default search action
Vassilios Chrissikopoulos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j13]Ilias O. Pappas, Panos E. Kourouthanassis, Sofia Papavlasopoulou, Vassilios Chrissikopoulos:
Emotions in Motion: The Combined Effect of Positive and Negative Emotions on Personalised E-Commerce. Int. J. Online Mark. 7(1): 64-78 (2017) - 2014
- [j12]Ilias O. Pappas, Panos E. Kourouthanassis, Michail N. Giannakos, Vassilios Chrissikopoulos:
Shiny happy people buying: the role of emotions on personalized e-shopping. Electron. Mark. 24(3): 193-206 (2014) - [c26]Dimitris Fronimos, Emmanouil Magkos, Vassilios Chrissikopoulos:
Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats. Panhellenic Conference on Informatics 2014: 5:1-5:2 - 2013
- [c25]Ilias O. Pappas, Michail N. Giannakos, Panos E. Kourouthanassis, Vassilios Chrissikopoulos:
Assessing Emotions Related to Privacy and Trust in Personalized Services. I3E 2013: 38-49 - [c24]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems. ISCC 2013: 143-148 - 2012
- [j11]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Secure and privacy-preserving, timed vehicular communications. Int. J. Ad Hoc Ubiquitous Comput. 10(4): 219-229 (2012) - [j10]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Modeling security in cyber-physical systems. Int. J. Crit. Infrastructure Prot. 5(3-4): 118-126 (2012) - [j9]Konstantinos Vlachopoulos, Emmanouil Magkos, Vassilios Chrissikopoulos:
A Model for Hybrid Evidence Investigation. Int. J. Digit. Crime Forensics 4(4): 47-62 (2012) - [c23]Panayiotis Kotzanikolaou, Emmanouil Magkos, Nikolaos Petrakos, Christos Douligeris, Vassilios Chrissikopoulos:
Fair Anonymous Authentication for Location Based Services. DPM/SETOP 2012: 1-14 - [c22]Kostas Vlachopoulos, Emmanouil Magkos, Vassilios Chrissikopoulos:
A Model for Hybrid Evidence Investigation. WDFIA 2012: 119-128
2000 – 2009
- 2009
- [j8]Emmanouil Magkos, Manolis Maragoudakis, Vassilios Chrissikopoulos, Stefanos Gritzalis:
Accurate and large-scale privacy-preserving data mining using the election paradigm. Data Knowl. Eng. 68(11): 1224-1236 (2009) - [j7]Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
Treating scalability and modelling human countermeasures against local preference worms via gradient models. J. Comput. Virol. 5(4): 357-364 (2009) - [c21]Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
A Novel Stochastic Approach for Modeling Random Scanning Worms. Panhellenic Conference on Informatics 2009: 176-179 - [e1]Vassilios Chrissikopoulos, Nikolaos Alexandris, Christos Douligeris, Spyros Sioutas:
PCI 2009, 13th Panhellenic Conference on Informatics, 10-12 September 2009, Corfu, Greece. IEEE Computer Society 2009, ISBN 978-0-7695-3788-7 [contents] - 2008
- [c20]Vassilios Chrissikopoulos, George Papaloukopoulos, Evangelos Sakkopoulos, Spyros Sioutas:
Design and Implementation Aspects of a Novel Java P2P Simulator with GUI. Panhellenic Conference on Informatics 2008: 83-87 - [c19]Emmanouil Magkos, Manolis Maragoudakis, Vassilios Chrissikopoulos, Stefanos Gritzalis:
Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections. Privacy in Statistical Databases 2008: 284-297 - [c18]Emmanouil Magkos, Vassilios Chrissikopoulos:
Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems. WEBIST (1) 2008: 301-304 - [c17]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Strengthening Privacy Protection in VANETs. WiMob 2008: 508-513 - [i1]Vassilios Chrissikopoulos, George Papaloukopoulos, Evangelos Sakkopoulos, Spyros Sioutas:
Design and Implementation Aspects of a novel Java P2P Simulator with GUI. CoRR abs/0805.4134 (2008) - 2007
- [j6]Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos:
A spatial stochastic model for worm propagation: scale effects. J. Comput. Virol. 3(2): 87-92 (2007) - 2006
- [j5]Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris, Vassilios Chrissikopoulos:
Secure distributed intelligent networks. Comput. Commun. 29(3): 325-336 (2006) - 2005
- [j4]Marios Poulos, Sozon Papavlasopoulos, Vassilios Chrissikopoulos:
A Text Categorization Technique based on a Numerical Conversion of a Symbolic Expression and an Onion Layers Algorithm. J. Digit. Inf. 6(1) (2005) - [c16]Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos:
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. WOWMOM 2005: 581-587 - 2004
- [j3]Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Uncoercible e-Bidding Games. Electron. Commer. Res. 4(1-2): 113-125 (2004) - 2002
- [c15]Ioannis Papadakis, Ioannis Andreou, Vassilios Chrissikopoulos:
Interactive Search Results. ECDL 2002: 448-462 - 2001
- [j2]Ioannis Papadakis, Vassilios Chrissikopoulos, Despoina Polemi:
Secure medical digital libraries. Int. J. Medical Informatics 64(2-3): 417-428 (2001) - [c14]Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos:
Dynamic Multi-signatures for Secure Autonomous Agents. DEXA Workshop 2001: 587-591 - [c13]Emmanouil Magkos, Panayiotis Kotzanikolaou, Vassilios Chrissikopoulos:
An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions. EC-Web 2001: 186-195 - [c12]Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos:
Receipt-Freeness in Large-Scale Elections without Untappable Channels. I3E 2001: 683-693 - [c11]Nikos Alexandris, Emmanouil Magkos, Vassilios Chrissikopoulos:
Software-Based Receipt-Freeness in On-Line Elections. Network Security 2001: 33-43 - [c10]Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
Strong Forward Security. SEC 2001: 109-122 - 2000
- [j1]Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Yvo Desmedt:
Secure linking of customers, merchants and banks in electronic commerce. Future Gener. Comput. Syst. 16(4): 393-401 (2000) - [c9]Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos:
Secure Transactions with Mobile Agents in Hostile Environments. ACISP 2000: 289-297 - [c8]Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos:
An Equitably Fair On-line Auction Scheme. EC-Web 2000: 72-83
1990 – 1999
- 1999
- [c7]Marios Poulos, Maria Rangoussi, Vassilios Chrissikopoulos, Angelos Evangelou:
Person identification based on parametric processing of the EEG. ICECS 1999: 283-286 - [c6]Marios Poulos, Maria Rangoussi, Vassilios Chrissikopoulos, Angelos Evangelou:
Parametric person identification from the EEG using computational geometry. ICECS 1999: 1005-1008 - 1998
- [c5]Vassilios Chrissikopoulos, D. Georgiou, Nectarios Koziris, K. Toraki, Panayotis Tsanakas:
A Digital Library Model for the Grey Literature of Academic Institutes. ECDL 1998: 699-700 - 1996
- [c4]George Vassilacopoulos, Vassilios Chrissikopoulos, Dimitrios Peppes:
Network Security in a Telemedicine System. Communications and Multimedia Security 1996: 108-115 - [c3]Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Dimitrios Peppes:
Efficient and provably secure key agreement. SEC 1996: 227-236 - [c2]George Vassilacopoulos, Vassilios Chrissikopoulos, Dimitrios Peppes:
Security enforcement in a European medical device vigilance system network. SEC 1996: 377-386 - 1992
- [c1]Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos:
An Efficient Public Key Distribution System. IFIP Congress (2) 1992: 532-539
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint