Konstantinos Limniotis
Orcid: 0000-0002-7663-7169
According to our database1,
Konstantinos Limniotis
authored at least 45 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., October, 2024
Data Protection Issues in Automated Decision-Making Systems Based on Machine Learning: Research Challenges.
Network, January, 2024
2023
Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems.
Internet Things, December, 2023
2022
2021
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance.
Comput. Networks, 2021
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021
2020
Proceedings of the 2020 IEEE World Congress on Services, 2020
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
2019
The Error Linear Complexity Spectrum as a Cryptographic Criterion of Boolean Functions.
IEEE Trans. Inf. Theory, 2019
CoRR, 2019
IEEE Consumer Electron. Mag., 2019
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019
2018
Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction.
Des. Codes Cryptogr., 2018
An evaluation of the HTTPS adoption in websites in Greece: estimating the users awareness.
Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018
2017
Proceedings of the E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services, 2017
2016
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016
2015
Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes.
Proceedings of the Cryptography and Information Security in the Balkans, 2015
2013
Cryptogr. Commun., 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Constructing Boolean functions in odd number of variables with maximum algebraic immunity.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
E-Government in Greece: Serving State's Economic Needs - Respecting the Fundamental Right to Data Protection.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
2009
IEEE Trans. Inf. Theory, 2009
Cryptogr. Commun., 2009
2008
IEEE Trans. Inf. Theory, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
2007
IEEE Trans. Inf. Theory, 2007
IACR Cryptol. ePrint Arch., 2007
Best Affine Approximations of Boolean Functions and Applications to Low Order Approximations.
Proceedings of the IEEE International Symposium on Information Theory, 2007
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions.
Proceedings of the Cryptography and Coding, 2007
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
IEEE Trans. Circuits Syst. I Regul. Pap., 2006
Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression.
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2003
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003