default search action
Konstantinos Rantos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Dimitrios Chatziamanetoglou, Konstantinos Rantos:
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review. Comput. 13(3): 60 (2024) - [j17]Pavlos Cheimonidis, Konstantinos Rantos:
Dynamic vulnerability severity calculator for industrial control systems. Int. J. Inf. Sec. 23(4): 2655-2676 (2024) - [i2]Pavlos Cheimonidis, Konstantinos Rantos:
Dynamic Vulnerability Criticality Calculator for Industrial Control Systems. CoRR abs/2404.16854 (2024) - 2023
- [j16]Pavlos Cheimonidis, Konstantinos Rantos:
Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review. Future Internet 15(10): 324 (2023) - [j15]Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos:
An autoML network traffic analyzer for cyber threat detection. Int. J. Inf. Sec. 22(5): 1511-1530 (2023) - [j14]Konstantinos Demertzis, Konstantinos Rantos, Lykourgos Magafas, Charalabos Skianis, Lazaros Iliadis:
A Secure and Privacy-Preserving Blockchain-Based XAI-Justice System. Inf. 14(9): 477 (2023) - [j13]Ioanna Anastasaki, George Drosatos, George Pavlidis, Konstantinos Rantos:
User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review. Inf. 14(10): 538 (2023) - [i1]Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos:
A Cyber Threat Intelligence Management Platform for Industrial Environments. CoRR abs/2301.03445 (2023) - 2022
- [j12]Stefanos Tsimenidis, Thomas Lagkas, Konstantinos Rantos:
Deep Learning in IoT Intrusion Detection. J. Netw. Syst. Manag. 30(1): 8 (2022) - [c24]Charalampos Bampalas, Konstantinos Rantos:
Blockchain-based vaccination certificates management. PCI 2022: 309-316 - 2021
- [j11]Ioannis Lykidis, George Drosatos, Konstantinos Rantos:
The Use of Blockchain Technology in e-Government Services. Comput. 10(12): 168 (2021) - [c23]Dimitrios Chatziamanetoglou, Konstantinos Rantos:
CTI Blockchain-Based Sharing using Proof-of-Quality Consensus Algorithm. CSR 2021: 331-336 - 2020
- [j10]Konstantinos Demertzis, Konstantinos Rantos, George Drosatos:
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processing in the IoT Ecosystem. Big Data Cogn. Comput. 4(2): 9 (2020) - [j9]Panagiotis G. Sarigiannidis, Thomas Lagkas, Konstantinos Rantos, Paolo Bellavista:
The Big Data era in IoT-enabled smart farming: Re-defining systems, tools, and techniques. Comput. Networks 168 (2020) - [j8]Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis, Vasilios Katos:
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Comput. 9(1): 18 (2020) - [j7]Anna Triantafyllou, Jose Antonio Perez Jimenez, Alejandro Del Real Torres, Thomas Lagkas, Konstantinos Rantos, Panagiotis G. Sarigiannidis:
The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid. IEEE Open J. Commun. Soc. 1: 1934-1960 (2020) - [c22]George Drosatos, Konstantinos Rantos, Dimitris Karampatzakis, Thomas Lagkas, Panagiotis G. Sarigiannidis:
Privacy-preserving solutions in the Industrial Internet of Things. DCOSS 2020: 219-226 - [c21]Arnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou, Christos Ilioudis:
An Innovative Self-Healing Approach with STIX Data Utilisation. ICETE (2) 2020: 645-651 - [c20]Nikolaos Zapoglou, Ioannis Patsakos, George Drosatos, Konstantinos Rantos:
Privacy-Preserving Blockchain-Based Solutions in the Internet of Things. SmartCity360° 2020: 386-405
2010 – 2019
- 2019
- [j6]Konstantinos G. Tsiknas, Konstantinos Rantos, Christos J. Schinas, Andrew Soilemes:
Performance evaluation of TCP-BIAD in high-speed, long-distance networks. Computing 101(4): 319-337 (2019) - [j5]Konstantinos Rantos, George Drosatos, Antonios Kritsas, Christos Ilioudis, Alexandros Papanikolaou, Adam P. Filippidis:
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem. Secur. Commun. Networks 2019: 1431578:1-1431578:15 (2019) - [c19]Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr:
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. ARES 2019: 83:1-83:10 - [c18]Anastasia Papastylianou, Antonios Stasis, Konstantinos Rantos, Victoria Kalogirou:
Blended Learning and Open Courseware for Promoting Interoperability in Public Services. e-Democracy 2019: 79-93 - 2018
- [j4]Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas, Ioannis G. Askoxylakis:
Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources. IEEE Syst. J. 12(1): 92-102 (2018) - [c17]Konstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou:
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem. ICETE (2) 2018: 738-743 - [c16]Konstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou, Antonios Kritsas:
ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology. SecITC 2018: 300-313 - 2015
- [c15]Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes:
Enhancing EMV Online PIN Verification. TrustCom/BigDataSE/ISPA (1) 2015: 808-817 - [c14]Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou:
WSACd - A Usable Access Control Framework for Smart Home Devices. WISTP 2015: 120-133 - [c13]Konstantinos Rantos, Konstantinos Fysarakis, Othonas Sultatos, Ioannis G. Askoxylakis:
Secure and Authenticated Access to LLN Resources Through Policy Constraints. WISTP 2015: 271-280 - 2014
- [c12]Konstantinos Fysarakis, Ioannis Papaefstathiou, Charalampos Manifavas, Konstantinos Rantos, Othonas Sultatos:
Policy-based access control for DPWS-enabled ubiquitous devices. ETFA 2014: 1-8 - [c11]Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, George Hatzivasilis:
DSAPE - Dynamic Security Awareness Program Evaluation. HCI (24) 2014: 258-269 - [c10]Konstantinos Fysarakis, George Hatzivasilis, Konstantinos Rantos, Alexandros Papanikolaou, Charalampos Manifavas:
Embedded Systems Security Challenges. PECCS 2014: 255-266 - [c9]Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou:
Policy-Based Access Control for Body Sensor Networks. WISTP 2014: 150-159 - [p1]Konstantinos Rantos, Konstantinos Markantonakis:
Analysis of Potential Vulnerabilities in Payment Terminals. Secure Smart Embedded Devices, Platforms and Applications 2014: 311-333 - 2013
- [c8]Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos:
Lightweight Cryptography for Embedded Systems - A Comparative Analysis. DPM/SETOP 2013: 333-349 - [c7]Konstantinos Rantos, Alexandros Papanikolaou, Charalampos Manifavas:
IPsec over IEEE 802.15.4 for low power and lossy networks. MOBIWAC 2013: 59-64 - [c6]Konstantinos Rantos, Alexandros Papanikolaou, Charalampos Manifavas, Ioannis Papaefstathiou:
IPv6 security for low power and lossy networks. Wireless Days 2013: 1-8 - 2012
- [j3]Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas:
How Effective Is Your Security Awareness Program? An Evaluation Methodology. Inf. Secur. J. A Glob. Perspect. 21(6): 328-345 (2012) - [c5]Konstantinos Rantos, Alexandros Papanikolaou, Konstantinos Fysarakis, Charalampos Manifavas:
Secure policy-based management solutions in heterogeneous embedded systems networks. TEMU 2012: 227-232 - 2011
- [c4]Konstantinos Rantos:
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions? Communications and Multimedia Security 2011: 155-162 - [c3]Andreas E. Papadakis, Konstantinos Rantos, Antonis Stasis:
Promoting e-Gov Services: e-Document Interoperability across EU. Panhellenic Conference on Informatics 2011: 304-308
2000 – 2009
- 2005
- [j2]Konstantinos Rantos, Chris J. Mitchell:
Matching key recovery mechanisms to business requirements. Comput. Secur. 24(3): 232-245 (2005) - 2004
- [c2]Konstantinos Rantos, Constantinos Markantonakis:
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. SEC 2004: 351-366 - 2001
- [c1]Konstantinos Rantos, Chris J. Mitchell:
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. IMACC 2001: 268-276
1990 – 1999
- 1999
- [j1]Chris J. Mitchell, Konstantinos Rantos:
A fair certification protocol. Comput. Commun. Rev. 29(3): 47-49 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-31 21:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint