Panagiotis Rizomiliotis
According to our database1,
Panagiotis Rizomiliotis
authored at least 50 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., February, 2024
Inf. Comput. Secur., 2024
Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives.
Forensic Sci. Int. Digit. Investig., 2024
Pseudo-Random Generator based on a Photonic Neuromorphic Physical Unclonable Function.
CoRR, 2024
Proceedings of the 24th International Conference on Transparent Optical Networks, 2024
2023
Int. J. Inf. Sec., 2023
2022
Proceedings of the Trust, Privacy and Security in Digital Business, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022
2020
Photonic Pseudo-Random Number Generator for Internet-of-Things Authentication using a Waveguide based Physical Unclonable Function.
CoRR, 2020
2019
Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2017
Proceedings of the 9th Cloud Computing Security Workshop, 2017
2016
Secur. Commun. Networks, 2016
2015
ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol.
Secur. Commun. Networks, 2014
Proceedings of the 18th Panhellenic Conference on Informatics, 2014
2013
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem.
Int. J. Inf. Sec., 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
2012
IEEE Trans. Commun., 2012
PASSIVE: Policy-Assessed System-Level Security of Sensitive Information Processing in Virtualised Environments.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012
Multiocular surveilance of wide dynamic environments based on optical vision, event modelling and end-to-end data encryption: A cloud-based monitoring approach of maritime activities.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
A User-Oriented, Customizable Infrastructure Sharing Approach for Hybrid Cloud Computing Environments.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation.
IEEE Trans. Inf. Theory, 2010
IEEE Trans. Commun., 2010
On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks.
Des. Codes Cryptogr., 2010
Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity.
Discret. Appl. Math., 2010
2009
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
Proceedings of the Security and Dependability for Ambient Intelligence, 2009
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags.
IEEE Commun. Lett., 2009
<i>HB</i> - <i>MAC</i>: Improving the <i>Random</i> - <i>HB</i><sup>#</sup> Authentication Protocol.
Proceedings of the Trust, 2009
Message Origin Authentication and Integrity Protection in Chaos-Based Optical Communication.
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of IEEE International Conference on Communications, 2009
2007
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity.
Proceedings of the Cryptography and Coding, 2007
2006
IEEE Trans. Inf. Theory, 2006
2005
PhD thesis, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2002
2001
Proceedings of the Sequences and their Applications, 2001