Ioannis Askoxylakis

Books & editorial

Mauro Conti, Matthias Schunter, Ioannis G. Askoxylakis (Eds.): Trust and Trustworthy Computing, Heraklion, Greece, August 24-25, 2015, Proceedings of TRUST 2015, Lecture Notes in Computer Science, Springer 2015 (under preparation)

Theo Tryfonas, Ioannis G. Askoxylakis (Eds.): Human Aspects of Information Security Privacy and Trust, Los Angeles, USA, August 02-07, 2015, Proceedings of HAS 2015, Lecture Notes in Computer Science, Springer 2015 (under preparation)

Dimitris Gritzalis, Aggelos Kiayas, Ioannis G. Askoxylakis (Eds.): Cryptology and Network Security, Heraklion, Greece, October 22-24, 2014, Proceedings of CANS 2014, Lecture Notes in Computer Science, vol. 8813, Springer 2014

Ioannis Askoxylakis, Theo Tryfonas (Eds.): ERCIM News, Smart Cities, Vol 98, July 2014

Theo Tryfonas, Ioannis G. Askoxylakis (Eds.): Human Aspects of Information Security Privacy and Trust, Heraklion, Greece, June 22-27, 2014, Proceedings of HAS 2014, Lecture Notes in Computer Science, vol. 7322, Springer 2014

Louis Marinos, Ioannis G. Askoxylakis (Eds.): Human Aspects of Information Security Privacy and Trust, Las Vegas, Nevada, USA, July 21-26, 2013, Proceedings of HAS 2013, Lecture Notes in Computer Science, vol. 7322, Springer 2013

Ioannis G. Askoxylakis, Marc Manulis, Joachim Posegga (Eds.): Security and Privacy for Digital Ecosystems. Information Security Technical Report. December 2012. Elsevier. ISSN: 1363-4127

Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga (Eds.): Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, Proceedings of WISTP 2012. Lecture Notes in Computer Science, vol. 7322, Springer 2012, ISBN 978-3-642-30954-0

 

Journal publications

K. Rantos, K.Fysarakis, C. Manifavas, I. Askoxylakis: Policy-controlled authenticated access to LLN-connected healthcare resources. IEEE Systems Journal (accepted for publication)

A. Fragkiadakis, E. Tragos, I. Askoxylakis: A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys and Tutorials, pp. 428-445, 2013.

A. Fragkiadakis, E. Tragos, T. Tryfonas, I. Askoxylakis: Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype. EURASIP Journal on Wireless Communications and Networking, vol. 2012, pp. 1-18, March 2012.

A. Fragkiadakis, E. Tragos, I. Askoxylakis, C. Verikoukis: Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks. EURASIP Journal on Wireless Communications and Networking, vol. 2011, pp. 1-16, June 2011

I. Askoxylakis, T. Tryfonas, J. May, V. Siris, A. Traganitis: A family of key agreement mechanisms for mission critical communications for secure mobile ad hoc and wireless mesh internetworking. EURASIP Journal on Wireless Communications and Networking, January 2011

I. Askoxylakis, B. Bencsath, L. Buttyan, L. Dora, V.A. Siris, D. Szili, I. Vajda: Securing multi-operator based QoS-aware mesh networks: requirements and design options. International Journal on Wireless Communications and Mobile Computing, Volume 10, Issue 5, May 2010

K. Markantonakis, M. Tunstall, G. Hancke, I. Askoxylakis, K. Mayes: Attacking smart card systems: Theory and practice. Information Security Technical Report, Vol 4, pp. 46-56, 2009

 

Book chapters

I. Askoxylakis, B. Bencsath, L. Buttyan, L. Dora, V. Siris, A. Traganitis, “Cross-layer security and resilience in wireless mesh networks” Book Chapter in the book “Cross Layer Designs in WLAN Systems” ISBN: 9781848762275, Troubador Publishing, July 2011

 

Periodicals

I. Askoxylakis, P. Papagrigoriou, D. Kastanis, P. Karampelas, G. Spanoudakis: SIREN – A network infrastructure for emergencies. ERCIM news, Volume 100, January 2015

T. Tryfonas, I. Askoxylakis: Introduction to the Special Theme. Future Cities and Smart Technologies: A Landscape of Ambition and Caution. ERCIM News, Volume 98, 2014

I. Askoxylakis, L. Marinos, G. Spanoudakis, Bring Your Own Device –BYOD (In Greek: Φέρε την δική σου συσκευή). The Economist, Volume 106, December 2012

V. Angelakis, I. Askoxylakis, S. Fowler, D. Gundlegård, A.Traganitis, D. Yuan: Security and resilience in cognitive radio networks. ERCIM News, Volume 85, April 2011

E. Tragos, A. Fragkiadakis, I. Askoxylakis: Digital economy and innovation (In Greek: Ψηφιακή οικονομία και καινοτομία). The Economist, Volume 86, April 2011

