Sotirios Terzis, PhD, MSc, BSc(Hon), MBCS, CITP, FHEA

Dr

  • United Kingdom

Accepting PhD Students

PhD projects

Socio-technical design of authentication mechanisms.
Understand the factors that drive user attitudes and behavior towards authentication systems and based on this understanding devise a methodology for effective authentication mechanism design.

Transparency and accountability in cloud computing systems
Move away from current blind trust in cloud computing systems towards appropriate trust management through the design and utilization of security mechanism that enhance transparency and accountability.

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution book

Search results

  • 2022

    Understanding phishing in mobile instant messaging: a study into user behaviour toward shared links

    Ahmad, R. & Terzis, S., 22 Jul 2022, Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Proceedings. Clarke, N. & Furnell, S. (eds.). Cham, Switzerland: Springer, p. 197-206 10 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 658, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2016

    VD-PSI: verifiable delegated private set intersection on outsourced private datasets

    Abadi, A., Terzis, S. & Dong, C., 10 Jun 2016, Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers. Grossklags, J. & Preneel, B. (eds.). Berlin Heidelberg, Vol. 9603. p. 149-168 20 p. (Lecture Notes in Computer Science; vol. 9603).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    31 Downloads (Pure)
  • 2012

    Distress detection

    Vella, M. J., Terzis, S. & Roper, M., 12 Sep 2012, Research in Attacks, Intrusions, and Defenses: Proceedings of the 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Davide, B., Salvatore.J., S. & Marco, C. (eds.). Springer, p. 384-385 2 p. (Lecture Notes in Computer Science; vol. 7462).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • A middleware for pervasive situation-awareness

    Thomson, G. & Terzis, S., Jun 2012, Distributed Applications and Interoperable Systems: 12th IFIP WG 6.1 International Conference, DAIS 2012. Goschka, K. & Haridi, S. (eds.). Vol. 7272. p. 148-161 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    File
    127 Downloads (Pure)
  • 2011

    Novice user perception of e-services: a study in the Egyptian public sector

    Nosseir, A. & Terzis, S., Dec 2011, Applied electrical engineering and computing technologies : conference proceedings. New York: IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    2 Citations (Scopus)
  • Towards authentication via selected extraction from electronic personal histories

    Nosseir, A. & Terzis, S., 2011, Enterprise Information Systems: Revised Selected Papers of the 12th International Conference on Enterprise Information Systems. Filipe, J. & Cordeiro, J. (eds.). Springer, p. 571-586 16 p. (Lecture Notes in Business Information Processing; vol. 73).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • 2010

    A study in authentication via electronic personal history questions

    Nosseir, A. & Terzis, S., Jun 2010, Proceedings of the 12th International Conference on Enterprise Information Systems. Cordeiro, J. (ed.). p. 63-70 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    6 Citations (Scopus)
  • Danger theory and intrusion detection: possibilities and limitations of the analogy

    Vella, M., Roper, M. & Terzis, S., 2010, Artificial Immune Systems: Proceedings of the 9th International Conference, ICARIS 2010. Hart, E., McEwan, C., Timmis, J. & Hone, A. (eds.). Springer, p. 276-289 14 p. (Lecture Notes in Computer Science; vol. 6209).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    8 Citations (Scopus)