Panagiotis Rizomiliotis
Panagiotis Rizomiliotis
Verified email at - Homepage
Cited by
Cited by
On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation
P Rizomiliotis
IEEE Transactions on Information Theory 56 (8), 4014-4024, 2010
Feedback phase in optically generated chaos: A secret key for cryptographic applications
A Bogris, P Rizomiliotis, KE Chlouverakis, A Argyris, D Syvridis
IEEE Journal of Quantum Electronics 44 (2), 119-124, 2008
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
P Rizomiliotis, E Rekleitis, S Gritzalis
IEEE Communications letters 13 (4), 274-276, 2009
Cryptography goes to the cloud
I Agudo, D Nuņez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011
Results on the nonlinear span of binary sequences
P Rizomiliotis, N Kalouptsidis
IEEE transactions on information theory 51 (4), 1555-1563, 2005
ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes
P Rizomiliotis, S Gritzalis
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 65-76, 2015
GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol
P Rizomiliotis, S Gritzalis
International Conference on Applied Cryptography and Network Security, 489-506, 2012
Relay selection for secure 5G green communications
N Nomikos, A Nieto, P Makris, DN Skoutas, D Vouyioukas, P Rizomiliotis, ...
Telecommunication Systems 59, 169-187, 2015
How to protect security and privacy in the IoT: a policy‐based RFID tag management protocol
E Rekleitis, P Rizomiliotis, S Gritzalis
Security and Communication Networks 7 (12), 2669-2683, 2014
On the quadratic span of binary sequences
P Rizomiliotis, N Kolokotronis, N Kalouptsidis
IEEE transactions on information theory 51 (5), 1840-1848, 2005
Minimum linear span approximation of binary sequences
N Kolokotronis, P Rizomiliotis, N Kalouptsidis
IEEE Transactions on Information Theory 48 (10), 2758-2764, 2002
New constructions of high-performance low-complexity convolutional codes
A Katsiotis, P Rizomiliotis, N Kalouptsidis
IEEE Transactions on Communications 58 (7), 1950-1961, 2010
Constructing periodic binary sequences with maximum nonlinear span
P Rizomiliotis
IEEE transactions on information theory 52 (9), 4257-4261, 2006
Flexible convolutional codes: variable rate and complexity
A Katsiotis, P Rizomiliotis, N Kalouptsidis
IEEE transactions on communications 60 (3), 608-613, 2011
A user-oriented, customizable infrastructure sharing approach for hybrid cloud computing environments
P Makris, DN Skoutas, P Rizomiliotis, C Skianis
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
Digital forensics in the cloud computing era
N Marangos, P Rizomiliotis, L Mitrou
2012 IEEE Globecom Workshops, 775-780, 2012
Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity
P Rizomiliotis
Discrete applied mathematics 158 (18), 2049-2055, 2010
Time synchronization: pivotal element in cloud forensics
N Marangos, P Rizomiliotis, L Mitrou
Security and Communication Networks 9 (6), 571-582, 2016
On the security of the Feng–Liao–Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
P Rizomiliotis
Designs, Codes and Cryptography 57, 283-292, 2010
HB − MAC: Improving the Random − HB # Authentication Protocol
P Rizomiliotis
Trust, Privacy and Security in Digital Business: 6th International …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20