{"e7808cfc7557d5958801ae598de3ec24dblp":{"DOI":"","ISBN":"","ISSN":"","URL":"http://dblp.uni-trier.de/db/journals/cm/cm52.html#KrontirisLS14","abstract":"","annote":"","author":[{"family":"Krontiris","given":"Ioannis"},{"family":"Langheinrich","given":"Marc"},{"family":"Shilton","given":"Katie"}],"citation-label":"journals/cm/KrontirisLS14","collection-editor":[],"collection-title":"","container-author":[],"container-title":"IEEE Communications Magazine","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2014"]],"literal":"2014"},"event-place":"","id":"e7808cfc7557d5958801ae598de3ec24dblp","interhash":"dfa3873e9b0ece61c93a70f7a19b7180","intrahash":"e7808cfc7557d5958801ae598de3ec24","issue":"8","issued":{"date-parts":[["2014"]],"literal":"2014"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1109/MCOM.2014.6871669"},"note":"","number":"8","number-of-pages":"5","page":"50-55","page-first":"50","publisher":"","publisher-place":"","status":"","title":"Trust and privacy in mobile experience sharing: future challenges and avenues for research.","type":"article-journal","username":"dblp","version":"","volume":"52"},"3a62d35236377b31b4ead6ceb3c8b325dblp":{"DOI":"","ISBN":"978-3-319-24017-6","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/wistp/wistp2015.html#DimitriouK15","abstract":"","annote":"","author":[{"family":"Dimitriou","given":"Tassos"},{"family":"Krontiris","given":"Ioannis"}],"citation-label":"conf/wistp/DimitriouK15","collection-editor":[{"family":"Akram","given":"Raja Naeem"},{"family":"Jajodia","given":"Sushil"}],"collection-title":"Lecture Notes in Computer Science","container-author":[{"family":"Akram","given":"Raja Naeem"},{"family":"Jajodia","given":"Sushil"}],"container-title":"WISTP","documents":[],"edition":"","editor":[{"family":"Akram","given":"Raja Naeem"},{"family":"Jajodia","given":"Sushil"}],"event-date":{"date-parts":[["2015"]],"literal":"2015"},"event-place":"","id":"3a62d35236377b31b4ead6ceb3c8b325dblp","interhash":"c0a6b161368d990080546b637df23b21","intrahash":"3a62d35236377b31b4ead6ceb3c8b325","issue":"","issued":{"date-parts":[["2015"]],"literal":"2015"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1007/978-3-319-24018-3_2","isbn":"978-3-319-24017-6"},"note":"","number":"","number-of-pages":"15","page":"20-35","page-first":"20","publisher":"Springer","publisher-place":"","status":"","title":"Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing.","type":"paper-conference","username":"dblp","version":"","volume":"9311"},"ab856c22596895465ee655f599b55d52dblp":{"DOI":"","ISBN":"978-1-4503-7164-3","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/IEEEares/ares2019.html#GiannetsosK19","abstract":"","annote":"","author":[{"family":"Giannetsos","given":"Thanassis"},{"family":"Krontiris","given":"Ioannis"}],"citation-label":"conf/IEEEares/GiannetsosK19","collection-editor":[],"collection-title":"","container-author":[],"container-title":"ARES","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"ab856c22596895465ee655f599b55d52dblp","interhash":"6fabf54bb9f0498c63b4a52aac054adb","intrahash":"ab856c22596895465ee655f599b55d52","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1145/3339252.3340523","isbn":"978-1-4503-7164-3"},"note":"","number":"","page":"95:1-95:8","page-first":"95","publisher":"ACM","publisher-place":"","status":"","title":"Securing V2X Communications for the Future: Can PKI Systems offer the answer?","type":"paper-conference","username":"dblp","version":"","volume":""},"b2714abde83a8dae10d2964e8abfd367dblp":{"DOI":"","ISBN":"978-1-4503-5970-2","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/chi/chi2019.html#HopeDHMRKZ19","abstract":"","annote":"","author":[{"family":"Hope","given":"Alexis"},{"family":"D'Ignazio","given":"Catherine"},{"family":"Hoy","given":"Josephine"},{"family":"Michelson","given":"Rebecca"},{"family":"Roberts","given":"Jennifer"},{"family":"Krontiris","given":"Kate"},{"family":"Zuckerman","given":"Ethan"}],"citation-label":"conf/chi/HopeDHMRKZ19","collection-editor":[{"family":"Brewster","given":"Stephen A."},{"family":"Fitzpatrick","given":"Geraldine"},{"family":"Cox","given":"Anna L."},{"family":"Kostakos","given":"Vassilis"}],"collection-title":"","container-author":[{"family":"Brewster","given":"Stephen A."},{"family":"Fitzpatrick","given":"Geraldine"},{"family":"Cox","given":"Anna L."},{"family":"Kostakos","given":"Vassilis"}],"container-title":"CHI","documents":[],"edition":"","editor":[{"family":"Brewster","given":"Stephen A."},{"family":"Fitzpatrick","given":"Geraldine"},{"family":"Cox","given":"Anna L."},{"family":"Kostakos","given":"Vassilis"}],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"","id":"b2714abde83a8dae10d2964e8abfd367dblp","interhash":"037eee01bad529bd1e1a278a2a6261b5","intrahash":"b2714abde83a8dae10d2964e8abfd367","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1145/3290605.3300291","isbn":"978-1-4503-5970-2"},"note":"","number":"","page":"61","page-first":"61","publisher":"ACM","publisher-place":"","status":"","title":"Hackathons as Participatory Design: Iterating Feminist Utopias.","type":"paper-conference","username":"dblp","version":"","volume":""},"b470be881d78721214be95bdee4a4d26dblp":{"DOI":"","ISBN":"978-1-4244-6605-4","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/percom/percomw2010.html#KrontirisF10","abstract":"","annote":"","author":[{"family":"Krontiris","given":"Ioannis"},{"family":"Freiling","given":"Felix C."}],"citation-label":"conf/percom/KrontirisF10","collection-editor":[],"collection-title":"","container-author":[],"container-title":"PerCom Workshops","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2010"]],"literal":"2010"},"event-place":"","id":"b470be881d78721214be95bdee4a4d26dblp","interhash":"be1264c5bf671e13a2e2bd49ce36cd5d","intrahash":"b470be881d78721214be95bdee4a4d26","issue":"","issued":{"date-parts":[["2010"]],"literal":"2010"},"keyword":"dblp","misc":{"ee":"http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2010.5470510","isbn":"978-1-4244-6605-4"},"note":"","number":"","number-of-pages":"3","page":"620-623","page-first":"620","publisher":"IEEE Computer Society","publisher-place":"","status":"","title":"Integrating people-centric sensing with social networks: A privacy research agenda.","type":"paper-conference","username":"dblp","version":"","volume":""},"ff6850d6f56d6ec47e8813287fdd4612dblp":{"DOI":"","ISBN":"","ISSN":"","URL":"http://dblp.uni-trier.de/db/journals/ijrr/ijrr37.html#HanSKBY18","abstract":"","annote":"","author":[{"family":"Han","given":"Shuai D."},{"family":"Stiffler","given":"Nicholas M."},{"family":"Krontiris","given":"Athanasios"},{"family":"Bekris","given":"Kostas E."