Yannis C. Stamatiou
Orcid: 0000-0002-8925-9427Affiliations:
- University of Patras, Computer Engineering and Informatics Department, Greece
According to our database1,
Yannis C. Stamatiou
authored at least 83 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Structural Information and Communication Complexity, 2024
2023
The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation.
J. Cybersecur. Priv., January, 2023
Proceedings of the 27th Pan-Hellenic Conference on Progress in Computing and Informatics, 2023
On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
2022
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats.
Int. J. Inf. Sec., 2022
Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol.
Future Internet, 2022
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem.
Cryptogr., 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2019
Int. J. Comput. Math. Comput. Syst. Theory, 2019
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
2017
Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017
2016
On a new edge function on complete weighted graphs and its application for locating Hamiltonian cycles of small weight.
Optim. Lett., 2016
Innovative Applications and Services Based on Privacy Enhanced Distributed Computations on IoT Devices.
Proceedings of the 18th IEEE Conference on Business Informatics, 2016
Increasing Trust Towards eCommerce: - Privacy Enhancing Technologies Against Price Discrimination.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016
2015
Proceedings of the Database and Expert Systems Applications, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Database and Expert Systems Applications, 2014
2013
J. Cases Inf. Technol., 2013
Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013
Proceedings of the 4th International Conference on Information, 2013
2012
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
2011
Consolidating a Heuristic for Incremental Decision Tree Learning through asymptotic Analysis.
Int. J. Artif. Intell. Tools, 2011
Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm.
Proceedings of the Information Security and Assurance - International Conference, 2011
Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011
A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs.
Proceedings of the Security Technology, 2011
2010
SIGACT News, 2010
2009
Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009
Geometric approaches for creating low power, low interference connectivity patterns in static, structureless sensor networks.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009
Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008
A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007
Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005.
SIGACT News, 2007
Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography.
Math. Comput. Model., 2007
Appl. Math. Comput., 2007
Proceedings of the Electronic Government, 6th International Conference, 2007
Trust in global computing systems as a limit property emerging from short range random interactions.
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Internet and Network Economics, Second International Workshop, 2006
Deterministic key pre-distribution schemes for mobile ad-hoc networks based on set systems with limited intersection sizes.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006
The Threshold Behaviour of the Fixed Radius Random Graph Model and Applications to the Key Management Problem of Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2006
Distributively Increasing the Percentage of Similarities Between Strings with Applications to Key Agreement.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
The Satisfiability Threshold Conjecture: Techniques Behind Upper Bound Improvements.
Proceedings of the Computational Complexity and Statistical Physics., 2006
Proving Conditional Randomness using The Principle of Deferred Decisions.
Proceedings of the Computational Complexity and Statistical Physics., 2006
2005
An Efficient Watermarking Method for MP3 Audio Files.
Proceedings of the International Enformatika Conference, 2005
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience.
Proceedings of the Information Security, 8th International Conference, 2005
2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Public Key Infrastructure, 2004
2003
Locating information with uncertainty in fully interconnected networks: The case of nondistributed memory.
Networks, 2003
Threshold Phenomena: The Computer Scientist's Viewpoint.
Bull. EATCS, 2003
The CORAS approach for model-based risk management applied to a telemedicine service.
Proceedings of the New Navigators: from Professionals to Patients, 2003
Proceedings of the Progress in Cryptology, 2003
2002
Dynamically Modifiable Ciphers Using a Reconfigurable CAST-128 Based Algorithm on ATMEL's FPSLIC(tm) Reconfigurable FPGA Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002
Enhancing the Security of Block Ciphers with the Aid of Parallel Substitution Box Construction.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002
Proceedings of the Algorithms, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
Random Struct. Algorithms, 2001
Constraints An Int. J., 2001
Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval.
Comput. J., 2001
Proceedings of the Advances in Informatics, 8th Panhellenic Conference on Informatics, 2001
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001
Proceedings of the Theoretical Computer Science, 7th Italian Conference, 2001
2000
Random Struct. Algorithms, 2000
On Parallel Partial Solutions and Approximation Schemes for Local Consistency in Networks of Constraints.
Constraints An Int. J., 2000
Proceedings of the Distributed Computing, 14th International Conference, 2000
1999
1998
Random Struct. Algorithms, 1998
1997
Proceedings of the Parallel Processing for Artificial Intelligence 3, 1997
1995
Partiality and Approximation Schemes for Local Consistency in Networks of Constraints.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1995