I. Askoxylakis, V. Siris, A. Traganitis, C. Stephanidis, Networked city (In Greek: Δικτυωμένη πόλη). The Economist, Volume 82, December 2010

I. Askoxylakis, D. Ikonomou, S. Gorniak: Priority on ICT resilience and security (In Greek: Προτεραιότητα στην ανθεκτικότητα και ασφάλεια). The Economist, Volume 75, May 2010

V. Siris, I. Askoxylakis, M. Conti, R. Bruno: Enhanced, Ubiquitous and Dependable Broadband Access using Mesh Networks. ERCIM News, Volume 73, April 2008

V. Siris, A. Traganitis, I. Askoxylakis: The Medium for a new generation of innovative telecommunication services (In Greek: Το μέσο για μια νέα γενιά καινοτόμων υπηρεσιών τηλεπικοινωνιών). The Economist, Volume 46, December 2007

I. Askoxylakis, A Traganitis: Economic transactions while moving (In Greek: Οικονομικές συναλλαγές εν κινήσει). The Economist, Volume 45, November 2007

V. Siris, A. Traganitis, I. Askoxylakis: Electromagnetic radiation of mobile and wireless networks and public health (In Greek: Ακτινοβολία κινητών και ασύρματων δικτύων και δημόσια υγεία). The Economist, Volume 43, September 2007

I. Askoxylakis, D. Kastanis, A. Traganitis: Secure wireless ad-hoc networking. ERCIM News, Volume 63, October 2005

I. Askoxylakis, D. Kastanis, A. Traganitis: M-commerce API package for mobile phones. ERCIM News, Volume 52, May 2003

 

Conference publications

N. Petroulakis, G. Spanoudakis, I. Askoxylakis, A. Miaoudakis, A. Traganitis: A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems.IEEE Globecom (accepted for publication)

K. Fysarakis, G. Hatzivasilis, I. Askoxylakis, C. Manifavas: RT-SDM: Real-time Security & Dependability Management of Heterogeneous Systems. In proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust-HAS, Los Angeles, USA, August 2-7, 2015 (accepted for publication)

I. Askoxylakis, A. Makrogiannakis, A. Miaoudakis, S. Papadakis, N. Petroulakis, M. Surligas, A. Traganitis, N. Vervelakis: A rapid emergency deployment node. In proceedings of the 18th International IEEE Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks-CAMAD, Athens, Hellas, December 1-3, 2014

P. Chatziadam, I. Askoxylakis, A. Fragkiadakis: A Network telescope for early warning intrusion detection. In proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy and Trust-HAS, Heraklion, Greece, June 22-27, 2014: 11-22

P. Papagrigoriou, A. Plemenos, I. Askoxylakis: Discrete hardware apparatus and method for mobile application and communication security. In proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy and Trust-HAS, Heraklion, Greece, June 22-27, 2014: pp.102-112

A. Fragkiadakis, I. Askoxylakis, P. Chatziadam: Denial-of-Service attacks in wireless networks using off-the-shelf hardware. In proceedings of the 2nd International Conference on Distributed, Ambient and Pervasive Interactions -DAPI, Heraklion, Greece, June 22-27, 2014: pp. 427-438

A. Miaoudakis, N. Petroulakis, D. Kastanis, I. Askoxylakis: Communications in emergency and crisis situations. In proceedings of the 2nd International Conference on Distributed, Ambient and Pervasive Interactions-DAPI, Heraklion, Greece, June 22-27, 2014: pp. 555-565

A. Fragkiadakis, I. Askoxylakis, E. Tragos: Joint compressed-sensing and matrix-completion for efficient data collection in WSNs. In proceedings of the 18th International IEEE Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks-CAMAD, Berlin, Germany, September 25-27, 2013: pp. 84-88

A. Fragkiadakis, I. Askoxylakis, E. Tragos: Secure and energy-efficient life-logging in wireless pervasive environments. In proceedings of the 1st International Conference on Human Aspects of Information Security, Privacy and Trust-HAS, Las Vegas, USA, July 21-26, 2013: pp. 306-315

N. Petroulakis, I. Askoxylakis, G. Spanoudakis, A. Traganitis: A Privacy-level model of user-centric cyber-physical systems. In proceedings of the 1st International Conference on Human Aspects of Information Security, Privacy and Trust, , Las Vegas, USA, July 21-26, 2013: pp. 338-347

A. Fragkiadakis, I. Askoxylakis: Malicious traffic analysis in wireless sensor networks using advanced signal processing techniques. In proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks-WOWMOM, Madrid, Spain, June 4-7, 2013: pp. 1-6

