This is the list of refereed conferences of the NMSLab team.

2016

  1. Karavaras E., Magkos E. and Tsohou A. (2016) Low User Awareness Against Social Malware: an Empirical Study and Design of a Security Application, In Proceedings of the 13th European, Mediterranean and Middle Eastern Conference on Information Systems, Krakow, Poland, June 2016.

2015

  1. Apostolos Demertzis, and Konstantinos Oikonomou, “A Braided Routing Mechanism to Reduce Traffic Load’s Local Variance in Wireless Sensor Networks,” the 6th International Conference on Information, Intelligence, Systems and Applications (IISA 2015), July 2015.
  2. Vasileios Komianos, and Konstantinos Oikonomou, “Tour Recommendations for Effective Cultural Heritage Promotion in Large Scale Virtual Environments,” the 6th International Conference on Information, Intelligence, Systems and Applications (IISA 2015), July 2015.
  3. Jiang H. and Tsohou A. (2015), The same Antecedents do not fit all activities: an Activity-Specific Model of Personal Internet Use in Workplace, (Research in Progress), In Proceedings of the 23nd European Conference on Information Systems (ECIS 2015), May 2015, Mursten, Germany, Association for Information Systems (AIS).

2014

  1. Fung Po Tso, Konstantinos Oikonomou, Eleni Kavvadia, and Dimitrios Pezaros, “Scalable Traffic-Aware Virtual Machine Management for Cloud Data Centers,” IEEE 34th International Conference on Distributed Computing Systems (ICDCS), pp. 238-247, June 30 2014-July 3 2014.
  2. Eleni Kavvadia, Georgios Koufoudakis, and Konstantinos Oikonomou, “Robust probabilistic information dissemination in energy harvesting wireless sensor networks,” 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), pp.63-70, 2-4 June 2014.
  3. Apostolos Demertzis, and Kosntantinos Oikonomou, “Avoiding energy holes in wireless sensor networks with non-uniform energy distribution,” the 5th International Conference on Information, Intelligence, Systems and Applications (IISA 2014), pp. 138-143, 7-9 July 2014.
  4. Georgios Tsoumanis, Eleni Kavvadia, and Konstantinos Oikonomou, “Changing the look of a city: The v-Corfu case,” the 5th International Conference on Information, Intelligence, Systems and Applications (IISA 2014), pp. 419-424, 7-9 July 2014.
  5. Vassileios Komianos, Eleni Kavvadia, and Konstantinos Oikonomou, “Efficient and realistic cultural heritage representation in large scale virtual environments,” Information, Intelligence, Systems and Applications, IISA 2014, The 5th International Conference on , pp. 1-6, 7-9 July 2014.
  6. Koufi V., Tsohou A., Malamateniou F. and Vassilacopoulos G., (2014), A Framework for Privacy-Preserving Access Control to Cloud Process-based PHR Systems, In Proceedings of the 25th European Medical Informatics Conference, August 2014, Istanbul, Turkey.
  7. Jiang H. and Tsohou A. (2014), Expressive Or Instrumental: A Dual-Perspective Model Of Personal Web Usage At Workplace (Research in Progress) In Proceedings of the 22nd European Conference on Information Systems (ECIS 2014), June 2014, Tel Aviv, Israel, Association for Information Systems (AIS)
  8. Jiang H. and Tsohou A. (2014), The Dual Nature of Personal Web Usage At Workplace: Impacts, Antecedents And Regulating Policies, In Proceedings of the 22nd European Conference on Information Systems (ECIS 2014), June 2014, Tel Aviv, Israel, Association for Information Systems (AIS)
  9. E. Magkos, P. Kotzanikolaou, M. Magioladitis, S. Sioutas, and V. S. Verykios. “Towards Secure and Practical Location Privacy, through Private Equality Testing”. In: Privacy in Statistical Databases – PSD 2014, 17-19 Sep. 2014, Eivissa, Spain. Lecture Notes in Computer Science LNCS v. 8744, Springer-Verlag, 2014.
  10. M. Korakakis, E. Magkos, P. Mylonas. “Automated CAPTCHA Solving: An Empirical Comparison of Selected Techniques”. In: SMAP 2014, 9th International Workshop on Semantic and Social Media Adaptation and Personalization, November 6-7th, 2014, Corfu, Greece. IEEE Computer Society’s Conference Publishing Services (CPS), 2014.
  11. E. Magkos, E. Kleisiari, P. Chanias, V. Giannakouris-Salalidis. “Parental Control and Children’s Internet Safety: The Good, the Bad and the Ugly”. In: 6th International Conference on Information Law and Ethics (ICIL 2014), “Lifting Barriers to Empower the Future of Information Law and Ethics”, Thessaloniki, May 30-31, 2014.
  12. D. Fronimos, E. Magkos, V. Chrissikopoulos. “Evaluating Low Interaction Honeypots and On their Use against Advanced Persistent Threats”. In 18th Panhellenic Conference on Informatics – PCI 2014, 2-4 October, Athens, Greece, 2014.

2013

  1. Fung Po Tso, Gregg Hamilton, Konstantinos Oikonomou, Dimitrios P. Pezaros, “Implementing Scalable, Network-Aware Virtual Machine Migration for Cloud Data Centers,” IEEE CLOUD 2013, pp. 557-564, 28 June-3 July 2013, Santa Clara, CA, USA.
  2. Oh J., Lee H. and Tsohou A. (2013) Relational Versus Structural Embeddedness in IT Outsourcing Networks: The Role Of Requirement Unpredictability And Measurement Difficulty, In Proceedings of the 17th Pacific Asia Conference on Information Systems (PACIS), June 2013, Jeju Island, Korea, Association for Information Systems (AIS).
  3. M. Burmester, E. Magkos, V. Chrissikopoulos. “T-ABAC: An Attribute-Based Access Control Model for Real-Time Availability in Highly Dynamic Systems”. In: 18th IEEE Symposium on Computers and Communications, July 7-10, 2013, Split Croatia, IEEE.

2012

  1. Konstantinos Oikonomou, Giorgos Tsioutsiouliklis, and Sonia Aissa “Scalable Facility Placement for Communication Cost Reduction in Wireless Networks,” IEEE ICC 2012 – Wireless Networks Symposium (ICC’12 WN), Ottawa, Canada, 10-15 June, 2012.
  2. Konstantinos Oikonomou, Giorgos Koufoudakis, and Sonia Aissa “Probabilistic Flooding Coverage Analysis in Large Scale Wireless Networks,” IEEE International Conference on Telecommunications (IEEE ICT’12), Jounieh, Lebanon, 23-25 April, 2012.
  3. Konstantinos Oikonomou, and Sonia Aissa “Dynamic Sink Assignment for Efficient Energy Consumption in Wireless Sensor Networks,” IEEE Wireless Communications and Networking Conference (WCNC 2012), Paris, France, 1-4 April, 2012.
  4. Tsohou A., Al-Yafi K., Lee H., (2012), Evaluating M-Government Applications: An Elaboration Likelihood Model Framework, Proceedings of the European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS), (Eds. Ghoneim A., Klischewski R., Schrödl H., Muhammed K.), 7-8 June, Munich, Germany
  5. Tsohou A., Lee H., Zahir I., Weerakkody V., Osman I., Latif A., Medeni T., (2012), Evaluating E-Government Services From A Citizens’ Perspective: A Reference Process Model, Proceedings of the European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS), (Eds. Ghoneim A., Klischewski R., Schrödl H., Muhammed K.), 7-8 June, 2012, Munich, Germany
  6. El-Haddadeh R., Tsohou A., Karyda M., (2012), Implementation Challenges for information Security Awareness initiatives in E-government, Proceedings of the ECIS 2012 20th European Conference on Information Systems, (Eds. Janssen M, Weerakkody V, Dwivedi Y), June 2012, Barcelona, Spain, Association for Information Systems (AIS).
  7. P. Kotzanikolaou, E. Magkos, N.Petrakos, C.Douligeris, V. Chrissikopoulos. “Fair Anonymous Authentication for Location Based Services”. In: Data Privacy Management, 7th International Workshop (DPM 2012), Pisa, Italy, September 13-14. Lecture Notes in Computer Science (LNCS), Springer-Verlag, to be published, 2012.
  8. K. Vlachopoulos, E. Magkos and V. Chrissikopoulos. “A Model for Hybrid Evidence Investigation”. In: 7th International Annual Workshop on Digital Forensics & Incident Analysis (WDFIA 2012), Hersonissos, Crete, 6-8 June, 2012.
  9. M. Burmester, E. Magkos, V. Chrissikopoulos. “Modeling Security in Cyber-Physical Systems”. In: Sixth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, National Defense University Fort McNair, Washington, DC, USA, March 19 – 21, 2012.

