default search action
George Stephanides
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Kyriacos Talattinis, George Stephanides:
RatingsLib: A python library for rating methods with applications. Softw. Impacts 14: 100416 (2022)
2010 – 2019
- 2019
- [j15]Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis, Foteini Baldimtsi, George Stephanides:
Leakage-resilient lattice-based partially blind signatures. IET Inf. Secur. 13(6): 670-684 (2019) - [j14]Kyriacos Talattinis, George Kyriakides, E. Kapantai, George Stephanides:
Forecasting Soccer Outcome Using Cost-Sensitive Models Oriented to Investment Opportunities. Int. J. Comput. Sci. Sport 18(1): 93-114 (2019) - [i2]Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis, Foteini Baldimtsi, George Stephanides:
Leakage-Resilient Lattice-Based Partially Blind Signatures. IACR Cryptol. ePrint Arch. 2019: 1452 (2019) - 2018
- [c32]Ioanna Karantaidou, Spyros T. Halkidis, Sophia G. Petridou, Lefteris Mamatas, George Stephanides:
Pairing-Based Cryptography on the Internet of Things: A Feasibility Study. WWIC 2018: 219-230 - 2014
- [c31]George Kyriakides, Kyriacos Talattinis, George Stephanides:
Rating Systems Vs Machine Learning on the context of sports. Panhellenic Conference on Informatics 2014: 4:1-4:6 - 2012
- [j13]Anastasia Ioannidou, Spyros T. Halkidis, George Stephanides:
A novel technique for image steganography based on a high payload method and edge detection. Expert Syst. Appl. 39(14): 11517-11524 (2012) - [c30]Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides:
The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes. SECRYPT 2012: 403-407 - [c29]Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides:
A Compatible Implementation between Identity-based and Certificateless Encryption Schemes. WEBIST 2012: 225-230 - 2010
- [c28]Kyriacos Talattinis, Aikaterini Sidiropoulou, Konstantinos Chalkias, George Stephanides:
Parallel Collection of Live Data Using Hadoop. Panhellenic Conference on Informatics 2010: 66-71 - [c27]Anastasios Kihidis, Konstantinos Chalkias, George Stephanides:
Practical Implementation of Identity Based Encryption for Secure E-mail Communication. Panhellenic Conference on Informatics 2010: 101-106 - [c26]Athanasios Perdos, George Stephanides, Alexander Chatzigeorgiou:
A Queuing Theory and Systems Modeling Course Based on Unified Modeling Language (UML). WSKS (1) 2010: 460-464 - [i1]Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, Spyros T. Halkidis, George Stephanides:
Attacks on the AKACP Protocol. IACR Cryptol. ePrint Arch. 2010: 500 (2010)
2000 – 2009
- 2009
- [c25]Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
Moving from Requirements to Design Confronting Security Issues: A Case Study. OTM Conferences (2) 2009: 798-814 - 2008
- [j12]Konstantinos G. Kouskouras, Alexander Chatzigeorgiou, George Stephanides:
Facilitating software extension with design patterns and Aspect-Oriented Programming. J. Syst. Softw. 81(10): 1725-1737 (2008) - [j11]Spyros T. Halkidis, Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides:
Architectural Risk Analysis of Software Systems Based on Security Patterns. IEEE Trans. Dependable Secur. Comput. 5(3): 129-142 (2008) - [c24]Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides:
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. IAS 2008: 89-94 - [c23]George E. Violettas, Tryfon Theodorou, Konstantinos Chalkias, George Stephanides:
Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki. WINSYS 2008: 96-101 - 2007
- [j10]Stephanos Papadamou, George Stephanides:
Improving technical trading systems by using a new MATLAB-based genetic algorithm procedure. Math. Comput. Model. 46(1-2): 189-197 (2007) - [c22]Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides:
Low-cost Anonymous Timed-Release Encryption. IAS 2007: 77-82 - [c21]Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis:
A Provably Secure One-Pass Two-Party Key Establishment Protocol. Inscrypt 2007: 108-122 - [c20]Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides:
Improved Anonymous Timed-Release Encryption. ESORICS 2007: 311-326 - [c19]Konstantinos Chalkias, Foteini Baldimtsi, Dimitris Hristu-Varsakelis, George Stephanides:
Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols. ICETE (Selected Papers) 2007: 227-238 - [c18]Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hristu-Varsakelis, George Stephanides:
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols. SECRYPT 2007: 222-228 - 2006
- [j9]Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
A qualitative analysis of software security patterns. Comput. Secur. 25(5): 379-392 (2006) - [j8]Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides, Spyros T. Halkidis:
Design Pattern Detection Using Similarity Scoring. IEEE Trans. Software Eng. 32(11): 896-909 (2006) - [c17]Konstantinos Chalkias, George Stephanides:
Timed Release Cryptography from Bilinear Pairings Using Hash Chains. Communications and Multimedia Security 2006: 130-140 - [c16]Athanasios Perdos, Alexander Chatzigeorgiou, George Stephanides:
Evaluation of a Queuing Theory and Systems Modeling Course Based on UML. ICALT 2006: 507-509 - [c15]George Stephanides, Mirel Cosulschi, Mihai Gabroveanu, Nicolae Constantinescu:
AHPA-Calculating Hub and Authority for Information Retrieval. ICDE Workshops 2006: 36 - [c14]Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
Quantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach. OTM Workshops (1) 2006: 554-564 - [c13]Kostas Zotos, George Stephanides:
Analysis of Object-Oriented Numerical Libraries. Software Engineering Research and Practice 2006: 253-258 - [c12]George Stephanides, Nicolae Constantinescu, Mirel Cosulschi, Mihai Gabroveanu:
RSA-Padding Signatures with Attack Studies. WEBIST (1) 2006: 97-100 - [c11]Alexander Chatzigeorgiou, Nikolaos Tsantalis, George Stephanides:
Application of graph theory to OO software engineering. WISER 2006: 29-36 - 2005
- [j7]George Stephanides, Nicolae Constantinescu:
The GN-authenticated key agreement. Appl. Math. Comput. 170(1): 531-544 (2005) - [j6]Theodosios Tsiakis, George Stephanides:
The concept of security and trust in electronic payments. Comput. Secur. 24(1): 10-15 (2005) - [j5]Theodosios Tsiakis, George Stephanides:
The economic approach of information security. Comput. Secur. 24(2): 105-108 (2005) - [j4]Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides:
Predicting the Probability of Change in Object-Oriented Systems. IEEE Trans. Software Eng. 31(7): 601-614 (2005) - [c10]Kostas Zotos, Andreas Litke, George Stephanides, Alexander Chatzigeorgiou:
The Collatz Problem in a New Perspective: Energy Consumption Analysis. SoMeT 2005: 54-63 - [c9]George Stephanides, Mihai Gabroveanu, Mirel Cosulschi, Nicolae Constantinescu:
A Distributed Algorithm for Mining Fuzzy Association Rules. WEBIST 2005: 206-209 - [c8]Konstantinos Chalkias, George Filiadis, George Stephanides:
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm. IEC (Prague) 2005: 137-142 - [c7]Theodosios Tsiakis, George Stephanides, George Pekos:
Trust and Security in Electronic Payments: What We Have and Need to Know? WEC (5) 2005: 147-150 - 2004
- [c6]Athanasios Perdos, Alexander Chatzigeorgiou, George Stephanides:
Teaching Queuing Systems Modeling Using UML. ICALT 2004 - [c5]Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
A Qualitative Evaluation of Security Patterns. ICICS 2004: 132-144 - [c4]Alexander Chatzigeorgiou, Spiros Xanthos, George Stephanides:
Evaluating Object-Oriented Designs with Link Analysis. ICSE 2004: 656-665 - [c3]Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides, Ignatios S. Deligiannis:
Probabilistic Evaluation of Object-Oriented Systems. IEEE METRICS 2004: 26-33 - 2003
- [j3]Konstantinos Paparrizos, Nikolaos Samaras, George Stephanides:
A new efficient primal dual simplex algorithm. Comput. Oper. Res. 30(9): 1383-1399 (2003) - [j2]Konstantinos Paparrizos, Nikolaos Samaras, George Stephanides:
An efficient simplex type algorithm for sparse and dense linear programs. Eur. J. Oper. Res. 148(2): 323-334 (2003) - [c2]Athanasios Perdos, Alexander Chatzigeorgiou, George Stephanides:
Simulation Software for a Network Modelling Lab. ICALT 2003: 290-291 - 2002
- [j1]Alexander Chatzigeorgiou, George Stephanides:
Energy Metric for Software Systems. Softw. Qual. J. 10(4): 355-371 (2002) - [c1]Alexander Chatzigeorgiou, George Stephanides:
Evaluating Performance and Power of Object-Oriented Vs. Procedural Programming in Embedded Processors. Ada-Europe 2002: 65-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint