Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Issue Section
Date
Availability
1-20 of 20
Stefanos Gritzalis
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
E-Governance in educational settings: Greek educational organizations leadership’s perspectives towards social media usage for participatory decision-making
Available to Purchase
Journal:
Internet Research
Internet Research (2019) 29 (4): 818–845.
Published: 30 January 2019
Journal Articles
Privacy and fair information practices in ubiquitous environments: Research challenges and future directions
Available to Purchase
Journal:
Internet Research
Internet Research (2009) 19 (2): 194–208.
Published: 03 April 2009
Journal Articles
Obligations of trust for privacy and confidentiality in distributed transactions
Available to Purchase
Journal:
Internet Research
Internet Research (2009) 19 (2): 153–173.
Published: 03 April 2009
Journal Articles
An efficient collusion resistant security mechanism for heterogeneous sensor networks
Available to Purchase
Journal:
Internet Research
Internet Research (2009) 19 (2): 227–245.
Published: 03 April 2009
Journal Articles
Ubiquitous proximity e‐service for trust collaboration
Available to Purchase
Journal:
Internet Research
Internet Research (2009) 19 (2): 174–193.
Published: 03 April 2009
Journal Articles
Integrating wireless sensor networks and the internet: a security analysis
Available to Purchase
Journal:
Internet Research
Internet Research (2009) 19 (2): 246–259.
Published: 03 April 2009
Journal Articles
Security technologies based on a home gateway for making smart homes secure
Available to Purchase
Journal:
Internet Research
Internet Research (2009) 19 (2): 209–226.
Published: 03 April 2009
Journal Articles
Problem localization using probabilistic dependency analysis for automated system management in ubiquitous computing
Available to Purchase
Journal:
Internet Research
Internet Research (2009) 19 (2): 136–152.
Published: 03 April 2009
Journal Articles
Guest editorial
Free
Journal:
Internet Research
Internet Research (2009) 19 (2)
Published: 03 April 2009
Journal Articles
An incentive‐based architecture to enable privacy in dynamic environments
Available to Purchase
Journal:
Internet Research
Internet Research (2006) 16 (2): 171–189.
Published: 01 March 2006
Journal Articles
Regroup‐And‐Go mixes to counter the (n‐1) attack
Available to Purchase
Journal:
Internet Research
Internet Research (2006) 16 (2): 213–223.
Published: 01 March 2006
Journal Articles
Incorporating privacy requirements into the system design process: The PriS conceptual framework
Available to Purchase
Journal:
Internet Research
Internet Research (2006) 16 (2): 140–158.
Published: 01 March 2006
Journal Articles
Anonymous attribute certificates based on traceable signatures
Available to Purchase
Journal:
Internet Research
Internet Research (2006) 16 (2): 120–139.
Published: 01 March 2006
Journal Articles
Guest editorial
Free
Journal:
Internet Research
Internet Research (2006) 16 (2)
Published: 01 March 2006
Journal Articles
Agyaat: mutual anonymity over structured P2P networks
Available to Purchase
Journal:
Internet Research
Internet Research (2006) 16 (2): 189–212.
Published: 01 March 2006
Journal Articles
Protecting privacy in e‐cash schemes by securing hidden identity approaches against statistical attacks
Available to Purchase
Journal:
Internet Research
Internet Research (2006) 16 (2): 159–169.
Published: 01 March 2006
Journal Articles
A generic Grid security policy reconciliation framework
Available to Purchase
Journal:
Internet Research
Internet Research (2005) 15 (5): 508–517.
Published: 01 December 2005
Journal Articles
Withdrawing a declaration of will: Towards a framework for digital signature revocation
Available to Purchase
Journal:
Internet Research
Internet Research (2005) 15 (4): 400–420.
Published: 01 September 2005
Journal Articles
Mechanisms for controlling access in the global grid environment
Available to Purchase
Journal:
Internet Research
Internet Research (2004) 14 (5): 347–352.
Published: 01 December 2004
Journal Articles
Architectures for secure portable executable content
Available to Purchase
Journal:
Internet Research
Internet Research (1999) 9 (1): 16–24.
Published: 01 March 1999
