/b><\/p><ul><li>Network Security\u00a0<\/li><li style=\"font-weight: 400;\">Security Assessment and Vulnerability Exploitation\u00a0<\/li><li style=\"font-weight: 400;\">Mobile Internet Security<\/li><li style=\"font-weight: 400;\">Digital Forensics and Web Security\u00a0<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2022\" aria-expanded=\"false\">Journals<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2022\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2022\" tabindex=\"0\" hidden=\"hidden\"><ol style=\"font-weight: 400;\"><li style=\"text-align: justify;\">Kostantinos Papadamou, Savvas Zannettou, Bogdan Chifor, Sorin Teican, George Gugulea, Alberto Caponi, Annamaria Recupero, Claudio Pisa, Giuseppe Bianchi, Steven Gevers, Christos Xenakis, Michael Sirivianos,\u00a0&#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/pubs.html\"><span style=\"color: #000000;\">\u00a0Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication.<\/span><\/a>&#8221; IEEE Transactions on Information Forensics &amp; Security,<span lang=\"EN-GB\">\u00a0December 2019 (accepted).\u00a0<\/span><a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/82-IEEE-Transactions_on_Information_Forensics_Security_2019\/Killing%20the%20Password%20and%20Preserving%20Privacy%20withDevice-Centric%20and%20Attribute-based%20Authentication.pdf\"><span style=\"color: #0080c0;\">(PDF)<\/span><\/a><\/li><li style=\"text-align: justify;\">Vaios Bolgouras, Christoforos Ntantogian, Emmanouil Panaousis, Christos Xenakis,\u00a0&#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8839344\" target=\"_blank\" rel=\"noopener\">Distributed Key Management in Microgrids.<\/a>&#8221; IEEE Transactions on Industrial Informatics,<span lang=\"EN-GB\">\u00a0September 2019 (accepted).\u00a0<\/span><a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/78-IEEE%20Transactions%20on%20Industrial%20Informatics-2019\/bolgouras2019distributed.pdf\"><span style=\"color: #0080c0;\">(PDF)<\/span><\/a><\/li><li style=\"text-align: justify;\">Christoforos Ntantogian, Eleni Veroni, Georgios Karopoulos, Christos Xenakis, &#8220;<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0045790618317257\" target=\"_blank\" rel=\"noopener\">A survey of voice and communication protection solutions against wiretapping,<\/a>&#8221; Computers &amp; Electrical Engineering, Vol. 77, pp:163-178, July 2019. (<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/76-Computers%20&amp;%20Electrical%20Engineering-2019\/SecureVoice.pdf\" target=\"_blank\" rel=\"noopener\">PDF<\/a>)<\/li><li style=\"text-align: justify;\">Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404818308332?via%3Dihub\" target=\"_blank\" rel=\"noopener\">Evaluation of password hashing schemes in open source web platform<\/a>s\u201d, Computers &amp; Security, Elsevier, July 2019.(<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/72-%20Computers%20&amp;%20Security-2019\/PasswordHashing.pdf\" target=\"_blank\" rel=\"noopener\">PDF<\/a>)<\/li><li style=\"text-align: justify;\">Christoforos Ntantogian, George Poulios, George Karopoulos, Christos Xenakis, \u201c<a href=\"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs.2018.5386\" target=\"_blank\" rel=\"noopener\">Transforming Malicious Code to ROP Gadgets for Antivirus Evasion<\/a>\u201d, IET Information Security, March 2019. (<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/73-IET%20Information%20Security-2019\/ROPInjector.pdf\" target=\"_blank\" rel=\"noopener\">PDF<\/a>)<\/li><li style=\"text-align: justify;\">Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, \u201c<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10207-018-0399-z\" target=\"_blank\" rel=\"noopener\">Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications<\/a>\u201d, International Journal of Information Security, Springer, Volume 18, Issue 1, pp 49\u201372, February 2019.(<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/68-COMMIX-2018\/commix_plain.pdf\" target=\"_blank\" rel=\"noopener\">PDF<\/a>)<\/li><li style=\"text-align: justify;\"><span style=\"text-align: left; font-size: 1rem;\">Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis,\u00a0&#8220;<\/span><a style=\"text-align: left; background-color: #ffffff; font-size: 1rem;\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404817302456\">MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem<\/a><span style=\"text-align: left; font-size: 1rem;\">,&#8221; Computers &amp; Security, Elsevier Science,\u00a0Vol. 73, Issue 1, pp:307-325, March 2018.<\/span><a style=\"text-align: left; background-color: #ffffff; font-size: 1rem;\" href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/69-COSE-2018\/masker-preprint.pdf\" target=\"_blank\" rel=\"noopener\">\u00a0(PDF)<\/a><\/li><li style=\"text-align: justify;\">Christoforos Panos, Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis,\u00a0&#8220;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128616304212\">Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks<\/a>,&#8221; Computer Networks, Elsevier Science,\u00a0Vol. 113, Issue 1, pp: 94-110, February 2017.<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/65-COMNET-2016\/%CE%92lackhole_Evaluation_CUSUM.pdf\" target=\"_blank\" rel=\"noopener\">\u00a0(PDF)<\/a><\/li><li style=\"text-align: justify;\">Christos Xenakis, Christoforos Ntantogian, Orestis Panos,\u00a0&#8220;<a style=\"background-color: #ffffff; font-size: 1rem;\" href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S016740481630027X?np=y\">(U)SimMonitor: a mobile application for security evaluation of cellular networks<\/a><span style=\"font-size: 1rem;\">,&#8221; Computers &amp; Security, Elsevier Science,\u00a0Vol. 60, Issue 1, pp: 62-70, July 2016.<\/span><a style=\"background-color: #ffffff; font-size: 1rem;\" href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/63-COSE-2016\/Usimmonitor-COSE-pub.pdf\" target=\"_blank\" rel=\"noopener\">\u00a0(PDF)<\/a><\/li><li style=\"text-align: justify;\">Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis,\u00a0&#8220;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404815000413\">Gaithashing: a two-factor authentication scheme based on gait features<\/a>,&#8221; Computers &amp; Security, Elsevier Science,\u00a0Vol. 52, Issue 1, pp: 17-32, July 2015.<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/55-COMSEC-2015\/gaithashing.pdf\">\u00a0(PDF)<\/a><\/li><li style=\"text-align: justify;\">Christoforos Panos, Christos Xenakis, Platon Kotzias, Ioannis Stavrakakis,\u00a0&#8220;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366414002813\">A specification-based intrusion detection engine for infrastructure-less networks<\/a>,&#8221; Computer Communications, Elsevier Science,\u00a0Vol. 54, pp: 67-83, Dec. 2014.<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/52-COMCOM-2014\/SIDE.pdf\" target=\"_blank\" rel=\"noopener\">\u00a0(PDF)<\/a><\/li><li style=\"text-align: justify;\">Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis,\u00a0Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404814000157\">Evaluating the privacy of Android mobile applications under forensic analysis<\/a>,&#8221; Computers &amp; Security, Elsevier Science,\u00a0Vol. 42, pp:66-76, May 2014.<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/53-COSE-2014\/Mobile-forensics.pdf\" target=\"_blank\" rel=\"noopener\">\u00a0(PDF)<\/a><\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis, Christoforos\u00a0Ntantogian, &#8220;<a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404813001685#\">An advanced persistent threat in 3G networks: Attacking the home network from roaming networks<\/a>,&#8221; Computers &amp; Security, Elsevier Science,\u00a0Vol. 40, Issue 1, pp:84-94, February 2014.<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/53-COSE-2014\/Attacking%20the%20HLR%20of%203G%20Networks.pdf\" target=\"_blank\" rel=\"noopener\">\u00a0(PDF)<\/a><\/li><li style=\"text-align: justify;\">Foivos\u00a0Demertzis, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/47-MCM-I\/SOMA-Extended.pdf\">SOMA-E: Self-Organised\u00a0Mesh Authentication Extended<\/a>,&#8221; Mathematical and Computer Modeling, Elsevier Science,\u00a0Vol. 57, Issue 7-8, pp: 1606 \u2013 1616, April 2013.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/41-WIRE-III\/WIRE-UMTS-GSM-Attacks.pdf\">Questioning the Feasibility of UMTS-GSM Interworking Attacks<\/a>,&#8221; Wireless Personal Communications, Springer, Vol. 65, No. 1, pp:157-163, July 2012.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian,\u00a0Christos\u00a0Xenakis,\u00a0Ioannis\u00a0Stavrakakis\u00a0&#8221;\u00a0<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/43-IEEE-TWC-I\/TWC-False-Sync.pdf\">Reducing False Synchronizations in 3G-WLAN Interworking Networks\u00a0<\/a>,&#8221; IEEE Transactions on Wireless Communications, Vol. 10, No. 11, pp: 3765\u20133773, Nov. 2011.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Christoforos\u00a0Panos,\u00a0Ioannis\u00a0Stavrakakis\u00a0&#8221;\u00a0<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/40-COSE-II\/COSE-MANETS-IDS-Evaluation.pdf\">A\u00a0Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks\u00a0<\/a>,&#8221; Computers &amp; Security, Elsevier Science, Vol. 30, Issue 1,\u00a0pp: 63-80, Jan. 2011.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis,\u00a0Ioannis\u00a0Stavrakakis\u00a0&#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/36-COSE-I\/COSE-Authentication-B3G.pdf\">A Generic Mechanism for Efficient Authentication in B3G Networks\u00a0<\/a>,&#8221; Computers &amp; Security, Elsevier Science, Vol. 29, Issue 4,\u00a0pp: 460-475, June 2010.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/32-WIRE-II\/WIRE-OnepassEAP-AKA.pdf\">One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks\u00a0<\/a>,&#8221; Wireless Personal Communications, Springer,\u00a0Vol. 48, Issue 4, pp:\u00a0569-584, March 2009.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Christoforos\u00a0Ntantogian,\u00a0Ioannis\u00a0Stavrakakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/33-COMCOM-III\/COMCOM-MVPN-UMTS.pdf\">A network-assisted mobile VPN for securing users data in UMTS\u00a0<\/a>,&#8221; Computer Communications, Elsevier Science, vol.\u00a031, No. 14, pp.\u00a03315-3327\u00a0September 2008.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/24-JJNS\/IJNS-Sec&amp;Weak-GPRS.pdf\">Security Measures and Weaknesses of the GPRS Security Architecture\u00a0<\/a>,&#8221; International Journal of Network Security, Vol.6, No.2, pp:158-169, Mar. 2008.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Christoforos\u00a0Ntantogian, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/26-Telecommmunications-Systems\/TelSystems-Security-B3G.pdf\">Security Architectures for B3G Mobile Networks,\u00a0<\/a>&#8221; Telecommunication Systems, Springer, Vol.35, pp: 123-139, Aug. 2007.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/22-Comp-Virology\/CompVirology-GPRS-Attacks.pdf\">Malicious actions against the GPRS technology<\/a>,&#8221; Computer Virology, Springer, Vol. 2, No. 2, Nov. 2006, pp. 121-133.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis, Nikos\u00a0Laoutaris,\u00a0Lazaros\u00a0Merakos,\u00a0Ioannis\u00a0Stavrakakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/16-ComNet\/COMNET-IPsec-Perf-analysis.pdf\">A Generic Characterization of the Overheads Imposed by\u00a0IPsecand Associated Cryptographic Algorithms\u00a0<\/a>,&#8221; Computer Networks, Elsevier Science, Vol. 50, No. 17, Dec 2006, pp. 3225-3241.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/14-WIRE\/WIRE-VPN-schemes-UMTS.pdf\">Alternative Schemes for Dynamic Secure VPN Deployment over UMTS<\/a>,&#8221; Wireless Personal Communications, Springer, Vol. 36, No. 2, Jan 2006, pp. 163-194.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/13-COMCOM-II\/COMCOM-E2E-VPN-UMTS.pdf\">IPsec-based End-to-end VPN Deployment over UMTS<\/a>,&#8221; Computer Communications, Elsevier Science, vol. 27, No. 17, pp. 1693-1708, November 2004. (8<sup>th<\/sup>\u00a0in the list of most requested articles of the Journal)<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/11-COMCOM-I\/COMCOM-Security-in-3G.pdf\">Security in third Generation Mobile Networks<\/a>,&#8221; Computer Communications, Elsevier Science, Vol. 27, No. 7, pp. 638-650, May 2004. (Most requested article of the Journal)<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/08-IEEE-Network\/IEEE-Network-NetWide-VPN-GPRS.pdf\">On Demand Network-wide VPN Deployment in GPRS<\/a>,&#8221; IEEE Network, Vol. 16, No. 6, pp. 28-37, November\/December 2002.<\/li><li style=\"text-align: justify;\">Kostantinos Papadamou, Savvas Zannettou, Giuseppe Bianchi, Alberto Caponi, Annamaria Recupero, Steven Gevers, George Gugulea, Sorin Teican, Bogdan Chifor, Christos Xenakis, Michael Sirivianos, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/1811.08360\" data-clk=\"hl=ro&amp;sa=T&amp;ei=rUDmXLzSMYeTmAHOsaGwCA\">Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication,arXiv preprint arXiv:1811.08360, 2018<\/a><\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2023\" aria-expanded=\"false\">Conferences<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2023\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2023\" tabindex=\"0\" hidden=\"hidden\"><ol style=\"font-weight: 400;\"><li style=\"text-align: justify;\">Nikolaos Koutroumpouchos, Georgios Lavdanis, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis , &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/81-PCI-2019\/pcipaper.pdf\"><span style=\"color: #0080c0;\">ObjectMap: Detecting Insecure Object Deserialization.<\/span><\/a>\u00a0<span class=\"SpellE\">&#8221; In Proc. 23rd Pan-Hellenic Conference on Informatics (PCI 2019), Nicosia, Cyprus, Nov. 2019.<\/span><\/li><li style=\"text-align: justify;\">Farnaz Mohammadi, Angeliki Panou, Christoforos Ntantogian, Eirini Karapistoli, Emmanouil Panaousis, Christos Xenakis , &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/80-WI-2019\/WI19COMPANION-58.pdf\">CUREX: seCUre and pRivate hEalth data eXchange.<\/a>\u00a0&#8221; In Proc. Web Intelligence 2019, Thessaloniki, Greece, Oct. 2019.<\/li><li style=\"text-align: justify;\">Michail Bampatsikos, Christoforos Ntantogian, Christos Xenakis, Stelios C.A. Thomopoulos , &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/80-WI-2019\/WI19COMPANION-57.pdf\">BARRETT BlockchAin Regulated REmote aTTestation.<\/a>\u00a0&#8221; In Proc. Web Intelligence 2019, Thessaloniki, Greece, Oct. 2019.<\/li><li style=\"text-align: justify;\">Aristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis and Javier Lopez, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/79-CRITIS-2019\/CRITIS_2019.pdf\"><span style=\"color: #0080c0;\">SealedGRID: A Secure Interconnection Technologies for Smart Grid Applications<\/span><\/a>\u00a0<span class=\"SpellE\">&#8221; In Proc. 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, Link\u00f6ping, Sweden, Sept. 2019.<\/span><\/li><li style=\"text-align: justify;\">George Suciu, Cristiana-Ioana Istrate, Alexandru Vulpe, Mari-Anais Sachian, Marius Vochin, Aristeidis Farao, Christos Xenakis, <a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/74-ICS-CSR-2019\/ICS-CSR_2019-Attribute-based%20Access%20Control%20for%20Secure%20and%20Resilient%20Smart%20Grids.pdf\" target=\"_blank\" rel=\"noopener\">Attribute-based Access Control for Secure and Resilient Smart Grids<\/a>, ICS-CSR 2019, Athens, Greece, Sept. 2019.<\/li><li style=\"text-align: justify;\">Aristeidis Farao, Christoforos Ntantogian, Cristiana Istrate, George Suciu, Christos Xenakis, <a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/74-ICS-CSR-2019\/ISC_CSR_2019-SealedGRID.pdf\" target=\"_blank\" rel=\"noopener\">SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smartGRID<\/a>, ICS-CSR 2019, Athens, Greece, Sept. 2019.<\/li><li style=\"text-align: justify;\">Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos, \u201c<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/75-Workshop%20on%20Cyber-Security%20-2019\/SecSoft_2019.pdf\" target=\"_blank\" rel=\"noopener\">Secure Edge Computing with Lightweight Control-Flow Property-based Attestation<\/a>,\u201d In Proc. 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures co-located with IEEE NetSoft 2019,\u00a0 Paris, France, June 2019.<\/li><li style=\"text-align: justify;\">Ioanna Kitsaki, Anna Angelogianni, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/71-PCI-2018\/Android-app-forensics-PCI2018.pdf\">\u00a0A Forensic Investigation of Android Mobile Applications,<\/a>\u00a0&#8221; In Proc. 22st Pan-Hellenic Conference on Informatics (PCI 2018), Athens, Greece, Nov. 2018.<\/li><li style=\"text-align: justify;\">Christoforos Panos, Stefanos Malliaros, Christoforos Ntantogian, Angeliki Panou, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/67-TIWDC-2017\/fido-paper-camera-ready-UPRC.pdf\">\u00a0A Security Evaluation of FIDO\u2019s UAF Protocol in Mobile and Embedded Devices,<\/a>\u00a0&#8221; In Proc. Towards a Smart and Secure Future Internet: 28th International Tyrrhenian Workshop (TIWDC), Palermo, Italy, Sept. 2017.<\/li><li style=\"text-align: justify;\">Angeliki Panou, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/66-PCI-2017\/PCI_2017_paper_63-UPRC.pdf\">\u00a0RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance,<\/a>\u00a0&#8221; In Proc. 21st Pan-Hellenic Conference on Informatics (PCI 2017), Larisa, Greece, Sept. 2017.<\/li><li style=\"text-align: justify;\">Georgios Karopoulos, Christos Xenakis, Stefano Tennina, Stefanos Evangelopoulos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/70-CAMAD-2017\/PID4785307.pdf\">\u00a0Towards trusted metering in the smart grid,<\/a>\u00a0&#8221; In Proc. 22nd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2017), Lund, Sweden, June 2017.<\/li><li style=\"text-align: justify;\">Stefanos Malliaros, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/64-ARES-2016\/protecting%20sensitive%20information%20in%20the%20volatile%20memory.pdf\">\u00a0Protecting sensitive information in the volatile memory from disclosure attacks,<\/a>\u00a0&#8221; In Proc. 11th International Conference on Availability, Reliability and Security (ARES 2016), Salzburg, Austria, August 2016.<\/li><li style=\"text-align: justify;\">Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/62-BICT-2015\/androcrypto-cameraready.pdf\">\u00a0Evaluation of Cryptography Usage in Android Applications,<\/a>\u00a0&#8221; In Proc. 9th EAI International Conference on Bio-inspired Information and Communications Technologies, New York City, New York, USA, Dec. 2015.<\/li><li style=\"text-align: justify;\">Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/61-BlackHatEU-2015\/eu-15-Stasinopoulos-Commix-Detecting-And-Exploiting-Command-Injection-Flaws-wp.pdf\">\u00a0Commix: Detecting and exploiting command injection flaws,<\/a>\u00a0&#8221; In Proc. The Black hat Europe 2015, Amsterdam, Netherlands, Nov. 2015.<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/61-BlackHatEU-2015\/eu-15-Stasinopoulos-Commix_%20Detecting-And-Exploiting-Command-Injection-Flaws.pdf\">\u00a0(slides)<\/a><\/li><li style=\"text-align: justify;\">Christoforos Ntantogian, Grigoris Valtas, Nikos Kapetanakis, Faidon Lalagiannis, Georgios Karopoulos, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/59-TrustBus-2015\/Attacking_GSM_Networks-cameraready.pdf\">\u00a0Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software,<\/a>\u00a0&#8221; In Proc. 12th International Conference on Trust, Privacy &amp; Security in Digital Business (TrustBus 2015), Valencia, Spain, Sept. 2015.<\/li><li style=\"text-align: justify;\">Giorgos Poulios, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Xenakis-ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion-wp.pdf\">\u00a0ROPInjector: Using Return Oriented Programming for Polymorphism and Antivirus Evasion,<\/a>\u00a0&#8221; In Proc. The Black hat USA 2015, Las Vegas NV, USA, August 2015.<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/60-BlackHat-2015\/us-15-Xenakis-Briefings-Aug-6.pdf\">\u00a0(slides)<\/a><\/li><li style=\"text-align: justify;\">Foivos F. Demertzis, Georgios Karopoulos, Christos Xenakis, Andrea Colarieti, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/57-ADHOC-NOW-2015\/SOMA-Extended-SG.pdf\">\u00a0Self-Organised Key Management for the Smart Grid,<\/a>\u00a0&#8221; In Proc. 14th International Conference on Ad Hoc Networks and Wireless (ADHOC\u2010NOW 2015), Athens, Greece, June 2015.<\/li><li style=\"text-align: justify;\">Christos Xenakis, Christoforos Ntantogian, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/58-CYCON-2015\/CyCon_2015_cameraready.pdf\">\u00a0Attacking the Baseband Modem of Mobile Phones to Breach the Users\u2019 Privacy and Network Security,<\/a>\u00a0&#8221; In Proc. 7th International Conference on Cyber Conflict (CyCon 2015), Tallinn, Estonia, May 2015,\u00a0<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/58-CYCON-2015\/(U)SimMonitor-xenakis.pdf\" target=\"_blank\" rel=\"noopener\">(slides),<\/a>\u00a0<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/58-CYCON-2015\/usim_monitor.mp4\" target=\"_blank\" rel=\"noopener\">(video).<\/a><\/li><li style=\"text-align: justify;\">Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/54-ISSPIT-2014\/IEEE_Bypassing_XSS_Auditor.pdf\">\u00a0Bypassing XSS Auditor: Taking Advantage of Badly Written PHP Code,<\/a>\u00a0&#8221; In Proc. 14th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2014), Noida, India, Dec 2014.<\/li><li style=\"text-align: justify;\">Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/51-ISSPIT-2013\/ASDL-routers-exploitation-cameraready.pdf\">\u00a0The weakest link on the network: exploiting ADSL routers to perform cyber-attacks,<\/a>\u00a0&#8221; In Proc. 13th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013), Athens, Greece, December 2013.<\/li><li style=\"text-align: justify;\">Charalampos Petrou, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/50-TRUSTBUS-2013\/ePassports-cameraready.pdf\">\u00a0A better time approximation scheme for e-passports,<\/a>\u00a0&#8221; In Proc. 10th International Conference on Trust, Privacy &amp; Security in Digital Business (TrustBus 2013), Prague, Czech Republic, August 2013.<\/li><li style=\"text-align: justify;\">Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/49-I3E-2013\/2013-I3E-AMNX.pdf\">\u00a0Discovering authentication credentials in volatile memory of Android mobile devices,<\/a>\u00a0&#8221; In Proc. 12th IFIP Conference on e-Business, e-Services, e-Society (I3E 2013), Athens, Greece, April 2013.<\/li><li style=\"text-align: justify;\">Christoforos Ntantogian, Dimitris Gkikakis, Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/48-ICSNC-2012\/ICSNC2012-pripay.pdf\">\u00a0PRIPAY: A Privacy Preserving Architecture for Secure Micropayments,<\/a>\u00a0&#8221; In Proc. The Seventh International Conference on Systems and Networks Communications (ICSNC 2012), Lisbon, Portugal, Nov. 2012.<\/li><li>Dimitris Tsolkas, Nikos Passas, Christos Xenakis, Vassilis Papataxiarhis, Vassileios Tsetsos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/46-PCI-2012\/PCI2012-Busfinder.pdf\">\u00a0Busfinder: a personalized multimodal transportation guide with dynamic routing,<\/a>\u00a0&#8221; In Proc. 16th Panhellenic Conference on Informatics (PCI 2012), Piraeus, Greece, Oct. 2012.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis,\u00a0Ioannis\u00a0Stavrakakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/45-SEC2012\/SEC2012-ModelingFalseSynch3G.pdf\">Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks<\/a>,&#8221; In Proc. 27<sup>th<\/sup>\u00a0IFIP International Information Security and Privacy Conference (SEC 2012),\u00a0Heraklion, Crete, Greece, June 2012.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Panos,\u00a0Platon\u00a0Kotzias, Christos\u00a0Xenakis,\u00a0Ioannis\u00a0Stavrakakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/44-WONS-2012\/WONS2012-MAC-Engine.pdf\">Securing the 802.11 MAC in MANETS: A Specification-based Intrusion Detection Engine,<\/a>&#8221; In Proc. 9<sup>th<\/sup>\u00a0IEEE\/IFIP International Conference on Wireless On-demand Network Systems and Services (WONS 2012), Courmayeur, Italy, Jan. 2012.<\/li><li style=\"text-align: justify;\">Eleni\u00a0Darra,\u00a0Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis,\u00a0Sokratis\u00a0Katsikas, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/42-TrustBus-2011\/IDS-MEACA-MANETs.pdf\">A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks\u00a0<\/a>,&#8221; In Proc. 8th International Conference on Trust, Privacy &amp; Security in Digital Business (TrustBus2011), Toulouse France, August 2011<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Panos, Christos\u00a0Xenakis,\u00a0Ioannis\u00a0Stavrakakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/42-TrustBus-2011\/IDS-Engines-Evaluation.pdf\">An Evaluation of Anomaly-based Intrusion Detection Engines for Mobile Ad Hoc Networks\u00a0,<\/a>&#8221; In Proc. 8th International Conference on Trust, Privacy &amp; Security in Digital Business (TrustBus\u00a02011), Toulouse France, Aug. 2011<\/li><li style=\"text-align: justify;\">Foivos\u00a0Demertzis, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/38-EuroPKI-2010\/SOMA.pdf\">SOMA: Self-Organized Mesh Authentication\u00a0<\/a>,&#8221; In Proc.\u00a07th European Workshop on Public Key Services, Applications and Infrastructures (EuroPKI 2010), Athens, Greece, Sept. 2010.<\/li><li style=\"text-align: justify;\">Nikos\u00a0Vavoulas, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/39-CRITIS-2010\/CRITIS2010-RiskAnalysisDeliberateThreats.pdf\">A Quantitative Risk Analysis Approach for Deliberate Threats\u00a0<\/a>,&#8221; In Proc.\u00a05<sup>th<\/sup>\u00a0International Workshop on Critical Information Infrastructures Security, (CRITIS 2010), Athens, Greece, Sept. 2010.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Panos, Christos\u00a0Xenakis,\u00a0Ioannis\u00a0Stavrakakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/37-SECRYPT-2010\/IEEE-RW_IDS_MANET.pdf\">A Novel Intrusion Detection System for MANETs\u00a0<\/a>,&#8221; In Proc. International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece, July 2010.<\/li><li style=\"text-align: justify;\">Christos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/34-TSP-2008\/TSP2008RiskAnalysisGPRS.pdf\">A Qualitative Risk Analysis for the GPRS Technology<\/a>,&#8221; In Proc.\u00a0IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-08),\u00a0Shanghai, China,\u00a0December 2008.<\/li><li style=\"text-align: justify;\">Dimitris Ztoupis, Kyriakos Zarifis, Christos Xenakis, Ioannis Stavrakakis &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/31-ISWPC-2008\/2008ISWPC-ZZXS.pdf\">\u00a0Towards a Security Framework for an Established Autonomous Network<\/a>,\u00a0&#8221; In Proc.\u00a0IEEE\u00a0International Symposium on Wireless Pervasive Computing,\u00a0Santorini, Greece, May 2008<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis,\u00a0Ioannis\u00a0Stavrakakis,\u00a0&#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/30-WONS-2008\/WONS2008-Auth-Cost-NGN.pdf\">Reducing the User Authentication Cost in Next Generation Networks,\u00a0<\/a>&#8221; In Proc. 5<sup>th<\/sup>\u00a0IEEE\/IFIP Annual Conference on Wireless On demand Network Systems and Services (WONS 2008), Garmisch-Partenkirchen, Germany, Jan 2008.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis,\u00a0Ioannis\u00a0Stavrakakis,\u00a0&#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/29-BIONETICS-SAC\/BIONETICS-2007-Auth-NGN.pdf\">Efficient Authentication for Users Autonomy in Next Generation All-IP Networks,\u00a0<\/a>&#8221; In Proc. 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (BIONETICS 2007), Budapest, Hungary, Dec 2007.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/28-PIMRC%202007\/PIMRC07-Authe-3G-WLAN.pdf\">Reducing Authentication Traffic in 3G-WLAN Integrated Networks<\/a>,&#8221; In Proc. 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2007), Athens, Greece, Sept 2007.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/28-PIMRC%202007\/PIMRC07-Auth-Mob-VPN.pdf\">A Security Protocol for Mutual Authentication and Mobile VPN Deployment in B3G Networks<\/a>,&#8221; In Proc. 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC 2007), Athens, Greece, Sept 2007.<\/li><li style=\"text-align: justify;\">Kyriakos\u00a0Zarifis,\u00a0Dimitris\u00a0Ztoupis, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/27-Med-hoc-Net-PhD-workshop\/MedHocNet-2007-AWMN-security.pdf\">Security Issues in an Established Autonomous Wireless Network<\/a>,&#8221; PhD poster presented in the 6<sup>th<\/sup>\u00a0Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 2007<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/27-Med-hoc-Net-PhD-workshop\/MedHocNet-2007-Sec-Bindining.pdf\">A Security Binding for Efficient Authentication in 3G-WLAN Heterogeneous Networks<\/a>,&#8221;\u00a0PhD poster presented in the 6<sup>th<\/sup>\u00a0Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 2007.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/23-CRITIS'06\/CRITIS2006-Vul&amp;Att-GPRS-backbone.pdf\">Vulnerabilities and Possible Attacks against the GPRS Backbone Network<\/a>,&#8221; In Proc.\u00a0International Workshop on Critical Information Infrastructures Security, (CRITIS 06), LNCS 4347, Springer, 2006, pp. 262\u00a0&#8211; 272.<\/li><li style=\"text-align: justify;\">Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/20-Mobile-Summit-2006\/MobSummit2006-EnEAP-SIM-for-WLAN.pdf\">An enhanced EAP-SIM authentication scheme for securing WLAN<\/a>,&#8221; Proc. 15<sup>th<\/sup>\u00a0IST Mobile &amp; Wireless Communications, Mykonos, Greece, June 2006.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis, Nikos\u00a0Loukas,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/18-EW2006\/EW2006-Mob-VPN-UMTS.pdf\">A Secure Mobile VPN Scheme for UMTS<\/a>,&#8221; In\u00a0Proc. European Wireless 2006, Athens, Greece, April 2006<\/li><li style=\"text-align: justify;\">Dimitris\u00a0Karteris, Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/12-Mobile-Summit-2004\/MobSummit-2004-CASPAIR.pdf\">Context-Aware Service Provisioning in All-IP Networks,&#8221;\u00a0<\/a>In Proc. 13<sup>th<\/sup>\u00a0IST Mobile &amp; Wireless Communications, Lyon, France, June 2004.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/10-10th-wwrf-meeting-NY-Oct-2003\/WWRF-User-privacy-3G.pdf\">\u00a0Enhancing End-users Privacy in 3G Networks,<\/a>\u00a0&#8221; In Proc. 10<sup>th<\/sup>\u00a0WWRF Meeting,\u00a0New York, NY, USA, October 2003.\u00a0<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/07-IEEE-PIMRC-02-Lisboa-Portugal-Sept-02\/PIMRC2002-Netbased-VPN.pdf\">Dynamic Network-based Secure VPN Deployment in GPRS<\/a>,&#8221; In Proc. IEEE PIMRC 2002, Lisboa, Portugal, pp. 1260-1266, September 2002.<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/06-Mobile-Veneu-02-Athens-May-02\/MobVeneu2002-Security-in-UMTS.pdf\">Security Architecture Standardization and Services in UMTS<\/a>,&#8221; In Proc. Mobile Venue 2002,\u00a0Athens, Greece, pp. 585-592, May 2002.\u00a0<\/li><li style=\"text-align: justify;\">Christos\u00a0Xenakis,\u00a0Evangelos\u00a0Gazis,\u00a0Lazaros\u00a0Merakos, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/05-EW2002-Florence-Italy-Feb-02\/EW2002-VPN-GPRS.pdf\">Secure VPN Deployment in GPRS Mobile Network<\/a>,&#8221; In Proc. European Wireless 2002,\u00a0Florence, Italy, pp. 293-300, February 2002.<\/li><li style=\"text-align: justify;\">Nikos\u00a0Loukas, Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos,\u00a0Iakovos\u00a0Venieris\u00a0\u00a0\u00a0&#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/03-IEEE-ICUPC-98-Florence-Italy-Oct-98\/IEEE-ICUPC-1998.pdf\">Access\u00a0Signaling\u00a0and IN-based Mobility Management for Wireless ATM Systems,&#8221;\u00a0\u00a0<\/a>In Proc. IEEE ICUPC 1998, Florence, Italy, October 1998.<\/li><li style=\"text-align: justify;\">Nikos Loukas, Christos Xenakis, Lazaros Merakos, Iakovos Venieris\u00a0 &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/02-IEEE-PIMRC-98-Boston-USA-Sept-98\/IEEE-PIMRC-1998.pdf\">Signaling\u00a0and Mobility Control for Wireless Intelligent ATM CPNs<\/a>,&#8221; In Proc. IEEE PIMRC 1998,\u00a0Boston, USA, September 1998.<\/li><li style=\"text-align: justify;\">Nikos\u00a0Loukas, Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos\u00a0&#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/01-IEEE-ICUPC-97-San-Diego-USA-Oct-97\/IEEE-ICUPC-1997.pdf\">Transport Performance Evaluation of an ATM-based UMTS Access Network<\/a>,&#8221; In Proc. IEEE ICUPC 1997,\u00a0San Diego, USA, October 1997.<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2024\" aria-expanded=\"false\">Books<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2024\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2024\" tabindex=\"0\" hidden=\"hidden\"><ol style=\"font-weight: 400;\"><li>Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis, &#8220;Privacy-Preserving Aggregation in the Smart Grid,&#8221;\u00a0Chapter in Security Solutions and Applied Cryptography in Smart Grid Communications\u00a0(Mohamed Amine Ferrag, Ahmed Ahmim),\u00a0IGI Global, August 2016.