George Stephanides
According to our database1,
George Stephanides
authored at least 49 papers
between 2002 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Softw. Impacts, December, 2022
2019
Forecasting Soccer Outcome Using Cost-Sensitive Models Oriented to Investment Opportunities.
Int. J. Comput. Sci. Sport, 2019
2018
Proceedings of the Wired/Wireless Internet Communications, 2018
2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
2012
A novel technique for image steganography based on a high payload method and edge detection.
Expert Syst. Appl., 2012
A Compatible Implementation between Identity-based and Certificateless Encryption Schemes.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012
The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.
Proceedings of the SECRYPT 2012, 2012
2010
A Queuing Theory and Systems Modeling Course Based on Unified Modeling Language (UML).
Proceedings of the Knowledge Management, Information Systems, E-Learning, and Sustainability Research, 2010
Proceedings of the 14th Panhellenic Conference on Informatics, 2010
Practical Implementation of Identity Based Encryption for Secure E-mail Communication.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010
2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
2008
IEEE Trans. Dependable Secur. Comput., 2008
Facilitating software extension with design patterns and Aspect-Oriented Programming.
J. Syst. Softw., 2008
Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki.
Proceedings of the WINSYS 2008, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Improving technical trading systems by using a new MATLAB-based genetic algorithm procedure.
Math. Comput. Model., 2007
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols.
Proceedings of the SECRYPT 2007, 2007
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the 2006 Workshop on interdisciplinary software engineering research, 2006
RSA-Padding Signatures with Attack Studies.
Proceedings of the WEBIST 2006, 2006
Analysis of Object-Oriented Numerical Libraries.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, 2006
Proceedings of the Communications and Multimedia Security, 2006
2005
IEEE Trans. Software Eng., 2005
Trust and Security in Electronic Payments: What We Have and Need to Know?
Proceedings of the Third World Enformatika Conference, 2005
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm.
Proceedings of the International Enformatika Conference, 2005
A Distributed Algorithm for Mining Fuzzy Association Rules.
Proceedings of the WEBIST 2005, 2005
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2005
2004
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the IEEE International Conference on Advanced Learning Technologies, 2004
2003
Eur. J. Oper. Res., 2003
Proceedings of the 2003 IEEE International Conference on Advanced Learning Technologies, 2003
2002
Evaluating Performance and Power of Object-Oriented Vs. Procedural Programming in Embedded Processors.
Proceedings of the Reliable Software Technologies, 2002