Abstract is missing.
- Transforming Vehicles into e-government 'Cloud Computing' NodesKleanthis Dellios, Chronakis Aristeidis, Polemi Despoina. 1-8 [doi]
- Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data MiningStergios G. Tsiafoulis, Vasilios Zorkadis, Elias Pimenidis. 9-16 [doi]
- Practical Password Harvesting from Volatile MemoryStavroula Karayianni, Vasilios Katos. 17-22 [doi]
- Applied Phon Curve Algorithm for Improved Voice Recognition and AuthenticationBobby L. Tait. 23-30 [doi]
- Tuning the Epidemical Algorithm in Wireless Sensor NetworksKostis Gerakos, Christos Anagnostopoulos, Stathes Hadjiefthymiades. 31-37 [doi]
- A Robustness Testing Method for Network SecurityYulong Fu, Ousmane Koné. 38-45 [doi]
- Economic Evaluation of Interactive Audio Media for Securing Internet ServicesTheodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis. 46-53 [doi]
- On the Evolution of Malware SpeciesVasileios Vlachos, Christos Ilioudis, Alexandros Papanikolaou. 54-61 [doi]
- PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low SecurityIosif Androulidakis, Gorazd Kandus. 62-66 [doi]
- GSi Compliant RAS for Public Private Sector PartnershipFawzi Fawzi, Rabih Bashroush, Hamid Jahankhani. 67-71 [doi]
- A Probabilistic Key Agreement Scheme for Sensor Networks without Key PredistributionVasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou. 72-79 [doi]
- Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital CertificatesDimitrios Zissis, Dimitrios Lekkas, Panayiotis Koutsabasis. 80-87 [doi]
- Towards Colored Petri Net Modeling of Expanded C-TMACApostolos K. Provatidis, Christos K. Georgiadis, Ioannis Mavridis. 88-95 [doi]
- Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border ServicesDimitrios Lekkas, Dimitrios Zissis. 96-103 [doi]
- Genre-Based Information HidingRussell Ogilvie, George R. S. Weir. 104-111 [doi]
- In the Hacker's Eye: The Neurophysiology of a Computer HackerWael Khalifa, Kenneth Revett, Abdel-Badeeh M. Salem. 112-119 [doi]
- Untangling Public Service Usage for Agribusinesses with Dialogic E-governmentSotiris Karetsos, Maria Ntaliani, Constantina Costopoulou, Alexander B. Sideridis. 120-125 [doi]
- On the Deployment of Artificial Immune Systems for BiometricsRuben Krishnamurthy, Kenneth Revett, Hossein Jahankhani. 126-130 [doi]
- A Prediction Model for Criminal Levels Specialized in Brazilian CitiesMarcelo Damasceno de Melo, Jerffeson Teixeira, Gustavo Campos. 131-138 [doi]
- MASSIF: A Promising Solution to Enhance Olympic Games IT SecurityElsa Prieto, Rodrigo Diaz, Luigi Romano, Roland Rieke, Mohammed Achemlal. 139-147 [doi]
- An Ontology-Based Model for SIEM EnvironmentsGustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar. 148-155 [doi]
- Analyzing the Economic Impacts of Security Breaches Due to OutsourcingDimitrios Koumaridis, Emmanouil Stiakakis, Christos K. Georgiadis. 156-163 [doi]
- Study of the Perception on the Portuguese Citizen Card and Electronic SignatureIsabel Cerqueira, Vítor J. Sá, Sérgio Tenreiro de Magalhães. 164-170 [doi]
- Securing Transportation-Critical Infrastructures: Trends and PerspectivesMarianthi Theoharidou, Miltiadis Kandias, Dimitris Gritzalis. 171-178 [doi]
- E-Government in Greece: Serving State's Economic Needs - Respecting the Fundamental Right to Data ProtectionZoe Kardasiadou, Evi Chatziliasi, Konstantinos Limniotis. 179-185 [doi]
- Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID TagsHoda Jannati, Abolfazl Falahati. 186-193 [doi]
- Paving the Way for a Transformational Public AdministrationIoannis Savvas, Nick Bassiliades, Elias Pimenidis, Alexander B. Sideridis. 194-203 [doi]
- Cybercrime: The Case of Obfuscated MalwareMamoun Alazab, Sitalakshmi Venkatraman, Paul Watters, Moutaz Alazab, Ammar Alazab. 204-211 [doi]
- Feeling Secure vs. Being Secure the Mobile Phone User CaseIosif Androulidakis, Gorazd Kandus. 212-219 [doi]
- A Collaborative System Offering Security Management Services for SMEs/mEsTheodoros Ntouskas, Dimitrios Papanikas, Nineta Polemi. 220-228 [doi]
- A Situational Awareness Architecture for the Smart GridAnastasia Mavridou, Mauricio Papa. 229-236 [doi]
- Alleviating SMEs' Administrative Burdens: The Rural Inclusion InitiativeMaria Ntaliani, Constantina Costopoulou, Alexander B. Sideridis. 237-244 [doi]
- Optimum Hardware-Architecture for Modular Divider in GF(2 m ) with Chaos as Arbitrary Source Based on ECCAzar Hosseini, Abolfazl Falahati. 245-252 [doi]
- Sufficiency of Windows Event Log as Evidence in Digital ForensicsNurdeen M. Ibrahim, Ameer Al-Nemrat, Hamid Jahankhani, Rabih Bashroush. 253-262 [doi]
- An Evaluation of the Initiatives and the Progress Made on e-government Services in the EUAlexander B. Sideridis, Elias Pimenidis, Loucas Protopappas, Maria Koukouli. 263-270 [doi]
- Improved Awareness on Fake Websites and Detecting TechniquesHossein Jahankhani, Thulasirajh Jayaraveendran, William Kapuku-Bwabw. 271-279 [doi]
- Study of the Perception on the Biometric Technology by the Portuguese CitizensDaniela Borges, Vítor J. Sá, Sérgio Tenreiro de Magalhães, Henrique M. D. Santos. 280-287 [doi]