<\/li><li>Christoforos Ntantogian, Christos Xenakis, &#8220;Privacy Mechanisms in 4<sup>th<\/sup>\u00a0Generation Networks,&#8221;\u00a0book chapter in &#8220;Protection Privacy in Information and Communication Technologies: Technical and Legal Issues,&#8221;\u00a0Papasotiriou\u00a0(2009), editor: K.\u00a0Labrinoudakis, L.\u00a0Mitrou, S.\u00a0Gkritzalis, S.\u00a0Katsikas.<\/li><li>Christoforos\u00a0Ntantogian, Christos\u00a0Xenakis, &#8220;Security Architectures for B3G Mobile Networks,&#8221;\u00a0book chapter in &#8220;Handbook of Research on Wireless Security,&#8221; Information Science Reference (2008), editor: Yan Zhang, Jun\u00a0Zheng, Miao Ma,\u00a0ISBN:\u00a0978-1-59904-899-4.<\/li><li>Christos Xenakis, &#8220;Security in UMTS 3G Mobile Networks,&#8221;\u00a0book chapter in &#8220;Handbook of Research on Wireless Security,&#8221; Information Science Reference (2008), editor: Yan Zhang, Jun\u00a0Zheng, Miao Ma,\u00a0ISBN:\u00a0978-1-59904-899-4.<\/li><li>Christos Xenakis, &#8220;Security in 2.5G Mobile Systems,&#8221;\u00a0book chapter in &#8220;Handbook of Research on Wireless Security,&#8221; Information Science Reference (2008), editor: Yan Zhang, Jun\u00a0Zheng, Miao Ma,\u00a0ISBN:\u00a0978-1-59904-899-4.<\/li><li>Christos\u00a0Xenakis,\u00a0Lazaros\u00a0Merakos, &#8220;Security in Mobile Telecom Networks,&#8221; book chapter in &#8220;Network Security: Current status and future directions,&#8221; Wiley-IEEE Press, editor: Christos\u00a0Douligeris\u00a0and\u00a0Dimitrios\u00a0Serpanos,\u00a0June 2007, ISBN: 978-0-471-70355-6.<\/li><li>Christos Xenakis et al., &#8220;Security &amp; Trust&#8221;\u00a0book chapter in &#8220;Technologies for the Wireless Future: Wireless World Research Forum (WWRF), volume 2, Wiley, editor:\u00a0Rahim\u00a0Tafazolli, 2006, ISBN: 0-470-02905-6.<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2025\" aria-expanded=\"false\">Invited talks<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2025\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2025\" tabindex=\"0\" hidden=\"hidden\"><ol style=\"font-weight: 400;\"><li>Christos Xenakis, &#8221;\u00a0Device-centric authentication for Online Services,\u00a0&#8221; 2nd Infomobility World Conference, Athens, Greece, Dec 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0Addressing Cybersecurity challenges and REA&#8217;s role therein: The ReCRED project,\u00a0&#8221; REA.B.4 Science Conference, Brussels, Belgium, Nov 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0Password-less Authentication and Anonymous Access for on-line Services &amp; eCommerce,\u00a0&#8221; eCommerce Expo 2017, Athens, Greece, Nov 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0Password-less Authentication and Anonymous Access for Future Internet,\u00a0&#8221; Workshop on Information and Communication Security, Hellenic National Defense General Staff, Athens, Greece, Nov 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0Keynote Speech: Device-centric authentication for future Internet,\u00a0&#8221; 2017 Tyrrhenian Workshop on Digital Communications: Towards A Smart And Secure Future Internet, Mondello (Palermo), Italy, Sept. 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0Beyond password authentication: a device centric approach,\u00a0&#8221; Guest Lecture, Technical, University of Darmstadt, Darmstadt, Germany, June 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0From Password\u2013less Authentication to Anonymous Access,\u00a0&#8221; 3rd ICT Security World Congress 2017, Athens, Greece, June 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0European Cyber Security Challenge 2017: The Hellenic Cyber Security Team,\u00a0&#8221; InfoCom Security 2017, Athens, March 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0Addressing the problems with passwords: the ReCRED\u2019s approach for device-centric access control,\u00a0&#8221; 8th Scientific Workshop for Students: \u201cSecurity for everything, everyone, anytime\u201d of the IEEE University of Thessaly (Lamia) Student Branch, Lamia, Greece, March 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0European Cyber Security Challenge 2017: The Hellenic Cyber Security Team,\u00a0&#8221; 2nd Forward Thinking Cybersecurity, (ISC)\u00b2 Hellenic Chapter, Athens, Greece, March 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0Cyber Security in Greece,\u00a0&#8221; Workshop on Cyber Security in Greece organized by Center for Security Studies &amp; European Cyber Security Organization (ECSO), Athens, Greece, March 2017.<\/li><li>Christos Xenakis, &#8221;\u00a0A New Type of Malware that Targets the Modem of Mobile Devices,\u00a0&#8221; 1st Annual Conference for Protecting Critical Infrastructure, organized by Center for Security, Athens, Greece, Dec. 2016.<\/li><li>Christos Xenakis, &#8221;\u00a0Addressing the problems with passwords: the ReCRED\u2019s approach for device-centric access control,\u00a0&#8221; European Cyber Security Month (ECSM 2016), Piraeus, Greece, Oct. 2016.<\/li><li>Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/ReCRED-IHU-v3.pdf\">\u00a0Addressing the problems with passwords: the ReCRED\u2019s approach for device-centric access control,<\/a>\u00a0&#8221; Cybersecurity: The Expanding Frontier, Presentation at the International Hellenic University, Thessaloniki, Greece, July 7, 2016.<\/li><li>Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/ReCRED-Infocom-xenakis-v2.pdf\">\u00a0From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control,<\/a>\u00a0&#8221; InfoCom Security 2016, Athens, April 2016.