Konstantinos Rantos

Orcid: 0000-0003-2453-3904

According to our database1, Konstantinos Rantos authored at least 43 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review.
Comput., March, 2024

2023
An autoML network traffic analyzer for cyber threat detection.
Int. J. Inf. Sec., October, 2023

A Secure and Privacy-Preserving Blockchain-Based XAI-Justice System.
Inf., 2023

User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review.
Inf., 2023

Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review.
Future Internet, 2023

A Cyber Threat Intelligence Management Platform for Industrial Environments.
CoRR, 2023

2022
Deep Learning in IoT Intrusion Detection.
J. Netw. Syst. Manag., 2022

Blockchain-based vaccination certificates management.
Proceedings of the 26th Pan-Hellenic Conference on Informatics, 2022

2021
The Use of Blockchain Technology in e-Government Services.
Comput., 2021

CTI Blockchain-Based Sharing using Proof-of-Quality Consensus Algorithm.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid.
IEEE Open J. Commun. Soc., 2020

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem.
Comput., 2020

The Big Data era in IoT-enabled smart farming: Re-defining systems, tools, and techniques.
Comput. Networks, 2020

A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processing in the IoT Ecosystem.
Big Data Cogn. Comput., 2020

Privacy-Preserving Blockchain-Based Solutions in the Internet of Things.
Proceedings of the Science and Technologies for Smart Cities, 2020

An Innovative Self-Healing Approach with STIX Data Utilisation.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Privacy-preserving solutions in the Industrial Internet of Things.
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020

2019
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem.
Secur. Commun. Networks, 2019

Performance evaluation of TCP-BIAD in high-speed, long-distance networks.
Computing, 2019

Blended Learning and Open Courseware for Promoting Interoperability in Public Services.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources.
IEEE Syst. J., 2018

ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2015
Secure and Authenticated Access to LLN Resources Through Policy Constraints.
Proceedings of the Information Security Theory and Practice, 2015

WSACd - A Usable Access Control Framework for Smart Home Devices.
Proceedings of the Information Security Theory and Practice, 2015

Enhancing EMV Online PIN Verification.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Policy-Based Access Control for Body Sensor Networks.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Embedded Systems Security Challenges.
Proceedings of the PECCS 2014, 2014

DSAPE - Dynamic Security Awareness Program Evaluation.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Policy-based access control for DPWS-enabled ubiquitous devices.
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, 2014

Analysis of Potential Vulnerabilities in Payment Terminals.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
IPv6 security for low power and lossy networks.
Proceedings of the IFIP Wireless Days, 2013

IPsec over IEEE 802.15.4 for low power and lossy networks.
Proceedings of the MobiWac'13, 2013

Lightweight Cryptography for Embedded Systems - A Comparative Analysis.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
How Effective Is Your Security Awareness Program? An Evaluation Methodology.
Inf. Secur. J. A Glob. Perspect., 2012

Secure policy-based management solutions in heterogeneous embedded systems networks.
Proceedings of the 2012 International Conference on Telecommunications and Multimedia, 2012

2011
Promoting e-Gov Services: e-Document Interoperability across EU.
Proceedings of the 15th Panhellenic Conference on Informatics, 2011

Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?
Proceedings of the Communications and Multimedia Security, 2011

2005
Matching key recovery mechanisms to business requirements.
Comput. Secur., 2005

2004
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2001
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation.
Proceedings of the Cryptography and Coding, 2001

1999
A fair certification protocol.
Comput. Commun. Rev., 1999


  Loading...