default search action
Ioannis Krontiris
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c28]Michael Kubach, Isaac Henderson, Bithin Alangot, Theo Dimitrakos, Juan Vargas, Matthias Winterstetter, Ioannis Krontiris:
A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC. Open Identity Summit 2023 - [c27]Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen:
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets. TrustCom 2023: 1049-1059 - [c26]Anna Angelogianni, Ioannis Krontiris, Thanassis Giannetsos:
Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security. VNC 2023: 199-206 - [i5]Frank Kargl, Ioannis Krontiris, Jason Millar, André Weimerskirch, Kevin Gomez:
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 23242). Dagstuhl Reports 13(6): 22-54 (2023) - 2022
- [i4]Frank Kargl, Ioannis Krontiris, André Weimerskirch, Ian Williams:
Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl Seminar 22042). Dagstuhl Reports 12(1): 83-100 (2022) - 2021
- [c25]Benjamin Larsen, Thanassis Giannetsos, Ioannis Krontiris, Kenneth A. Goldman:
Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS. WISEC 2021: 48-59 - [i3]Heini Bergsson Debes, Thanassis Giannetsos, Ioannis Krontiris:
BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains. CoRR abs/2107.05054 (2021) - 2020
- [c24]Ioannis Krontiris:
Enabling Trusted Digital Identities ? From Connected Citizens to Connected Objects. CYSARM@CCS 2020: 31 - [c23]Ioannis Krontiris, Kalliroi Grammenou, Kalliopi Terzidou, Marina Zacharopoulou, Marina Tsikintikou, Foteini Baladima, Chrysi Sakellari, Konstantinos Kaouras:
Autonomous Vehicles: Data Protection and Ethical Considerations. CSCS 2020: 10:1-10:10
2010 – 2019
- 2019
- [c22]Thanassis Giannetsos, Ioannis Krontiris:
Securing V2X Communications for the Future: Can PKI Systems offer the answer? ARES 2019: 95:1-95:8 - 2017
- [j10]Tassos Dimitriou, Ioannis Krontiris:
Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications. J. Netw. Comput. Appl. 100: 24-34 (2017) - 2015
- [j9]Ioannis Krontiris, Tassos Dimitriou:
A platform for privacy protection of data requesters and data providers in mobile sensing. Comput. Commun. 65: 43-54 (2015) - [c21]Ioannis Krontiris, Zinaida Benenson, Anna Girard, Ahmad Sabouri, Kai Rannenberg, Peter Schoo:
Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers. APF 2015: 104-123 - [c20]Zinaida Benenson, Anna Girard, Ioannis Krontiris:
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation. WEIS 2015 - [c19]Tassos Dimitriou, Ioannis Krontiris:
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing. WISTP 2015: 20-35 - [p3]Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri:
An Architecture for Privacy-ABCs. Attribute-based Credentials for Trust 2015: 11-78 - [p2]Yannis C. Stamatiou, Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Welderufael Tesfay:
Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust. Attribute-based Credentials for Trust 2015: 197-239 - [p1]Joerg Abendroth, Marit Hansen, Ioannis Krontiris, Ahmad Sabouri, Eva Schlehahn, Robert Seidl, Harald Zwingelberg:
Privacy-ABC Usage Scenarios. Attribute-based Credentials for Trust 2015: 319-343 - 2014
- [j8]Ioannis Krontiris, Marc Langheinrich, Katie Shilton:
Trust and privacy in mobile experience sharing: future challenges and avenues for research. IEEE Commun. Mag. 52(8): 50-55 (2014) - [c18]Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis C. Stamatiou:
User Acceptance of Privacy-ABCs: An Exploratory Study. HCI (24) 2014: 375-386 - [c17]Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri:
Towards a Framework for Benchmarking Privacy-ABC Technologies. SEC 2014: 197-204 - [c16]Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg:
Trust Relationships in Privacy-ABCs' Ecosystems. TrustBus 2014: 13-23 - 2013
- [c15]Ioannis Krontiris, Tassos Dimitriou:
Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications. DCOSS 2013: 249-257 - [c14]Andreas Albers, Ioannis Krontiris, Noboru Sonehara, Isao Echizen:
Coupons as Monetary Incentives in Participatory Sensing. I3E 2013: 226-237 - [i2]Alessandro Acquisti, Ioannis Krontiris, Marc Langheinrich, Martina Angela Sasse:
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312). Dagstuhl Reports 3(7): 74-107 (2013) - 2012
- [j7]Ioannis Krontiris, Andreas Albers:
Monetary incentives in participatory sensing using multi-attributive auctions. Int. J. Parallel Emergent Distributed Syst. 27(4): 317-336 (2012) - [c13]Ronny Bjones, Ioannis Krontiris, Pascal Paillier, Kai Rannenberg:
Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication. APF 2012: 111-124 - [c12]Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris:
Privacy-by-design based on quantitative threat modeling. CRiSIS 2012: 1-8 - [c11]Tassos Dimitriou, Ioannis Krontiris, Ahmad Sabouri:
PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing. MobiSec 2012: 93-106 - [c10]Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg:
Attribute-Based Credentials for Trust (ABC4Trust). TrustBus 2012: 218-219 - [e1]Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems - 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 107, Springer 2012, ISBN 978-3-642-33391-0 [contents] - 2011
- [j6]Simone Fischer-Hübner, Chris Jay Hoofnagle, Ioannis Krontiris, Kai Rannenberg, Michael Waidner:
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Manifestos 1(1): 1-20 (2011) - [j5]Ioannis Krontiris, Tassos Dimitriou:
Scatter - secure code authentication for efficient reprogramming in wireless sensor networks. Int. J. Sens. Networks 10(1/2): 14-24 (2011) - [j4]Markus Tschersich, Christian Kahl, Stephan Heim, Stephen Crane, Katja Böttcher, Ioannis Krontiris, Kai Rannenberg:
Towards privacy-enhanced mobile communities - Architecture, concepts and user trials. J. Syst. Softw. 84(11): 1947-1960 (2011) - [i1]Simone Fischer-Hübner, Chris Jay Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris, Michael Marhöfer:
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Reports 1(2): 1-15 (2011) - 2010
- [j3]Thanassis Giannetsos, Tassos Dimitriou, Ioannis Krontiris, Neeli R. Prasad:
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices. Comput. J. 53(10): 1576-1593 (2010) - [j2]Ioannis Krontiris, Felix C. Freiling, Tassos Dimitriou:
Location privacy in urban sensing networks: research challenges and directions. IEEE Wirel. Commun. 17(5): 30-35 (2010) - [c9]Ioannis Krontiris, Felix C. Freiling:
Integrating people-centric sensing with social networks: A privacy research agenda. PerCom Workshops 2010: 620-623
2000 – 2009
- 2009
- [c8]Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks. EWSN 2009: 263-278 - 2008
- [b1]Ioannis Krontiris:
Intrusion prevention and detection in wireless sensor networks. University of Mannheim, Germany, 2008, pp. 1-126 - [c7]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. SecureComm 2008: 20 - [c6]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. WiMob 2008: 526-531 - 2007
- [c5]Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, Marios Mpasoukos:
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. ALGOSENSORS 2007: 150-161 - 2006
- [j1]Tassos Dimitriou, Ioannis Krontiris:
GRAViTy: Geographic Routing around Voids in Sensor Networks. Int. J. Pervasive Comput. Commun. 2(4): 351-361 (2006) - [c4]Ioannis Krontiris, Tassos Dimitriou:
Authenticated In-Network Programming for Wireless Sensor Networks. ADHOC-NOW 2006: 390-403 - 2005
- [c3]Tassos Dimitriou, Ioannis Krontiris:
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks. IPDPS 2005 - [c2]Tassos Dimitriou, Ioannis Krontiris:
Autonomic Communication Security in Sensor Networks. WAC 2005: 141-152 - 2004
- [c1]Tassos Dimitriou, Ioannis Krontiris, Fotios Nikakis, Paul G. Spirakis:
SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks. NETWORKING 2004: 1300-1305
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint