Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks C Panos, C Ntantogian, S Malliaros, C Xenakis Computer Networks 113, 94-110, 2017 | 82 | 2017 |
Evaluation of password hashing schemes in open source web platforms C Ntantogian, S Malliaros, C Xenakis Computers & Security 84, 206-224, 2019 | 45 | 2019 |
A security evaluation of FIDO’s UAF protocol in mobile and embedded devices C Panos, S Malliaros, C Ntantogian, A Panou, C Xenakis Digital Communication. Towards a Smart and Secure Future Internet: 28th …, 2017 | 29 | 2017 |
Gaithashing: a two-factor authentication scheme based on gait features C Ntantogian, S Malliaros, C Xenakis Computers & Security 52, 17-32, 2015 | 29 | 2015 |
The integrated holistic security and privacy framework deployed in CrowdHEALTH project S Malliaros, C Xenakis, G Moldovan, J Mantas, A Magdalinou, ... Acta Informatica Medica 27 (5), 333, 2019 | 11 | 2019 |
Protecting sensitive information in the volatile memory from disclosure attacks S Malliaros, C Ntantogian, C Xenakis 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 8 | 2016 |
User authentication and detection of malicious actions S Malliaros Πανεπιστήμιο Πειραιώς. Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών …, 2018 | | 2018 |