Spyros Kopsidas

Learn More
In this paper we propose a user based architecture for the email system , where the recipient of an email message manage its receipt in conjunction with both origin and destination email servers. Messages are kept to the origin email server until a confirmation from the recipient is issued though the destination email server. Therefore, spam email doesn't(More)
In this paper we present the architectural design of a secure VoIP conference system for mobile devices, which is using the strong security mechanisms of the Z Real Time Transport Protocol (ZRTP). We also provide implementation fundamentals of the proposed system. We analyze the core elements and we present the primitive characteristics of the component(More)
Transportation networks are open and accessible, by design, and thus vulnerable to malicious attacks. Transportation networks are integral parts of larger systems, where individual transportation networks form a network-of-networks within a defined geographical region. A security incident on an asset can propagate to new security incidents in interconnected(More)
—The main concern on the use of wireless technologies is security, due to the nature of the medium. User awareness in order to implement efficient security configurations is an important requirement raised by the technology, undermining its use. Wireless Protected Setup (WPS) was introduced as a viable solution to the problem, offering automatic network(More)
Handling multiple sets of trouble tickets (TTs) originating from different participants in today's GRID interconnected network environments poses a series of challenges for the involved institutions. Each of the participants follows different procedures for handling trouble incidents in its domain, according to the local technical and linguistic profile.(More)