Addressing cloud computing security issues D Zissis, D Lekkas Future Generation computer systems 28 (3), 583-592, 2012 | 2864 | 2012 |
Securing e-Government and e-Voting with an open cloud computing architecture D Zissis, D Lekkas Government Information Quarterly 28 (2), 239-251, 2011 | 316 | 2011 |
A cloud based architecture capable of perceiving and predicting multiple vessel behaviour D Zissis, EK Xidias, D Lekkas Applied Soft Computing 35, 652-661, 2015 | 92 | 2015 |
Real-time vessel behavior prediction D Zissis, EK Xidias, D Lekkas Evolving Systems 7, 29-40, 2016 | 90 | 2016 |
Long-term verifiability of the electronic healthcare records’ authenticity D Lekkas, D Gritzalis International Journal of Medical Informatics 76 (5-6), 442-448, 2007 | 80 | 2007 |
Cumulative notarization for long-term preservation of digital signatures D Lekkas, D Gritzalis Computers & Security 23 (5), 413-424, 2004 | 72 | 2004 |
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments S Gritzalis, C Lambrinoudakis, D Lekkas, S Deftereos IEEE Transactions on Information Technology in Biomedicine 9 (3), 413-423, 2005 | 66 | 2005 |
Establishing and managing trust within the public key infrastructure D Lekkas Computer Communications 26 (16), 1815-1825, 2003 | 56 | 2003 |
Screening agrochemicals as potential protectants of plants against ozone phytotoxicity CJ Saitanis, DV Lekkas, E Agathokleous, F Flouri Environmental Pollution 197, 247-255, 2015 | 45 | 2015 |
Shipping routes through core habitat of endangered sperm whales along the Hellenic Trench, Greece: Can we reduce collision risks? A Frantzis, R Leaper, P Alexiadou, A Prospathopoulos, D Lekkas PLoS One 14 (2), e0212016, 2019 | 41 | 2019 |
Competent electronic participation channels in electronic democracy D Zissis, D Lekkas, AE Papadopoulou Electronic Journal of e-government 7 (2), pp195‑208-pp195‑208, 2009 | 40 | 2009 |
e-Passports as a means towards the first world-wide Public Key Infrastructure D Lekkas, D Gritzalis Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007 | 33 | 2007 |
Analyzing congestion interdependencies of ports and container ship routes in the maritime network infrastructure G Stergiopoulos, E Valvis, D Mitrodimas, D Lekkas, D Gritzalis IEEE Access 6, 63823-63832, 2018 | 30 | 2018 |
Collaborative CAD/CAE as a cloud service D Zissis, D Lekkas, P Azariadis, P Papanikos, E Xidias International Journal of Systems Science: Operations & Logistics 4 (4), 339-355, 2017 | 29 | 2017 |
Quality assured trusted third parties for deploying secure internet-based healthcare applications D Lekkas, S Gritzalis, S Katsikas International journal of medical informatics 65 (2), 79-96, 2002 | 28 | 2002 |
e-Passports as a means towards a globally interoperable Public Key Infrastructure D Lekkas, D Gritzalis Journal of Computer Security 18 (3), 379-396, 2010 | 24 | 2010 |
Design, Development, and Use of Secure Electronic Voting Systems D Zissis IGI Global, 2014 | 23 | 2014 |
Securing the electronic market: the KEYSTONE Public Key Infrastructure architecture S Gritzalis, SK Katsikas, D Lekkas, K Moulinos, E Polydorou Computers & Security 19 (8), 731-746, 2000 | 21 | 2000 |
User requirements of trusted third parties in Europe D Lekkas, SK Katsikas, DD Spinellis, P Gladychev, A Patel Proceedings, User identification and Privacy Protection Joint IFIP WG 8, 229-242, 1999 | 21 | 1999 |
Handling and reporting security advisories: A scorecard approach D Lekkas, D Spinellis IEEE security & privacy 3 (4), 32-41, 2005 | 15 | 2005 |