• An architecture for secure VoiIP and collaboration applications 

      Zisiadis, D.; Kopsidas, S.; Tassiulas, L. (2007)
      VoIP and collaboration Internet applications are a driving force for the use and expansion of the Internet. Current applications usually require end user registration in a central user database, which in turn provides ...
    • Design and implementation of a VIPSec based application 

      Kopsidas, S.; Zisiadis, D.; Tassiulas, L. (2007)
      Voice over IP (VoIP) is one of the most emerging technologies, while a respectable number of corresponding applications are being implemented or updated in daily basis. Although communications security is a constant ...
    • Digital storytelling in Kindergarten: An alternative tool in children's way of expression 

      Papadimitriou, E.; Kapaniaris, A.; Zisiadis, D.; Kalogirou, E. (2013)
      This paper refers to Digital Storytelling as an alternative tool enhancing children's way of expression in kindergarten classroom. Storytelling is a global culture depicting the way people live, feel and interact in life. ...
    • Enhancing WPS security 

      Zisiadis, D.; Kopsidas, S.; Varalis, A.; Tassiulas, L. (2012)
      The main concern on the use of wireless technologies is security, due to the nature of the medium. User awareness in order to implement efficient security configurations is an important requirement raised by the technology, ...
    • Mailbook: A social network against spamming 

      Zisiadis, D.; Kopsidas, S.; Varalis, A.; Tassiulas, L. (2011)
      Spam is the main problem of email systems nowadays. The total amount of spam emails account for more than 75% of the total emails exchanged worldwide; recent reports raise this number up to more than 90%. Novel anti-spam ...
    • A secure VoIP conference system: Architecture analysis and design issues 

      Kopsidas, S.; Zisiadis, D.; Tassiulas, L. (2007)
      In this paper we present the architectural design of a secure VoIP conference system for mobile devices, which is using the strong security mechanisms of the Z Real Time Transport Protocol (ZRTP). We also provide implementation ...
    • Simple Mail Delivery Protocol: Recipient-based email delivery with anti-spam support 

      Zisiadis, D.; Kopsidas, S.; Tassiulas, L. (2013)
      In this paper we propose a user based architecture for the email system, where the recipient of an email message manage its receipt in conjunction with both origin and destination email servers. Messages are kept to the ...
    • VIPSec defined 

      Zisiadis, D.; Kopsidas, S.; Tassiulas, L. (2008)
      Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...
    • Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification 

      Kopsidas, S.; Zisiadis, D.; Tassiulas, L. (2006)
      Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...
    • Voice interactive personalized security protocol: Definition and security analysis 

      Zisiadis, D.; Kopsidas, S.; Tassiulas, L. (2007)
      Security is a major issue in VoIP communications over the Internet, especially in mobile environments. Voice Interactive Personalized Security (VIPSec) constitutes a method for leveraging the security for Internet ...