Ad-hoc, Mobile, and Wireless Networks: 14th International Conference,...
books.google.co.uk
This book constitutes the proceedings of the 14th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2015, held in Athens, Greece in June/July...
Handbook of Research on Wireless Security - Google Books
books.google.co.uk
Christos Xenakis University of Piraeus, Greece AbstrAct The global system for mobile communications (GSM) is the most popular standard that implements ...
CiteSeerX — Citation Query A GameTheoretic Intrusion Detection Model...
citeseer.ist.psu.edu
CiteSeerX - Scientific documents that cite the following paper: A GameTheoretic Intrusion Detection Model for Mobile Ad Hoc Networks
Christos Xenakis, Christoforos Ntantogian, Orestis Panos,...
www.recred.eu
Christos Xenakis, Christoforos Ntantogian, Orestis Panos, “(U)SimMonitor: A mobile application for security evaluation of cellular networks”. Computers & Security Volume 60, July 2016, Pages 62–78. Submitted by wadmin on Fri, :47. File: PDF icon usimmonitor-cose-pub.pdf. Publication Category:.
All web results to the name "Christos Xenakis"
Black Hat USA | Speakers List
www.blackhat.com
Christos Xenakis. University of Piraeus, Department of Digital Systems. Peng Xiao. Mobile Security of Alibaba. HAO XU. PanguTeam. Wen Xu. KEEN Team. Mark Vincent ...
Book Chapters – SYSTEMS SECURITY LABORATORY (SSL)
ssl.ds.unipi.gr
Christos Xenakis, “Security in UMTS 3G Mobile Networks,” book chapter in “Handbook of Research on Wireless Security Information Science Reference
Security in 2.5G Mobile Systems: Security & Forensics Book Chapter |...
www.igi-global.com
Christos Xenakis Sample PDF. $ List Price: $ Chapter 21. Access Security in UMTS and IMS (pages ) Yan Zhang, Yifan Chen, Rong Yu, Supeng ...
Security Architectures for B3G Mobile Networks: Security & Forensics...
www.igi-global.com
Ntantogian, Christoforos and Christos Xenakis. "Security Architectures for B3G Mobile Networks." Handbook of Research on Wireless Security. IGI Global,
A Security Evaluation of FIDO's UAF Protocol in Mobile and ...www.springerprofessional.de › a-security-evaluation-of-fi...
www.springerprofessional.de
Authors: Christoforos Panos, Stefanos Malliaros, Christoforos Ntantogian, Angeliki Panou, Christos Xenakis. Publisher: Springer International Publishing.
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated...
hal.inria.fr
Recently, a set of problems have been solved analytically, in order to improve various aspects of the authentication procedure in mobile networks. In these...
Discovering Authentication Credentials in Volatile Memory of Android...
hal.inria.fr
This paper investigates whether authentication credentials in the volatile memory of Android mobile devices can be discovered using freely available tools. The...
10Kstudents: Participants
10kstudents.eu
Network Security (Instructor: Christos Xenakis, Semester: Spring); Cryptography (Instructor: Christos Xenakis, Semester: Fall); Mobile and Wireless ...
Security in 2.5G Mobile Systems IRMA-International.orgwww.irma-international.org › chapter › security-mobile-s...
www.irma-international.org
Security in 2.5G Mobile Systems: Christos Xenakis: Book Chapters Author(s): Christos Xenakis (University of Piraeus, Greece) Copyright: Pages: 14
CrIM13 - OUSPG
www.ee.oulu.fi
Christos Xenakis - Compromising users' privacy from stolen/lost mobile devices: the Android case. 14:15-14:45: Coffee break. 14:45-16:00:.
Collaborative, Trusted and Privacy-Aware e/m-Services - AICT 399
hal.archives-ouvertes.fr
SWOT Analysis of a Portuguese Electronic Health Record Rui Pereira, Maria Salazar, António Abelha, José Machado, Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis,
ThinkMind(TM) Digital Library
www.thinkmind.org
Christos Xenakis. Keywords: micropayments; privacy; mobile operators; trusted third party. Abstract: This paper proposes a privacy preserving ...
IRMA-International.org: Security in 2.5G Mobile Systems: Christos...
www.irma-international.org
Security in 2.5G Mobile Systems: Christos Xenakis: Book Chapters
IRMA-International.org: Security in UMTS 3G Mobile Networks: Christos...
www.irma-international.org
Security in UMTS 3G Mobile Networks: Christos Xenakis: Book Chapters
Security in 2.5G Mobile Systems: Media & Communications Book Chapter...
www.igi-global.com
NewsroomOnline SymposiumProduct Catalogs. Security in 2.5G Mobile Systems. Christos Xenakis (University of Piraeus, Greece). Copyright © pages.
Telecom providers unfazed by major security hole in mobile networks |...
www.dw.com
By mimicking cell phone towers, hackers can listen on calls, but the industry isn't worried. Attacks like these used to cost millions, but now they only cost...
Related search requests for Christos Xenakis
Stephen Wolthusen Lazaros Merakos Sokratis Katsikas | Dimitris Apostolopoulos Giannis Marinakis Ioannis Stavrakakis | Nikos Passas |
Person "Xenakis" (1) Forename "Christos" (2210) Name "Xenakis" (77) |
sorted by relevance / date