default search action
7th ICGS3 / 4. e-Democracy 2011: Thessaloniki, Greece
- Christos K. Georgiadis, Hamid Jahankhani, Elias Pimenidis, Rabih Bashroush, Ameer Al-Nemrat:
Global Security, Safety and Sustainability & e-Democracy - 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 99, Springer 2012, ISBN 978-3-642-33447-4 - Kleanthis Dellios, Aristeidis Chronakis, Despoina Polemi:
Transforming Vehicles into e-government 'Cloud Computing' Nodes. 1-8 - Stergios G. Tsiafoulis, Vasilios Zorkadis, Elias Pimenidis:
Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining. 9-16 - Stavroula Karayianni, Vasilios Katos:
Practical Password Harvesting from Volatile Memory. 17-22 - Bobby L. Tait:
Applied Phon Curve Algorithm for Improved Voice Recognition and Authentication. 23-30 - Kostis Gerakos, Christos Anagnostopoulos, Stathes Hadjiefthymiades:
Tuning the Epidemical Algorithm in Wireless Sensor Networks. 31-37 - Yulong Fu, Ousmane Koné:
A Robustness Testing Method for Network Security. 38-45 - Theodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis:
Economic Evaluation of Interactive Audio Media for Securing Internet Services. 46-53 - Vasileios Vlachos, Christos Ilioudis, Alexandros Papanikolaou:
On the Evolution of Malware Species. 54-61 - Iosif Androulidakis, Gorazd Kandus:
PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security. 62-66 - Fawzi Fawzi, Rabih Bashroush, Hamid Jahankhani:
GSi Compliant RAS for Public Private Sector Partnership. 67-71 - Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution. 72-79 - Dimitrios Zissis, Dimitrios Lekkas, Panayiotis Koutsabasis:
Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital Certificates. 80-87 - Apostolos K. Provatidis, Christos K. Georgiadis, Ioannis Mavridis:
Towards Colored Petri Net Modeling of Expanded C-TMAC. 88-95 - Dimitrios Lekkas, Dimitrios Zissis:
Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services. 96-103 - Russell Ogilvie, George R. S. Weir:
Genre-Based Information Hiding. 104-111 - Wael Khalifa, Kenneth Revett, Abdel-Badeeh M. Salem:
In the Hacker's Eye: The Neurophysiology of a Computer Hacker. 112-119 - Sotiris Karetsos, Maria Ntaliani, Constantina I. Costopoulou, Alexander B. Sideridis:
Untangling Public Service Usage for Agribusinesses with Dialogic E-government. 120-125 - Ruben Krishnamurthy, Kenneth Revett, Hossein Jahankhani:
On the Deployment of Artificial Immune Systems for Biometrics. 126-130 - Marcelo Damasceno de Melo, Jerffeson Teixeira, Gustavo Augusto Lima de Campos:
A Prediction Model for Criminal Levels Specialized in Brazilian Cities. 131-138 - Elsa Prieto, Rodrigo Diaz, Luigi Romano, Roland Rieke, Mohammed Achemlal:
MASSIF: A Promising Solution to Enhance Olympic Games IT Security. 139-147 - Gustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar:
An Ontology-Based Model for SIEM Environments. 148-155 - Dimitrios Koumaridis, Emmanouil Stiakakis, Christos K. Georgiadis:
Analyzing the Economic Impacts of Security Breaches Due to Outsourcing. 156-163 - Isabel Cerqueira, Vítor J. Sá, Sérgio Tenreiro de Magalhães:
Study of the Perception on the Portuguese Citizen Card and Electronic Signature. 164-170 - Marianthi Theoharidou, Miltiadis Kandias, Dimitris Gritzalis:
Securing Transportation-Critical Infrastructures: Trends and Perspectives. 171-178 - Zoe Kardasiadou, Evi Chatziliasi, Konstantinos Limniotis:
E-Government in Greece: Serving State's Economic Needs - Respecting the Fundamental Right to Data Protection. 179-185 - Hoda Jannati, Abolfazl Falahati:
Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags. 186-193 - Ioannis Savvas, Nick Bassiliades, Elias Pimenidis, Alexander B. Sideridis:
Paving the Way for a Transformational Public Administration. 194-203 - Mamoun Alazab, Sitalakshmi Venkatraman, Paul A. Watters, Moutaz Alazab, Ammar Alazab:
Cybercrime: The Case of Obfuscated Malware. 204-211 - Iosif Androulidakis, Gorazd Kandus:
Feeling Secure vs. Being Secure the Mobile Phone User Case. 212-219 - Theodoros Ntouskas, Dimitrios Papanikas, Nineta Polemi:
A Collaborative System Offering Security Management Services for SMEs/mEs. 220-228 - Anastasia Mavridou, Mauricio Papa:
A Situational Awareness Architecture for the Smart Grid. 229-236 - Maria Ntaliani, Constantina I. Costopoulou, Alexander B. Sideridis:
Alleviating SMEs' Administrative Burdens: The Rural Inclusion Initiative. 237-244 - Azar Hosseini, Abolfazl Falahati:
Optimum Hardware-Architecture for Modular Divider in GF(2 m ) with Chaos as Arbitrary Source Based on ECC. 245-252 - Nurdeen M. Ibrahim, Ameer Al-Nemrat, Hamid Jahankhani, Rabih Bashroush:
Sufficiency of Windows Event Log as Evidence in Digital Forensics. 253-262 - Alexander B. Sideridis, Elias Pimenidis, Loucas Protopappas, Maria Koukouli:
An Evaluation of the Initiatives and the Progress Made on e-government Services in the EU. 263-270 - Hossein Jahankhani, Thulasirajh Jayaraveendran, William Kapuku-Bwabw:
Improved Awareness on Fake Websites and Detecting Techniques. 271-279 - Daniela Borges, Vítor J. Sá, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos:
Study of the Perception on the Biometric Technology by the Portuguese Citizens. 280-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.