default search action
Panagiotis Rizomiliotis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Alexandros Vasilaras, Nikolaos Papadoudis, Panagiotis Rizomiliotis:
Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives. Forensic Sci. Int. Digit. Investig. 49: 301737 (2024) - [j18]Aikaterini Triakosia, Panagiotis Rizomiliotis, Cecilia Tonelli, Fabio Federici, Valerio Senni:
Secure outsourcing of manufacturing compliance checks. Int. J. Inf. Sec. 23(1): 609-627 (2024) - [j17]Konstantinos Kalodanis, Panagiotis Rizomiliotis, Dimosthenis Anagnostopoulos:
European Artificial Intelligence Act: an AI security approach. Inf. Comput. Secur. 32(3): 265-281 (2024) - [c26]Dimitris Alexandropoulos, Christos Tselios, Simone Mazzucato, Panagiotis Rizomiliotis, Konstantinos Moustakas, Thomas Kamalakis:
Laser written optical Physical Unclonable Functions: a route to commercialization. ICTON 2024: 1-4 - [i3]Dimitris Dermanis, Panagiotis Rizomiliotis, Adonis Bogris, Charis Mesaritakis:
Pseudo-Random Generator based on a Photonic Neuromorphic Physical Unclonable Function. CoRR abs/2402.14876 (2024) - 2023
- [j16]Eirini Molla, Panagiotis Rizomiliotis, Stefanos Gritzalis:
Efficient searchable symmetric encryption supporting range queries. Int. J. Inf. Sec. 22(4): 785-798 (2023) - 2022
- [j15]Alexandros Vasilaras, Donatos Dosis, Michael Kotsis, Panagiotis Rizomiliotis:
Retrieving deleted records from Telegram. Digit. Investig. 43(Supplement): 301447 (2022) - [c25]Panagiotis Rizomiliotis, Aikaterini Triakosia:
On Matrix Multiplication with Homomorphic Encryption. CCSW 2022: 53-61 - [c24]Alexandros Vasilaras, Donatos Dosis, Michael Kotsis, Panagiotis Rizomiliotis:
Android Device Incident Response: Viber Analysis. CSR 2022: 138-142 - [c23]Panagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes:
Partially Oblivious Neural Network Inference. SECRYPT 2022: 158-169 - [c22]Aikaterini Triakosia, Panagiotis Rizomiliotis, Konstantinos Tserpes, Cecilia Tonelli, Valerio Senni, Fabio Federici:
Homomorphic Encryption in Manufacturing Compliance Checks. TrustBus 2022: 81-95 - [i2]Panagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes:
Partially Oblivious Neural Network Inference. CoRR abs/2210.15189 (2022) - 2020
- [i1]Charis Mesaritakis, Panagiotis Rizomiliotis, Marialena Akriotou, Charidimos Chaintoutis, Alexandros Fragkos, Dimitris Syvridis:
Photonic Pseudo-Random Number Generator for Internet-of-Things Authentication using a Waveguide based Physical Unclonable Function. CoRR abs/2001.11794 (2020)
2010 – 2019
- 2019
- [c21]Panagiotis Rizomiliotis, Stefanos Gritzalis:
Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips. CCSW 2019: 141-152 - 2017
- [c20]Panagiotis Rizomiliotis, Eirini Molla, Stefanos Gritzalis:
REX: A Searchable Symmetric Encryption Scheme Supporting Range Queries. CCSW 2017: 29-37 - 2016
- [j14]Nikolaos Marangos, Panagiotis Rizomiliotis, Lilian Mitrou:
Time synchronization: pivotal element in cloud forensics. Secur. Commun. Networks 9(6): 571-582 (2016) - 2015
- [j13]Nikolaos Nomikos, Ana Nieto, Prodromos Makris, Dimitrios N. Skoutas, Demosthenes Vouyioukas, Panagiotis Rizomiliotis, Javier López, Charalambos Skianis:
Relay selection for secure 5G green communications. Telecommun. Syst. 59(1): 169-187 (2015) - [c19]Panagiotis Rizomiliotis, Stefanos Gritzalis:
ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes. CCSW 2015: 65-76 - [p3]Maria Bertsima, Iraklis Varlamis, Panagiotis Rizomiliotis:
Strengthening Privacy in Healthcare Social Networks. Medical Data Privacy Handbook 2015: 613-635 - 2014
- [j12]Evangelos Rekleitis, Panagiotis Rizomiliotis, Stefanos Gritzalis:
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. Secur. Commun. Networks 7(12): 2669-2683 (2014) - [c18]Aikaterina Latsiou, Panagiotis Rizomiliotis:
The Rainy Season of Cryptography. Panhellenic Conference on Informatics 2014: 58:1-58:6 - 2013
- [j11]Panagiotis Rizomiliotis, Stefanos Gritzalis:
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem. Int. J. Inf. Sec. 12(2): 151-154 (2013) - [c17]Panagiotis Rizomiliotis, Stefanos Gritzalis:
Revisiting lightweight authentication protocols based on hard learning problems. WISEC 2013: 125-130 - 2012
- [j10]Alexandros Katsiotis, Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
Flexible Convolutional Codes: Variable Rate and Complexity. IEEE Trans. Commun. 60(3): 608-613 (2012) - [c16]Panagiotis Rizomiliotis, Stefanos Gritzalis:
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. ACNS 2012: 489-506 - [c15]Klimis S. Ntalianis, Emmanuel Sardis, Nicolas Tsapatsoulis, Anastasios D. Doulamis, Panagiotis Rizomiliotis:
Multiocular surveilance of wide dynamic environments based on optical vision, event modelling and end-to-end data encryption: A cloud-based monitoring approach of maritime activities. GLOBECOM Workshops 2012: 742-746 - [c14]Nikolaos Marangos, Panagiotis Rizomiliotis, Lilian Mitrou:
Digital forensics in the Cloud Computing Era. GLOBECOM Workshops 2012: 775-780 - [c13]Alexandros Katsiotis, Nicholas Kalouptsidis, Panagiotis Rizomiliotis:
Recursive flexible convolutional encoders for parallel concatenation. ISTC 2012: 250-254 - [c12]Panagiotis Rizomiliotis, Charalambos Skianis:
PASSIVE: Policy-Assessed System-Level Security of Sensitive Information Processing in Virtualised Environments. TrustBus 2012: 227-228 - 2011
- [c11]Prodromos Makris, Dimitrios N. Skoutas, Panagiotis Rizomiliotis, Charalabos Skianis:
A User-Oriented, Customizable Infrastructure Sharing Approach for Hybrid Cloud Computing Environments. CloudCom 2011: 432-439 - [c10]Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis:
Designing secure RFID authentication protocols is (still) a non-trivial task. NSS 2011: 73-80 - [c9]Isaac Agudo, David Nuñez, Gabriele Giammatteo, Panagiotis Rizomiliotis, Costas Lambrinoudakis:
Cryptography Goes to the Cloud. STA Workshops 2011: 190-197 - [e1]Costas Lambrinoudakis, Panagiotis Rizomiliotis, Tomasz Wiktor Wlodarczyk:
IEEE 3rd International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29 - December 1, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-0090-2 [contents] - 2010
- [j9]Panagiotis Rizomiliotis:
Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity. Discret. Appl. Math. 158(18): 2049-2055 (2010) - [j8]Panagiotis Rizomiliotis:
On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks. Des. Codes Cryptogr. 57(3): 283-292 (2010) - [j7]Alexandros Katsiotis, Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
New Constructions of High-Performance Low-Complexity Convolutional Codes. IEEE Trans. Commun. 58(7): 1950-1961 (2010) - [j6]Panagiotis Rizomiliotis:
On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation. IEEE Trans. Inf. Theory 56(8): 4014-4024 (2010) - [c8]Evangelos Rekleitis, Panagiotis Rizomiliotis, Stefanos Gritzalis:
An Agent Based Back-End RFID Tag Management System. TrustBus 2010: 165-176
2000 – 2009
- 2009
- [j5]Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis:
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags. IEEE Commun. Lett. 13(4): 274-276 (2009) - [c7]Alexandros Katsiotis, Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
New Constructions of Low-Complexity Convolutional Codes. ICC 2009: 1-6 - [c6]Panagiotis Rizomiliotis, Adonis Bogris, Dimitris Syvridis:
Message Origin Authentication and Integrity Protection in Chaos-Based Optical Communication. ICC 2009: 1-5 - [c5]Panagiotis Rizomiliotis:
HB - MAC: Improving the Random - HB# Authentication Protocol. TrustBus 2009: 159-168 - [p2]Spyros Kokolakis, Panagiotis Rizomiliotis, Azzedine Benameur, Smriti Kumar Sinha:
Security and Dependability Solutions for Web Services and Workflows. Security and Dependability for Ambient Intelligence 2009: 97-106 - [p1]Panagiotis Rizomiliotis:
New Results on the Algebraic Immunity of Boolean Functions. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 192-202 - 2007
- [c4]Panagiotis Rizomiliotis:
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity. IMACC 2007: 204-219 - 2006
- [j4]Panagiotis Rizomiliotis:
Constructing Periodic Binary Sequences With Maximum Nonlinear Span. IEEE Trans. Inf. Theory 52(9): 4257-4261 (2006) - 2005
- [b1]Panagiotis Rizomiliotis:
Μελέτη ψευδοτυχαίων ακολουθιών για χρήση στην κρυπτογραφία και τις τηλεπικοινωνίες. National and Kapodistrian University of Athens, Greece, 2005 - [j3]Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
Results on the nonlinear span of binary sequences. IEEE Trans. Inf. Theory 51(4): 1555-1563 (2005) - [j2]Panagiotis Rizomiliotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
On the quadratic span of binary sequences. IEEE Trans. Inf. Theory 51(5): 1840-1848 (2005) - [c3]Panagiotis Rizomiliotis:
On the design of binary sequences with maximum nonlinear span. ISIT 2005: 469-473 - 2004
- [c2]Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
Results on the nonlinear span of binary sequences. ISIT 2004: 124 - 2002
- [j1]Nicholas Kolokotronis, Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
Minimum linear span approximation of binary sequences. IEEE Trans. Inf. Theory 48(10): 2758-2764 (2002) - 2001
- [c1]Nicholas Kolokotronis, Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
First-Order Optimal Approximation of Binary Sequences. SETA 2001: 242-256
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint