Panagiotis Rizomiliotis
Panagiotis Rizomiliotis
Verified email at hua.gr - Homepage
Title
Cited by
Cited by
Year
On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation
P Rizomiliotis
IEEE Transactions on Information Theory 56 (8), 4014-4024, 2010
632010
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
P Rizomiliotis, E Rekleitis, S Gritzalis
IEEE Communications Letters 13 (4), 274-276, 2009
622009
Feedback phase in optically generated chaos: A secret key for cryptographic applications
A Bogris, P Rizomiliotis, KE Chlouverakis, A Argyris, D Syvridis
IEEE Journal of Quantum Electronics 44 (2), 119-124, 2008
622008
Cryptography goes to the cloud
I Agudo, D Nuñez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
FTRA International Conference on Secure and Trust Computing, Data Managementá…, 2011
442011
Results on the nonlinear span of binary sequences
P Rizomiliotis, N Kalouptsidis
IEEE transactions on information theory 51 (4), 1555-1563, 2005
402005
GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol
P Rizomiliotis, S Gritzalis
International Conference on Applied Cryptography and Network Security, 489-506, 2012
262012
Relay selection for secure 5G green communications
N Nomikos, A Nieto, P Makris, DN Skoutas, D Vouyioukas, P Rizomiliotis, ...
Telecommunication Systems 59 (1), 169-187, 2015
232015
New constructions of high-performance low-complexity convolutional codes
A Katsiotis, P Rizomiliotis, N Kalouptsidis
IEEE Transactions on Communications 58 (7), 1950-1961, 2010
232010
On the quadratic span of binary sequences
P Rizomiliotis, N Kolokotronis, N Kalouptsidis
IEEE transactions on information theory 51 (5), 1840-1848, 2005
232005
Minimum linear span approximation of binary sequences
N Kolokotronis, P Rizomiliotis, N Kalouptsidis
IEEE Transactions on Information Theory 48 (10), 2758-2764, 2002
222002
How to protect security and privacy in the IoT: a policy‐based RFID tag management protocol
E Rekleitis, P Rizomiliotis, S Gritzalis
Security and Communication Networks 7 (12), 2669-2683, 2014
192014
ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes
P Rizomiliotis, S Gritzalis
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 65-76, 2015
182015
Flexible convolutional codes: variable rate and complexity
A Katsiotis, P Rizomiliotis, N Kalouptsidis
IEEE transactions on communications 60 (3), 608-613, 2011
152011
Constructing periodic binary sequences with maximum nonlinear span
P Rizomiliotis
IEEE transactions on information theory 52 (9), 4257-4261, 2006
152006
A user-oriented, customizable infrastructure sharing approach for hybrid cloud computing environments
P Makris, DN Skoutas, P Rizomiliotis, C Skianis
2011 IEEE Third International Conference on Cloud Computing Technology andá…, 2011
142011
HB − MAC: Improving the Random − HB# Authentication Protocol
P Rizomiliotis
International Conference on Trust, Privacy and Security in Digital Businessá…, 2009
112009
Digital forensics in the cloud computing era
N Marangos, P Rizomiliotis, L Mitrou
2012 IEEE Globecom Workshops, 775-780, 2012
102012
On the security of the Feng–Liao–Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
P Rizomiliotis
Designs, Codes and Cryptography 57 (3), 283-292, 2010
92010
Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity
P Rizomiliotis
Discrete applied mathematics 158 (18), 2049-2055, 2010
82010
A holistic approach to RFID security and privacy
E Rekleitis, P Rizomiliotis, S Gritzalis
Proc. 1st Intól Workshop Security of the Internet of Things, 2010
82010
The system can't perform the operation now. Try again later.
Articles 1–20