Nicolas Sklavos
Orcid: 0000-0001-9034-4277Affiliations:
- University of Patras, Greece
According to our database1,
Nicolas Sklavos
authored at least 125 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures.
Cryptogr., March, 2024
Comput. Electr. Eng., 2024
An Area Efficient Architecture of a Novel Chaotic System for High Randomness Security in e-Health.
IEEE Comput. Archit. Lett., 2024
Proceedings of the 13th International Conference on Modern Circuits and Systems Technologies, 2024
Proceedings of the 13th International Conference on Modern Circuits and Systems Technologies, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Minimal Resource Required E-Health System with End-to-End Authenticated Encryption Mechanism.
Proceedings of the 12th International Conference on Modern Circuits and Systems Technologies, 2023
Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Towards Secure and Efficient Multi-generation Cellular Communications: Multi-mode SNOW-3G/V ASIC and FPGA Implementations.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2023
2022
IoT-Based Multi-Sensor Healthcare Architectures and a Lightweight-Based Privacy Scheme.
Sensors, 2022
Cryptogr., 2022
Proceedings of the 30th IFIP/IEEE 30th International Conference on Very Large Scale Integration, 2022
Design and Implementation of a Lightweight Cryptographic Module, for Wireless 5G Communications and Beyond.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2022
Network on Privacy-Aware Audio-and Video-Based Applications for Active and Assisted Living: GoodBrother Project.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022
2021
Microprocess. Microsystems, November, 2021
Microprocess. Microsystems, 2021
Internet Things, 2021
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications.
Cryptogr., 2021
Proceedings of the 24th Euromicro Conference on Digital System Design, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Microprocess. Microsystems, 2020
Conventional and machine learning approaches as countermeasures against hardware trojan attacks.
Microprocess. Microsystems, 2020
The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
An FPGA-Implemented Parallel System of Face Recognition, for Digital Forensics Applications.
Proceedings of the 10th IEEE International Conference on Consumer Electronics, 2020
Lightweight Security Data Streaming, Based on Reconfigurable Logic, for FPGA Platform.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
2019
Lightweight Efficient Simeck32/64 Crypto-Core Designs and Implementations, for IoT Security.
Proceedings of the 27th IFIP/IEEE International Conference on Very Large Scale Integration, 2019
On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts.
Proceedings of the Computer and Network Security Essentials., 2018
Proceedings of the Computer and Network Security Essentials., 2018
2017
Privacy in a Digital, Networked World: Technologies, Implications and Solutions. By Sherali Zeadally and Mohamad Badra. Springer International Publishing: 418 pp.; $51.89; ISBN-10: 3319084690, ISBN-13: 978-3319084695.
Cryptogr., 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the Euromicro Conference on Digital System Design, 2017
Proceedings of the Euromicro Conference on Digital System Design, 2017
2016
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016
Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to Promote Science Education.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography.
Proceedings of the 2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era, 2016
2015
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication.
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, 2015
2014
Book Review: Shavers, Brett. <i>Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects</i>.
Inf. Secur. J. A Glob. Perspect., 2014
Book Review: Wong, Caroline. <i>Security Metrics, A Beginner's Guide</i> - McGraw-Hill Osborne Media, A Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 432p., $40.00. ISBN: 10: 0071744002, ISBN: 13: 978-0071744003.
Inf. Secur. J. A Glob. Perspect., 2014
Book Review: Bahadur, Gary, Inasi, Jason, and de Carvalho, Alex. <i>Securing the Clicks: Network Security in the Age of Social Media</i> - McGraw-Hill Osborne Media, 2011, 368p., $40.00. ISBN: 10: 0071769056, ISBN: 13: 978-0071769051.
Inf. Secur. J. A Glob. Perspect., 2014
Book Review: Sullivan, Bryan, and Liu, Vincent. <i>Web Application Security, A Beginner's Guide</i> - McGraw-Hill Osborne Media, Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 352p., $40.00. ISBN: 10: 0071776168, ISBN: 13: 978-0071776165.
Inf. Secur. J. A Glob. Perspect., 2014
Book Review: Stallings, W. <i>Cryptography and Network Security: Principles and Practice</i> - 6th ed. Upper Saddle River, NJ: Prentice Hall, 2013, 752p., $142.40. ISBN: 13: 978-0133354690.