2011

  1. Dimitrios Tsolis, Spyros Sioutas, Alexandros Panaretos, Ioannis Karydis, and Konstantinos Oikonomou, “Decentralized Digital Content Exchange and Copyright Protection via P2P Networks,” Th e Sixteenth IEEE Symposium in Computers and Communications (ISCC 2011), Corfu, Greece, 27 June – 1 July, 2011.
  2. Konstantinos Oikonomou, Afroditi Loukidou, and Spyros Sioutas, “A Study of a Time-Graph Friendship Model,” The Fifth International IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2011), Lucca, Italy, 23 June, 2011.

2010

  1. Emmanouil Magkos, Panayiotis Kotzanikolaou, Spyros Sioutas, and Konstantinos Oikonomou, “A Distributed Privacy-Preserving Scheme for Location-Based Queries,” The Fourth International IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2010), Montreal, Canada, 14 June, 2010.
  2. Konstantinos Oikonomou, Dimitrios Kogias, and Ioannis Stavrakakis, “A Study of Information Dissemination Under Multiple Random Walkers and Replication Mechanisms,” The Second International Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2010, February 22-23, 2010, Pisa, Italy.
  3. Tsohou A., Karyda M., Kokolakis S., Kiountouzis E., (2010), Analyzing Information Security Awareness through Networks of Association, Proceedings of the TrustBus 2010 7th International Conference on Trust, Privacy & Security in Digital Business, pp. 227-237, September 2010, Bilbao, Spain, Lecture Notes in Computer Science LNCS, Springer
  4. Evans R., Tsohou A., Tryfonas T., Morgan T., (2010), Architecting Secure Systems with the ISO standards 26702 and 27001, Proceedings of the SoSE 2010 5th IEEE International Conference on Systems of Systems Engineering, pp. 1-6, June 2010, Loughborough, UK, IEEE Computer Society Press
  5. Vrakas N., Kalloniatis C., Tsohou A., Lambrinoudakis C., (2010), Privacy Requirements Engineering for Trustworthy e-Government Services, Proceedings of the TRUST 2010 3rd International Conference on Trust and Trustworthy Computing, pp. 298-307, June 2010, Berlin, Germany, Lecture Notes in Computer Science LNCS, Springer
  6. Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., (2010), Unifying ISO Security Standards Practices into a Single Security Framework, Proceedings of the 12th Annual IFIP Workshop on Information Security Management, pp. 188-203, May 2010, Port Elizabeth, South Africa.
  7. S. Sioutas, E. Magkos, I. Karydis, and V.S. Verykios. “Uncertainty for Anonymity and 2-Dimensional Range Query Distortion”. In: Privacy in Statistical Databases – PSD 2010, 22-24 Sep. 2010, Corfu, Greece. Lecture Notes in Computer Science LNCS v. 6344, Springer-Verlag, pp. 85-96, 2010.
  8. E. Magkos, P. Kotzanikolaou. “Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments”. In: The Second International ICST Conference on Security and Privacy in Mobile Information and Communication Systems – MOBISEC 2010, May 27-28, Catania, Sicily. LNICST, Springer, to be published, 2010.

2009

  1. Spyros Sioutas, Konstantinos Oikonomou, Giorgos Papaloukopoulos, Mihalis Xenos, and Yiannis Manolopoulos, “Building an Efficient P2P Overlay for Energy-Level Queries in Sensor Networks,” in proceedings of the first ACM SIGAPP International Conference on Management of Emergent Digital EcoSystems (MEDES09), Lyon, France, October 27-30, 2009.
  2. Konstantinos Oikonomou, Dimitrios Kogias, Leonidas Tzevelekas, and Ioannis Stavrakakis, “Investigation of Information Dissemination Design Criteria in Large-scale Network Environments,” 13th Panhellenic Conference on Informatics, 10 – 12 September 2009, Corfu, Greece.
    Konstantinos Oikonomou, Spyros Sioutas, and Ioannis Stavrakakis, “Scalable Communication Cost Reduction: The Chord Case,” The 8th IFIP Annual Mediterranean Ad Hoc Networking Workshop Med-Hoc-Net 2009, June 29 – 30, 2009, Haifa, Israel.
  3. Dimitris Kogias, Konstantinos Oikonomou, and Ioannis Stavrakakis, “Study of Randomly Replicated Random Walks for Information Dissemination Over Various Network Topologies,” Sixth Annual Conference on Wireless On demand Network Systems and Services (WONS), February 2-4, 2009. Snowbird, Utah, USA.
  4. Tsohou A., Karyda M., Kokolakis S., Kiountouzis E., (2009), Aligning Security Awareness with Information Systems Security Management, Proceedings of the MCIS 2009 4th Mediterranean Conference on Information Systems, pp. 866- 878, September 2009, Athens, Greece, Association for Information Systems (AIS)

  5. Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., (2009), Information Systems Security Management: A review and a classification of the ISO standards, Proceedings of the e-Democracy 2009 Next Generation Society: Technological and Legal Issues, pp. 220-235, Athens, Greece, 2009, Lecture Notes of the ICSSIT Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering LNICST 26, Springer

  6. Tsohou A., Rizomiliotis P., Lambrinoudakis C., Gritzalis S., (2009), Security and Privacy Issues in Bipolar Disorder Research, Proceedings of the ICICTH 7th International Conference on Information and Communication Technologies in Health, July 2009, Samos, Greece, INEAG.

  7. M. Avlonitis, E. Magkos, M. Stefanidakis and V. Chrissikopoulos. “A Novel Stochastic Approach for Modeling Random Scanning Worms”. In: 13th Panhellenic Conference on Informatics – PCI 2009, 10-12 September, Corfu, Greece. IEEE Computer Society, pp. 176-179, 2009.

  8. K. L. Kermanidis and E. Magkos. “Empirical Paraphrasing of Modern Greek Text in Two Phases; An Application to Steganography”. In: A. Gelbukh (Ed.): CICLing 2009, LNCS 5449, pp. 535–546, Springer-Verlag Berlin, 2009.