P. Andriotis, T. Tryfonas, G. Oikonomou, T. Spyridopoulos, A. Zaharis, A. Martini, I. Askoxylakis: On two different methods for steganography detection in JPEG images with Benford's law. In proceedings of the 7th Scienitifc NATO Conference in Security and Protection of Information (SPI 2013), Brno, Czech Republic, May 22-24, 2013: pp. 3-14

N. Petroulakis, E. Tragos, I. Askoxylakis: An Experimental investigation on energy consumption for secure life-logging in smart environments. In proceedings of the 17th International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks-CAMAD, Barcelona, Spain, September 17-19, 2012: pp. 292-296

N. Petroulakis, I. Askoxylakis, T. Tryfonas: Life-logging in smart environments: challenges and security threats. In proceedings of the IEEE International Conference on Communications-ICC, Ottava, Canada, June 10-15, 2012: pp. 5680-5684

E. Tragos, A. Fragkiadakis, I. Askoxylakis, V. Siris: The Impact of interference on the performance of a multi-path metropolitan wireless mesh network. In proceedings of the 16th IEEE symposium on Computers and Communications-ISCC, Corfu, Hellas, June 28- July 01, 2011: pp. 199-204

A. Fragkiadakis, E. Tragos, I. Askoxylakis: Video streaming performance in wireless hostile environments. In proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering-MUE, Loutraki, Hellas, June 28-30, 2011: pp. 267-272

I. Askoxylakis, T. Tryfonas, J. May, A. Traganitis: A dynamic key agreement mechanism for mission critical mobile ad hoc networking. In proceedings of the 2nd International Conference on Mobile Lightweight Wireless Systems-MOBILIGHT, Barcelona, Spain, May 10-12, 2010: pp. 216-228

I. Askoxylakis, N. Mechin, G. Perantinos, G. Vasilakis, A. Traganitis: Usage scenarios and application requirements for wireless mesh networks. In proceedings of the 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Kos, Hellas, June, 15-19, 2009: pp. 8-16

G. Vasilakis, G. Perantinos, I. Askoxylakis, N. Mechin, V. Spitadakis, A. Traganitis: Business opportunities and considerations on wireless mesh networks. In proceedings of the 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Kos, Hellas, June, 15-19, 2009: pp.1-8

I. Askoxylakis, K. Markantonakis, T. Tryfonas, J. May, A. Traganitis: A face-centered cubic key agreement mechanism for mobile ad-hoc networks. In proceedings the 1st International Conference on Mobile Lightweight Wireless Systems-MOBILIGHT, Athens, Hellas, May 18-20, 2009: pp. 103-113

K. Markantonakis, K. Mayes, D. Sauveron, I. Askoxylakis: Overview of security threats for smart cards in the public transport industry. In proceedings of the IEEE International Conference on e-Business Engineering 2008-ICEBE, XI AN, China, October 22-24, 2008: pp. 506-513

I. Askoxylakis, D. Sauveron, K. Markantonakis, T. Tryfonas, A. Traganitis: A body-centered cubic method for key agreement in dynamic mobile ad-hoc networks. In proceedings of the 2nd International Conference on Emerging Security Information, Systems and Technologies, Cap Esterel, France, August 25-31, 2008: pp. 193-202

I. Askoxylakis, M.Pramateftakis, D. Kastanis, A. Traganitis: Integration of a secure mobile payment system in a GSM/UMTS SIM smart card. In proceedings 4th International Conference on Communication, Network, and Information Security, UC Berkeley, USA, September 24-26, 2007: pp. 40-50

I. Askoxylakis, D. Kastanis, A. Traganitis: Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks. In proceedings of the 3rd International Conference on Communication, Network, and Information Security, MIT, Cambridge, USA, October 9-11, 2006: pp. 50-60

D. Kastanis, I. Askoxylakis, A. Traganitis: An efficient authentication scheme for contactless smart cards using elliptic curve cryptography. In proceedings of the 3rd International Conference on Communication, Network, and Information Security, MIT, Cambridge, USA, October 9-11, 2006: pp. 28-33

 

Technical reports

 

Hellenic National Cyber Security Strategy (In Greek: Εθνική Στρατηγική Κυβερνοασφάλειας), Hellenic Ministry of Administrative Reform and e-governance, December 2014 (under development)

Consumerization of IT: Risk Mitigation Strategies. European Network and Information Security Agency, ENISA Report, December 2012

FORTHcert guide to incident response. Foundation for Research and Technology-Hellas (FORTH), FORTHcert Technical Report, October 2012

EISAS – European Information Sharing and Alert System for citizens and SMEs. European Network and Information Security Agency, ENISA Report, October 2011

To log or not to log? Risks and benefits of emerging life-logging applications. European Network and Information Security Agency, ENISA Report, June 2011

Priorities for Research on Current and Emerging Network Technologies. European Network and Information Security Agency, ENISA PROCENT Report, March 2010