Skip to main content

Showing 1–6 of 6 results for author: Kantzavelou, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.10726  [pdf, ps, other

    cs.CR

    A Blockchain-based Electronic Voting System: EtherVote

    Authors: Achilleas Spanos, Ioanna Kantzavelou

    Abstract: The development of an electronic voting system that would replace traditional election procedures is a research topic of great interest for many years. Blockchain technology could provide some guarantees and fulfill strong requirements for electronic voting platforms, such as transparency, immutability, and confidentiality. From time to time research is conducted to address problems in voting syst… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 2 pages, Poster presented in ACM 5th summit on Gender Equality in Computing, GEC 2023, Athens University of Economics and Business, Athens, Greece, 27 June 2023

    ACM Class: C.2.0

  2. arXiv:2307.05047  [pdf, other

    cs.CR

    A Blockchain-based two Factor Honeytoken Authentication System

    Authors: Vasilis Papaspirou, Leandros Maglaras, Ioanna Kantzavelou, Naghmeh Moradpoor, Sokratis Katsikas

    Abstract: This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method to prevent many attacks including tampering attacks. Evaluation results show that integrating blockchain into the Honeytoken method could improve performance and operational efficiency.

    Submitted 12 July, 2023; v1 submitted 11 July, 2023; originally announced July 2023.

  3. arXiv:2211.06451  [pdf, other

    cs.CR

    Blockchain Technology to Secure Bluetooth

    Authors: Athanasios Kalogiratos, Ioanna Kantzavelou

    Abstract: Bluetooth is a communication technology used to wirelessly exchange data between devices. In the last few years there have been found a great number of security vulnerabilities, and adversaries are taking advantage of them causing harm and significant loss. Numerous system security updates have been approved and installed in order to sort out security holes and bugs, and prevent attacks that could… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

    Comments: 7 pages, 6 figures

    ACM Class: C.2.0

  4. arXiv:2112.08431  [pdf, other

    cs.CR

    Cybersecurity Revisited: Honeytokens meet Google Authenticator

    Authors: Vasilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag, Helge Janicke

    Abstract: Although sufficient authentication mechanisms were enhanced by the use of two or more factors that resulted in new multi factor authentication schemes, more sophisticated and targeted attacks have shown they are also vulnerable. This research work proposes a novel two factor authentication system that incorporates honeytokens into the two factor authentication process. The current implementation c… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: 6 pages, 1 figure

  5. arXiv:2012.08782  [pdf, other

    cs.CR

    A novel Two-Factor HoneyToken Authentication Mechanism

    Authors: Vassilis Papaspirou, Leandros Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris

    Abstract: The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regar… ▽ More

    Submitted 20 January, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: 7 pages, 6 figures

  6. arXiv:2010.15394  [pdf, other

    cs.CR

    Smart Homes: Security Challenges and Privacy Concerns

    Authors: Fraser Hall, Leandros Maglaras, Theodoros Aivaliotis, Loukas Xagoraris, Ioanna Kantzavelou

    Abstract: Development and growth of Internet of Things (IoT) technology has exponentially increased over the course of the last 10 years since its inception, and as a result has directly influenced the popularity and size of smart homes. In this article we present the main technologies and applications that constitute a smart home, we identify the main security and privacy challenges that smart home face an… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: 6 pages