Charalampos Manifavas

According to our database1, Charalampos Manifavas
  • authored at least 40 papers between 1996 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources.
IEEE Systems Journal, 2018

XSACd - Cross-domain resource sharing & access control for smart environments.
Future Generation Comp. Syst., 2018

2017
SCOTRES: Secure Routing for IoT and CPS.
IEEE Internet of Things Journal, 2017

2016
Software Security, Privacy, and Dependability: Metrics and Measurement.
IEEE Software, 2016

Node.DPWS: Efficient Web Services for the Internet of Things.
IEEE Software, 2016

A survey of lightweight stream ciphers for embedded systems.
Security and Communication Networks, 2016

RtVMF: A Secure Real-Time Vehicle Management Framework.
IEEE Pervasive Computing, 2016

Lightweight authenticated encryption for embedded on-chip systems.
Information Security Journal: A Global Perspective, 2016

Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Embedded Systems Security: A Survey of EU Research Efforts.
Security and Communication Networks, 2015

Password Hashing Competition - Survey and Benchmark.
IACR Cryptology ePrint Archive, 2015

Node.DPWS: High performance and scalable Web Services for the IoT.
CoRR, 2015

Lightweight Password Hashing Scheme for Embedded Systems.
Proceedings of the Information Security Theory and Practice, 2015

WSACd - A Usable Access Control Framework for Smart Home Devices.
Proceedings of the Information Security Theory and Practice, 2015

An automated network intrusion process and countermeasures.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
A Solution to the Ramification Problem Expressed in Temporal Description Logics.
Int. J. Semantic Computing, 2014

Policy-Based Access Control for Body Sensor Networks.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

ULCL - An Ultra-lightweight Cryptographic Library for Embedded Systems.
Proceedings of the PECCS 2014, 2014

Embedded Systems Security Challenges.
Proceedings of the PECCS 2014, 2014

A Reasoning System for Composition Verification and Security Validation.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

DSAPE - Dynamic Security Awareness Program Evaluation.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Policy-based access control for DPWS-enabled ubiquitous devices.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
IPv6 security for low power and lossy networks.
Proceedings of the IFIP Wireless Days, 2013

IPsec over IEEE 802.15.4 for low power and lossy networks.
Proceedings of the MobiWac'13, 2013

A lightweight anonymity & location privacy service.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Fast, FPGA-based Rainbow Table creation for attacking encrypted mobile communications.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013

Lightweight Cryptography for Embedded Systems - A Comparative Analysis.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Parallelizing bioinformatics and security applications on a low-cost multi-core system.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

2012
How Effective Is Your Security Awareness Program? An Evaluation Methodology.
Information Security Journal: A Global Perspective, 2012

Secure policy-based management solutions in heterogeneous embedded systems networks.
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012

Building Trust in Ad Hoc Distributed Resource-Sharing Networks Using Reputation-Based Systems.
Proceedings of the 16th Panhellenic Conference on Informatics, PCI 2012, 2012

Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS.
Proceedings of the 22nd International Conference on Field Programmable Logic and Applications (FPL), 2012

2010
Development and implementation of a Network Processor Architecture in reconfigurable logic (FPGA).
Proceedings of the 8th Workshop on Intelligent Solutions in Embedded Systems, 2010

Implementing Rainbow Tables in High-End FPGAs for Super-Fast Password Cracking.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

2009
High-End Reconfigurable Systems for Fast Windows' Password Cracking.
Proceedings of the FCCM 2009, 2009

1998
A New Family of Authentication Protocols.
Operating Systems Review, 1998

1997
Chameleon - A New Kind of Stream Cipher.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

1996
NetCard - A Practical Electronic-Cash System.
Proceedings of the Security Protocols, 1996


  Loading...