<\/li><li>Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/ReCRED-OIX-presentation-short.pdf\">\u00a0From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control,<\/a>\u00a0&#8221; Open Identity Exchange Workshop, Amsterdam, Netherlands, March 24, 2016.<\/li><li>Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/R&amp;D_Security&amp;Privacy.pdf\">\u00a0R&amp;D in the field of Security and Privacy: Made in Greece,<\/a>\u00a0&#8221; Innovating for Privacy, Piraeus, Greece, April 2015.<\/li><li>Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/Experience%20from%20recent%20National%20&amp;%20International%20Cyber%20Exercises-final.pdf\">\u00a0Experience from recent National &amp; International Cyber Exercises,<\/a>\u00a0&#8221; (ISC)2 Hellenic Chapter: The New Era of Cyber Security, Piraeus, Greece, December 2014.<\/li><li>Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/GCC-mob-storing-xenakis.pdf\">\u00a0Storing Personal Data on Mobile Devices,<\/a>\u00a0&#8221; 2nd Seminar of the Greek Centre for Cybercrime (GCC), Athens, Greece, November 2014.<\/li><li>Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/An-APT-in-3G-Networks-Infocom-security.pdf\">\u00a0An Advanced Persistent Threat in 3G Networks: Attacking the Home Network from Roaming Networks,<\/a>\u00a0&#8221; InfoCom Security \u2013 InfoCom 2014, Athens, April 2014.<\/li><li>Christos Xenakis, Christoforos Ntantogian, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/GCC-Xenakis-PPT.pdf\">\u00a0Acquisition and Analysis of Android Memory,<\/a>\u00a0&#8221; Cybercrime Network Conference \u2013 CyNC 2013, Center for Cybersecurity &amp; Cybercrime Investigation, University College Dublin, Dublin, Ireland, December 2013.<\/li><li>Christos Xenakis, &#8220;<a href=\"http:\/\/cgi.di.uoa.gr\/~xenakis\/Published\/Invited_Talks\/Compromising-users-privacy-from-lost-stolen-devices.pdf\">\u00a0Compromising users&#8217; privacy from stolen\/lost mobile devices: the Android case,<\/a>\u00a0&#8221; In Proc. 7th International Crisis Management Workshop (CrIM&#8217;13) and Oulu Winter School, University of Oulu, Finland, Nov. 2013.<\/li><li>Christos\u00a0Xenakis, &#8220;An improved authentication scheme for B3G heterogeneous mobile networks,&#8221; 4<sup>th<\/sup>\u00a0annual workshop on\u00a0PRacticalAspeCts\u00a0of Security (PRACSE), Athens, June 2009.<\/li><li>Christos\u00a0Xenakis, &#8220;Security in Wireless Broadband Networks&#8221; Athens Digital Week, Organized by the City of Athens, October 2008<\/li><li>Christos\u00a0Xenakis, &#8220;Security Considerations in 2.5G Mobile Networks&#8221;, 9<sup>th<\/sup>\u00a0Conference of Greek Information and Communications Technology (ICT) Forum, Organized by Ministry of Economy and Finance, Athens, October 2007.<\/li><li>Christos Xenakis &#8220;3<sup>rd<\/sup>\u00a0Generation Mobile Telecom Network (3G\/UMTS) and Security&#8221;, 3<sup>rd<\/sup>\u00a0International Conference Electronic Crime 2005, Co-organized by OTE and MD5 S.A., Athens, October 2005.<\/li><li>Christos Xenakis &#8220;Security issues in third generation mobile systems&#8221;, 7<sup>th<\/sup>\u00a0International Telecommunication Conference (INFO-COM), Athens, September 2005.<\/li><li>Christos Xenakis &#8220;Security in Next Generation Mobile Data Networks&#8221;, Workshop on Trust &amp; Security in\u00a0eBusiness\u00a0Processes, jointly organised by the AMSD, RAPID and PAMPAS roadmap projects, Brussels, December 2002.<\/li><li>Christos Xenakis\u00a0&#8220;Security in 3G Networks&#8221;, Conference on Security in Cyberspace and Hacking, jointly organized by Hellenic Army and University of Athens, Athens, October 2001.<\/li><\/ol><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2026\" aria-expanded=\"false\"> Committees - Administrative Experience<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2026\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2026\" tabindex=\"0\" hidden=\"hidden\"><p><span style=\"text-align: justify;\">\u00a0&#8211; member of the editorial board of the Computers &amp; Security Journal\u00a0<\/span><\/p><p><span style=\"text-align: justify;\">&#8211;\u00a0<\/span><span style=\"text-align: justify; font-size: 1rem;\">member of the editorial board of<\/span><span style=\"text-align: justify; font-size: 1rem;\">\u00a0the Computer Communications Journal of the Elsevier publishing.<\/span><\/p><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ec2cb9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ec2cb9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4bf33ed\" data-id=\"4bf33ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Prof. Christos Xenakis received his B.Sc degree in computer science in 1993 and his M.Sc degree in telecommunication and computer networks in 1996, both from the Department of Informatics and Telecommunications, University of Athens, Greece. In 2004 he received his Ph.D. from the University of Athens (Department of Informatics and Telecommunications). From 1998 \u2013 2001 [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"_links":{"self":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/998"}],"collection":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/comments?post=998"}],"version-history":[{"count":101,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/998\/revisions"}],"predecessor-version":[{"id":2054,"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/pages\/998\/revisions\/2054"}],"wp:attachment":[{"href":"https:\/\/laboratories.ds.unipi.gr\/ssl\/wp-json\/wp\/v2\/media?parent=998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}