Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags P Rizomiliotis, E Rekleitis, S Gritzalis IEEE Communications letters 13 (4), 274-276, 2009 | 70 | 2009 |
ENISA Threat Landscape 2015 L Marinos, A Belmonte, E Rekleitis https://www.enisa.europa.eu/publications/etl2015, 18, 2016 | 38* | 2016 |
How to protect security and privacy in the IoT: a policy‐based RFID tag management protocol E Rekleitis, P Rizomiliotis, S Gritzalis Security and Communication Networks 7 (12), 2669-2683, 2014 | 26 | 2014 |
Information security and privacy standards for SMEs: Recommendations to improve the adoption of information security and privacy standards in small and medium enterprises CG Manso, E Rekleitis, F Papazafeiropoulos, V Maritsas ENISA, Heraklion, available at: http://bookshop. europa. eu/uri, 2015 | 24* | 2015 |
Threat Landscape and Good Practice Guide for Software Defined Networks/5G A Belmonte Martin, L Marinos, E Rekleitis, G Spanoudakis, N Petroulakis https://www.enisa.europa.eu/activities/risk-management/evolving-threat …, 2016 | 16 | 2016 |
A holistic approach to RFID security and privacy E Rekleitis, P Rizomiliotis, S Gritzalis Tokyo, Japan, 2010 | 10 | 2010 |
Big Data Threat Landscape and Good Practice Guide E Damiani, CA Ardagna, F Zavatarelli, E Rekleitis, L Marinos https://www.enisa.europa.eu/activities/risk-management/evolving-threat …, 2016 | 9 | 2016 |
Encrypted Traffic Analysis P Dimou, J Fajfer, N Müller, E Papadogiannaki, E Rekleitis, F Střasák European Union Agency for Cybersecurity (ENISA), 2019 | 8 | 2019 |
ENISA threat taxonomy L Marinos, A Belmonte, E Rekleitis European Union Agency for Network and Information Security (ENISA), 33-35, 2016 | 5 | 2016 |
An agent based back-end RFID tag management system E Rekleitis, P Rizomiliotis, S Gritzalis Trust, Privacy and Security in Digital Business: 7th International …, 2010 | 4 | 2010 |
Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach A ZACHARIS, E JABES, I LELLA, E REKLEITIS International Journal of Information Security and Cybercrime (IJISC) 10 (2), 2021 | | 2021 |
Stakeholders´ Requirements and Reference Scenarios. Deliverable D2. 1 V Diamantopoulou, H Mouratidis, M Pavlidis, E Rekleitis European Commission, 2016 | | 2016 |
MITIGATE-Deliverable D2. 2-Evidence-driven maritime supply chain risk assessment approach N Polemi, S Papastergiou, A Karantzias, F Georgiakodis, C Patsakis, ... European Commission, 2016 | | 2016 |
Deliverable D2. 3-System Architecture and Technical Specifications N Polemi, S Papastergiou, A Karantjias, N Drosos, P Gouvas, A Duzha, ... European Commission, 2016 | | 2016 |
Deliverable D4. 1. Report on Background Risk Management/Assessment Systems Enhancement S König, C Kollmitzer, M Latzenhofer, S Schauer, P Gouvas, N Drosos, ... European Commission, 2016 | | 2016 |
Designing secure RFID authentication protocols is (still) a non-trivial task P Rizomiliotis, E Rekleitis, S Gritzalis 2011 5th International Conference on Network and System Security, 73-80, 2011 | | 2011 |
RFID: Απειλές κατά της Ιδιωτικότητας και Μέτρα Προστασίας Ε Ρεκλείτης, Π Ριζομυλιώτης, Σ Γκρίτζαλης Προστασία της ιδιωτικότητας και τεχνολογίες πληροφορικής και επικοινωνιών …, 2010 | | 2010 |
Ασφάλεια επιπέδου εφαρμογής στα ομότιμα δίκτυα ΕΑΓ Ρεκλείτης | | 2005 |