Ioannis G. Askoxylakis

According to our database1, Ioannis G. Askoxylakis
  • authored at least 47 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources.
IEEE Systems Journal, 2018

XSACd - Cross-domain resource sharing & access control for smart environments.
Future Generation Comp. Syst., 2018

The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network.
Computer Communications, 2018

2017
Blockchain-enabled Intelligent Asset Exchange for a Circular Economy.
ERCIM News, 2017

Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

SecRoute: End-to-end secure communications for wireless ad-hoc networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A Reactive Security Framework for operational wind parks using Service Function Chaining.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Fault Tolerance Using an SDN Pattern Framework.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
VirtuWind: virtual and programmable industrial network prototype deployed in operational wind park.
Trans. Emerging Telecommunications Technologies, 2016

VirtuWind - Security in a Virtual and Programmable Industrial Network Prototype Deployed in an Operational Wind Park.
ERCIM News, 2016

Patterns for the design of secure and dependable software defined networks.
Computer Networks, 2016

Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
SIREN - A Network Infrastructure for Emergencies.
ERCIM News, 2015

Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Proceedings of the Information Security Theory and Practice, 2015

Lightweight Password Hashing Scheme for Embedded Systems.
Proceedings of the Information Security Theory and Practice, 2015

RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Introduction to the Special Theme - Future Cities and Smart Technologies: A Landscape of Ambition and Caution.
ERCIM News, 2014

Early Warning Intrusion Detection System.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Discrete Hardware Apparatus and Method for Mobile Application and Communication Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Communications in Emergency and Crisis Situations.
Proceedings of the Distributed, Ambient, and Pervasive Interactions, 2014

Denial-of-Service Attacks in Wireless Networks Using Off-the-Shelf Hardware.
Proceedings of the Distributed, Ambient, and Pervasive Interactions, 2014

A Network Telescope for Early Warning Intrusion Detection.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

A Rapid Emergency Deployment mobile communication node.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

2013
Security and privacy for digital ecosystems.
Inf. Sec. Techn. Report, 2013

A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks.
IEEE Communications Surveys and Tutorials, 2013

Malicious traffic analysis in wireless sensor networks using advanced signal processing techniques.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

A Privacy-Level Model of User-Centric Cyber-Physical Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Secure and Energy-Efficient Life-Logging in Wireless Pervasive Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Joint compressed-sensing and matrix-completion for efficient data collection in WSNs.
Proceedings of the IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2013

2012
Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype.
EURASIP J. Wireless Comm. and Networking, 2012

Life-logging in smart environments: Challenges and security threats.
Proceedings of IEEE International Conference on Communications, 2012

An experimental investigation on energy consumption for secure life-logging in smart environments.
Proceedings of the 17th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2012

2011
Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks.
EURASIP J. Wireless Comm. and Networking, 2011

A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking.
EURASIP J. Wireless Comm. and Networking, 2011

Video Streaming Performance in Wireless Hostile Environments.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

The impact of interference on the performance of a multi-path metropolitan wireless mesh network.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

2010
Securing multi-operator-based QoS-aware mesh networks: requirements and design options.
Wireless Communications and Mobile Computing, 2010

A Dynamic Key Agreement Mechanism for Mission Critical Mobile Ad Hoc Networking.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

2009
Attacking smart card systems: Theory and practice.
Inf. Sec. Techn. Report, 2009

Business opportunities and considerations on wireless mesh networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Mobile Lightweight Wireless Systems, 2009

2008
Enhanced, Ubiquitous and Dependable Broadband Access using MESH Networks.
ERCIM News, 2008

A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Overview of Security Threats for Smart Cards in the Public Transport Industry.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2006
An efficient authentication scheme for contactless smartcards using elliptic curve cryptography.
Proceedings of the Third IASTED International Conference on Communication, 2006

Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks.
Proceedings of the Third IASTED International Conference on Communication, 2006


  Loading...