Security Research Lab
Department of Informatics,University of Piraeus
Research Publications
Journal papers
- [J-20] P. Kotzanikolaou, G. Chatzisofroniou, M. Burmester, “Broadcast Anonymous Routing (BAR): Scalable Real-Time Anonymous Communication, International Journal of Information Security, Springer, DOI 10.1007/s10207-016-0318-0, 2016 (to appear)
- [J-19] G. Stergiopoulos, P. Kotzanikolaou, M. Theocharidou, G. Lykou, D. Gritzalis, “Time-based Critical Infrastructure Dependency Analysis for Large-Scale and Cross-Sectoral Failures”, Elsevier International Journal of Critical Infrastructure Protection 12(2016), 46-60.
- [J-18] P. Kotzanikolaou, C. Patsakis, E. Magkos, M. Korakakis, “Lightweight Private Proximity Testing for Geospatial Social Networks”, Elsevier Computer Communications 73 (2016) 263–270.
- [J-17] G. Stergiopoulos, P. Kotzanikolaou, M. Theocharidou, D. Gritzalis, “Risk Mitigation Strategies For Critical Infrastructures Based On Graph Centrality Analysis”, Elsevier International Journal of Critical Infrastructure Protection (IJIP) 10 (2015) 34–44, 2015.
- [J-15] E. Magkos, M. Avlonitis, P. Kotzanikolaou and M. Stefanidakis, “Towards Early Warning Against Internet Worms Based on Critical-Sized Networks”, Journal of Security and Communication Networks, Wiley Interscience, Vol.6, pp.78-88, 2013.
- [J-14] A. Avramidis, P. Kotzanikolaou, C. Douligeris and M. Burmester, “Chord-PKI: Providing Security and Privacy in P2P Networks with a Distributed PKI Architecture”, Computer Networks, Vol.56, Issue 1, pp.378-398, Elsevier, January 2012.
- [J-13] M. Theoharidou, P. Kotzanikolaou and D. Gritzalis, “Risk assessment methodology for interdependent critical infrastructures”, International Journal of Risk Assessment and Management, Inderscience Pubishers, Vol. 15, No.2/3 pp.128-148, 2011.
- [J-12] E. Magkos and P. Kotzanikolaou, “Achieving Privacy and Access Control in Pervasive Computing Environments”, Journal of Security and Communication Networks, Wiley Interscience, DOI: 10.1002/sec.283, (Early View, Feb.2011), 9(2), pp.94-105, 2016.
- [J-11] M. Theoharidou, P. Kotzanikolaou and D. Gritzalis,: “A multi-layer Criticality Assessment methodology based on interdependencies”, Computers & Security, Vol. 29, No.6, pp.643-658, Elsevier, 2010.
- [J-10] D.Zorbas, D. Glynos, P. Kotzanikolaou and C. Douligeris, “Solving Coverage Problems in Wireless Sensor Networks Using Cover Sets”, Ad Hoc Networks Vol.8 (2010), pp.400-415, Elsevier, 2010.
- [J-9] P. Kotzanikolaou, E. Magkos, D. Vergados and M. Stefanidakis “Secure and Practical Key Establishment for Distributed Sensor Networks”, Journal of Security and Communication Networks, Vol.2, Issue 6, pp.595-610, Wiley Interscience 2009.
- [J-8] V. Stathopoulos, P. Kotzanikolaou, and E. Magkos, “Secure Log Management for Privacy Assurance in Electronic Communications”, Computers & Security, Vol.27, No.7-8, pp.298-308, Elsevier, 2008.
- [J-7] P. Kotzanikolaou, “Data Retention and Privacy in Electronic Communications”, IEEE Security & Privacy, Vol.6, No.5, pp. 18-24, September-October 2008.
- [J-6] P. Kotzanikolaou, D. Vergados, G. Stergiou and E. Magkos, “Multi-Layer Key Establishment for Large Scale Sensor Networks”, International Journal of Security and Networks (IJSN), Inderscience, Vol.3, No.1, pp. 1-9, January 2008.
- [J-5] E. Magkos, P. Kotzanikolaou, and C. Douligeris: “Towards Secure Online Elections – Models, Primitives and Open Issues”, Electronic Government, Vol.4, No.3, pp.249-268, Inderscience, 2007.
- [J-4] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris: "SecMR - A Secure Multipath Routing Protocol for Ad Hoc Networks", Ad Hoc Networks, Special Issue on Security Issues in Sensor and Ad Hoc Networks, Singhal and Misic (eds), Vol.5, No. 1, pp.87-99, Elsevier, January 2007.
- [J-3] P. Kotzanikolaou, R. Mavropodi, C. Douligeris, and V. Chrissikopoulos: “Secure Distributed Intelligent Networks”. Elsevier Computer Communications, Special issue on Internet Security (B. Levine and C. Shields Eds), Vol.29, No.3, pp.325-336, February 2006.
- [J-2] D. Petropoulos and P. Kotzanikolaou: “Some More Improvements on a Fair non-repudiation Protocol”. Journal of Internet Technology, Vol.4 No.3, pp. 255-260, October 2003.
- [J-1] P. Kotzanikolaou, M. Burmester, V. Chrissikopoulos and C. Douligeris: “Role Based Access Control Policies in the Mobile Agent Paradigm”. Informatik Forum Journal – Special Issue on Mobile Agent Technology. Vol.14, No.2, pp. 62-69, December 2002.
Book chapters
- [B-10] P. Kotzanikolaou: “Security and Privacy in Next Generation Networks and Services”, Invited chapter, in Handbook of Research on Next Generation Mobile Communication Systems, IGI Global, DOI: 10.4018/978-1-4666-8732-5.ch014, 2016
- [Β-9] P. Kotzanikolaou, M. Theoharidou, D. Gritzalis: “Risk assessment of multi-order dependencies between critical information and communication infrastructures”. Invited chapter, in Critical Information Infrastructure Protection and Resilience in the ICT Sector (Editors: Sandro Bologna & Paul Theron), IGI Global, 2012.
- [Β-8] (In Greek) Κ. Πατσάκης, Π. Κοτζανικολάου και Δ. Πολέμη: «Μονόδρομες συναρτήσεις και Γεννήτορες ψευδοτυχαίων αριθμών». Στο βιβλίο “Σύγχρονη κρυπτογραφία: Θεωρία και Εφαρμογές” (Επιστημονική Επιμέλεια: M. Burmester, Σ. Γκρίτζαλης, Σ. Κάτσικας, Β. Χρυσικόπουλος), σελ. 211-236, Εκδόσεις Παπασωτηρίου 2010.
- [Β-7] (In Greek) Π. Κοτζανικολάου, Δ. Πολέμη και Χ. Δουληγέρης: « Διατήρηση Δεδομένων Επικοινωνίας και Διασφάλιση του Απορρήτου και της Ιδιωτικότητας». Στο βιβλίο “Προστασία της Ιδιωτικότητας & Τεχνολογίες Πληροφορικής και Επικοινωνιών” (Επιστημονική Επιμέλεια: Κ.Λαμπρινουδάκης, Λ.Μήτρου, Σ.Γκρίτζαλης, Σ.Κάτσικας), σελ. 73-91, Εκδόσεις Παπασωτηρίου, 2010.
- [Β-6] C. Douligeris and P. Kotzanikolaou: “Network Security”. In Encyclopaedia of Life Support Systems, Telecommunication Systems and Technologies, Volume II, ISBN- 978-1-84826-000-9, EOLSS Publishers – UNESCO, pp. 250-267, 2007.
- [B-5] M. Burmester and P. Kotzanikolaou: “Securing Networks against Extreme Attacks”. In Volume of essays in honour of Professor Antonios C. Panayotopoulos, pp. 875–886, University of Piraeus, Greece, 2006.
- [Β-4] C. Douligeris and P. Kotzanikolaou: “Introduction to Network Security”. In “Network Security: Current Status and Future Directions”, IEEE Press – Wiley Interscience, ISBN 978-0-471-70355-6, pp.1-12, April 2007.
- [Β-3] P. Kotzanikolaou, C. Douligeris, R. Mavropodi and V. Chrissikopoulos: “Mobile Agent Security”. In “Network Security: Current Status and Future Directions”, IEEE Press – Wiley Interscience, ISBN 978-0-471-70355-6, pp.257-268, April 2007.
- [Β-2] M. Burmester, P. Kotzanikolaou and C. Douligeris: “Security In Mobile Ad Hoc Networks”. Book chapter, in “Network Security: Current Status and Future Directions”, IEEE Press – Wiley Interscience, ISBN 978-0-471-70355-6, pp.355-371, April 2007.
