Pavlos S. Efraimidis

According to our database1, Pavlos S. Efraimidis authored at least 54 papers between 1995 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 





How much does a zero-permission Android app know about us?
Proceedings of the Third Central European Cybersecurity Conference, 2019

Formal analysis of DeGroot Influence Problems using probabilistic model checking.
Simulation Modelling Practice and Theory, 2018

Privacy leakages about political beliefs through analysis of Twitter followers.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018

Deriving the Political Affinity of Twitter Users from Their Followers.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Communicating Personalized Risk Factors for Lifestyle Coaching.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

Privacy-Enhanced Television Audience Measurements.
ACM Trans. Internet Techn., 2017

Implementing PacketEconomy: Distributed money-based QoS in OMNET++.
Int. J. Communication Systems, 2017

Weighted Random Sampling.
Encyclopedia of Algorithms, 2016

A Privacy-by-Design Contextual Suggestion System for Tourism.
J. Sensor and Actuator Networks, 2016

Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment.
Inf. & Comput. Security, 2016

Solving Influence Problems on the DeGroot Model with a Probabilistic Model Checking Tool.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

Malevolent app pairs: an Android permission overpassing scheme.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Towards Privacy by Design in Personal e-Health Systems.
Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016), 2016

A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network.
Security and Communication Networks, 2015

Versatile Query Scrambling for Private Web Search.
Inf. Retr. Journal, 2015

Reengineering the user: privacy concerns about personal data on smartphones.
Inf. & Comput. Security, 2015

Social network analysis of public lists of POIs.
Proceedings of the 19th Panhellenic Conference on Informatics, 2015

Interoperable Multimedia Annotation and Retrieval for the Tourism Sector.
Proceedings of the Metadata and Semantics Research - 9th Research Conference, 2015

Pythia: A Privacy-Enhanced Personalized Contextual Suggestion System for Tourism.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Weighted Random Sampling over Data Streams.
Proceedings of the Algorithms, Probability, Networks, and Games, 2015

An efficient privacy-preserving solution for finding the nearest doctor.
Personal and Ubiquitous Computing, 2014

Privacy-preserving computation of participatory noise maps in the cloud.
Journal of Systems and Software, 2014

A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication.
Journal of Computer Security, 2014

User-centric privacy-preserving statistical analysis of ubiquitous health monitoring data.
Comput. Sci. Inf. Syst., 2014

myVisitPlanner GR: Personalized Itinerary Planning System for Tourism.
Proceedings of the Artificial Intelligence: Methods and Applications, 2014

Reengineering the user: Privacy concerns about personal data on smartphones.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

A query scrambler for search privacy on the internet.
Inf. Retr., 2013

DUTH at TREC 2013 Contextual Suggestion Track.
Proceedings of The Twenty-Second Text REtrieval Conference, 2013

A Versatile Tool for Privacy-Enhanced Web Search.
Proceedings of the Advances in Information Retrieval, 2013

Money-Based Coordination of Network Packets.
Proceedings of the Algorithms and Complexity, 8th International Conference, 2013

On Money as a Means of Coordination between Network Packets
CoRR, 2012

A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network.
Proceedings of the Information Security and Privacy Research, 2012

Privacy-Preserving Television Audience Measurement Using Smart TVs.
Proceedings of the Information Security and Privacy Research, 2012

User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Privacy-Preserving Statistical Analysis on Ubiquitous Health Data.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Privacy-enhanced management of ubiquitous health monitoring data.
Proceedings of the PETRA 2011, 2011

An Exact and O(1) Time Heaviest and Lightest Hitters Algorithm for Sliding-Window Data Streams.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

Using Personal Portfolios to Manage Customer Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Enhancing Deniability against Query-Logs.
Proceedings of the Advances in Information Retrieval, 2011

Window-games between TCP flows.
Theor. Comput. Sci., 2010

(\alpha, \beta) Fibonacci Search
CoRR, 2010

A privacy-preserving protocol for finding the nearest doctor in an emergency.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

Towards privacy in personal data management.
Inf. Manag. Comput. Security, 2009

Economics of Personal Data Management: Fair Personal Information Trades.
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Weighted Random Sampling.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

The complexity of linear programming in (gamma, kappa)-form.
Inf. Process. Lett., 2008

Window-Games between TCP Flows.
Proceedings of the Algorithmic Game Theory, First International Symposium, 2008

Existence, uniqueness and asymptotic behavior of the solutions of a fuzzy differential equation with piecewise constant argument.
Inf. Sci., 2007

Approximation schemes for scheduling and covering on unrelated machines.
Theor. Comput. Sci., 2006

Weighted random sampling with a reservoir.
Inf. Process. Lett., 2006

Randomized Approximation Schemes for Scheduling Unrelated Parallel Machines
Electronic Colloquium on Computational Complexity (ECCC), 2000

Positive Linear Programming Extensions: Parallel Complexity and Applications (Research Note).
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000

Parallel Text Retrieval on a High Performance Super Computer Using the Vector Space Model.
Proceedings of the SIGIR'95, 1995