Inf. Secur. J. A Glob. Perspect., 2014
Book Review: Samuelle, T.J. <i>Mike Meyers' CompTIA Security + Certification Passport (Exam SY0-301)</i> - 3rd ed. New York: McGraw-Hill Osborne Media, 2011, 480p., $30.00. ISBN: 13: 978-0071770385.
Inf. Secur. J. A Glob. Perspect., 2014
Book Review: Wu, Chwan-Hwa, and Irwin, J. David. <i>Introduction to Computer Networks and Cybersecurity</i> - Boca Raton, FL: CRC Press/Taylor & Francis Group, 2013, 1236p., $130.00. ISBN 1466572132.
Inf. Secur. J. A Glob. Perspect., 2014
Secure embedded system hardware design - A flexible security and trust enhanced approach.
Comput. Electr. Eng., 2014
2013
FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0.
Microprocess. Microsystems, 2013
C(I)SO, And Now What? How to Successfully Build Security by Design, by Oberlaender, M. S.CreateSpace Independent Publishing Platform, 2013, 102p., $36.99. ISBN 1480237418.
Inf. Secur. J. A Glob. Perspect., 2013
Proceedings of the ISSE 2013, 2013
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013
2012
Comput. Electr. Eng., 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012
Proceedings of the 15th Euromicro Conference on Digital System Design, 2012
2011
Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications".
Comput. Electr. Eng., 2011
Comput. Electr. Eng., 2011
Proceedings of the International Conference on Field Programmable Logic and Applications, 2011
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011
2010
Inf. Secur. J. A Glob. Perspect., 2010
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2010
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2010
Proceedings of the 17th IEEE International Conference on Electronics, 2010
Proceedings of the 13th Euromicro Conference on Digital System Design, 2010
2009
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
2007
Wirel. Commun. Mob. Comput., 2007
MONET Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing.
Mob. Networks Appl., 2007
Inf. Secur. J. A Glob. Perspect., 2007
Guest Editors' Introduction to the Special Issue on Security of Computers and Networks.
Comput. Electr. Eng., 2007
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
2006
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security.
J. Supercomput., 2006
Telecommun. Syst., 2006
Int. J. Netw. Secur., 2006
Int. J. Netw. Secur., 2006
2005
High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers.
Mob. Networks Appl., 2005
Int. J. Netw. Secur., 2005
Pure DDP-Based Cipher: Architecture Analysis, Hardware Implementation Cost and Performance up to 6.5 Gbps.
Int. Arab J. Inf. Technol., 2005
Int. Arab J. Inf. Technol., 2005
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps.
Comput. Electr. Eng., 2005
Proceedings of the Integrated Circuit and System Design, 2005
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005
2004
Open Mobile Alliance (OMA) Security Layer: Architecture, Implementation and Performance Evaluation of the Integrity Unit.
New Gener. Comput., 2004
Comput. Electr. Eng., 2004
New class of the FPGA efficient cryptographic primitives.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Proceedings of the 2004 11th IEEE International Conference on Electronics, 2004
Proceedings of the 2004 11th IEEE International Conference on Electronics, 2004
2003
Int. Arab J. Inf. Technol., 2003
Comput. Sci. J. Moldova, 2003
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance.
Comput. Secur., 2003
Architectures and FPGA Implementations of the SCO(-1, -2, -3) Ciphers Family.
Proceedings of the IFIP VLSI-SoC 2003, 2003
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.
Proceedings of the Computer Network Security, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
VLSI implementation of the keyed-hash message authentication code for the wireless application protocol.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
2002
Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques.
VLSI Design, 2002
IEEE Trans. Computers, 2002
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
An efficient VLSI implementation for forward and inverse wavelet transform for JPEG2000.
Proceedings of the 14th International Conference on Digital Signal Processing, 2002
2001
Asynchronous low power VLSI implementation of the International Data Encryption Algorithm.
Proceedings of the 2001 8th IEEE International Conference on Electronics, 2001
Proceedings of the 2001 8th IEEE International Conference on Electronics, 2001