},{"family":"Yu","given":"Jingjin"}],"citation-label":"journals/ijrr/HanSKBY18","collection-editor":[],"collection-title":"","container-author":[],"container-title":"I. J. Robotics Res.","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018"]],"literal":"2018"},"event-place":"","id":"ff6850d6f56d6ec47e8813287fdd4612dblp","interhash":"6f7f655f714a05553da240f23e3bf853","intrahash":"ff6850d6f56d6ec47e8813287fdd4612","issue":"13-14","issued":{"date-parts":[["2018"]],"literal":"2018"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1177/0278364918780999"},"note":"","number":"13-14","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Complexity Results and Fast Methods for Optimal Tabletop Rearrangement with Overhand Grasps.","type":"article-journal","username":"dblp","version":"","volume":"37"},"1cbd7bd5e907cd10e0e68ea471f55e07dblp":{"DOI":"","ISBN":"978-0-9923747-3-0","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/rss/rss2017.html#HanSKBY17","abstract":"","annote":"","author":[{"family":"Han","given":"Shuai D."},{"family":"Stiffler","given":"Nicholas M."},{"family":"Krontiris","given":"Athanasios"},{"family":"Bekris","given":"Kostas E."},{"family":"Yu","given":"Jingjin"}],"citation-label":"conf/rss/HanSKBY17","collection-editor":[{"family":"Amato","given":"Nancy M."},{"family":"Srinivasa","given":"Siddhartha S."},{"family":"Ayanian","given":"Nora"},{"family":"Kuindersma","given":"Scott"}],"collection-title":"","container-author":[{"family":"Amato","given":"Nancy M."},{"family":"Srinivasa","given":"Siddhartha S."},{"family":"Ayanian","given":"Nora"},{"family":"Kuindersma","given":"Scott"}],"container-title":"Robotics: Science and Systems","documents":[],"edition":"","editor":[{"family":"Amato","given":"Nancy M."},{"family":"Srinivasa","given":"Siddhartha S."},{"family":"Ayanian","given":"Nora"},{"family":"Kuindersma","given":"Scott"}],"event-date":{"date-parts":[["2017"]],"literal":"2017"},"event-place":"","id":"1cbd7bd5e907cd10e0e68ea471f55e07dblp","interhash":"8aff8fe3d8c0280f8d71ccd319b30a5f","intrahash":"1cbd7bd5e907cd10e0e68ea471f55e07","issue":"","issued":{"date-parts":[["2017"]],"literal":"2017"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.15607/RSS.2017.XIII.051","isbn":"978-0-9923747-3-0"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"High-Quality Tabletop Rearrangement with Overhand Grasps: Hardness Results and Fast Methods.","type":"paper-conference","username":"dblp","version":"","volume":""},"1086dd00e4296b692bee0c8a2035f47bdblp":{"DOI":"","ISBN":"","ISSN":"","URL":"http://dblp.uni-trier.de/db/journals/ar/ar31.html#KrontirisB17","abstract":"","annote":"","author":[{"family":"Krontiris","given":"Athanasios"},{"family":"Bekris","given":"Kostas E."}],"citation-label":"journals/ar/KrontirisB17","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Advanced Robotics","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2017"]],"literal":"2017"},"event-place":"","id":"1086dd00e4296b692bee0c8a2035f47bdblp","interhash":"e12611ed5702e8c9f31aff637aba942a","intrahash":"1086dd00e4296b692bee0c8a2035f47b","issue":"23-24","issued":{"date-parts":[["2017"]],"literal":"2017"},"keyword":"dblp","misc":{"ee":"https://www.wikidata.org/entity/Q58027527"},"note":"","number":"23-24","number-of-pages":"11","page":"1313-1324","page-first":"1313","publisher":"","publisher-place":"","status":"","title":"Trade-off in the computation of minimum constraint removal paths for manipulation planning.","type":"article-journal","username":"dblp","version":"","volume":"31"},"5daa91fa2c6f5017088bf206bb967327dblp":{"DOI":"","ISBN":"978-1-4503-4745-7","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/ca/casa2016.html#KrontirisBK16","abstract":"","annote":"","author":[{"family":"Krontiris","given":"Athanasios"},{"family":"Bekris","given":"Kostas E."},{"family":"Kapadia","given":"Mubbasir"}],"citation-label":"conf/ca/KrontirisBK16","collection-editor":[{"family":"Magnenat-Thalmann","given":"Nadia"},{"family":"Gavrilova","given":"Marina L."},{"family":"Komura","given":"Taku"},{"family":"Cordier","given":"Frederic"},{"family":"Thalmann","given":"Daniel"}],"collection-title":"","container-author":[{"family":"Magnenat-Thalmann","given":"Nadia"},{"family":"Gavrilova","given":"Marina L."},{"family":"Komura","given":"Taku"},{"family":"Cordier","given":"Frederic"},{"family":"Thalmann","given":"Daniel"}],"container-title":"CASA","documents":[],"edition":"","editor":[{"family":"Magnenat-Thalmann","given":"Nadia"},{"family":"Gavrilova","given":"Marina L."},{"family":"Komura","given":"Taku"},{"family":"Cordier","given":"Frederic"},{"family":"Thalmann","given":"Daniel"}],"event-date":{"date-parts":[["2016"]],"literal":"2016"},"event-place":"","id":"5daa91fa2c6f5017088bf206bb967327dblp","interhash":"a71d8b9f7f8e831dd3e0b5e913fab4a6","intrahash":"5daa91fa2c6f5017088bf206bb967327","issue":"","issued":{"date-parts":[["2016"]],"literal":"2016"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1145/2915926.2915935","isbn":"978-1-4503-4745-7"},"note":"","number":"","number-of-pages":"8","page":"61-69","page-first":"61","publisher":"ACM","publisher-place":"","status":"","title":"ACUMEN: Activity-Centric Crowd Authoring Using Influence Maps.","type":"paper-conference","username":"dblp","version":"","volume":""},"a50e66bba5aed59d6f7d9f4de18f52a2dblp":{"DOI":"","ISBN":"978-1-60558-241-2","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/securecomm/securecomm2008.html#KrontirisGD08","abstract":"","annote":"","author":[{"family":"Krontiris","given":"Ioannis"},{"family":"Giannetsos","given":"Thanassis"},{"family":"Dimitriou","given":"Tassos"}],"citation-label":"conf/securecomm/KrontirisGD08","collection-editor":[{"family":"Levi","given":"Albert"},{"family":"Liu","given":"Peng"},{"family":"Molva","given":"Refik"}],"collection-title":"","container-author":[{"family":"Levi","given":"Albert"},{"family":"Liu","given":"Peng"},{"family":"Molva","given":"Refik"}],"container-title":"SecureComm","documents":[],"edition":"","editor":[{"family":"Levi","given":"Albert"},{"family":"Liu","given":"Peng"},{"family":"Molva","given":"Refik"}],"event-date":{"date-parts":[["2008"]],"literal":"2008"},"event-place":"","id":"a50e66bba5aed59d6f7d9f4de18f52a2dblp","interhash":"2f31d8dc56f809df12656c3e3b1b3fdc","intrahash":"a50e66bba5aed59d6f7d9f4de18f52a2","issue":"","issued":{"date-parts":[["2008"]],"literal":"2008"},"keyword":"dblp","misc":{"ee":"http://eudl.eu/doi/10.1145/1460877.1460903","isbn":"978-1-60558-241-2"},"note":"","number":"","page":"20","page-first":"20","publisher":"ACM","publisher-place":"","status":"","title":"LIDeA: a distributed lightweight intrusion detection architecture for sensor networks.","type":"paper-conference","username":"dblp","version":"","volume":""},"1ec6525535d2783d71ace79d8c1a5375dblp":{"DOI":"","ISBN":"","ISSN":"","URL":"http://dblp.uni-trier.de/db/journals/corr/corr1705.html#HanSKBY17","abstract":"","annote":"","author":[{"family":"Han","given":"Shuai D."},{"family":"Stiffler","given":"Nicholas M."},{"family":"Krontiris","given":"Athanasios"},{"family":"Bekris","given":"Kostas E."},{"family":"Yu","given":"Jingjin"}],"citation-label":"journals/corr/HanSKBY17","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2017"]],"literal":"2017"},"event-place":"","id":"1ec6525535d2783d71ace79d8c1a5375dblp","interhash":"8aff8fe3d8c0280f8d71ccd319b30a5f","intrahash":"1ec6525535d2783d71ace79d8c1a5375","issue":"","issued":{"date-parts":[["2017"]],"literal":"2017"},"keyword":"dblp","misc":{"ee":"http://arxiv.org/abs/1705.09180"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"High-Quality Tabletop Rearrangement with Overhand Grasps: Hardness Results and Fast Methods.","type":"article-journal","username":"dblp","version":"","volume":"abs/1705.09180"},"2a52ff3038bdb939c247e52adefcae13dblp":{"DOI":"","ISBN":"","ISSN":"","URL":"http://dblp.uni-trier.de/db/journals/corr/corr1711.html#abs-1711-07369","abstract":"","annote":"","author":[{"family":"Han","given":"Shuai D."},{"family":"Stiffler","given":"Nicholas M."},{"family":"Krontiris","given":"Athanasios"},{"family":"Bekris","given":"Kostas E."},{"family":"Yu","given":"Jingjin"}],"citation-label":"journals/corr/abs-1711-07369","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2017"]],"literal":"2017"},"event-place":"","id":"2a52ff3038bdb939c247e52adefcae13dblp","interhash":"abb077dd452d959df7468f5f1d5b106b","intrahash":"2a52ff3038bdb939c247e52adefcae13","issue":"","issued":{"date-parts":[["2017"]],"literal":"2017"},"keyword":"dblp","misc":{"ee":"http://arxiv.org/abs/1711.07369"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Complexity Results and Fast Methods for Optimal Tabletop Rearrangement with Overhand Grasps.","type":"article-journal","username":"dblp","version":"","volume":"abs/1711.07369"},"0f5a0d2a6f8df2ccc62453b3b2a28afcdblp":{"DOI":"","ISBN":"","ISSN":"","URL":"http://dblp.uni-trier.de/db/journals/corr/corr1404.html#KrontirisSDKYB14","abstract":"","annote":"","author":[{"family":"Krontiris","given":"Athanasios"},{"family":"Shome","given":"Rahul"},{"family":"Dobson","given":"Andrew"},{"family":"Kimmel","given":"Andrew"},{"family":"Yochelson","given":"Isaac"},{"family":"Bekris","given":"Kostas E."}],"citation-label":"journals/corr/KrontirisSDKYB14","collection-editor":[],"collection-title":"","container-author":[],"container-title":"CoRR","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2014"]],"literal":"2014"},"event-place":"","id":"0f5a0d2a6f8df2ccc62453b3b2a28afcdblp","interhash":"fa70f21e2af513e0bfe654bcbd68e264","intrahash":"0f5a0d2a6f8df2ccc62453b3b2a28afc","issue":"","issued":{"date-parts":[["2014"]],"literal":"2014"},"keyword":"dblp","misc":{"ee":"http://arxiv.org/abs/1404.6573"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Similar Part Rearrangement With Pebble Graphs.","type":"article-journal","username":"dblp","version":"","volume":"abs/1404.6573"},"560841098b1c86af07f32a19a9299babdblp":{"DOI":"","ISBN":"3-540-32992-7","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/wac/wac2005.html#DimitriouK05","abstract":"","annote":"","author":[{"family":"Dimitriou","given":"Tassos"},{"family":"Krontiris","given":"Ioannis"}],"citation-label":"conf/wac/DimitriouK05","collection-editor":[{"family":"Stavrakakis","given":"Ioannis"},{"family":"Smirnov","given":"Michael"}],"collection-title":"Lecture Notes in Computer Science","container-author":[{"family":"Stavrakakis","given":"Ioannis"},{"family":"Smirnov","given":"Michael"}],"container-title":"WAC","documents":[],"edition":"","editor":[{"family":"Stavrakakis","given":"Ioannis"},{"family":"Smirnov","given":"Michael"}],"event-date":{"date-parts":[["2005"]],"literal":"2005"},"event-place":"","id":"560841098b1c86af07f32a19a9299babdblp","interhash":"93fe8e313cbc6f98e0d59a4852b9d65d","intrahash":"560841098b1c86af07f32a19a9299bab","issue":"","issued":{"date-parts":[["2005"]],"literal":"2005"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1007/11687818_11","isbn":"3-540-32992-7"},"note":"","number":"","number-of-pages":"11","page":"141-152","page-first":"141","publisher":"Springer","publisher-place":"","status":"","title":"Autonomic Communication Security in Sensor Networks.","type":"paper-conference","username":"dblp","version":"","volume":"3854"},"a556fd661104a9557d9adfc89c73a94cdblp":{"DOI":"","ISBN":"978-3-642-55414-8","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/sec/sec2014.html#VeseliVKRS14","abstract":"","annote":"","author":[{"family":"Veseli","given":"Fatbardh"},{"family":"Vateva-Gurova","given":"Tsvetoslava"},{"family":"Krontiris","given":"Ioannis"},{"family":"Rannenberg","given":"Kai"},{"family":"Suri","given":"Neeraj"}],"citation-label":"conf/sec/VeseliVKRS14","collection-editor":[{"family":"Cuppens-Boulahia","given":"Nora"},{"family":"Cuppens","given":"Frédéric"},{"family":"Jajodia","given":"Sushil"},{"family":"Kalam","given":"Anas Abou El"},{"family":"Sans","given":"Thierry"}],"collection-title":"IFIP Advances in Information and Communication Technology","container-author":[{"family":"Cuppens-Boulahia","given":"Nora"},{"family":"Cuppens","given":"Frédéric"},{"family":"Jajodia","given":"Sushil"},{"family":"Kalam","given":"Anas Abou El"},{"family":"Sans","given":"Thierry"}],"container-title":"SEC","documents":[],"edition":"","editor":[{"family":"Cuppens-Boulahia","given":"Nora"},{"family":"Cuppens","given":"Frédéric"},{"family":"Jajodia","given":"Sushil"},{"family":"Kalam","given":"Anas Abou El"},{"family":"Sans","given":"Thierry"}],"event-date":{"date-parts":[["2014"]],"literal":"2014"},"event-place":"","id":"a556fd661104a9557d9adfc89c73a94cdblp","interhash":"2ff213a53083db546e0e4b408d7013e9","intrahash":"a556fd661104a9557d9adfc89c73a94c","issue":"","issued":{"date-parts":[["2014"]],"literal":"2014"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1007/978-3-642-55415-5_16","isbn":"978-3-642-55414-8"},"note":"","number":"","number-of-pages":"7","page":"197-204","page-first":"197","publisher":"Springer","publisher-place":"","status":"","title":"Towards a Framework for Benchmarking Privacy-ABC Technologies.","type":"paper-conference","username":"dblp","version":"","volume":"428"},"c89bbbd340690cb8ddc88121cf261b10dblp":{"DOI":"","ISBN":"978-1-57735-575-5","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/aaai/mapf2012.html#KrontirisSB12","abstract":"","annote":"","author":[{"family":"Krontiris","given":"Athanasios"},{"family":"Sajid","given":"Qandeel"},{"family":"Bekris","given":"Kostas E."}],"citation-label":"conf/aaai/KrontirisSB12","collection-editor":[{"family":"Felner","given":"Ariel"},{"family":"Sturtevant","given":"Nathan R."},{"family":"Bekris","given":"Kostas E."},{"family":"Stern","given":"Roni"}],"collection-title":"AAAI Technical Report","container-author":[{"family":"Felner","given":"Ariel"},{"family":"Sturtevant","given":"Nathan R."},{"family":"Bekris","given":"Kostas E."},{"family":"Stern","given":"Roni"}],"container-title":"MAPF@AAAI","documents":[],"edition":"","editor":[{"family":"Felner","given":"Ariel"},{"family":"Sturtevant","given":"Nathan R."},{"family":"Bekris","given":"Kostas E."},{"family":"Stern","given":"Roni"}],"event-date":{"date-parts":[["2012"]],"literal":"2012"},"event-place":"","id":"c89bbbd340690cb8ddc88121cf261b10dblp","interhash":"e8bbde27bbfdd74239f619a34268a45a","intrahash":"c89bbbd340690cb8ddc88121cf261b10","issue":"","issued":{"date-parts":[["2012"]],"literal":"2012"},"keyword":"dblp","misc":{"ee":"http://www.aaai.org/ocs/index.php/WS/AAAIW12/paper/view/5328","isbn":"978-1-57735-575-5"},"note":"","number":"","page":"","page-first":"","publisher":"AAAI Press","publisher-place":"","status":"","title":"Towards Using Discrete Multiagent Pathfinding to Address Continuous Problems.","type":"paper-conference","username":"dblp","version":"","volume":"WS-12-10"},"ce50ea5d54abad52ac2f2c7048394bc5dblp":{"DOI":"","ISBN":"3-540-21959-5","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/networking/networking2004.html#DimitriouKNS04","abstract":"","annote":"","author":[{"family":"Dimitriou","given":"Tassos"},{"family":"Krontiris","given":"Ioannis"},{"family":"Nikakis","given":"Fotios"},{"family":"Spirakis","given":"Paul G."}],"citation-label":"conf/networking/DimitriouKNS04","collection-editor":[{"family":"Mitrou","given":"Nikolas"},{"family":"Kontovasilis","given":"Kimon P."},{"family":"Rouskas","given":"George N."},{"family":"Iliadis","given":"Ilias"},{"family":"Merakos","given":"Lazaros F."}],"collection-title":"Lecture Notes in Computer Science","container-author":[{"family":"Mitrou","given":"Nikolas"},{"family":"Kontovasilis","given":"Kimon P."},{"family":"Rouskas","given":"George N."},{"family":"Iliadis","given":"Ilias"},{"family":"Merakos","given":"Lazaros F."}],"container-title":"NETWORKING","documents":[],"edition":"","editor":[{"family":"Mitrou","given":"Nikolas"},{"family":"Kontovasilis","given":"Kimon P."},{"family":"Rouskas","given":"George N."},{"family":"Iliadis","given":"Ilias"},{"family":"Merakos","given":"Lazaros F."}],"event-date":{"date-parts":[["2004"]],"literal":"2004"},"event-place":"","id":"ce50ea5d54abad52ac2f2c7048394bc5dblp","interhash":"54842b36d0851c8f6f721636b6e6644f","intrahash":"ce50ea5d54abad52ac2f2c7048394bc5","issue":"","issued":{"date-parts":[["2004"]],"literal":"2004"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1007/978-3-540-24693-0_110","isbn":"3-540-21959-5"},"note":"","number":"","number-of-pages":"5","page":"1300-1305","page-first":"1300","publisher":"Springer","publisher-place":"","status":"","title":"SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks.","type":"paper-conference","username":"dblp","version":"","volume":"3042"},"e452a6481e581390b4dcc92962a9f93adblp":{"DOI":"","ISBN":"978-3-319-09769-5","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/trustbus/trustbus2014.html#SabouriKR14","abstract":"","annote":"","author":[{"family":"Sabouri","given":"Ahmad"},{"family":"Krontiris","given":"Ioannis"},{"family":"Rannenberg","given":"Kai"}],"citation-label":"conf/trustbus/SabouriKR14","collection-editor":[{"family":"Eckert","given":"Claudia"},{"family":"Katsikas","given":"Sokratis K."},{"family":"Pernul","given":"Günther"}],"collection-title":"Lecture Notes in Computer Science","container-author":[{"family":"Eckert","given":"Claudia"},{"family":"Katsikas","given":"Sokratis K."},{"family":"Pernul","given":"Günther"}],"container-title":"TrustBus","documents":[],"edition":"","editor":[{"family":"Eckert","given":"Claudia"},{"family":"Katsikas","given":"Sokratis K."},{"family":"Pernul","given":"Günther"}],"event-date":{"date-parts":[["2014"]],"literal":"2014"},"event-place":"","id":"e452a6481e581390b4dcc92962a9f93adblp","interhash":"0209a6dc8ada387ae0de995258f61eea","intrahash":"e452a6481e581390b4dcc92962a9f93a","issue":"","issued":{"date-parts":[["2014"]],"literal":"2014"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1007/978-3-319-09770-1_2","isbn":"978-3-319-09769-5"},"note":"","number":"","number-of-pages":"10","page":"13-23","page-first":"13","publisher":"Springer","publisher-place":"","status":"","title":"Trust Relationships in Privacy-ABCs' Ecosystems.","type":"paper-conference","username":"dblp","version":"","volume":"8647"},"9dccca0d4b6e481ce0227ca579404fbddblp":{"DOI":"","ISBN":"978-3-642-32286-0","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/trustbus/trustbus2012.html#SabouriKR12","abstract":"","annote":"","author":[{"family":"Sabouri","given":"Ahmad"},{"family":"Krontiris","given":"Ioannis"},{"family":"Rannenberg","given":"Kai"}],"citation-label":"conf/trustbus/SabouriKR12","collection-editor":[{"family":"Fischer-Hübner","given":"Simone"},{"family":"Katsikas","given":"Sokratis K."},{"family":"Quirchmayr","given":"Gerald"}],"collection-title":"Lecture Notes in Computer Science","container-author":[{"family":"Fischer-Hübner","given":"Simone"},{"family":"Katsikas","given":"Sokratis K."},{"family":"Quirchmayr","given":"Gerald"}],"container-title":"TrustBus","documents":[],"edition":"","editor":[{"family":"Fischer-Hübner","given":"Simone"},{"family":"Katsikas","given":"Sokratis K."},{"family":"Quirchmayr","given":"Gerald"}],"event-date":{"date-parts":[["2012"]],"literal":"2012"},"event-place":"","id":"9dccca0d4b6e481ce0227ca579404fbddblp","interhash":"7adc61510ec066741b87dfce54daddb4","intrahash":"9dccca0d4b6e481ce0227ca579404fbd","issue":"","issued":{"date-parts":[["2012"]],"literal":"2012"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1007/978-3-642-32287-7_21","isbn":"978-3-642-32286-0"},"note":"","number":"","number-of-pages":"1","page":"218-219","page-first":"218","publisher":"Springer","publisher-place":"","status":"","title":"Attribute-Based Credentials for Trust (ABC4Trust).","type":"paper-conference","username":"dblp","version":"","volume":"7449"},"0e3227b089c51096be632c967aefb00edblp":{"DOI":"","ISBN":"3-540-37246-6","ISSN":"","URL":"http://dblp.uni-trier.de/db/conf/adhoc-now/adhoc-now2006.html#KrontirisD06","abstract":"","annote":"","author":[{"family":"Krontiris","given":"Ioannis"},{"family":"Dimitriou","given":"Tassos"}],"citation-label":"conf/adhoc-now/KrontirisD06","collection-editor":[{"family":"Kunz","given":"Thomas"},{"family":"Ravi","given":"S. S."}],"collection-title":"Lecture Notes in Computer Science","container-author":[{"family":"Kunz","given":"Thomas"},{"family":"Ravi","given":"S. S."}],"container-title":"ADHOC-NOW","documents":[],"edition":"","editor":[{"family":"Kunz","given":"Thomas"},{"family":"Ravi","given":"S. S."}],"event-date":{"date-parts":[["2006"]],"literal":"2006"},"event-place":"","id":"0e3227b089c51096be632c967aefb00edblp","interhash":"85622bb9b0accb48b67298e62fa31185","intrahash":"0e3227b089c51096be632c967aefb00e","issue":"","issued":{"date-parts":[["2006"]],"literal":"2006"},"keyword":"dblp","misc":{"ee":"https://doi.org/10.1007/11814764_32","isbn":"3-540-37246-6"},"note":"","number":"","number-of-pages":"13","page":"390-403","page-first":"390","publisher":"Springer","publisher-place":"","status":"","title":"Authenticated In-Network Programming for Wireless Sensor Networks.","type":"paper-conference","username":"dblp","version":"","volume":"4104"}}