- [Β-1] P. Kotzanikolaou and C. Douligeris: “Cryptography Primer: An Introduction to Cryptographic Principles and Algorithms”. In “Network Security: Current Status and Future Directions”, IEEE Press – Wiley Interscience, ISBN 978-0-471-70355-6, pp.459-479, April 2007.
Conference papers
- [C-29] C. Patsakis, P. Kotzanikolaou and M. Bouroche, “Private Proximity Testing on Steroids: An NTRU-based Protocol”, Proceedings of the Security and Trust Management – STM2015 (ESORICS workshop), Vienna, September 2015, LNCS, Vol.9331, pp.172-184, Springer. (Lecture Notes in Computer Science)
- [C-28] D. Polemi, P. Kotzanikolaou, “Medusa: A Supply Chain Risk Assessment Methodology”, Proceedings of the Cyber Security and Privacy (CSP Forum), Brussels 2015, Communications in Computer and Information Science Vol.530, pp.79-90, Springer.
- [C-27] G. Stergiopoulos, P. Kotzanikolaou, M. Theocharidou, D. Gritzalis, “Using Centrality Measures in CI Dependency Risk Graphs for Efficient Risk Mitigation”, Proceedings of the 9th Seventh Annual IFIP RI International, Arlington, USA, 16th–18th March 2015.
- [C-26] E. Magkos, P. Kotzanikolaou, M. Magioladitis, S. Sioutas, and V.S. Verykios “Towards Secure and Practical Location Privacy through Private Equality Testing”, Proceedings of the Privacy in Statistical Databases (PSD2014), pp.312-235, LNCS Vol.8744, Springer, Ibiza, Spain, 17-19 September 2014. (Lecture Notes in Computer Science)
- [C-25] D. Moustis and P. Kotzanikolaou, “Evaluating security controls against HTTP-based DDoS attacks”, Proceedings of the 2013 Fourth International Conference on Information, Intelligence, Systems and Applications (IISA 2013), pp.1-6, IEEE, July 10-12 2013, Piraeus, Greece.
- [C-24] P. Kotzanikolaou, Μ. Theocharidou, and D. Gritzalis, “Cascading Effects Of Common-Cause Failures On Critical Infrastructures”, Proceedings of the 7th Seventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (CIP-2013), Springer, pp.171-182, George Washington University, Washington, DC, USA, March 18 - 20, 2013.
- [C-23] P. Kotzanikolaou, E. Magkos, N. Petrakos, C. Douligeris and V. Chrissikopoulos, “Fair Anonymous Authentication for Location Based Services”, Proceedings of DPM 2012 and SETOP 2012 (ESORICS 2012 Workshops), LNCS Vol.7731, Springer, pp.1-14, Pisa, Italy, September 2012. (Lecture Notes in Computer Science)
- [C-22] N. Petrakos, P. Kotzanikolaou, C. Douligeris, "Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme for Location Based Services", accepted, PCI 2012, Piraeus, Greece, October 2012.
- [C-21] P.Kotzanikolaou, Μ. Theocharidou, and D. Gritzalis, “Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects”, Proceedings of the 6th International Conference on Critical Information Infrastructures Protection (CRITIS2011), Lucerne, Switzerland, September 2011. (Lecture Notes in Computer Science)
- [C-20] T. Ntouskas, P. Kotzanikolaou and N. Polemi, “Impact Assessment through Collaborative Asset Modeling: The STORM-RM approach”, Proceedings of the 1st International Symposium and 10th Balkan conference on Operational Research, (BALCOR2011), Thessaloniki, September 2011.
- [C-19] E. Magkos, P. Kotzanikolaou, S. Sioutas and K. Oikonomou, “A Distributed Privacy-Preserving Scheme for Location-Based Queries”, Proceedings of the 4th International IEEE / WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2010), Montreal, Canada, June 2010).
- [C-18] E. Magkos and P. Kotzanikolaou, “Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments”, Proceedings of 2nd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2010), Catania, Italy, May 2010.
- [C-17] P.Kotzanikolaou, S. Maniatis, E. Nikolouzou and V. Stathopoulos, “Evaluating Common Privacy Vulnerabilities in Internet Service Providers”, Proceedings of the 3rd International Conference on e-Democracy, Greece, September 2009, Lecture Notes of ICST (LNICST), ISBN 978-963-9799-54-7, Springer 2009.
- [C-16] Μ. Theocharidou, P. Kotzanikolaou and D. Gritzalis, “Towards a Criticality Analysis Methodology: Redefining Risk Analysis for Critical Infrastructure Protection”, Proceedings of the 3rd IFIP International Conference on Critical Infrastructure Protection (CIP-2009), C. Palmer and S. Shenoi (Eds.): Critical Infrastructure Protection III, IFIP AICT 311, Springer pp. 35–49, 2009.
- [C-15] P. Kotzanikolaou and C. Douligeris: “Privacy Threats of Data Retention in Internet Communications”, Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07), IEEE, pp.1-4, September 2007.
- [C-14] A. Avramidis, P. Kotzanikolaou and C. Douligeris: “Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network”, Proceedings of the EUROPKI’2007, LNCS Vol.4582, Springer, pp.354-361, Mallorca, Spain, June 2007. (Lecture Notes in Computer Science)
- [C-13] D. Zorbas, D. Glynos, P. Kotzanikolaou, C. Douligeris: “B{GOP}: An Adaptive Algorithm for Coverage Problems in Wireless Sensor Networks”, Proceedings of the 13th European Wireless Conference ", Paris, France, April 1 - 4, 2007
- [C-12] V. Stathopoulos, P. Kotzanikolaou and E. Magkos: “A Framework for Secure and Verifiable Logging in Public Communication Networks”, Proceedings of the 1st Critical Information Infrastructures Security (CRITIS’06), LNCS Vol. 4347, Springer, pp.273-284, Samos Island, Greece, Aug 2006. (Lecture Notes in Computer Science)
- [C-11] E. Magkos, P. Kotzanikolaou, D. Vergados and M. Stefanidakis: “An Asymmetric Key Establishment Protocol for Multiphase Self-Organized Sensor Networks”, Proceedings of the 12th European Wireless Conference – “Enabling Technologies for Wireless Multimedia Communications", Athens, Greece, April 2 - 5, 2006.
- [C-10] P. Kotzanikolaou, D. Vergados and G. Stergiou: “Performance Analysis of a Hybrid Key Establishment Protocol”, Proc. Of the 7th IEEE IMS’2005 conference, pp. 719-724, Irvine, California, USA, December 2005.
- [C-9] P. Kotzanikolaou, E. Magkos, C. Douligeris and V. Chrissikopoulos: “Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks”, Proceedings of 1st International IEEE Workshop on Trust, Security and Privacy for Ubiquitous Computing (TSPUC’2005), IEEE, pp. 581-587, Taromina, Italy, June 2005.
- [C-8] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris: “Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks”, Proceedings of 3rd International Conference on Wired/Wireless Internet Communications (WWIC’2005), LNCS Vol. 3510, Springer, pp. 269-279, Xanthi, Greece, May 2005. (Lecture Notes in Computer Science)
- [C-7] D. Glynos, P. Kotzanikolaou, and C. Douligeris: “Preventing Impersonation Attacks in MANET with multi-factor authentication”, Proceedings of 3rd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT’2005), IEEE, pp. 59-64, Trentino, Italy, April 2005.
- [J-5] E. Magkos, P. Kotzanikolaou, and C. Douligeris: “Towards Secure Online Elections – Models, Primitives and Open Issues”, Electronic Government, Vol.4, No.3, pp.249-268, Inderscience, 2007.
- [J-4] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris: "SecMR - A Secure Multipath Routing Protocol for Ad Hoc Networks", Ad Hoc Networks, Special Issue on Security Issues in Sensor and Ad Hoc Networks, Singhal and Misic (eds), Vol.5, No. 1, pp.87-99, Elsevier, January 2007.
- [J-3] P. Kotzanikolaou, R. Mavropodi, C. Douligeris, and V. Chrissikopoulos: “Secure Distributed Intelligent Networks”. Elsevier Computer Communications, Special issue on Internet Security (B. Levine and C. Shields Eds), Vol.29, No.3, pp.325-336, February 2006.
- [J-2] D. Petropoulos and P. Kotzanikolaou: “Some More Improvements on a Fair non-repudiation Protocol”. Journal of Internet Technology, Vol.4 No.3, pp. 255-260, October 2003.
- [J-1] P. Kotzanikolaou, M. Burmester, V. Chrissikopoulos and C. Douligeris: “Role Based Access Control Policies in the Mobile Agent Paradigm”. Informatik Forum Journal – Special Issue on Mobile Agent Technology. Vol.14, No.2, pp. 62-69, December 2002.