Georgios Mantas

Orcid: 0000-0002-8074-0417

According to our database1, Georgios Mantas authored at least 87 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks.
IEEE Commun. Surv. Tutorials, 2024

2023
Bit Security Estimation for Leakage-Prone Key Establishment Schemes.
IEEE Commun. Lett., July, 2023

A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones.
Sensors, March, 2023

DECENT: Decentralized and Efficient Key Management to Secure Communication in Dense and Dynamic Environments.
IEEE Trans. Intell. Transp. Syst., 2023

Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services.
IEEE Trans. Cloud Comput., 2023

Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities.
IEEE Trans. Cloud Comput., 2023

Prototyping a Hyperledger Fabric-Based Security Architecture for IoMT-Based Health Monitoring Systems.
Future Internet, 2023

An IoT/IoMT Security Testbed for Anomaly-based Intrusion Detection Systems.
Proceedings of the IFIP Networking Conference, 2023

Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations.
Proceedings of the IFIP Networking Conference, 2023

A Tutorial on the Implementation of a Hyperledger Fabric-based Security Architecture for IoMT.
Proceedings of the IFIP Networking Conference, 2023

Grain-128PLE: Generic Physical-Layer Encryption for IoT Networks.
Proceedings of the IEEE Globecom Workshops 2023, 2023

Outlier Detection for Risk-Based User Authentication on Mobile Devices.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Blockchain-Based Security Mechanisms for IoMT Edge Networks in IoMT-Based Healthcare Monitoring Systems.
Sensors, 2022

A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT).
Trans. Emerg. Telecommun. Technol., 2022

Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control.
IEEE Access, 2022

A Scalable Approach of Practical Byzantine Fault Tolerance Algorithms for IoMT Blockchains.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2022

A Cryptographic Perspective to Achieve Practical Physical Layer Security.
Proceedings of the IEEE Global Communications Conference, 2022

Novelty Detection for Risk-based User Authentication on Mobile Devices.
Proceedings of the IEEE Global Communications Conference, 2022

Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

Generating Datasets Based on the HuMIdb Dataset for Risk-based User Authentication on Smartphones.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

2021
Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks.
Sensors, 2021

On the Performance Analysis of IDLP and SpaceMac for Network Coding-Enabled Mobile Small Cells.
IEEE Commun. Lett., 2021

Secure Virtual Mobile Small Cells: A Stepping Stone Toward 6G.
IEEE Commun. Stand. Mag., 2021

Secure Virtual Mobile Small Cells: A Stepping Stone Towards 6G.
CoRR, 2021

DISTANT: DIStributed Trusted Authority-based key managemeNT for beyond 5G wireless mobile small cells.
Comput. Commun., 2021

IDLP Mechanism for NC-enabled Mobile Small Cells based on Broadcast Nature of Wireless Communication.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

Risk-Based User Authentication for Mobile Passenger ID Devices for Land and Sea Border Control.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

A Hyperledger Fabric-based Blockchain Architecture to Secure IoT-based Health Monitoring Systems.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

Generating IoT Edge Network Datasets based on the TON_IoT Telemetry Dataset.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

A Key Management Framework to Secure IoMT-enabled Healthcare Systems.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

Data Confidentiality for IoT Networks: Cryptographic Gaps and Physical-Layer Opportunities.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

A Privacy-Preserving User Authentication Mechanism for Smart City Mobile Apps.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

Risk-Based Adaptive User Authentication for Mobile Passenger ID Devices for Land/Sea Border Control.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

A Blockchain-based Architecture for Secure IoT-based Health Monitoring Systems.
Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2021

2020
A Signature Scheme with Unlinkable-yet-Accountable Pseudonymity for Privacy-Preserving Crowdsensing.
IEEE Trans. Mob. Comput., 2020

Editorial: Security and Privacy Protection for Mobile Applications and Platforms.
Mob. Networks Appl., 2020

An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.
Mob. Networks Appl., 2020

HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android.
IEEE Access, 2020

IDLP: An Efficient Intrusion Detection and Location-Aware Prevention Mechanism for Network Coding-Enabled Mobile Small Cells.
IEEE Access, 2020

Public Key Cryptography Without Certificates for Beyond 5G Mobile Small Cells.
Proceedings of the 12th International Symposium on Communication Systems, 2020

User Authentication and Authorization for Next Generation Mobile Passenger ID Devices for Land and Sea Border Control.
Proceedings of the 12th International Symposium on Communication Systems, 2020

Classification of Psychosomatic's Symptoms of Depression: Iliou Versus PCA Preprocessing Methods.
Proceedings of the 25th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2020

2019
A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells.
IEEE Trans. Comput. Soc. Syst., 2019

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment.
IEEE Internet Things J., 2019

Key Management for Beyond 5G Mobile Small Cells: A Survey.
IEEE Access, 2019

An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain.
IEEE Access, 2019

Distributed Trusted Authority-based Key Management for Beyond 5G Network Coding-enabled Mobile Small Cells.
Proceedings of the 2nd IEEE 5G World Forum, 5GWF 2019, Dresden, Germany, September 30, 2019

A Location-aware IDPS scheme for Network Coding-enabled Mobile Small Cells.
Proceedings of the 2nd IEEE 5G World Forum, 5GWF 2019, Dresden, Germany, September 30, 2019

2018
Physical-layer entity authentication scheme for mobile MIMO systems.
IET Commun., 2018

A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications.
Comput. Secur., 2018

Machine Learning to Automate Network Segregation for Enhanced Security in Industry 4.0.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Key Management for Secure Network Coding-Enabled Mobile Small Cells.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Security Threats in Network Coding-Enabled Mobile Small Cells.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Profile Management System in Ubiquitous Healthcare Cloud Computing Environment.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Security Framework for the Semiconductor Supply Chain Environment.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

Software-Defined Networking for Ubiquitous Healthcare Service Delivery.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

2017
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks.
Int. J. Inf. Sec., 2017

Towards a secure network architecture for smart grids in 5G era.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Towards trustworthy end-to-end communication in industry 4.0.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Implementation of a Pseudonym-Based Signature Scheme with Bilinear Pairings on Android.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2017

2016
An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC.
IEEE Commun. Lett., 2016

An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems.
EURASIP J. Wirel. Commun. Netw., 2016

An autonomous privacy-preserving authentication scheme for intelligent transportation systems.
Comput. Secur., 2016

An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Lightweight Privacy-Preserving OAuth2-Based Protocol for Smart City Mobile Apps.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Application-layer denial of service attacks: taxonomy and survey.
Int. J. Inf. Comput. Secur., 2015

Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

A null space-based MAC scheme against pollution attacks to Random linear Network Coding.
Proceedings of the IEEE International Conference on Communication, 2015

Analysis of a Homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks.
Proceedings of the 20th IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2015

2014
Analysis of the Impact of Denial of Service Attacks on Centralized Control in Smart Cities.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Towards an Advanced PKI-Based Security Solution for Next Generation e-Passport and Associated Applications: The NewP@ss Approach.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Jointly padding for subspace orthogonality against tag pollution.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

An improved homomorphic message authentication code scheme for RLNC-enabled wireless networks.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

Towards personalization of Trust Management service for ubiquitous healthcare environment.
Proceedings of IEEE-EMBS International Conference on Biomedical and Health Informatics, 2014

2013
Towards Personalized Services in the Healthcare Domain.
Proceedings of the Handbook of Medical and Healthcare Technologies, 2013

A New Framework Architecture for Next Generation e-Health Services.
IEEE J. Biomed. Health Informatics, 2013

A profile-based Trust Management scheme for Ubiquitous Healthcare environment.
Proceedings of the 13th IEEE International Conference on BioInformatics and BioEngineering, 2013

2012
Σχεδίαση και υλοποίηση μηχανισμών ασφάλειας για διάχυτες υπηρεσίες υγείας πάνω σε δίκτυα επόμενης γενιάς
PhD thesis, 2012

Health products sales forecasting using computational intelligence and adaptive neuro fuzzy inference systems.
Oper. Res., 2012

PKI Security in Large-Scale Healthcare Networks.
J. Medical Syst., 2012

Group Profile Creation in Ubiquitous Healthcare Environment Applying the Analytic Hierarchy Process.
Proceedings of the Wireless Mobile Communication and Healthcare, 2012

Group profile management in ubiquitous healthcare environment.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

2011
Ubiquitous Healthcare Profile Management Applying Smart Card Technology.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

2010
ARATOS: An intelligent machine-to-machine framework for services based on satellite Earth Observation data.
Proceedings of the IEEE International Conference on Wireless Communications, 2010


  Loading...