Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
S. Kokolakis, A. Tsohou, Communicating Information Security, chapter in: The Routledge Handbook of Privacy and Social Media, S. Trepte, P. Masur , (eds), pp. , 2023,
[2]
S. Kokolakis, Διακυβέρνηση και Διοίκηση Ασφάλειας Πληροφοριών, chapter in: Ασφάλεια Πληροφοριών και Συστημάτων στον Κυβερνοχώρο, Σ. Κάτσικας, Σ. Γκρίτζαλης, Κ. Λαμπρινουδάκης, (ed), pp. , 2021, Εκδόσεις Νέων Τεχνολογιών,
[3]
S. Kokolakis, Privacy Nudging, chapter in: Encyclopedia of Cryptography, Jajodia S., Samarati P., Yung M., (ed), pp. , 2021, Springer, https://doi.org/10.1007/978-3-642-2...
[4]
M. Anagnostopoulos, A. Douma, G. Kambourakis, Network Security, chapter in: Information and System Security in the Cyberspace, S. Katsikas, S. Gritzalis, C Lambrinoudakis, (eds), 2021, Athens, NewTech Pub (in Greek), https://newtech-pub.com/βιβλί...
[5]
M. Sideri, S. Gritzalis, V. Diamantopoulou, Data collection techniques used as mechanisms for citizens, chapter in: The Social Dimension of Sustainability, M. Kaila, (ed), 2020, Athens, Greece, Diadrasi Pubs (in Greek)
[6]
A. Praitano, L. Giovannetti, V. Diamantopoulou, M. Salnitri, An Introduction to Privacy, chapter in: Visual Privacy Management, M. Salnitri, J. Jürgens, H. Mouratidis, L. Mancini, P. Giorgini, (eds), pp. 1-21, 2020, Springer Cham, https://link.springer.com/book/10.1...
[7]
P. Drogkaris, I. Agrafiotis, Promoting trust through the EU cybersecurity certification framework, chapter in: 15 years of ENISA, U. Helmbrecht, (ed), (to_appear), 2019, ENISA
A. Bourka, P. Drogkaris, Security meets data protection: from risk management to systems engineering, chapter in: 15 years of ENISA: A Success story, U. Helmbrecht, (ed), pp. 125-135, 2019, Brussels, Publication Office of the European Union,
[9]
M. Sideri, V. Diamantopoulou, S. Gritzalis, Privacy preservation in modern e-Participation environments: The Crowdsourcing case, chapter in: The Digital Future, G. Doukidis, (ed), pp. 297-306, 2019, Athens, Greece, Sideri Pubs. (in Greek)
[10]
L. Mitrou, Health data in General Data Protection Regulation, chapter in: Protection of health data, Kaiafa-Gbadi et al, (eds), pp. 1-25, 2018, Athens-Thessaloniki,
[11]
Jougleux P., G. Leventakis, L. Mitrou, Community Policing in the Light of the New European Data Protection Legal Framework, chapter in: Synergy of Community Policing and Technology, SpringerBriefs in Criminology, Leventakis, M. R. Haberfeld, (eds), pp. 15-20, 2018, Springer,
[12]
Giannopoulos G., L. Mitrou, Tsolias G., Obligations of the Data Controller, chapter in: The General Data Protection Regulation (GDPR)- Analysis and Implementation, Kotsalis/ Menoudakos, (eds), pp. 167-222, 2018, Athens,
[13]
L. Mitrou, Τhe General Data Protection Regulation: A Law for the Digital Age?, chapter in: EU Internet Law, Regulation and Enforcement, T. Synodinou et al., (eds), pp. 19-58, 2017, Springer,
[14]
L. Mitrou, P. Drogkaris, G. Leventakis, Perceptions of videosurveillance in Greece, chapter in: Surveillance, Privacy and Security: Citizens’ Perspectives , New Security Studies, Michael Friedewald,J. Peter Burgess,Johann Cas,Rocco Bellanova,Walter Peissl, (eds), pp. 123-138, 2017, Routledge,
[15]
L. Mitrou, The right to Data Protection in Greek Constitution, chapter in: The Greek Constitution – Commentary, P. Spyropoulos and al., (eds), pp. 214-233, 2017,
[16]
R. Neisse, D. Geneiatakis, G. Steri, G. Kambourakis, I. N. Fovino, R. Satta, Dealing with user privacy in mobile apps: issues and mitigation, chapter in: Protecting Mobile Networks and Devices: Challenges and Solutions, Weizhi Meng, Xiapu Luo, Jianying Zhou, Steven Furnell, (eds), 2016, CRC Press - Taylor & Francis, https://www.crcpress.com/Protecting...
