Athanasios Zigomitros

ORCID: 0000-0003-1622-2815
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Privacy, Security, and Data Protection
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Context-Aware Activity Recognition Systems
  • Spam and Phishing Detection
  • QR Code Applications and Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Oral and gingival health research
  • Advanced Image and Video Retrieval Techniques
  • User Authentication and Security Systems
  • Digital Mental Health Interventions
  • Mobile Health and mHealth Applications
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Innovative Human-Technology Interaction

University of Piraeus
2011-2020

Institute of Communication and Computer Systems
2014

Athena Research and Innovation Center In Information Communication & Knowledge Technologies
2014

Recent advances in telecommunications and database systems have allowed the scientific community to efficiently mine vast amounts of information worldwide extract new knowledge by discovering hidden patterns correlations. Nevertheless, all this shared can be used invade privacy individuals through use fusion mining techniques. Simply removing direct identifiers such as name, SSN, or phone number is not anymore sufficient prevent against these practices. In numerous cases, other fields, like...

10.1109/access.2020.2980235 article EN cc-by IEEE Access 2020-01-01

Due to the rise of social media, several new needs, problems and challenges have emerged in users' privacy security policies. Two very serious that should be addressed are identity theft unauthorized content sharing. In this work we propose a more secure scheme for networks by use watermarking manages diminish these problems, at least inside current media architectures, without need building them from scratch.

10.1109/trustcom.2012.264 article EN 2012-06-01

A key aspect of online social networks (OSNs) is the user-generated multimedia content shared online. OSNs like Facebook have to deal with up 300 million photos uploaded on a daily basis, both video- and audio-related also started gain important shares market. Although security privacy mechanisms deployed by can cope several risks discourage inexperienced users from malicious behaviours, many issues still need be addressed. Uploaded carries information that could transmitted virally almost...

10.1093/comjnl/bxu066 article EN The Computer Journal 2014-07-31

The Human Genome Project has generated a great wealth of information. Currently, almost all human genome been sequenced and now it is time to identify the functionality each gene. sequence base pairs accounts for approximately 3 billion elements. While there are many efficient algorithms implementations mine this information, doing privately challenge. Current state-of-the-art methods have improved their efficiency, but they not practical yet. In article, we introduce several protocols...

10.1109/cbms.2015.70 article EN 2015-06-01

The quality of life has been significantly improved and one the main reasons is medical advances past decades. Nevertheless, to further advance research services in field, practitioners, researchers health organizations should share more information. While this need indisputable, sensitivity information demands that it preprocessed, so published data are anonym zed individuals cannot be identified. scope work highlight difficulties providing automated anonymization approaches for records...

10.1109/cbms.2014.88 article EN 2014-05-01

Providing users with a lot of information might sound ideal in many scenarios, nonetheless, this may often be very annoying for the end user. To limit amount that has to processed by user, set is more relevant his needs, most service providers use recommender systems. Undoubtedly, provide someone proper recommendations, one needs some background knowledge about individual. Nonetheless, depending on nature query, database and means acquire knowledge, sensitive user can leaked system,...

10.1109/iisa.2016.7785379 article EN 2016-07-01

Modern mobile and wearable devices are enabling the realization of so-called ubiquitous computing. This provides citizens technological means to contribute urban management by becoming sensors within a smart city. Notwithstanding, health sector is very crucial factor for city management, imposing restrictions decisions directly or indirectly. The question that arises given current advances, could we collect related data from without violating their privacy? In this work propose methodology...

10.1109/cbms.2014.89 article EN 2014-05-01

In an attempt to make our cities more sustainable and resource efficient, we are transforming them into what now call Smart Cities. This transformation is heavily dependent on ICT, where a huge network of interconnected sensors other devices deployed monitor many aspects urban life in real-time. Recently, Solanas et al. [1] introduced the concept Health (s-Health) which resources smart city exploited facilitate provision healthcare services citizens. this position paper explore potentials...

10.1109/iisa.2015.7388027 article EN 2015-07-01
Coming Soon ...