default search action
Vasiliki Liagkou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Vasiliki Liagkou, George Fragiadakis, Evangelia Filiopoulou, Christos Michalakelis, Anargyros Tsadimas, Mara Nikolaidou:
Assessing the Complexity of Cloud Pricing Policies: A Comparative Market Analysis. J. Grid Comput. 22(3): 65 (2024) - [j10]Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripidis Glavas:
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks. Sensors 24(5): 1676 (2024) - [c25]Sofia Sakka, Vasiliki Liagkou, Chrysostomos D. Stylios:
A Blockchain Identity Privacy Management Framework for a Healthcare Application. Blockchain 2024: 599-604 - [c24]Sofia Sakka, Vasiliki Liagkou, Chrysostomos D. Stylios, Afonso Ferreira:
On the Privacy and Security for E-Education Metaverse. EDUCON 2024: 1-10 - [c23]Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Existence of Consensus Converging Organized Groups in Large Social Networks. SIROCCO 2024: 507-512 - 2023
- [j9]George Fragiadakis, Vasiliki Liagkou, Evangelia Filiopoulou, Dimitris Fragkakis, Christos Michalakelis, Mara Nikolaidou:
Cloud services cost comparison: a clustering analysis framework. Computing 105(10): 2061-2088 (2023) - [j8]Sofia Sakka, Vasiliki Liagkou, Chrysostomos D. Stylios:
Exploiting Security Issues in Human Activity Recognition Systems (HARSs). Inf. 14(6): 315 (2023) - [j7]Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou, Euripidis Glavas:
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape. J. Cybersecur. Priv. 3(3): 610-637 (2023) - [c22]Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents. CSCML 2023: 501-510 - [c21]Nikolaos D. Kallimanis, Eleni Kanellou, Charidimos Kiosterakis, Vasiliki Liagkou:
Exploring Trade-Offs in Partial Snapshot Implementations. SSS 2023: 90-105 - [i3]Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the existence of highly organized communities in networks of locally interacting agents. CoRR abs/2304.04480 (2023) - 2022
- [j6]Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem. Cryptogr. 6(3): 42 (2022) - [j5]Vasiliki Liagkou, George Fragiadakis, Evangelia Filiopoulou, Vagia Kyriakidou, Christos Michalakelis, Mara Nikolaidou:
Comparing the Cost of IaaS and CaaS Services. Int. J. Technol. Diffusion 13(1): 1-11 (2022) - [j4]Vasiliki Liagkou, George Fragiadakis, Evangelia Filiopoulou, Christos Michalakelis, Thomas Kamalakis, Mara Nikolaidou:
A pricing model for Container-as-a-Service, based on hedonic indices. Simul. Model. Pract. Theory 115: 102441 (2022) - [c20]Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Undecidability of the Panopticon Detection Problem. CSCML 2022: 78-87 - [c19]Jesús García Rodríguez, David Goodman, Stephan Krenn, Vasia Liagkou, Rafael Torres Moreno:
From Research to Privacy-Preserving Industry Applications - Workshop Summary. Privacy and Identity Management 2022: 21-33 - [c18]Vasiliki Liagkou, Sofia Sakka, Chrysostomos D. Stylios:
Security and Privacy Vulnerabilities in Human Activity Recognition systems. SEEDA-CECNSM 2022: 1-6 - 2021
- [c17]Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis. CSCML 2021: 230-243 - [c16]Jorge Bernal Bernabé, Jesús García Rodríguez, Stephan Krenn, Vasia Liagkou, Antonio F. Skarmeta, Rafael Torres:
Privacy-Preserving Identity Management and Applications to Academic Degree Verification. Privacy and Identity Management 2021: 33-46 - [i2]Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the undecidability of the Panopticon detection problem. CoRR abs/2107.05220 (2021)
2010 – 2019
- 2019
- [j3]Vasiliki Liagkou, Chrysostomos D. Stylios, Aleksandr A. Petunin:
Handling Privacy and Concurrency in an Online Educational Evaluation System. Balt. J. Mod. Comput. 7(1) (2019) - [j2]Vasiliki Liagkou, Vasileios Kavvadas, Spyridon K. Chronopoulos, Dionysios Tafiadis, Vasilis Christofilakis, Kostas P. Peppas:
Attack Detection for Healthcare Monitoring Systems Using Mechanical Learning in Virtual Private Networks over Optical Transport Layer Architecture. Comput. 7(2): 24 (2019) - [c15]Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou:
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement). CSCML 2019: 324-327 - [c14]Vasiliki Liagkou, Chrysostomos D. Stylios:
VR Training for Security Awareness in Industrial IoT. PRO-VE 2019: 604-612 - 2018
- [c13]Ioannis Chatzigiannakis, Vasiliki Liagkou, Paul G. Spirakis:
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks. CSCML 2018: 101-104 - [c12]Vasiliki Liagkou, Chrysostomos D. Stylios:
A Trustworthy and Privacy Preserving Model for Online Competence Evaluation System. DepCoS-RELCOMEX 2018: 338-347 - 2015
- [p1]Yannis C. Stamatiou, Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Welderufael Tesfay:
Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust. Attribute-based Credentials for Trust 2015: 197-239 - 2014
- [c11]Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis C. Stamatiou:
User Acceptance of Privacy-ABCs: An Exploratory Study. HCI (24) 2014: 375-386 - 2013
- [j1]Vasiliki Liagkou:
A trustworthy architecture for managing cultural content. Math. Comput. Model. 57(11-12): 2625-2634 (2013) - 2012
- [c10]Vasiliki Liagkou, George Metakides, Apostolos Pyrgelis, Christoforos L. Raptopoulos, Paul G. Spirakis, Yannis C. Stamatiou:
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials. APF 2012: 140-156 - 2011
- [c9]Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution. ICGS3/e-Democracy 2011: 72-79
2000 – 2009
- 2009
- [c8]Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou:
Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? e-Democracy 2009: 199-208 - 2008
- [b1]Vasiliki Liagkou:
Ασφαλή και έμπιστα πρωτόκολλα επικοινωνιών με χρήση κρυπτογραφίας και κρυπτανάλυσης. University of Patras, Greece, 2008 - [c7]Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salouros, Paul G. Spirakis:
A Security Model for Internet-Based Digital Asset Management Systems. ECSA 2008: 326-329 - [i1]Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
A probabilistic key agreement scheme for sensor networks without key predistribution. CoRR abs/0806.1812 (2008) - 2007
- [c6]Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
Trust in global computing systems as a limit property emerging from short range random interactions. ARES 2007: 741-748 - [c5]Ioannis Chatzigiannakis, Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis:
Agent-based Distributed Group Key Establishment in Wireless Sensor Networks. WOWMOM 2007: 1-6 - 2006
- [c4]Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
The Threshold Behaviour of the Fixed Radius Random Graph Model and Applications to the Key Management Problem of Sensor Networks. ALGOSENSORS 2006: 130-139 - [c3]Ioannis Chatzigiannakis, Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis:
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks. WCAN@ICALP 2006: 17-31 - 2005
- [c2]Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung:
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. ISC 2005: 44-58 - 2004
- [c1]Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung:
Electronic National Lotteries. Financial Cryptography 2004: 147-163
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint