default search action
Sotirios Terzis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Getting users to click: a content analysis of phishers' tactics and techniques in mobile instant messaging phishing. Inf. Comput. Secur. 32(4): 420-435 (2024) - [c29]Phongsathon Fongta, Sotirios Terzis:
A Trust Management Delegation Protocol for Fog Computing Applications. CSR 2024: 1-6 - 2023
- [c28]Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing. HAISA 2023: 324-336 - [c27]Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures. HCI (35) 2023: 381-398 - 2022
- [c26]Aydin Abadi, Changyu Dong, Steven J. Murdoch, Sotirios Terzis:
Multi-party Updatable Delegated Private Set Intersection. Financial Cryptography 2022: 100-119 - [c25]Rufai Ahmad, Sotirios Terzis:
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links. HAISA 2022: 197-206 - 2020
- [i2]Aydin Abadi, Sotirios Terzis, Changyu Dong:
Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection. IACR Cryptol. ePrint Arch. 2020: 407 (2020)
2010 – 2019
- 2019
- [j5]Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. IEEE Trans. Dependable Secur. Comput. 16(4): 608-624 (2019) - 2018
- [i1]Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. IACR Cryptol. ePrint Arch. 2018: 496 (2018) - 2016
- [c24]Aydin Abadi, Sotirios Terzis, Changyu Dong:
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets. Financial Cryptography 2016: 149-168 - 2015
- [c23]Aydin Abadi, Sotirios Terzis, Changyu Dong:
O-PSI: Delegated Private Set Intersection on Outsourced Datasets. SEC 2015: 3-17 - 2012
- [c22]Graham Thomson, Sotirios Terzis:
A Middleware for Pervasive Situation-Awareness. DAIS 2012: 148-161 - [c21]Mark Vella, Sotirios Terzis, Marc Roper:
Distress Detection (Poster Abstract). RAID 2012: 384-385 - 2011
- [e9]Sotirios Terzis:
Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2011), Lisbon, Portugal, December 12 - 16, 2011. ACM 2011, ISBN 978-1-4503-1065-9 [contents] - 2010
- [c20]Mark Vella, Marc Roper, Sotirios Terzis:
Danger Theory and Intrusion Detection: Possibilities and Limitations of the Analogy. ICARIS 2010: 276-289 - [c19]Ann Nosseir, Sotirios Terzis:
A Study in Authentication Via Electronic Personal History Questions. ICEIS (5) 2010: 63-70 - [c18]Ann Nosseir, Sotirios Terzis:
Towards Authentication via Selected Extraction from Electronic Personal Histories. ICEIS 2010: 571-586 - [e8]Luís Veiga, Sotirios Terzis:
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), November 29, 2010, Bangalore, India. ACM 2010, ISBN 978-1-4503-0451-1 [contents]
2000 – 2009
- 2009
- [e7]Luís Veiga, Didier Donsez, Oriana Riva, Sotirios Terzis:
Proceedings of the 1st International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2009), November 30, 2009, Urbana Champaign, Illinois, USA. ACM 2009, ISBN 978-1-60558-849-0 [contents] - 2008
- [e6]René Meier, Sotirios Terzis:
Distributed Applications and Interoperable Systems, 8th IFIP WG 6.1 International Conference, DAIS 2008, Oslo, Norway, June 4-6, 2008. Proceedings. Lecture Notes in Computer Science 5053, 2008, ISBN 978-3-540-68639-2 [contents] - [e5]Sotirios Terzis:
Proceedings of the 6th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2008), held at the ACM/IFIP/USENIX 9th International Middleware Conference, December 1-5, 2008, Leuven, Belgium. ACM 2008, ISBN 978-1-60558-364-8 [contents] - 2007
- [e4]Sotirios Terzis, Steve Neely, Nitya Narasimhan:
Proceedings of the 5th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2007), held at the ACM/IFIP/USENIX 8th International Middleware Conference, November 26 - November 30, 2007, Newport Beach, California, USA. ACM International Conference Proceeding Series, ACM 2007, ISBN 978-1-59593-930-2 [contents] - 2006
- [j4]Sotirios Terzis, Paddy Nixon, Nitya Narasimhan, Tim Walsh:
Middleware for pervasive and ad hoc computing. Pers. Ubiquitous Comput. 10(1): 4-6 (2006) - [j3]Colin English, Sotirios Terzis, Paddy Nixon:
Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Pers. Ubiquitous Comput. 10(1): 50-54 (2006) - [c17]Graham Thomson, Sotirios Terzis, Paddy Nixon:
