Konstantinos Fysarakis

According to our database1, Konstantinos Fysarakis authored at least 28 papers between 2012 and 2018.

Collaborative distances :
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources.
IEEE Systems Journal, 2018

A review of lightweight block ciphers.
J. Cryptographic Engineering, 2018

XSACd - Cross-domain resource sharing & access control for smart environments.
Future Generation Comp. Syst., 2018

Reactive security for SDN/NFV-enabled industrial networks leveraging service function chaining.
Trans. Emerging Telecommunications Technologies, 2018

The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park's SDN/NFV-enabled 5G industrial network.
Computer Communications, 2018

VirtuWind - An SDN- and NFV-Based Architecture for Softwarized Industrial Networks.
Proceedings of the Measurement, Modelling and Evaluation of Computing Systems, 2018

SeMIBIoT: Secure Multi-Protocol Integration Bridge for the IoT.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

SecRoute: End-to-end secure communications for wireless ad-hoc networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A Reactive Security Framework for operational wind parks using Service Function Chaining.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
Node.DPWS: Efficient Web Services for the Internet of Things.
IEEE Software, 2016

A survey of lightweight stream ciphers for embedded systems.
Security and Communication Networks, 2016

RtVMF: A Secure Real-Time Vehicle Management Framework.
IEEE Pervasive Computing, 2016

Which IoT Protocol? Comparing Standardized Approaches over a Common M2M Application.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Embedded Systems Security: A Survey of EU Research Efforts.
Security and Communication Networks, 2015

Node.DPWS: High performance and scalable Web Services for the IoT.
CoRR, 2015

Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Proceedings of the Information Security Theory and Practice, 2015

WSACd - A Usable Access Control Framework for Smart Home Devices.
Proceedings of the Information Security Theory and Practice, 2015

RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
The Electronic McPhail Trap.
Sensors, 2014

Policy-Based Access Control for Body Sensor Networks.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Embedded Systems Security Challenges.
Proceedings of the PECCS 2014, 2014

DSAPE - Dynamic Security Awareness Program Evaluation.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Policy-based access control for DPWS-enabled ubiquitous devices.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

2013
A lightweight anonymity & location privacy service.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Lightweight Cryptography for Embedded Systems - A Comparative Analysis.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
How Effective Is Your Security Awareness Program? An Evaluation Methodology.
Information Security Journal: A Global Perspective, 2012

Secure policy-based management solutions in heterogeneous embedded systems networks.
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012


  Loading...