Panagiotis Rizomiliotis

According to our database1, Panagiotis Rizomiliotis authored at least 50 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure outsourcing of manufacturing compliance checks.
Int. J. Inf. Sec., February, 2024

European Artificial Intelligence Act: an AI security approach.
Inf. Comput. Secur., 2024

Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives.
Forensic Sci. Int. Digit. Investig., 2024

Pseudo-Random Generator based on a Photonic Neuromorphic Physical Unclonable Function.
CoRR, 2024

Laser written optical Physical Unclonable Functions: a route to commercialization.
Proceedings of the 24th International Conference on Transparent Optical Networks, 2024

2023
Efficient searchable symmetric encryption supporting range queries.
Int. J. Inf. Sec., 2023

2022
Retrieving deleted records from Telegram.
Digit. Investig., 2022

Homomorphic Encryption in Manufacturing Compliance Checks.
Proceedings of the Trust, Privacy and Security in Digital Business, 2022

Partially Oblivious Neural Network Inference.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Android Device Incident Response: Viber Analysis.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

On Matrix Multiplication with Homomorphic Encryption.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

2020
Photonic Pseudo-Random Number Generator for Internet-of-Things Authentication using a Waveguide based Physical Unclonable Function.
CoRR, 2020

2019
Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2017
REX: A Searchable Symmetric Encryption Scheme Supporting Range Queries.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

2016
Time synchronization: pivotal element in cloud forensics.
Secur. Commun. Networks, 2016

2015
Relay selection for secure 5G green communications.
Telecommun. Syst., 2015

ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

Strengthening Privacy in Healthcare Social Networks.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol.
Secur. Commun. Networks, 2014

The Rainy Season of Cryptography.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

2013
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem.
Int. J. Inf. Sec., 2013

Revisiting lightweight authentication protocols based on hard learning problems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

2012
Flexible Convolutional Codes: Variable Rate and Complexity.
IEEE Trans. Commun., 2012

PASSIVE: Policy-Assessed System-Level Security of Sensitive Information Processing in Virtualised Environments.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Recursive flexible convolutional encoders for parallel concatenation.
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012

Multiocular surveilance of wide dynamic environments based on optical vision, event modelling and end-to-end data encryption: A cloud-based monitoring approach of maritime activities.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Digital forensics in the Cloud Computing Era.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Cryptography Goes to the Cloud.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Designing secure RFID authentication protocols is (still) a non-trivial task.
Proceedings of the 5th International Conference on Network and System Security, 2011

A User-Oriented, Customizable Infrastructure Sharing Approach for Hybrid Cloud Computing Environments.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation.
IEEE Trans. Inf. Theory, 2010

New Constructions of High-Performance Low-Complexity Convolutional Codes.
IEEE Trans. Commun., 2010

On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks.
Des. Codes Cryptogr., 2010

Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity.
Discret. Appl. Math., 2010

An Agent Based Back-End RFID Tag Management System.
Proceedings of the Trust, 2010

2009
New Results on the Algebraic Immunity of Boolean Functions.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

Security and Dependability Solutions for Web Services and Workflows.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

Security analysis of the song-mitchell authentication protocol for low-cost RFID tags.
IEEE Commun. Lett., 2009

<i>HB</i> - <i>MAC</i>: Improving the <i>Random</i> - <i>HB</i><sup>#</sup> Authentication Protocol.
Proceedings of the Trust, 2009

Message Origin Authentication and Integrity Protection in Chaos-Based Optical Communication.
Proceedings of IEEE International Conference on Communications, 2009

New Constructions of Low-Complexity Convolutional Codes.
Proceedings of IEEE International Conference on Communications, 2009

2007
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity.
Proceedings of the Cryptography and Coding, 2007

2006
Constructing Periodic Binary Sequences With Maximum Nonlinear Span.
IEEE Trans. Inf. Theory, 2006

2005
Μελέτη ψευδοτυχαίων ακολουθιών για χρήση στην κρυπτογραφία και τις τηλεπικοινωνίες
PhD thesis, 2005

On the quadratic span of binary sequences.
IEEE Trans. Inf. Theory, 2005

Results on the nonlinear span of binary sequences.
IEEE Trans. Inf. Theory, 2005

On the design of binary sequences with maximum nonlinear span.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2002
Minimum linear span approximation of binary sequences.
IEEE Trans. Inf. Theory, 2002

2001
First-Order Optimal Approximation of Binary Sequences.
Proceedings of the Sequences and their Applications, 2001


  Loading...