Konstantinos RANTOS
Konstantinos RANTOS
International Hellenic University
Geverifieerd e-mailadres voor cs.ihu.gr - Homepage
Geciteerd door
Geciteerd door
Lightweight cryptography for embedded systems–a comparative analysis
C Manifavas, G Hatzivasilis, K Fysarakis, K Rantos
Data Privacy Management and Autonomous Spontaneous Security, 333-349, 2013
How effective is your security awareness program? An evaluation methodology
K Rantos, K Fysarakis, C Manifavas
Information Security Journal: A Global Perspective 21 (6), 328-345, 2012
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem.
K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou
ICETE (2) 298, 2018
ADvoCATE: a consent management platform for personal data processing in the IoT using blockchain technology
K Rantos, G Drosatos, K Demertzis, C Ilioudis, A Papanikolaou, A Kritsas
International Conference on Security for Information Technology and …, 2018
A quantitative evaluation of trust in the quality of cyber threat intelligence sources
T Schaberreiter, V Kupfersberger, K Rantos, A Spyros, A Papanikolaou, ...
Proceedings of the 14th International Conference on Availability …, 2019
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
K Rantos, K Markantonakis
IFIP International Information Security Conference, 351-365, 2004
Interoperability challenges in the cybersecurity information sharing ecosystem
K Rantos, A Spyros, A Papanikolaou, A Kritsas, C Ilioudis, V Katos
Computers 9 (1), 18, 2020
A blockchain-based platform for consent management of personal data processing in the IoT ecosystem
K Rantos, G Drosatos, A Kritsas, C Ilioudis, A Papanikolaou, AP Filippidis
Security and Communication Networks 2019, 2019
Policy-based access control for DPWS-enabled ubiquitous devices
K Fysarakis, I Papaefstathiou, C Manifavas, K Rantos, O Sultatos
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation …, 2014
Embedded Systems Security Challenges.
K Fysarakis, G Hatzivasilis, K Rantos, A Papanikolaou, C Manifavas
PECCS, 255-266, 2014
Deep learning in iot intrusion detection
S Tsimenidis, T Lagkas, K Rantos
Journal of Network and Systems Management 30 (1), 1-40, 2022
DSAPE–dynamic security awareness program evaluation
C Manifavas, K Fysarakis, K Rantos, G Hatzivasilis
International Conference on Human Aspects of Information Security, Privacy …, 2014
IPsec over IEEE 802.15. 4 for low power and lossy networks
K Rantos, A Papanikolaou, C Manifavas
Proceedings of the 11th ACM international symposium on Mobility management …, 2013
Secure policy-based management solutions in heterogeneous embedded systems networks
K Rantos, A Papanikolaou, K Fysarakis, C Manifavas
2012 International Conference on Telecommunications and Multimedia (TEMU …, 2012
Key recovery in ASPeCT Authentication and Initialization of Payment protocol
K Rantos, C Mitchell
Proceedings of ACTS mobile summit, Sorrento, Italy 226, 228-229, 1999
A step-by-step quasi-Newton algorithm in the frequency domain and its application to adaptive channel equalization
K Berberidis, S Rantos, J Palicot
IEEE transactions on signal processing 52 (12), 3335-3344, 2004
The challenges of privacy and access control as key perspectives for the future electric smart grid
A Triantafyllou, JAP Jimenez, ADR Torres, T Lagkas, K Rantos, ...
IEEE Open Journal of the Communications Society 1, 1934-1960, 2020
Measurable and composable security, privacy, and dependability for cyberphysical systems: the SHIELD methodology
A Fiaschetti, J Noll, P Azzoni, R Uribeetxeberria
CRC Press, 2017
Policy-controlled authenticated access to LLN-connected healthcare resources
K Rantos, K Fysarakis, C Manifavas, IG Askoxylakis
IEEE Systems Journal 12 (1), 92-102, 2015
IPv6 security for low power and lossy networks
K Rantos, A Papanikolaou, C Manifavas, I Papaefstathiou
2013 IFIP Wireless Days (WD), 1-8, 2013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20