Vespa: Vehicular security and privacy-preserving architecture N Alexiou, M Laganà, S Gisdakis, M Khodaei, P Papadimitratos Proceedings of the 2nd ACM workshop on Hot topics on wireless network …, 2013 | 76 | 2013 |
Formal analysis of the kaminsky DNS cache-poisoning attack using probabilistic model checking N Alexiou, S Basagiannis, P Katsaros, T Dashpande, SA Smolka 2010 IEEE 12th International Symposium on High Assurance Systems Engineering …, 2010 | 52 | 2010 |
Probabilistic model checking for the quantification of DoS security threats S Basagiannis, P Katsaros, A Pombortsis, N Alexiou Computers & Security 28 (6), 450-465, 2009 | 41 | 2009 |
Formal security analysis of near field communication using model checking N Alexiou, S Basagiannis, S Petridou computers & security 60, 1-14, 2016 | 33 | 2016 |
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach S Basagiannis, S Petridou, N Alexiou, G Papadimitriou, P Katsaros Computers & Security 30 (4), 257-272, 2011 | 28 | 2011 |
Towards a secure and privacy-preserving multi-service vehicular architecture N Alexiou, S Gisdakis, M Laganà, P Papadimitratos 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013 | 18 | 2013 |
Security analysis of NFC relay attacks using probabilistic model checking SP Nikolaos Alexiou, Stylianos Basagiannis Wireless Communications and Mobile Computing Conference (IWCMC), 2014 …, 2014 | 14* | 2014 |
A probabilistic attacker model for quantitative verification of dos security threats S Basagiannis, P Katsaros, A Pombortsis, N Alexiou 2008 32nd Annual IEEE International Computer Software and Applications …, 2008 | 12 | 2008 |
2D hash chain robust random key distribution scheme M Ehdaie, N Alexiou, M Ahmadian, MR Aref, P Papadimitratos Information Processing Letters 116 (5), 367-372, 2016 | 11 | 2016 |
Mitigating node capture attack in random key distribution schemes through key deletion M Ehdaie, N Alexiou, M Ahmadian, MR Aref, P Papadimitratos Journal of Communication Engineering 6 (2), 99-109, 2017 | 10 | 2017 |
Random key pre-distribution techniques against sybil attacks M Ehdaie, N Alexiou, P Papadimitratos Journal of Communication Engineering 5 (1), 1-13, 2016 | 6 | 2016 |
Key splitting: making random key distribution schemes resistant against node capture M Ehdaie, N Alexiou, MA Attari, MR Aref, P Papadimitratos Security and Communication Networks 8 (3), 431-445, 2015 | 4 | 2015 |
Quantitative model checking of an rsa-based email protocol on mobile devices S Petridou, S Basagiannis, N Alexiou, G Papadimitriou, P Katsaros 2011 IEEE Symposium on Computers and Communications (ISCC), 639-645, 2011 | 4 | 2011 |
Key splitting for random key distribution schemes M Ehdaie, N Alexiou, M Ahmadian, MR Aref, P Papadimitratos 2012 20th IEEE International Conference on Network Protocols (ICNP), 1-6, 2012 | 3 | 2012 |