2008

  1. Dimitris Kogias, Konstantinos Oikonomou, and Ioannis Stavrakakis, “Replicated Random Walks for Service Advertising in Unstructured Environments,” The 7th IFIP Annual Mediterranean Ad Hoc Networking Workshop Med-Hoc-Net 2008, June 23-27 2008, Palma de Mallorca, Spain.
  2. Konstantinos Oikonomou, Ioannis Stavrakakis, and Alexios Xydias, “Scalable Service Migration in General Topologies,” The Second International IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2008), Newport Beach, California, 23 June, 2008.
  3. Adamantia Pateli, Andreas Floros, Konstantinos Oikonomou, and Emmanouil Magkos, “CORFUNET: A Mesh Network Providing Wireless Services at Metropolitan Level,” IADIS International Conference Wireless Applications and Computing 2008, Amsterdam, The Netherlands, 22 – 24 July 2008.
  4. E. Magkos, V. Chrissikopoulos. “Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems”. In: 4th International Conference on Web Information Systems and Technologies (WEBIST 2008), May 4-7 2008, Madeira, Portugal. INSTICC Press, pp. 301-304, 2008.
  5. M. Avlonitis, E. Magkos, M. Stefanidakis, and V. Chrissikopoulos. “Exploring Scalability and Fast Spreading of Local Preference Worms via Gradient Models”. In: 17th EICAR Annual Conference, 3-6 May 2008, Laval, France, 2008.
  6. M. Burmester, E. Magkos, V. Chrissikopoulos. “Strengthening Privacy Protection in VANETs”. ΙΕΕΕ 1st International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications SecPri_WiMob 08, pp. 508-513, 2008.
  7. E. Magkos, M. Maragoudakis, V. Chrissikopoulos, and S. Gridzalis. “Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections”. In: Privacy in Statistical Databases (PSD ’08), 24-26 Sep. 2008, Istanbul. Lecture Notes in Computer Science (LNCS), Vol. 5262/2008, Springer-Verlag, pp. 284-297, 2008.

2007

  1. Konstantinos Oikonomou, and Ioannis Stavrakakis, “Performance Analysis of Probabilistic Flooding Using Random Graphs,” The First International IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2007), Helsinki, Finland, 18 June, 2007.
  2. Markos Avlonitis, Panagiotis Vlamos, and Konstantinos Oikonomou, “A Space-Time Analytical Model for Energy Consumption in Wireless Sensor Networks,” The Sixth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), Corfu, Greece, June 12-15, 2007.
  3. Nikolaos Laoutaris, George Smaragdakis, Konstantinos Oikonomou, Ioannis Stavrakakis, and Azer Bestavros, “Distributed Placement of Service Facilities in Large-Scale Networks”, IEEE INFOCOM’07, May 6-12, 2007, Anchorage, Alaska.
  4. Tsohou A., Theoharidou M., Kokolakis S., Gritzalis D., (2007), Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship, Proceedings of the TRUSTBUS’07 4th International Conference on Trust, Privacy and Security in Digital Business, pp.24-33, Regensburg, Germany, September 2007, Lecture Notes in Computer Science LNCS, Springer

2006

  1. Konstantinos Oikonomou, and Ioannis Stavrakakis, “Scalable Service Migration: The Tree Topology Case,” The Fifth Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2006), Lipari, Italy, June 14-17, 2006.
  2. V. Stathopoulos, P. Kotzanikolaou, and E. Magkos. “A Framework for Secure and Verifiable Logging in Public Communication Networks”. In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 – September 1, 2006, Lecture Notes in Computer Science, Vol. 4347, Springer, pp. 273-284, 2006.
  3. E. Magkos, P. Kotzanikolaou, M. Stefanidakis. “An Asymmetric Key Establishment Protocol for Multiphase Self-Organized Sensor Networks”. In: 12th European Wireless Conference (EW 2006) “Enabling Technologies for Wireless Multimedia Communications”, April 2 – 5, 2006, Athens Greece.

2005

  1. Konstantinos Oikonomou, and Ioannis Stavrakakis, “Power Efficiency Analysis for Topology-Unaware TDMA MAC Policies in Ad-Hoc Networks,” 38th Hawaii International Conference on System Sciences, HICSS-38, January 3-6, 2005, Big Island, Hawaii.
  2. Konstantinos Oikonomou, and Ioannis Stavrakakis, “Throughput Analysis of an Aloha-Based MAC Policy for Ad-Hoc Networks,” publication in a poster session during the Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, Ile de Porquerolles, France, 2005.
  3. P. Kotzanikolaou, E. Magkos, C. Douligeris, V. Chrissikopoulos V., “Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks”. 1st International Workshop on Trust, Security and Privacy for Ubiquitous Computing (TSPUK 2005), June 13, 2005, Taormina, Sicily, Italy. In: Proc. of 6th WoWMoM 2005, IEEE, pp. 581- 587, 2005.

2004

  1. Konstantinos Oikonomou, and Ioannis Stavrakakis, “Load Analysis of Topology-Unaware TDMA MAC Policies for Ad-Hoc Networks,” Quality of Future Internet Services (QoFIS), September 29 – 1 October, 2004, Barcelona, Spain.
  2. Konstantinos Oikonomou, Nikos Pronios, and Ioannis Stavrakakis, “Performance Analysis of TDMA MAC Schemes for Ad-Hoc Networks with Topology Control,” The Third Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2004), Bodrum, Turkey, June 27-30, 2004.
  3. Athanasios Vaios, Konstantinos Oikonomou, Nikolaos Zinelis, Konstantinos Ntagkounakis, and Ioannis Stavrakakis, “On Supporting Dual-Mode HiperLAN/2: Architecture and Overhead,” 13th IST Mobile & Wireless Communications Summit 2004, June 27-30, Lyon, France.
  4. Konstantinos Oikonomou, Konstantinos Ntagkounakis, Athanasios Vaios, Nikolaos Zinelis, and Ioannis Stavrakakis, “Layered Architecture and Modules of CANA Supporting Dual Mode HiperLAN/2,” International Workshop on Wireless Ad-Hoc Networks (IWWAN) 2004, 31st May – 3rd June, 2004, Oulu, Finland.
  5. Athanasios Vaios, Konstantinos Oikonomou, Sebastien Simoens, Pietro Pellati, and Ioannis Stavrakakis, “A Dual-Band HiperLAN/2-based Architecture for Indoor Hotspot Applications,” International Workshop on Wireless Ad-Hoc Networks (IWWAN) 2004, 31st May – 3rd June, 2004, Oulu, Finland.
  6. Konstantinos Oikonomou, and Nikos Pronios, “Transient Behavior of and Ad-Hoc Network Architecture Supporting an Enhanced Dual Mode HiperLAN/2 System,” International Workshop on Wireless Ad-Hoc Networks (IWWAN) 2004, 31st May – 3rd June, 2004, Oulu, Finland.

