• A free terrain model for trajectory k-anonymity 

      Gkoulalas-Divanis, A.; Verykios, V. S. (2008)
      This paper introduces a privacy model for location based services that utilizes collected movement data to identify parts of the user trajectories, where user privacy is at an elevated risk. To protect the privacy of the ...
    • Modeling and solution approach for the environmental traveling salesman problem 

      Saharidis, G. K. D.; Kolomvos, G.; Liberopoulos, G. (2014)
      We consider the environmental traveling salesman problem in a connected graph driven by a cost function describing the impact of environmental externalities over the routes. The resulting problem is the asymmetric non-Euclidean ...
    • A novel Two-Factor HoneyToken Authentication Mechanism 

      Papaspirou V., Maglaras L., Ferrag M.A., Kantzavelou I., Janicke H., Douligeris C. (2021)
      The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the ...
    • A pareto-efficient algorithm for data stream processing at network edges 

      Loukopoulos T., Tziritas N., Koziri M., Stamoulis G., Khan S. (2018)
      Data stream processing has received considerable attention from both research community and industry over the last years. Since latency is a key issue in data stream processing environments, the majority of the works ...