Dimitrios Lekkas

According to our database1, Dimitrios Lekkas
  • authored at least 23 papers between 2000 and 2016.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2016
Real-time vessel behavior prediction.
Evolving Systems, 2016

2015
A cloud based architecture capable of perceiving and predicting multiple vessel behaviour.
Appl. Soft Comput., 2015

2014
Trust coercion in the name of usable public key infrastructure.
Security and Communication Networks, 2014

2013
Design and Development Guidelines for Real-Time, Geospatial Mobile Applications: Lessons from 'MarineTraffic'.
Proceedings of the Mobile Web and Information Systems - 10th International Conference, 2013

2012
Addressing cloud computing security issues.
Future Generation Comp. Syst., 2012

2011
Securing e-Government and e-Voting with an open cloud computing architecture.
Government Information Quarterly, 2011

Fair digital signing: The structural reliability of signed documents.
Computers & Security, 2011

Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital Certificates.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
e-Passports as a means towards a Globally Interoperable Public Key Infrastructure.
Journal of Computer Security, 2010

2008
Enhancing Security in the Integration of E-Government - The e-School Initiative.
Proceedings of the WEBIST 2008, 2008

2007
Long-term verifiability of the electronic healthcare records' authenticity.
I. J. Medical Informatics, 2007

Implementing regular cash with blind fixed-value electronic coins.
Computer Standards & Interfaces, 2007

E-Passports as a Means Towards the First World-Wide Public Key Infrastructure.
Proceedings of the Public Key Infrastructure, 2007

2006
Outsourcing digital signatures: a solution to key management burden.
Inf. Manag. Comput. Security, 2006

2005
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments.
IEEE Trans. Information Technology in Biomedicine, 2005

Withdrawing a declaration of will: Towards a framework for digital signature revocation.
Internet Research, 2005

Handling and Reporting Security Advisories: A Scorecard Approach.
IEEE Security & Privacy, 2005

2004
Cumulative notarization for long-term preservation of digital signatures.
Computers & Security, 2004

2003
Establishing and managing trust within the public key infrastructure.
Computer Communications, 2003

2002
Quality assured trusted third parties for deploying secure internet-based healthcare applications.
I. J. Medical Informatics, 2002

2001
Towards an ISO-9000 compliant certification service provider.
Proceedings of the 5th Hellenic-European Conference on Computer Mathematics and its Applications (HERCMA-01), 2001

2000
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture.
Computers & Security, 2000


  Loading...