Andreas Pashalidis

According to our database1, Andreas Pashalidis
  • authored at least 28 papers between 2003 and 2014.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Toward a secure Kerberos key exchange with smart cards.
Int. J. Inf. Sec., 2014

2013
Preface.
Computers & Mathematics with Applications, 2013

Privacy-Friendly Checking of Remote Token Blacklists.
Proceedings of the Policies and Research in Identity Management, 2013

Simulated annealing attack on certain fingerprint authentication systems.
Proceedings of the 2013 BIOSIG, 2013

Security considerations on extending PACE to a biometric-based connection establishment.
Proceedings of the 2013 BIOSIG, 2013

2012
Evaluating Tag-Based Preference Obfuscation Systems.
IEEE Trans. Knowl. Data Eng., 2012

For human eyes only: security and usability evaluation.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Security implications in Kerberos by the introduction of smart cards.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Relations among privacy notions.
ACM Trans. Inf. Syst. Secur., 2011

On the limits of privacy in reputation systems.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

A New RFID Privacy Model.
Proceedings of the Computer Security - ESORICS 2011, 2011

My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Evaluating Adversarial Partitions.
Proceedings of the Computer Security, 2010

2009
Relations Among Privacy Notions.
Proceedings of the Financial Cryptography and Data Security, 2009

Accessing Password-Protected Resources without the Password.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method.
RFC, February, 2008

Measuring the Effectiveness and the Fairness of Relation Hiding Systems.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Context-aware multimedia services in a pervasive environment: the Daidalos approach.
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008

2007
Attacking Unlinkability: The Importance of Context.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

2006
Interdomain user authentication and privacy.
PhD thesis, 2006

Linking Anonymous Transactions: The Consistent View Attack.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2004
Secure Network Management within an Open-source Mobile Agent Framework.
J. Network Syst. Manage., 2004

Limits to Anonymity When Using Credentials.
Proceedings of the Security Protocols, 2004

A Security Model for Anonymous Credential Systems.
Proceedings of the Information Security Management, Education and Privacy, 2004

Impostor: a single sign-on system for use from untrusted devices.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Using EMV Cards for Single Sign-On.
Proceedings of the Public Key Infrastructure, 2004

2003
Single Sign-On Using Trusted Platforms.
Proceedings of the Information Security, 6th International Conference, 2003

A Taxonomy of Single Sign-On Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...