Seuraa
Yannis Stamatiou
Yannis Stamatiou
Vahvistettu sähköpostiosoite verkkotunnuksessa ceid.upatras.gr
Nimike
Viittaukset
Viittaukset
Vuosi
Approximating the unsatisfiability threshold of random formulas
LM Kirousis, E Kranakis, D Krizanc, YC Stamatiou
Random Structures & Algorithms 12 (3), 253-269, 1998
2081998
Random constraint satisfaction: A more accurate picture
D Achlioptas, LM Kirousis, E Kranakis, D Krizanc, MSO Molloy, ...
Principles and Practice of Constraint Programming-CP97: Third International …, 1997
1581997
Bounding the unsatisfiability threshold of random 3‐SAT
S Janson, YC Stamatiou, M Vamvakari
Random Structures & Algorithms 17 (2), 103-116, 2000
982000
Model-based risk assessment–the CORAS approach
K Stolen, F Den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ...
iTrust Workshop, 2002
812002
Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices
I Chatzigiannakis, A Pyrgelis, PG Spirakis, YC Stamatiou
2011 IEEE eighth international conference on mobile ad-hoc and sensor …, 2011
772011
Random constraint satisfaction: A more accurate picture
D Achlioptas, MSO Molloy, LM Kirousis, YC Stamatiou, E Kranakis, ...
Constraints 6, 329-344, 2001
732001
Evolutionary computation based cryptanalysis: A first study
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005
492005
Cryptography and cryptanalysis through computational intelligence
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Computational Intelligence in Information Assurance and Security, 1-49, 2007
412007
Model-based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks
K Stølen, F den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ...
Business Component-Based Software Engineering, 189-207, 2003
372003
Gamification acceptance for learners with different E-skills
A Panagiotarou, YC Stamatiou, C Pierrakeas, A Kameas
International Journal of Learning, Teaching and Educational Research 19 (2 …, 2020
352020
A trust-centered approach for building e-voting systems
A Antoniou, C Korakas, C Manolopoulos, A Panagiotaki, D Sofotassios, ...
Electronic Government: 6th International Conference, EGOV 2007, Regensburg …, 2007
352007
The CORAS approach for model-based risk management applied to a telemedicine service
Y Stamatiou, E Skipenes, E Henriksen, N Stathiakis, A Sikianakis, ...
The New Navigators: from Professionals to Patients, 206-211, 2003
352003
A compressed-domain watermarking algorithm for mpeg audio layer 3
DK Koukopoulos, YC Stamatiou
Proceedings of the 2001 workshop on Multimedia and security: new challenges …, 2001
312001
User acceptance of privacy-abcs: An exploratory study
Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
302014
A software library for elliptic curve cryptography
E Konstantinou, Y Stamatiou, C Zaroliagis
European Symposium on Algorithms, 625-637, 2002
302002
A note on the non-colorability threshold of a random graph
AC Kaporis, LM Kirousis, YC Stamatiou
the electronic journal of combinatorics 7, R29-R29, 2000
272000
A transparent watermarking method for color images
S Armeni, D Christodoulakis, I Kostopoulos, Y Stamatiou, M Xenos
First IEEE Balcan Conference on Signal Processing, Communications, Circuits …, 2000
242000
On the construction of prime order elliptic curves
E Konstantinou, YC Stamatiou, C Zaroliagis
International Conference on Cryptology in India, 309-322, 2003
222003
On the efficient generation of elliptic curves over prime fields
E Konstantinou, YC Stamatiou, C Zaroliagis
International Workshop on Cryptographic Hardware and Embedded Systems, 333-348, 2002
222002
Monotonicity and inert fugitive search games
Y Stamatiou, D Thilikos Touloupas
221999
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20