Approximating the unsatisfiability threshold of random formulas LM Kirousis, E Kranakis, D Krizanc, YC Stamatiou Random Structures & Algorithms 12 (3), 253-269, 1998 | 226 | 1998 |
Random constraint satisfaction: A more accurate picture D Achlioptas, LM Kirousis, E Kranakis, D Krizanc, MSO Molloy, ... International Conference on Principles and Practice of Constraint …, 1997 | 145 | 1997 |
Bounding the unsatisfiability threshold of random 3‐SAT S Janson, YC Stamatiou, M Vamvakari Random Structures & Algorithms 17 (2), 103-116, 2000 | 93 | 2000 |
Random constraint satisfaction: A more accurate picture D Achlioptas, MSO Molloy, LM Kirousis, YC Stamatiou, E Kranakis, ... Constraints 6 (4), 329-344, 2001 | 68 | 2001 |
Model-based risk assessment-the coras approach K Stolen, F den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ... iTrust Workshop, 2002 | 62 | 2002 |
Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices I Chatzigiannakis, A Pyrgelis, PG Spirakis, YC Stamatiou 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011 | 48 | 2011 |
Evolutionary computation based cryptanalysis: A first study EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005 | 47 | 2005 |
Model-based risk assessment in a component-based software engineering process K Stølen, F den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ... Business Component-Based Software Engineering, 189-207, 2003 | 35 | 2003 |
Cryptography and cryptanalysis through computational intelligence EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Computational Intelligence in Information Assurance and Security, 1-49, 2007 | 33 | 2007 |
The CORAS approach for model-based risk management applied to a telemedicine service. Y Stamatiou, E Skipenes, E Henriksen, N Stathiakis, A Sikianakis, ... Studies in health technology and informatics, 206-211, 2003 | 32 | 2003 |
A trust-centered approach for building e-voting systems A Antoniou, C Korakas, C Manolopoulos, A Panagiotaki, D Sofotassios, ... International Conference on Electronic Government, 366-377, 2007 | 31 | 2007 |
A compressed-domain watermarking algorithm for mpeg audio layer 3 DK Koukopoulos, YC Stamatiou Proceedings of the 2001 workshop on Multimedia and security: new challenges …, 2001 | 30 | 2001 |
A software library for elliptic curve cryptography E Konstantinou, Y Stamatiou, C Zaroliagis European Symposium on Algorithms, 625-637, 2002 | 27 | 2002 |
A note on the non-colorability threshold of a random graph AC Kaporis, LM Kirousis, YC Stamatiou the electronic journal of combinatorics 7, R29-R29, 2000 | 25 | 2000 |
A transparent watermarking method for color images S Armeni, D Christodoulakis, I Kostopoulos, Y Stamatiou, M Xenos 1st IEEE Balkan Conference On Signal Processing, Communications, Circuits …, 2000 | 24 | 2000 |
User acceptance of privacy-abcs: An exploratory study Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou International conference on human aspects of information security, privacy …, 2014 | 23 | 2014 |
On the efficient generation of elliptic curves over prime fields E Konstantinou, YC Stamatiou, C Zaroliagis International Workshop on Cryptographic Hardware and Embedded Systems, 333-348, 2002 | 22 | 2002 |
On the construction of prime order elliptic curves E Konstantinou, YC Stamatiou, C Zaroliagis International Conference on Cryptology in India, 309-322, 2003 | 20 | 2003 |
Monotonicity and inert fugitive search games Y Stamatiou, D Thilikos Touloupas | 20 | 1999 |
Coupon Collectors, q-Binomial Coefficients and the Unsatisfiability Threshold AC Kaporis, LM Kirousis, YC Stamatiou, M Vamvakari, M Zito Italian Conference on Theoretical Computer Science, 328-338, 2001 | 19 | 2001 |