Papers

Authors Papers / presentation title Publication date Event name / material name Publication Place Status of publication Publisher Number Relevant Pages
  • Alexandros Fragkiadakis
  • Vangelis Angelakis
  • Elias Tragos
Securing Cognitive Wireless Sensor Networks: a survey2014-03-28Hindawi International Journal of Distributed Sensor Networks - Special Issue on Protocols and Architectures for Next-Generation Wireless Sensor NetworksUSApublishedHindawi201412
  • Henrich C. Pöhls
  • Joachim Posegga
  • Hermann de Meer
  • Kai Samelin
Redactable Signature Schemes for Trees With Signer-Controlled Non-Leaf-Redactions2014-09-12 E-Business and Telecommunications Communications in Computer and Information Science Volume 455, 2014HeidelbergpublishedSpringer455155-171
  • Vangelis Angelakis
  • Ioannis Avgouleas
  • Nikolaos Pappas
  • Emma Fitzgerald
  • Di Yuan
Allocation of Heterogeneous Resources of an IoT Device to Flexible ServicesIEEE Internet of Things Journalpublished
Authors Papers / presentation title Publication date Event name / material name Publication Place Status of publication
  • Alexandros Fragkiadakis
  • Elias Tragos
A Trust-Based Scheme Employing Evidence Reasoning for IoT ArchitecturesIEEE WF-IoTaccepted
  • Christoph Frädrich
  • Henrich C. Pöhls
  • Wolfgang Popp
  • Noelle Rakotondravony
  • Kai Samelin
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT2016-12-01 Proc. of Information and Communications Security (ICICS 2016)Heidelbergpublished
  • Johannes Bauer
  • Ralf Staudemeyer
  • Henrich C. Pöhls
  • Alexandros Fragkiadakis
ECDSA on things: Iot integrity protection in practise18th International Conference on Information and Communications Security (ICICS2016)accepted
  • George Moldovan
  • Elias Tragos
  • Alexandros Fragkiadakis
  • Henrich C. Pöhls
  • Daniel Calvo
An IoT middleware for enhanced security and privacy: the RERUM approachIFIP NTMS 2016accepted
  • Georgios Papadopoulos
  • Andreas Georgallides
  • Theo Tryfonas
  • George Oikonomou
BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs2nd EAI International Conference on Interoperability in IoTaccepted
  • Alexandros Fragkiadakis
  • Luka Kovasevic
  • Elias Tragos
Enhancing compressive sensing encryption in constrained devices using chaotic sequencesACM SmartObjects 2016accepted
  • Max Mössinger
  • Benedikt Petschkuhn
  • Johannes Bauer
  • Ralf Staudemeyer
  • Marcin Wojcik
  • Henrich C. Pöhls
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device2016-08-282016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)Coimbra, Portugalpublished
  • Alexandros Fragkiadakis
  • Elias Tragos
  • Luka Kovasevic
  • Pavlos Charalampidis
A practical implementation of an adaptive Compressive Sensing encryption scheme2016-06-20IoT-SoS 2016Coimbra, Portugalpublished
  • Antonio Kung
  • Santiago Suppan
  • Jorge Cuellar
  • Henrich C. Pöhls
  • Adam Kapovits
A Privacy Engineering Framework for the Internet of ThingsComputers, Privacy and Dataprotection (CPDP 2016)accepted
  • Daniel Martin
  • Elisabeth Oswald
  • Martijn Stam
  • Marcin Wojcik
A Leakage Resilient MACFifteenth IMA International Conference on Cryptography and Codingaccepted
  • Elias Tragos
  • Pavlos Charalampidis
  • Alexandros Fragkiadakis
Improving the trustworthiness of ambient assisted living applicationsIEEE WPMCaccepted
  • George Stamatakis
  • Elias Tragos
  • Apostolos Traganitis
A two-stage Spectrum Assignment Scheme for Power and QoS constrained Cognitive CSMA/CA networksIEEE GLOBECOM 2015accepted
  • David Derler
  • Henrich C. Pöhls
  • Kai Samelin
  • Daniel Slamanig
A General Framework for Redactable Signatures and New Constructions2016-03-1018th Annual International Conference on Information Security and Cryptology Seoul, South Koreapublished
  • Henrich C. Pöhls
  • Kai Samelin
Accountable Redactable Signatures2015-10-19ARES 2015Toulouse, Francepublished
  • George Stamatakis
  • Elias Tragos
  • Apostolos Traganitis
Periodic collection of spectrum occupancy data by energy constrained cognitive IoT devices2015-08-26IWCMC 2015Dubrovnik, Croatiapublished
  • Henrich C. Pöhls
JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application2015-07-08esIoT 2015Santa Cantarina, Brazilpublished
  • George Stamatakis
  • Elias Tragos
  • Apostolos Traganitis
A two-stage Power and QoS aware Dynamic Spectrum Assignment scheme for Cognitive Wireless Sensor Networks2015-05-28QoMEX 2015Messiniapublished
  • Konstantinos Maraslis
  • Theodoros Spyridopoulos
  • George Oikonomou
  • Theo Tryfonas
  • Mo Haghighi
Game Theoretic Approach for Smart Sensor Data Trustworthiness Problems2015-05-26Proc. 30th IFIP TC 11 International Conference (SEC)Hamburgpublished
