The main aim of the dissertation is data security and data protection in the process of processing, transferring and / or storing it in computer systems. In particular, a new proven security key agreement model is proposed, a new cryptographic protocol of proven security, minimal complexity and low cost computing and an application. Also, a new access control system based on the user role model in the field of hospital information systems is presented. Finally, a comparative study of known cryptography protocols is presented.Η διατριβή έχει ως κύριο στόχο την ασφάλεια και την προστασία δεδομένων κατά την διαδικασία της επεξεργασίας, μεταφοράς ή/και αποθήκευσης τους σε συστήματα υπολογιστών. Ειδικότερα προτείνεται ένα νέο μοντέλο συμφωνίας κ...
Discrete problems are a major part of research in nonlinear optics. In the present dissertation such...
The generation of all different type of cells that reside the adult brain, as well as thegeneration ...
This study examines if and to what extend specific spatial configurations create intangible limits b...
A distributed credentials-based access control environment is introduced appropriate for protecting ...
The aim of this PhD thesis was to analyze and asses EU’s performance as a global security actor in c...
The particular thesis deals with the criminal treatment of the attacks on information systems. In th...
This research evaluates the application and the results of the P.A.R.M.M. (model of performance and ...
The present PhD thesis focuses on the scientific discipline of Multi-criteria Spatial Decision Suppo...
In this thesis we deal with the issue of Distributed Denial of Service attacks on the Internet. We a...
This PhD thesis investigates both theoretically and empirically the operating framework and characte...
The purpose of this paper is to examine the virtual store layout’s perceived ease of useeffects on c...
The present PhD thesis deals with problems related to reliability theory and statistical quality con...
In the present Ph.D. thesis, analytical procedures for the separation and quantification of selenium...
In this thesis the author rejects rational choice theory as an unrealistic approach to real world ta...
At the present PhD Thesis three new stochastic fractal models were introduced. The stochastic models...
Discrete problems are a major part of research in nonlinear optics. In the present dissertation such...
The generation of all different type of cells that reside the adult brain, as well as thegeneration ...
This study examines if and to what extend specific spatial configurations create intangible limits b...
A distributed credentials-based access control environment is introduced appropriate for protecting ...
The aim of this PhD thesis was to analyze and asses EU’s performance as a global security actor in c...
The particular thesis deals with the criminal treatment of the attacks on information systems. In th...
This research evaluates the application and the results of the P.A.R.M.M. (model of performance and ...
The present PhD thesis focuses on the scientific discipline of Multi-criteria Spatial Decision Suppo...
In this thesis we deal with the issue of Distributed Denial of Service attacks on the Internet. We a...
This PhD thesis investigates both theoretically and empirically the operating framework and characte...
The purpose of this paper is to examine the virtual store layout’s perceived ease of useeffects on c...
The present PhD thesis deals with problems related to reliability theory and statistical quality con...
In the present Ph.D. thesis, analytical procedures for the separation and quantification of selenium...
In this thesis the author rejects rational choice theory as an unrealistic approach to real world ta...
At the present PhD Thesis three new stochastic fractal models were introduced. The stochastic models...
Discrete problems are a major part of research in nonlinear optics. In the present dissertation such...
The generation of all different type of cells that reside the adult brain, as well as thegeneration ...
This study examines if and to what extend specific spatial configurations create intangible limits b...