L. Mitrou, P. Drogkaris, G. Leventakis, Perceptions of videosurveillance in Greece: a “Greek paradox” beyond the trade-off of security and privacy ?, chapter in: Surveillance, Privacy and Security: Citizens’ Perspectives, M. Friedewald, J. P. Burgess, J. Cas, R. Bellanova, W. Peissl, (eds), pp. 123-138, 2016, Routledge, https://www.routledge.com/products/...
[18]
L. Mitrou, Data Protection in Workplace, chapter in: Data Protection- Analysis – Commentary-Implementation, Kotsalis, (ed), pp. 191-221, 2016, Athens,
[19]
M. Bertsima, I. Varlamis, P. Rizomiliotis, Strengthening Privacy in Healthcare Social Networks, chapter in: Medical Data Privacy Handbook, Aris Gkoulalas‐Divanis and Grigorios Loukides , (eds), pp. , 2015, Springer, http://www.springer.com/us/book/978...
[20]
E. Konstantinou, A. Kontogeorgis, Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves, chapter in: Computation, Cryptography, and Network Security, NJ Daras, MT Rassias, (eds), pp. 299-318, 2015, Springer International Publishing,
E. Loukis, Y. Charalabidis, V. Diamantopoulou, The Multidimensional Business Value of Information Systems Interoperability, chapter in: Revolutionizing Enterprise Interoperability through Scientific Foundations, Lampathaki Fenareti, Jardim-Goncalves Ricardo , (eds), 2014, IGI Global – Business Science Reference
[22]
L. Mitrou, DNA Databases and Crime Detection, chapter in: DNA Analysis in Judicial Procedures, Kaiafa-Gbadi et al., (eds), pp. 87-114, 2014, Athens- Thessaloniki,
[23]
L. Mitrou, Introduction (in Greek), chapter in: Facebook, blogs and Fundamental Rights, pp. 9-20, 2013, Athens ,
[24]
C. Kolias, V. Kolias, G. Kambourakis, E. Kayafas, A Client-Side Privacy Framework for Web Personalization, chapter in: Semantic Hyper/Multimedia Adaptation: Schemes and Applications, I. Anagnostopoulos, M. Bielikova, P. Mylonas, N. Tsapatsoulis, (eds), pp. 297-316, 2013, Springer Series on Studies in Computational Intelligence, Vol. 418, http://link.springer.com/chapter/10...
[25]
M. Karyda, S. Kokolakis, Ψηφιακά Κοινωνικά Δίκτυα: Ζητήματα ιδιωτικότητας και η τεχνολογική αντιμετώπισή τους , chapter in: Facebook, Blogs και δικαιώματα, Θ. Κ. Παπαχρίστου, Λ. Μήτρου, Τ. Βιδάλης, Θ. Ξηρός., (eds), pp. 117-, 2013, Εκδόσεις Σάκκουλα,
[26]
M. Anagnostopoulos, G. Kambourakis, E. Konstantinou, S. Gritzalis, DNSsec vs. DNScurve: A side-by-side comparison, chapter in: Situational Awareness in Computer Network Defense: Principles, Methods and Applications, Onwubiko C., Owens T., (eds), pp. 201-220, 2012, Hershey, USA, IGI Global, http://www.igi-global.com/chapter/d...
[27]
E. Konstantinou, P. Nastou, Y. Stamatiou, C. Zaroliagis, Securing Embedded Computing Systems through Elliptic Curve Cryptography, chapter in: Encyclopedia of Embedded Computing Systems, Mohamed Khalgui, Olfa Mosbahi, Antonio Valentini, (eds), (to_appear), pp. , 2012, IGI Global,
[28]
E. Konstantinou, S. K. Katsikas, Public Key Cryptography, chapter in: Contemporary Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. Katsikas, V. Chryssikopoulos, (eds), pp. , 2011, Papasotiriou Pubs. (in Greek),
[29]
J. Iliadis, Message Authentication Codes (Κώδικες Αυθεντικοποίησης Μηνύματος), chapter in: Contemporary Cryptography: Theory and Applications (Σύγχρονη Κρυπτογραφία: Θεωρία και Εφαρμογές), M. Burmester, S. Gritzalis, S. Katsikas, V. Chrissikopoulos, (eds), pp. 423-439, 2011, Papasotiriou Publications,
[30]
P. Belsis, C. Skourlas, S. Gritzalis, Secure electronic healthcare records distribution in wireless environments using low resource devices, chapter in: Pervasive Computing and Communications Design and Deployment: Technologies, Trends, and Applications, A. Malatras, (ed), pp. 247-262, 2011, Hershey, Pennsylvania, USA, IGI Global, https://dl.acm.org/citation.cfm?id=...
[31]
T. Balopoulos, S. Gritzalis, Identification and Authentication of Entities, chapter in: Moden Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. Katsikas, V. Chryssikopoulos, (eds), pp. 469-498, 2011, Athens, Greece, Papasotiriou Pubs. (in Greek),
[32]
P. Rizomiliotis, Practical cryptography, chapter in: Modern Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. K. Katsikas, V. Chryssikopoulos, (eds), pp. , 2011, Papasotiriou Pubs. (in Greek),
Y. Charalabidis, E. Loukis, V. Diamantopoulou, Υποστήριξη Διεργασιών Διαμόρφωσης Δημόσιων Πολιτικών με Χρήση Κοινωνικών Μέσων, chapter in: Συνεργατικό Δίκτυο και Κοινωνία, Ι. Αποστολάκης, (ed), 2011, Εκδόσεις Παπαζήση
[34]
N. Vrakas, G. Fotiadis, Key Management Techniques, chapter in: Modern Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. K. Katsikas, V. Chryssikopoulos, (eds), pp. , 2011, Papasotiriou Pubs. (in Greek),
[35]
L. Mitrou, The Impact of Communications Data Retention on Fundamental Rights and Democracy , chapter in: Surveillance & Democracy, Κ. Haggerty and M. Samatas, pp. 127-147, 2010, London, Routledge ,
[36]
G. Kambourakis, S. Gritzalis, Key Management in 802.16e, chapter in: WiMAX Security and Quality of Service: Providing an End-to-End Explanation, P. Mueller, S. Y. Tang, H. Sharif, (eds), pp. 63-86, 2010, New Jersey, USA, Wiley, http://onlinelibrary.wiley.com/doi/...
[37]
E. Rekleitis, P. Rizomiliotis, S. Gritzalis, Privacy Threats and countermeasures in RFID environments, chapter in: Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 193-220, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek),
[38]
T. Balopoulos, S. Gritzalis, Linkability and Selective Disclosure in Privacy-preserving Cryptographic Protocols, chapter in: Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 267-282, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek),
[39]
G. Kambourakis, C. Lambrinoudakis, S. K. Katsikas, Intrusion Detection Systems for Wireless Networks: A Survey, chapter in: Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, C. Skianis, (eds), pp. 161-181, 2009, Troubador Publishing, http://bookshop.blackwell.co.uk/jsp...
[40]
G. Kambourakis, E. Konstantinou, Threats and Privacy-preserving mechanisms in Mobile and Wireless Communication Networks, chapter in: Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S.K. Katsikas, (eds), 2009, Athens, Greece, Papasotiriou Pubs. (in Greek), http://www.papasotiriou.gr/product/...
[41]
I. Chatzigiannakis, E. Konstantinou, Key Establishment Protocols for Wireless Sensor Networks, chapter in: Security in RFID and Sensor Networks, Y. Zhang and P. Kitsos, (eds), pp. , 2009, Taylor and Francis Group,
[42]
L. Mitrou, M. Karyda, Bridging the gap between employee’s surveillance and privacy protection , chapter in: Social and Human Elements of Information Security: Emerging Trends and Countermeasures, Gupta M. and R. Sharman(ed.), pp. 283-300, 2009, Hershey-New York , Information Science Reference (IGI Gl,
[43]
S. Kokolakis, P. Rizomiliotis, A. Benameur, S.-K. Sinha, Security and Dependability Solutions for Web Services and Workflows, chapter in: Security and Dependability for Ambient Intelligence, G. Spanoudakis, A. Mana, S. Kokolakis, (eds), pp. 97-106, 2009, Springer,
[44]
D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, SIP Security: Threats, Vulnerabilities and Countermeasures, chapter in: SIP Handbook: Services, Technologies, and Security, Ahson and M. Ilyas, (eds), pp. 435-455, 2008, CRC Press, http://www.crcpress.com/product/isb...
[45]
G. Kambourakis, On Mobile Wiki Systems Security, chapter in: Securing Information and Communication Systems: Principles, Technologies and Applications, J. Lopez, S. Katsikas, A. Patel, S. Furnell, (eds), pp. 323-334, 2008, Boston, USA, Artech House, http://www.artechhouse.com/Internat...