  • Beichen Chen
  • Zhong Fan
  • Fengming Cao
  • George Oikonomou
  • Theo Tryfonas
Class Based Overall Priority Scheduling for M2M Communications over LTE Networks2015-05-15VTC2015-SpringGlasgowpublished
  • Manolis Surligas
  • Stefanos Papadakis
  • Antonis Makrogiannakis
Empowering the IoT Heterogeneous Wireless Networking with Software Defined Radio2015-05-11VTC2015-SpringIEEEpublished
  • Pavlos Charalampidis
  • Alexandros Fragkiadakis
  • Elias Tragos
Rate-adaptive compressive sensing for IoT applications2015-05-11VTC2015-SpringGlasgowpublished
  • Alexandros Fragkiadakis
  • Elias Tragos
  • Stefanos Papadakis
  • Pavlos Charalampidis
Experiences with deploying Compressive Sensing and Matrix Completion techniques in IoT devices2014-12-02IEEE CAMAD 2014Athenspublished
  • Stefanos Papadakis
  • Antonis Makrogiannakis
  • Manolis Surligas
Low-cost Multiple Primary & Secondary Users Emulation Platform for Cognitive Radio Testbeds2014-12-02IEEE CAMAD 2014 - DEMOAthenspublished
  • Henrich C. Pöhls
Aggregation and Perturbation in Practice: Case-Study of Privacy, Accuracy & Performance2014-12-01IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD)Athens, Greecepublished
  • Petros S. Bithas
  • Athanasios Lioumpas
  • George K. Karagiannidis
  • Bayan S. Sharif
Interference Minimization in Hybrid WiFi/Cellular Networks2014-12-03International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD)Athenspublished
  • Petros S. Bithas
  • Athanasios Lioumpas
  • Theodoros Mouroutis
  • Yiannis Stylianou
  • George P. Efthymoglou
Hybrid Threshold-Based Selection Diversity Receivers for Efficient Resources Utilization2014-12-03International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD)Athenspublished
  • Alexandros Fragkiadakis
  • Vangelis Angelakis
  • Raphael Navas
  • George Vasilakis
  • Elias Tragos
CS-based crowd-sourcing IoT applications2014-12-02IEEE CAMAD 2014 - DEMOAthenspublished
  • Magnus Lundgren
  • Dan Helgesson
  • Vangelis Angelakis
  • Di Yuan
Energy-Aware Rate Selection in Cognitive Radio Inspired Wireless Smart Objects2014-06-26ISCC 2014 THE NINETEENTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONSIEEE Xplorepublished
  • Henrich C. Pöhls
  • Kai Samelin
On Updatable Redactable Signatures2014-06-10ACNS 2014 - 12th International Conference on Applied Cryptography and Network SecurityHeidelbergpublished
  • Alexandros Fragkiadakis
  • Elias Tragos
  • Apostolos Traganitis
Lightweight and secure encryption using channel measurements2014-05-11Wireless Vitae 2014Aalborgpublished
  • George Stamatakis
  • Elias Tragos
  • Apostolos Traganitis
Energy efficient collection of spectrum occupancy data in wireless cognitive sensor networks2014-05-11Wireless Vitae 2014 (Best Paper Award)Aalborgpublished
  • Alexandros Fragkiadakis
  • Pavlos Charalampidis
  • Elias Tragos
Adaptive compressive sensing for energy efficient smart objects in IoT applications2014-05-12GWS 2014Aalborgpublished
  • Henrich C. Pöhls
  • Vangelis Angelakis
  • Santiago Suppan
  • Kai Fischer
  • George Oikonomou
  • Rodrigo Diaz Rodriguez
  • Theodoros Mouroutis
  • Elias Tragos
RERUM: Building a Reliable IoT upon Privacy- and Security- enabled Smart Objects2014-04-06WCNC 2014 Workshop on IoT Communications and TechnologiesIstanbulpublished
  • Elias Tragos
  • Vangelis Angelakis
  • Alexandros Fragkiadakis
  • David Gundlegård
  • Cosmin
  • Septimiu Nechifor
  • George Oikonomou
  • Henrich C. Pöhls
  • Anastasius Gavras
Enabling Reliable and Secure IoT-based Smart City Applications 2014-01-081st International IEEE Workshop on Pervasive Systems for Smart Cities (PerCity)Hungarypublished
  • Henrich C. Pöhls
  • Joachim Posegga
  • Hermann de Meer
  • Kai Samelin
On the Relation Between Redactable and Sanitizable Signatures Schemes2014-02-26ESSOS 2014Heidelbergpublished
  • Henrich C. Pöhls
  • Markus Karwe
Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid2014-08-06Second Open EIT ICT Labs Workshop on Smart Grid SecuritySwitzerlandpublished
Authors Papers / presentation title Publication date Event name / material name Publication Place Status of publication Publisher Number Relevant Pages
  • Elias Tragos
  • Vangelis Angelakis
  • Stefanos Papadakis
Fighting Networking Heterogeneity in the Internet of Things2015-04-01ERCIM NewsonlinepublishedERCIM10133-34
  • Darío Ruiz López
Reducing IoT - PbD Dilemma by enriching authorization with reputation mechanismsERCIM Newspublished
  • Adam Kapovits
The Internet of Things - An OverviewEurescom Messagepublished
  • Henrich C. Pöhls
  • Elias Tragos
  • Vangelis Angelakis
RERUM - On-device intelligence for a better IoTEurescom Messagepublished