- K. Rantos, K. Fysarakis and Charalampos Manifavas. How Effective Is Your Security Awareness Program? An Evaluation Methodology, Information Security Journal: A Global Perspective, 21:6, 328-345, 2012.
- K. Rantos, A. Papanikolaou, K. Fysarakis, and C. Manifavas. Secure policy-based management solutions in heterogeneous embedded systems networks, in Proceedings of IEEE International conference on Telecomunications and Multimedia, TEMU2012, pp.227-232, Crete 2012.
- K. Rantos. Digital Signatures: How close is Europe to truly interoperable solutions?, in: B. De Decker, J. Lapon, V. Naessens, and A. Uhl (eds.) P. Bozanis and E. Houstis (eds.): Proceedings of the 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2011, Ghent, Belgium, 2011, Springer-Verlag (LNCS 7025), pp.155-162.
- K. Fysarakis, C. Manifavas, K. Rantos. Embedded Systems Security, Presented in the 10th International Symposium on Ambient Intelligence and Embedded Systems, AMIES 2011, Chania, Greece, 2011, http://www.fh-kiel.de/amies-2011.
- A. Papadakis, K. Rantos, A. Stasis, "Promoting e-gov services: e-Document interoperability across EU": Proceedings of the 15th Panhellenic Conference on Informatics, Kastoria, Greece, 2011, pp.304-308.
- A. Papadakis, K. Rantos, A. Stasis. The Realization of the Greek E-GIF, in Official Proceedings of the Second European Summit on Interoperability in the iGovernment, Rome 2008, www.esiig2.it.
- K. Rantos. Limitations Surrounding Certificate Handling on Smart Cards, in: P. Bozanis and E. Houstis (eds.): Proceedings of the 10th Panhellenic Conference in Informatics (PCI 2005), Volos, Greece, November 2005, pp. 77-87.
- K. Rantos and C.J. Mitchell. Matching key recovery mechanisms to business requirements. Computers & Security (2005) 24 (3), 232-245.
- K. Rantos and K. Markantonakis. An asymmetric cryptography secure channel protocol for smart cards, in: Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.): Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, August 2004, Toulouse, France. Kluwer 2004, pp. 351–366.
- K.Rantos and C.J. Mitchell. Key recovery scheme interoperability - a protocol for mechanism negotiation, in: B. Honary (ed.), Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001, Springer-Verlag (LNCS 2260), Berlin (2001), pp.268-276.
- K.Rantos and C.J.Mitchell. Key recovery for archived data using smart cards. In Proceedings of the 5th Nordic Workshop on Secure IT Systems (NORDSEC 2000), Reykjavik, Iceland, October 2000.
- C.J. Mitchell and K. Rantos. A fair certification protocol. ACM Computer Communication Review, 29 no. 3 (July 1999) 47-49.
- K. Rantos and C.J. Mitchell. Remarks on KRA's key recovery block format. Electronics Letters, 35 (1999) 632-634.
- C. Markantonakis and K. Rantos. On the life cycle of the certification authority key pair in EMV 96. In Proceedings of Euromedia '99, Munich, Germany, April 1999.
- K.Rantos and C.J. Mitchell. Key Recovery in ASPeCT Authentication and Initialisation of Payment Protocol. In Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999.
- B. Preneel, K.M. Martin, G. Horn, P. Howard, C.J. Mitchell, and K. Rantos. Trialling secure billing with Trusted Third Party support for UMTS applications. In Proceedings of the Third ACTS Mobile Communications Summit, Rhodes, Greece, June 1998.