A model and architecture for situation determination. CASCON 2006: 380 - [c16]Colin English, Sotirios Terzis:
Gathering Experience in Trust-Based Interactions. iTrust 2006: 62-76 - [c15]Ann Nosseir, Richard Connor, Crawford Revie, Sotirios Terzis:
Question-based authentication using context data. NordiCHI 2006: 429-432 - [c14]Graham Thomson, Sotirios Terzis, Paddy Nixon:
Situation Determination with Reusable Situation Specifications. PerCom Workshops 2006: 620-623 - [e3]Sotirios Terzis:
Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2006), held at the ACM/IFIP/USENIX 7th International Middleware Conference, November 27 - December 1, 2006, Melbourne, Australia. ACM International Conference Proceeding Series 182, ACM 2006, ISBN 1-59593-421-9 [contents] - 2005
- [b1]Sotirios Terzis:
Foundations for semantically enhanced component trading : a component type model. Trinity College Dublin, Ireland, 2005 - [e2]Sotirios Terzis, Didier Donsez:
Proceedings of the 3rd International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2005), held at the ACM/IFIP/USENIX 6th International Middleware Conference, November 28 - December 2, 2005, Grenoble, France. ACM International Conference Proceeding Series 115, ACM 2005, ISBN 1-59593-268-2 [contents] - 2004
- [c13]Sotirios Terzis, Waleed Wagealla, Colin English, Paddy Nixon:
Trust Lifecycle Management in a Global Computing Environment. Global Computing 2004: 291-313 - [c12]Colin English, Sotirios Terzis, Waleed Wagealla:
Engineering Trust Based Collaborations in a Global Computing Environment. iTrust 2004: 120-134 - 2003
- [j2]Vinny Cahill, Elizabeth Gray, Jean-Marc Seigneur, Christian Damsgaard Jensen, Yong Chen, Brian Shand, Nathan Dimmock, Andrew Twigg, Jean Bacon, Colin English, Waleed Wagealla, Sotirios Terzis, Paddy Nixon, Giovanna Di Marzo Serugendo, Ciarán Bryce, Marco Carbone, Karl Krukow, Mogens Nielsen:
Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Comput. 2(3): 52-61 (2003) - [c11]Paddy Nixon, Feng Wang, Sotirios Terzis:
Programming structures for adaptive ambient systems. ISICT 2003: 193-198 - [c10]Colin English, Waleed Wagealla, Paddy Nixon, Sotirios Terzis, Helen Lowe, Andrew D. McGettrick:
Trusting Collaboration in Global Computing Systems. iTrust 2003: 136-149 - [c9]Richard Glassey, Graeme Stevenson, Matthew Richmond, Paddy Nixon, Sotirios Terzis, Feng Wang, R. Ian Ferguson:
Towards a Middleware for Generalised Context Management. Middleware Workshops 2003: 45-52 - [c8]Colin English, Sotirios Terzis, Waleed Wagealla, Helen Lowe, Paddy Nixon, Andrew D. McGettrick:
Trust Dynamics for Collaborative Global Computing. WETICE 2003: 283- - [e1]Paddy Nixon, Sotirios Terzis:
Trust Management, First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28-30, 2002, Proceedings. Lecture Notes in Computer Science 2692, Springer 2003, ISBN 3-540-40224-1 [contents] - 2000
- [j1]Sarantos Kapidakis, Sotirios Terzis, Jakka Sairamesh:
A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries. Int. J. Digit. Libr. 3(1): 19-35 (2000) - [c7]Paddy Nixon, Vincent P. Wade, Sotirios Terzis, Marcus O'Connell, Simon A. Dobson:
The Virtues Architecture: A Software Infrastructure for Business-to-Business E-Commerce. ICEIS 2000: 461-466 - [c6]Sotirios Terzis, Paddy Nixon:
Component Location and the Role of Trading in Large Scale Distributed Systems. PDSE 2000: 173-179
1990 – 1999
- 1999
- [c5]Sotirios Terzis, Paddy Nixon:
Semantic Trading: Tackling Interoperability Problems During System Integration. ECOOP Workshops 1999: 9 - [c4]Sotirios Terzis, Paddy Nixon:
Component Trading: the Basis for a Component-Oriented Development Framework. ECOOP Workshops 1999: 186 - [c3]Simon A. Dobson, Paddy Nixon, Vincent P. Wade, Sotirios Terzis, John Fuller:
Vanilla: An Open Language Framework. GCSE 1999: 91-104 - [c2]Sotirios Terzis, Paddy Nixon, Vincent P. Wade, Simon A. Dobson, John Fuller:
The Future of Enterprise Groupware Applications. ICEIS 1999: 525-532 - 1998
- [c1]Sarantos Kapidakis, Sotirios Terzis, Jakka Sairamesh:
A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries. ECDL 1998: 95-114
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint