Follow
Evangelos Rekleitis
Evangelos Rekleitis
The EU Cybersecurity Agency
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
P Rizomiliotis, E Rekleitis, S Gritzalis
IEEE Communications letters 13 (4), 274-276, 2009
702009
ENISA Threat Landscape 2015
L Marinos, A Belmonte, E Rekleitis
https://www.enisa.europa.eu/publications/etl2015, 18, 2016
38*2016
How to protect security and privacy in the IoT: a policy‐based RFID tag management protocol
E Rekleitis, P Rizomiliotis, S Gritzalis
Security and Communication Networks 7 (12), 2669-2683, 2014
262014
Information security and privacy standards for SMEs: Recommendations to improve the adoption of information security and privacy standards in small and medium enterprises
CG Manso, E Rekleitis, F Papazafeiropoulos, V Maritsas
ENISA, Heraklion, available at: http://bookshop. europa. eu/uri, 2015
24*2015
Threat Landscape and Good Practice Guide for Software Defined Networks/5G
A Belmonte Martin, L Marinos, E Rekleitis, G Spanoudakis, N Petroulakis
https://www.enisa.europa.eu/activities/risk-management/evolving-threat …, 2016
162016
A holistic approach to RFID security and privacy
E Rekleitis, P Rizomiliotis, S Gritzalis
Tokyo, Japan, 2010
102010
Big Data Threat Landscape and Good Practice Guide
E Damiani, CA Ardagna, F Zavatarelli, E Rekleitis, L Marinos
https://www.enisa.europa.eu/activities/risk-management/evolving-threat …, 2016
92016
Encrypted Traffic Analysis
P Dimou, J Fajfer, N Müller, E Papadogiannaki, E Rekleitis, F Střasák
European Union Agency for Cybersecurity (ENISA), 2019
82019
ENISA threat taxonomy
L Marinos, A Belmonte, E Rekleitis
European Union Agency for Network and Information Security (ENISA), 33-35, 2016
52016
An agent based back-end RFID tag management system
E Rekleitis, P Rizomiliotis, S Gritzalis
Trust, Privacy and Security in Digital Business: 7th International …, 2010
42010
Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach
A ZACHARIS, E JABES, I LELLA, E REKLEITIS
International Journal of Information Security and Cybercrime (IJISC) 10 (2), 2021
2021
Stakeholders´ Requirements and Reference Scenarios. Deliverable D2. 1
V Diamantopoulou, H Mouratidis, M Pavlidis, E Rekleitis
European Commission, 2016
2016
MITIGATE-Deliverable D2. 2-Evidence-driven maritime supply chain risk assessment approach
N Polemi, S Papastergiou, A Karantzias, F Georgiakodis, C Patsakis, ...
European Commission, 2016
2016
Deliverable D2. 3-System Architecture and Technical Specifications
N Polemi, S Papastergiou, A Karantjias, N Drosos, P Gouvas, A Duzha, ...
European Commission, 2016
2016
Deliverable D4. 1. Report on Background Risk Management/Assessment Systems Enhancement
S König, C Kollmitzer, M Latzenhofer, S Schauer, P Gouvas, N Drosos, ...
European Commission, 2016
2016
Designing secure RFID authentication protocols is (still) a non-trivial task
P Rizomiliotis, E Rekleitis, S Gritzalis
2011 5th International Conference on Network and System Security, 73-80, 2011
2011
RFID: Απειλές κατά της Ιδιωτικότητας και Μέτρα Προστασίας
Ε Ρεκλείτης, Π Ριζομυλιώτης, Σ Γκρίτζαλης
Προστασία της ιδιωτικότητας και τεχνολογίες πληροφορικής και επικοινωνιών …, 2010
2010
Ασφάλεια επιπέδου εφαρμογής στα ομότιμα δίκτυα
ΕΑΓ Ρεκλείτης
2005
The system can't perform the operation now. Try again later.
Articles 1–18