[46]
L. Mitrou, Data retention: a Pandora Box for Rights and Liberties?, chapter in: Digital Privacy: Theory, Technologies and Practices, A. Acquisti,S. De Capitani di Vimercati,S. Gritzalis,C. Lambrinoudakis, (eds), pp. 410-433, 2008, Auerbach Publications,
[47]
M. Karyda, S. Kokolakis, Privacy Perceptions Among Members of Online Communities, chapter in: Digital Privacy: Theory, Technologies and Practices, A. Acquisti, S. De Capitani di Vimercati, S. Gritzalis, C. Lambrinoudakis , (eds), pp. , 2008, Auerbach Publications (Taylor and Francis Group),
[48]
M. Karyda, The Socioeconomic Background of Electronic Crime, chapter in: Socioeconomic and Legal Implications of Electronic Intrusion, D. Politis, P. Kozyris and I. Iglezakis, (eds), pp. , 2008, IGI Global pub,
[49]
G. Marias, L. Mitrou, M. Theoharidou, I. Soupionis, S. Ehlert, D. Gritzalis, SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues, chapter in: SIP Handbook: Services, Technologies and Security of Session Initiation Protocol, Syed Ahson and Mohammad Ilyas (Εds.), pp. 457-480, 2008, CRC Press,
[50]
G. Kambourakis, A. Rouskas, S. Gritzalis, Evaluating Security Mechanisms in different protocol layers for Bluetooth Connections, chapter in: Handbook of Research in Wireless Security, Y. Zhang, J. Zheng, Ma M., (eds), pp. 666-680, 2008, Herdshey, Pennsylvania, USA, Idea Group Reference, http://www.igi-global.com/chapter/e...
[51]
S. Gritzalis, L. Mitrou, Content Filtering Technologies and the Law, chapter in: Securing Information and Communication Systems: Principles, Technologies and Applications, J. Lopez, S. K. Katsikas, S. Furnell, A. Patel, (eds), pp. 243-265, 2008, Boston, USA, Artech House, https://books.google.gr/books?id=VA...
[52]
L. Mitrou, The right to participate to Information Society, chapter in: The right to participate to Information Society, G. Papadimitriou, (ed), pp. 35-56, 2006, Athens-Thessaloniki,
[53]
P. Belsis, K. Fragos, S. Gritzalis, C. Skourlas, Information filtering and effective resources taxonomy, chapter in: Parallel, Content based, Cross Language Information Retrieval, C. Skourlas, (ed), pp. 159-170, 2006, Athens, Greece, New Technologies Publishers (in Greek)
[54]
L. Mitrou, Regulation in Cyberspace?, chapter in: Self-regulation, G. Papadimitriou, (ed), pp. 75-97, 2005, Athens-Thessaloniki,
[55]
J. Iliadis, Malicious Software (Κακόβουλο Λογισμικό), chapter in: Information Systems Security (Ασφάλεια Πληροφοριακών Συστημάτων), Katsikas S., Gritzalis D., Gritzalis S., (eds), pp. 235-265, 2004, New Technology Publications,
[56]
L. Mitrou, Personal Data Protection, chapter in: Information and Data Security, S. Katsikas, D.Gritzalis, S. Gritzalis, (eds), pp. 443-525, 2004, Athens-Greece, Ekdoseis Neon Technologion,
[57]
C. Lambrinoudakis, D. Gritzalis, V. Tsoumas, M. Karyda, S. Ikonomopoulos, Secure Electronic Voting: The Current Landscape, chapter in: Secure Electronic Voting, D. Gritzalis, (ed), pp. 101-122, 2003, Kluwer Academic Publishers,
[58]
L. Mitrou, D. Gritzalis, S. K. Katsikas, G. Quirchmayr, Electronic voting: Constitutional and legal requirements and their technical implications , chapter in: Secure Electronic Voting, D. A. Gritzalis , (ed), pp. 43-60, 2003, Boston, Dordrecht, London, Kluwer Academic Publishers,
[59]
S. K. Katsikas, S. Kokolakis, High-level Security Policies for Health Care Establishments,, chapter in: Health Informatics, B. Blobel, (ed), pp. 98-104, 2003, Amsterdam, The Netherlands, IOS Press,
[60]
M. Karyda, Πολιτικές Ασφάλειας Πληροφοριακών Συστημάτων, chapter in: Ασφάλεια Πληροφοριακών Συστημάτων, Κάτσικας Σ., Γκρίτζαλης Δ., Γκρίτζαλης Σ., (eds), pp. 377-406, 2003, Αθήνα, Εκδόσεις Νέων Τεχνολογιών,
[61]
L. Mitrou, Worker's Personal Data Protection, chapter in: The Data Protection Authority and Its Decisions , G. Papadimitriou, (ed), pp. 21-44, 2002, Thessaloniki-Greece, Ekdoseis Sakkoula,
[62]
L. Mitrou, Data Protection in Greece, chapter in: The Global Data Protection Regulation, Holvast, Madsen, Roth, (eds), pp. 8, 2000, The Hague, London, Boston, Kluwer Law International,
[63]
L. Mitrou, Access to Archives and Data, chapter in: Archives and Confidentiality, Z. Synodinos, (ed), pp. 23-50, 1998, Thessaloniki-Greece, Greek Archives Society,
[64]
L. Mitrou, The Data Protection Insitutional Control, chapter in: Data Security, Alexandris, Kiountouzis, Trapezanoglou, (eds), pp. 341-367, 1995, Athens, Greece, EPY,