Evangelos Rekleitis
Evangelos Rekleitis
The European Cybersecurity Agency
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
P Rizomiliotis, E Rekleitis, S Gritzalis
IEEE Communications Letters 13 (4), 274-276, 2009
622009
ENISA Threat Landscape 2015
L Marinos, A Belmonte, E Rekleitis
https://www.enisa.europa.eu/publications/etl2015, 18, 2016
29*2016
How to protect security and privacy in the IoT: a policy‐based RFID tag management protocol
E Rekleitis, P Rizomiliotis, S Gritzalis
Security and Communication Networks 7 (12), 2669-2683, 2014
192014
Threat Landscape and Good Practice Guide for Software Defined Networks/5G
A Belmonte Martin, L Marinos, E Rekleitis, G Spanoudakis, N Petroulakis
https://www.enisa.europa.eu/activities/risk-management/evolving-threat …, 2016
122016
A holistic approach to RFID security and privacy
E Rekleitis, P Rizomiliotis, S Gritzalis
Proc. 1st Int’l Workshop Security of the Internet of Things, 2010
82010
ENISA Threat Landscape Report 2013
L Marinos, M Lourenço
European Union Agency for Network and Information Security, 2014
72014
Information security and privacy standards for SMEs
CG Manso, E Rekleitis, F Papazafeiropoulos, V Maritsas
https://www.enisa.europa.eu/publications/standardisation-for-smes, 2016
62016
Big Data Threat Landscape and Good Practice Guide
E Damiani, CA Ardagna, F Zavatarelli, E Rekleitis, L Marinos
https://www.enisa.europa.eu/activities/risk-management/evolving-threat …, 2016
42016
An agent based back-end RFID tag management system
E Rekleitis, P Rizomiliotis, S Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2010
42010
Designing secure RFID authentication protocols is (still) a non-trivial task
P Rizomiliotis, E Rekleitis, S Gritzalis
2011 5th International Conference on Network and System Security, 73-80, 2011
2011
RFID: Απειλές κατά της Ιδιωτικότητας και Μέτρα Προστασίας
Ε Ρεκλείτης, Π Ριζομυλιώτης, Σ Γκρίτζαλης
Προστασία της ιδιωτικότητας και τεχνολογίες πληροφορικής και επικοινωνιών …, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–11