Ioannis Kounelis

According to our database1, Ioannis Kounelis authored at least 19 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Blockchain Performance Analysis for Supporting Cross-Border E-Government Services.
IEEE Trans. Engineering Management, 2020

Towards a Formal IoT Security Model.
Symmetry, 2020

A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks.
Symmetry, 2020

Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies.
IEEE Secur. Priv., 2020

2017
Security and privacy issues for an IoT based smart home.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

2016
Business Information Exchange System with Security, Privacy, and Anonymity.
J. Electr. Comput. Eng., 2016

2015
Secure and Trusted Mobile Commerce System based on Virtual Currencies.
PhD thesis, 2015

A Permission verification approach for android mobile applications.
Comput. Secur., 2015

2014
Building Trust in the Human?Internet of Things Relationship.
IEEE Technol. Soc. Mag., 2014

Secure and privacy-enhanced e-mail system based on the concept of proxies.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

European Citizens and Their Trust in Social Networks.
Proceedings of the Learning and Collaboration Technologies. Technology-Rich Environments for Learning and Collaboration, 2014

2013
In-memory credentials robbery on android phones.
Proceedings of the 2013 World Congress on Internet Security, 2013

Data-in-use leakages from Android memory - Test and analysis.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

An Architecture for Secure m-Commerce Applications.
Proceedings of the 19th International Conference on Control Systems and Computer Science, 2013

A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario.
Proceedings of the Critical Information Infrastructures Security, 2013

2012
Security of service requests for cloud based m-commerce.
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012

The mobileak project: Forensics methodology for mobile application privacy assessment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Will the Cloud Make the Citizen More Vulnerable? - Risk and Vulnerability Assessment in times of Cloud-computing.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Secure Middleware for Mobile Phones and UICC Applications.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2011


  Loading...