Ioannis Krontiris
Cited by
Cited by
Intrusion detection of sinkhole attacks in wireless sensor networks
I Krontiris, T Dimitriou, T Giannetsos, M Mpasoukos
International symposium on algorithms and experiments for sensor systems …, 2007
Towards intrusion detection in wireless sensor networks
K Ioannis, T Dimitriou, FC Freiling
Proc. of the 13th European Wireless Conference, 1-10, 2007
Towards intrusion detection in wireless sensor networks
I Krontiris, T Dimitriou, FC Freiling
Proceedings of the 13th European Wireless Conference, 1-4, 2007
Launching a sinkhole attack in wireless sensor networks; the intruder side
I Krontiris, T Giannetsos, T Dimitriou
2008 IEEE International Conference on Wireless and Mobile Computing …, 2008
Cooperative intrusion detection in wireless sensor networks
I Krontiris, Z Benenson, T Giannetsos, FC Freiling, T Dimitriou
European Conference on Wireless Sensor Networks, 263-278, 2009
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
I Krontiris, T Giannetsos, T Dimitriou
Proceedings of the 4th international conference on Security and privacy in …, 2008
Security issues in biomedical wireless sensor networks
T Dimitriou, K Ioannis
2008 First International Symposium on Applied Sciences on Biomedical and …, 2008
Location privacy in urban sensing networks: research challenges and directions [security and privacy in emerging wireless networks]
I Krontiris, FC Freiling, T Dimitriou
IEEE Wireless Communications 17 (5), 30-35, 2010
Monetary incentives in participatory sensing using multi-attributive auctions
I Krontiris, A Albers
International Journal of Parallel, Emergent and Distributed Systems 27 (4 …, 2012
A localized, distributed protocol for secure information exchange in sensor networks
T Dimitriou, I Krontiris
19th IEEE International Parallel and Distributed Processing Symposium, 8 pp., 2005
Trust and privacy in mobile experience sharing: future challenges and avenues for research
I Krontiris, M Langheinrich, K Shilton
IEEE Communications Magazine 52 (8), 50-55, 2014
D2. 1 Architecture for Attribute-based Credential Technologies
J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ...
Deliverable, ABC4Trust EU Project, 2011
Attribute-based credentials for trust (abc4trust)
A Sabouri, I Krontiris, K Rannenberg
International Conference on Trust, Privacy and Security in Digital Business …, 2012
PEPPeR: A querier’s privacy enhancing protocol for participatory sensing
T Dimitriou, I Krontiris, A Sabouri
international Conference on Security and Privacy in Mobile Information and …, 2012
User Acceptance Factors for Anonymous Credentials: An Empirical Investigation.
Z Benenson, A Girard, I Krontiris
WEIS, 2015
Privacy-respecting discovery of data providers in crowd-sensing applications
I Krontiris, T Dimitriou
2013 IEEE International Conference on Distributed Computing in Sensor …, 2013
Privacy-by-design based on quantitative threat modeling
J Luna, N Suri, I Krontiris
2012 7th International Conference on Risks and Security of Internet and …, 2012
Arbitrary code injection through self-propagating worms in von neumann architecture devices
T Giannetsos, T Dimitriou, I Krontiris, NR Prasad
The Computer Journal 53 (10), 1576-1593, 2010
A platform for privacy protection of data requesters and data providers in mobile sensing
I Krontiris, T Dimitriou
Computer Communications 65, 43-54, 2015
Authenticated in-network programming for wireless sensor networks
I Krontiris, T Dimitriou
International Conference on Ad-Hoc Networks and Wireless, 390-403, 2006
The system can't perform the operation now. Try again later.
Articles 1–20