Ioannis Krontiris
Cited by
Cited by
Intrusion detection of sinkhole attacks in wireless sensor networks
I Krontiris, T Dimitriou, T Giannetsos, M Mpasoukos
International symposium on algorithms and experiments for sensor systems …, 2007
Towards intrusion detection in wireless sensor networks
K Ioannis, T Dimitriou, FC Freiling
Proc. of the 13th European Wireless Conference, 1-10, 2007
Towards intrusion detection in wireless sensor networks
I Krontiris, T Dimitriou, FC Freiling
Proceedings of the 13th European Wireless Conference, 1-4, 2007
Launching a sinkhole attack in wireless sensor networks; the intruder side
I Krontiris, T Giannetsos, T Dimitriou
2008 IEEE International Conference on Wireless and Mobile Computing …, 2008
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
Wireless Sensor Networks: 6th European Conference, EWSN 2009, Cork, Ireland …, 2009
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
I Krontiris, T Giannetsos, T Dimitriou
Proceedings of the 4th international conference on Security and privacy in …, 2008
Location privacy in urban sensing networks: research challenges and directions [security and privacy in emerging wireless networks]
I Krontiris, FC Freiling, T Dimitriou
IEEE Wireless Communications 17 (5), 30-35, 2010
Monetary incentives in participatory sensing using multi-attributive auctions
I Krontiris, A Albers
International Journal of Parallel, Emergent and Distributed Systems 27 (4 …, 2012
Security issues in biomedical wireless sensor networks
T Dimitriou, K Ioannis
2008 First International Symposium on Applied Sciences on Biomedical and …, 2008
A localized, distributed protocol for secure information exchange in sensor networks
T Dimitriou, I Krontiris
19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005
Trust and privacy in mobile experience sharing: future challenges and avenues for research
I Krontiris, M Langheinrich, K Shilton
IEEE Communications Magazine 52 (8), 50-55, 2014
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation.
Z Benenson, A Girard, I Krontiris
WEIS, 2015
Privacy-by-design based on quantitative threat modeling
J Luna, N Suri, I Krontiris
2012 7th International Conference on Risks and Security of Internet and …, 2012
Attribute-based credentials for trust (abc4trust)
A Sabouri, I Krontiris, K Rannenberg
Trust, Privacy and Security in Digital Business: 9th International …, 2012
D2. 1 architecture for attribute-based credential technologies
J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ...
Deliverable, ABC4Trust EU Project, 2011
Arbitrary code injection through self-propagating worms in von neumann architecture devices
T Giannetsos, T Dimitriou, I Krontiris, NR Prasad
The Computer Journal 53 (10), 1576-1593, 2010
Privacy-respecting discovery of data providers in crowd-sensing applications
I Krontiris, T Dimitriou
2013 IEEE International Conference on Distributed Computing in Sensor …, 2013
PEPPeR: A querier’s privacy enhancing protocol for participatory sensing
T Dimitriou, I Krontiris, A Sabouri
Security and Privacy in Mobile Information and Communication Systems: 4th …, 2012
A platform for privacy protection of data requesters and data providers in mobile sensing
I Krontiris, T Dimitriou
Computer Communications 65, 43-54, 2015
User acceptance of privacy-abcs: An exploratory study
Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20