Nikolaos Alexiou

Affiliations:
  • KTH Royal Institute of Technology, Stockholm, Sweden
  • Aristotle University of Thessaloniki, Greece (former)


According to our database1, Nikolaos Alexiou authored at least 14 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2008
2010
2012
2014
2016
2018
2020
0
1
2
3
1
2
1
1
1
1
1
1
1
1
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Low Phase Noise Fractional-N PLL for mmWave Telecom and RADAR Applications.
Proceedings of the 28th IEEE International Conference on Electronics, 2021

2020
VeSPA: Vehicular Security and Privacy-preserving Architecture.
CoRR, 2020

Ka-band Integrated Transmitter for SATCOM.
Proceedings of the 27th IEEE International Conference on Electronics, Circuits and Systems, 2020

2016
2D Hash Chain robust Random Key Distribution scheme.
Inf. Process. Lett., 2016

Formal security analysis of near field communication using model checking.
Comput. Secur., 2016

2015
Key splitting: making random key distribution schemes resistant against node capture.
Secur. Commun. Networks, 2015

2014
Security analysis of NFC relay attacks using probabilistic model checking.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

2013
Towards a secure and privacy-preserving multi-service vehicular architecture.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

2012
Key splitting for random key distribution schemes.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach.
Comput. Secur., 2011

Quantitative model checking of an RSA-based email protocol on mobile devices.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

2010
Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010

2009
Probabilistic model checking for the quantification of DoS security threats.
Comput. Secur., 2009

2008
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008


  Loading...