2003

  1. Konstantinos Oikonomou, and Ioannis Stavrakakis, “Throughput Analysis of a Probabilistic Topology-Unaware TDMA MAC Policy for Ad-Hoc Networks,” Quality of Future Internet Services (QoFIS), 1-3 October, 2003, Stockholm, Sweden.
  2. Konstantinos Oikonomou, and Ioannis Stavrakakis, “A Probabilistic Topology Unaware TDMA Medium Access Control Policy for Ad-Hoc Environments,” Personal Wireless Communications (PWC 2003), September 23-25, 2003, Venice, Italy.
  3. Konstantinos Oikonomou, Athanasios Vaios, Sebastien Simoens, Pietro Pellati, and Ioannis Stavrakakis, “A Centralized Ad-Hoc Network Architecture (CANA) Based on Enhanced HiperLAN/2,” The 14TH IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2003, Beijing, China, September 7-10, 2003.
  4. Konstantinos Oikonomou, and Nikos B. Pronios, “Ad-Hoc Networking: A Unified Evaluation Framework,” IST Mobile & Communications Summit 2003, Aveiro-Portugal, 15-18 June 2003.
  5. Athanasios Vaios, Konstantinos Oikonomou, and Ioannis Stavrakakis, “A Centralized Routing Scheme Supporting Ad Hoc Networking in Dual Mode HIPERLAN/2,” IST Mobile & Communications Summit 2003, Aveiro-Portugal, 15-18 June 2003.
  6. Ε. Μάγκος, Β. Χρυσικόπουλος, Ν. Αλεξανδρής, Μ. Πούλος. “Ηλεκτρονική Ψηφοφορία μέσω Internet: Ουτοπία ή Πραγματικότητα;” Ηλεκτρονική Δημοκρατία – Κοινωνία της Πληροφορίας και τα Δικαιώματα του Πολίτη, 1ο Εθνικό Συνέδριο με Διεθνή Συμμετοχή, 25 – 26 Σεπτεμβρίου 2003, Κτίριο ΕΒΕΑ. Proceedings. Εκδόσεις Σάκουλας, pp. 525-540, 2003.
  7. M. Poulos, A. Evangelou, E. Magkos, S. Papavlasopoulos. “Fingerprint Verification Based on Image Processing Segmentation Using An Onion Algorithm of Computational Geometry”. In: 6th International Workshop on Mathematical Methods in Scattering Theory and Biomedical Engineering, 18-21 September 2003, Tsepelovo, Greece. WOLRD SCIENTIFIC publications, pp. 550-559, 2003.
  8. Μ. Poulos, Ε. Magkos, V. Chrissikopoulos, and N. Alexandris. “Secure Fingerprint Verification Based on Image Processing Segmentation using Computational Geometry Algorithms”. In: SPPRA ’2003 – IASTED International Conference on Signal Processing, Pattern Recognition, and Applications. June 30 – July 2, Rhodes, Greece, ACTA Press, pp. 308-312, 2003.
  9. E. Magkos, V., Chrissikopoulos, N. Alexandris, and M. Poulos. “Secure Key Recovery for Archived and Communicated Data in the Corporate Intranet”. In: 7th WSEAS International Conference on Circuits, Systems, Communications and Computers. July 7-10, Corfu, Greece, pp. 191-195, 2003.
  10. M. Poulos, N. Alexandris, V.S. Belessiotis, E. Magkos. “Comparison between Computational Geometry and Coherence Methods applied to the EEG for Medical Diagnostic Purposes”. In: Proceedings of the 7th International Multicoference on Circuits, Systems, Communications and Computers, Corfu Island Greece, July 7-10, pp. 247-252, 2003.

2002

  1. E. Magkos, V. Chrissikopoulos, N. Alexandris. “A Common Security Model for Conducting e-Auctions and e-Elections”. 6th International Conference on Communications. In Recent Advances in Computers, Computing and Communications, WSEAS, pp. 463-467, 2002.

2001

  1. Konstantinos Oikonomou, Carmen Mas, and Ioannis Tenidis, “On QoS Management of H/2 Bearer Service for 3G Telecommunication Systems,” 3G Technologies and Applications, EURESCOM Summit 2001, 12-15 November 2001, Heidelberg, Germany.
  2. Konstantinos Oikonomou, Ioannis Tenidis, and Ioannis Stavrakakis, “A Mechanism to Enable Differentiated Services QoS in HIPERPLAN/2,” 8th IEEE International Conference on Telecommunications, Bucharest, Romania, June 2001.
  3. E. Magkos, P. Kotzanikolaou, V. Chrissikopoulos. «An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions». In: 2nd International Conference on Electronic Commerce and Web technologies EC-WEB 2001, Munich, Germany, September 4-6, LNCS Vol. 2115, Springer-Verlag, pp. 186-195, 2001.
  4. E. Magkos, M. Burmester, and V. Chrissikopoulos. “Receipt-Freeness in Large-scale Elections without Untappable Channels”. In: 1st IFIP Conference on E-Commerce/Business/Government, Kluwer Academic Publishers, pp. 683-693, 2001.
  5. M. Burmester, V. Chrissikopoulos, P. Kotzanikolaou, and E. Magkos. “Strong Forward Security”. In: IFIP-SEC ’01 Conference, Kluwer Academic Publishers, pp. 109-119, 2001.

2000

  1. E. Magkos, M. Burmester, V. Chrissikopoulos. An Equitably Fair On-line Auction Scheme”. In 1st International Conference on Electronic Commerce and Web technologies – EC-WEB 2000, LNCS Vol. 1875, Springer-Verlag, Berlin, pp. 72-84, 2000.