Elias Pimenidis

Learn More
Electronic crime is very difficult to investigate and prosecute, mainly due to the fact that investigators have to build their cases based on artefacts left on computer systems. Nowadays, computer criminals are aware of computer forensics methods and techniques and try to use countermeasure techniques to efficiently impede the investigation processes. In(More)
Web Services, due to their integration potential, are being enthusiastically utilized for joining business processes in business to business (B2B) transactions. However, aiming at spontaneously integrating services from different providers in ensuring at offering a user the best possible experience, Web Services face considerable challenges in materialising(More)
Evaluating existing initiatives for developing electronic government (e-government) in addition to identifying main challenges can provide valuable learning points in contributing towards efficient and effective implementation of e-government projects. The digital divide, issues of cyber security, privacy and primarily trust have been identified as the main(More)
London Plan is the London mayor’s Spatial Development Strategy. This strategic long-term plan comprises of proposals for different aspects of change within the London boundary. Furthermore, the proposals include chapters outlining adjustments in each facet. Policy 4A.2 reflects the Climate Change Mitigation scheme. Some consultations and research works have(More)
The digital divide has been mostly affecting the world’s poorest primarily due to lack of internet connectivity. A number of e-government services especially built to serve low income citizens do not reach those in need. The rapid expansion of the use of the mobile phone raises hopes that the digital divide can be bridged faster by providing services to(More)
Directed fuzzy hypergraphs are introduced as a generalization of both crisp directed hypergraphs and directed fuzzy graphs. It is proved that the set of all directed fuzzy hypergraphs can be structured into a magmoid with operations graph composition and disjoint union. In this framework a notion of syntactic recognition inside magmoids is defined. The(More)
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the securely transmitted biometric data has not been constructed by an attacker. The biometric sensors of a biometric information system are(More)
Electronic Government applications have been the focus of hundreds of local and national government administrations all over the world during the past decade. The emphasis of most of these applications lies in their effort to improve the experience of the user in interacting with public administration services and to minimise waiting times in completing(More)