Παρακολούθηση
G. C. Meletiou
G. C. Meletiou
Professor of Mathematics, T.E.I. of Epirus
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα teiep.gr
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Computational intelligence in information assurance and security
A Abraham
Springer, 2007
72*2007
Evolutionary computation based cryptanalysis: A first study
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005
492005
Modeling the relationship between water uptake by cucumber and NaCl accumulation in a closed hydroponic system
D Savvas, G Meletiou, S Margariti, I Tsirogiannis, A Kotsiras
HortScience 40 (3), 802-807, 2005
492005
Studying the performance of artificial neural networks on problems related to cryptography
EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis
Nonlinear analysis: real world applications 7 (5), 937-942, 2006
472006
Cryptography and Cryptanalysis Through Computational Intelligence
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Computational Intelligence in Information Assurance and Security, 1-49, 2007
422007
Utilizing evolutionary computation methods for the design of S-boxes
EC Laskari, GC Meletiou, MN Vrahatis
2006 international conference on computational intelligence and security 2 …, 2006
412006
A note on discrete logarithms in finite fields
G Meletiou, GL Mullen
Applicable Algebra in Engineering, Communication and Computing 3, 75-78, 1992
281992
Designing bijective S-boxes using Algorithm Portfolios with limited time budgets
D Souravlias, KE Parsopoulos, GC Meletiou
Applied Soft Computing 59, 475-486, 2017
262017
A first study of the neural network approach to the RSA cryptosystem
G Meletiou, DK Tasoulis, MN Vrahatis
IASTED 2002 Conference on Artificial Intelligence, 483-488, 2002
242002
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Applied mathematics and computation 184 (1), 63-72, 2007
192007
Explicit form for the discrete logarithm over the field
GC Meletiou
Archivum Mathematicum 29 (1), 25-28, 1993
191993
Problems of cryptography as discrete optimization tasks
EC Laskari, GC Meletiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e831-e837, 2005
182005
Interpolation of the double discrete logarithm
GC Meletiou, A Winterhof
Arithmetic of Finite Fields: 2nd International Workshop, WAIFI 2008 Siena …, 2008
132008
Cryptography through interpolation approximation and computational intelligence methods
GC Meletiou, DK Tasoulis, MN Vrahatis
Bulletin of the Greek Mathematical Society 48, 61-75, 2003
102003
Aitken and Neville inverse interpolation methods over finite fields
EC Laskari, GC Meletiou, MN Vrahatis
Applied Numerical Analysis & Computational Mathematics 2 (1), 100-107, 2005
82005
Privacy preserving electronic data gathering
EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis
Mathematical and computer modelling 42 (7), 739-746, 2005
72005
An algebraic setting for near-unanimity consensus
HJ Bandelt, GC Meletiou
Order 7 (2), 169-178, 1990
71990
On incidence algebras and triangular martrices
S Foldes, G Meletiou
62002
The algebra of majority consensus
HJ Bandelt, GC Meletiou
algebra universalis 29, 546-555, 1992
61992
A polynomial representation for exponents in Zp
GC Meletiou
Δελτίο της Ελληνικής Μαθηματικής Εταιρίας 34 (34), 59-63, 1992
61992
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20