Konstantinos Lambrinoudakis, Associate Professor

Dr. Costas Lambrinoudakis holds a B.Sc. (Electrical and Electronic Engineering) from the University of Salford (1985), an M.Sc. (Control Systems) from the University of London (Imperial College -1986), and a Ph.D. (Computer Science) from the University of London (Queen Mary and Westfield College – 1991). Currently he is an Associate Professor at the Department of Digital Systems, University of Piraeus, Greece. From 1998 until 2009 he has held teaching position with the University of the Aegean, Department of Information and Communication Systems Engineering, Greece. His current research interests are in the areas of Information and Communication Systems Security and of Privacy Enhancing Technologies. He is an author of more than 85 scientific publications in refereed international journals, books and conferences, most of them on ICT security and privacy protection issues. He has served as program committee chair of 12 international scientific conferences and as a member on the program and organizing committees in more than 150 others. Also he participates in the editorial board of two international scientific journals and he acts as a reviewer for more than 35 journals. He has been involved in many national and EU funded R&D projects in the area of Information and Communication Systems Security. He is a member of the ACM and the IEEE.

Undergraduate Degree Program

Print

Publications 2010 – 2015


I) JOURNALS

  • Vrakas N., Geneiatakis D., Lambrinoudakis C., “Obscuring Users’ Identity in Next Generation Networks”, Computer Networks Journal (indexed in ISI/SCI-E), Elsevier (submitted).
  • Vrakas N., Lambrinoudakis C., “An Intrusion Detection and Prevention System for IMS and VoIP Services”, International Journal of Information Security (indexed in ISI/SCI-E), Springer (to appear).
  • Vrakas N., Geneiatakis D., Lambrinoudakis C., “Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments”, IEEE Communications Surveys and Tutorials (indexed in ISI/SCI-E), IEEE Press, 2012 (to appear).
  • Kontoudis D., Fouliras P., Lambrinoudakis C., “A Survey of Network Virtualization Environment Modeling”, International Journal of Network Management (indexed in ISI/SCI-E), Wiley (to appear).
  • Lambrinoudakis C., “Evaluating and Enriching Information and Communication Technologies Compliance Frameworks with Regard to Privacy”, Information Management & Computer Security, Emerald (to appear).
  • Vrakas N., Lambrinoudakis C., “A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services”, International Journal of Information Technologies and the Systems Approach, Vol.4, Issue 2, pp. 32-47, IGI Global, 2011.
  • Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing (indexed in ISI/SCI-E), Vol.11, Issue 2, pp. 289-302, Wiley, 2011.
  • Tsohou Α., Kokolakis S., Lambrinoudakis C., Gritzalis S., “A Security Standards’ framework to facilitate best practices’ Awareness and Conformity”, Information Management & Computer Security, Vol. 18, No.5, pp. 350-365, Emerald, 2010.
  • Kambourakis G., Geneiatakis D., Gritzalis S., Lambrinoudakis C., Dagiouklas A., Ehlert S., Fiedler J., “High Availability for SIP: Solutions and Real-Time Measurement Performance Evaluation”, International Journal of Disaster Recovery and Business Continuity, Vol. 1, No.1, pp. 11-29, SERSC, 2010.
  • Terzis I., Kambourakis G., Karopoulos G., Lambrinoudakis C., “Privacy Preserving Context Transfer Schemes for 4G Networks”, Wireless Communications and Mobile Computing, Special Issue on Network Security and Digital Forensics in Next Generation Communications, doi: 10.1002/wcm.1019, Wiley Interscience, 2010.
  • Tsohou A., Lambrinoudakis C., Kokolakis S., Gritzalis S., “The Importance of Context Dependant Privacy Requirements and Perceptions to the Design of Privacy  Aware Systems”, The European Journal of the Informatics Professional (UPGrade, www.upgrade-cepis.org), Special Issue: Privacy and Identity Management, Vol. xi, No. 1, pp.32-37, also in Novatica journal, Issue 202  (www.ati.es/novatica), 2010.


II) CONFERENCES

  • Pitropakis N., Lambrinoudakis C., Geneiatakis D.,  Gritzalis D., “A Practical Steganographic Approach for Matroska based High Quality Video files”, 7th International Symposium on Security and Multimodality in Pervasive Environment (SMPE-2013), IEEE Computer Society Press Barcelona, Spain, March 2013.
  • Lalas E., Papathanasiou A., Lambrinoudakis C., “Privacy and Traceability in Social Networking Sites”, Proceedings of the 16th Panhellenic Conference on Informatics (PCI 2012), pp. 127-132, IEEE Xplore, Piraeus, Greece, October 2012.
  • Vrakas N., Geneiatakis D.,  Lambrinoudakis C., “Is IP Multimedia Subsystem Affected by ‘Malformed Message’ Attacks? – An Evaluation of OpenIMS”, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2011), pp. 275-280, Science and Technology Publications Digital Library, Seville, Spain, 2011.
  • (3) Agudo I., Nuñez D.,  Giammatteo G., Rizomiliotis P., Lambrinoudakis C., “Cryptography goes to the Cloud”, Proceedings of the 1st International Workshop on Security & Trust for Applications in Virtualised Environments (STAVE 2011), pp. 190-197, Springer, Loutraki, Greece, 2011.
  • Drogkaris P., Gritzalis S., Lambrinoudakis C., “Transforming the Greek e-Government Environment towards the e-Gov 2.0 Era”, Proceedings of the EGOVIS’10 International Conference on Electronic Government and the Information Systems Perspective, K. N. Andersedn, et al. (Eds.), pp. 142 -149, Springer LNCS 6267, Bilbao, Spain,  September 2010.
  • Vrakas Ν., Geneiatakis D., Lambrinoudakis C., “A Call Conference Room Interception Attack and its Detection” , Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’10), pp. 38-44, Springer LNCS 6264, Bilbao, Spain, September 2010.
  • Vrakas Ν., Kalloniatis C., Tsohou A., Lambrinoudakis C., “Privacy Requirements Engineering for Trustworthy e-government Services”, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST’10), pp. 298-307, Springer LNCS 6101, Berlin, Germany, June 2010.
  • Tsohou A., Kokolakis S., Lambrinoudakis C., Gritzalis S., “Unifying ISO Security Standards Practices into a Single Security Framework”, Proceedings of the 12th Annual IFIP Workshop on Information Security Management (South African Information Security Multi-Conference), pp. 188-203, Port Elizabeth, South Africa, May 2010.


III) BOOK CHAPTERS

  • Vrakas N., Fotiadis G., Lambrinoudakis C., “Key Management Techniques”, in the book Contemporary Cryptography: Theory and Applications, Burmester M. et. al. (Eds.), pp. 541-598, Papasotiriou, Greece, 2011 (in Greek).
  • Yannakopoulos A., Xanthopoulos S., Lambrinoudakis C., Gritzalis S., Katsikas S., “Privacy Protection Economics”, in the book Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Lambrinoudakis  C. et.al. (Eds.), pp. 447-467, Papasotiriou, Greece, 2010 (in Greek).
  • Lambrinoudakis C., Gritzalis S., Katsikas S., “A Review of Privacy Enhancing Technologies for the Internet”, in the book Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Lambrinoudakis  C. et.al. (Eds.), pp. 3-48, Papasotiriou, Greece, 2010 (in Greek).


IV) BOOKS

  • Lambrinoudakis C., Mitrou L., Gritzalis S., Katsikas S., (Eds.), Privacy Protection in Information and Communication Technologies: Technical and Legal Issues, Papasotiriou, Athens, Greece, 2010 (in Greek).

Digital Privacy: Theory, Technologies, and Practices

While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the […]

More »