Panagiotis Rizomiliotis
Panagiotis Rizomiliotis
As. Professor at the University of the Aegean
Verified email at aegean.gr - Homepage
TitleCited byYear
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
P Rizomiliotis, E Rekleitis, S Gritzalis
IEEE Communications Letters 13 (4), 274-276, 2009
622009
Feedback phase in optically generated chaos: A secret key for cryptographic applications
A Bogris, P Rizomiliotis, KE Chlouverakis, A Argyris, D Syvridis
IEEE Journal of Quantum Electronics 44 (2), 119-124, 2008
612008
On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation
P Rizomiliotis
IEEE Transactions on Information Theory 56 (8), 4014-4024, 2010
592010
Cryptography goes to the cloud
I Agudo, D Nuņez, G Giammatteo, P Rizomiliotis, C Lambrinoudakis
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
422011
Results on the nonlinear span of binary sequences
P Rizomiliotis, N Kalouptsidis
IEEE transactions on information theory 51 (4), 1555-1563, 2005
352005
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol
P Rizomiliotis, S Gritzalis
International Conference on Applied Cryptography and Network Security, 489-506, 2012
252012
New constructions of high-performance low-complexity convolutional codes
A Katsiotis, P Rizomiliotis, N Kalouptsidis
IEEE Transactions on Communications 58 (7), 1950-1961, 2010
222010
On the quadratic span of binary sequences
P Rizomiliotis, N Kolokotronis, N Kalouptsidis
IEEE transactions on information theory 51 (5), 1840-1848, 2005
222005
Minimum linear span approximation of binary sequences
N Kolokotronis, P Rizomiliotis, N Kalouptsidis
IEEE Transactions on Information Theory 48 (10), 2758-2764, 2002
222002
Relay selection for secure 5G green communications
N Nomikos, A Nieto, P Makris, DN Skoutas, D Vouyioukas, P Rizomiliotis, ...
Telecommunication Systems 59 (1), 169-187, 2015
202015
How to protect security and privacy in the IoT: a policy‐based RFID tag management protocol
E Rekleitis, P Rizomiliotis, S Gritzalis
Security and Communication Networks 7 (12), 2669-2683, 2014
162014
Flexible convolutional codes: variable rate and complexity
A Katsiotis, P Rizomiliotis, N Kalouptsidis
IEEE Transactions on communications 60 (3), 608-613, 2011
152011
ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes
P Rizomiliotis, S Gritzalis
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 65-76, 2015
142015
A user-oriented, customizable infrastructure sharing approach for hybrid cloud computing environments
P Makris, DN Skoutas, P Rizomiliotis, C Skianis
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
132011
Constructing periodic binary sequences with maximum nonlinear span
P Rizomiliotis
IEEE transactions on information theory 52 (9), 4257-4261, 2006
122006
Digital forensics in the cloud computing era
N Marangos, P Rizomiliotis, L Mitrou
2012 IEEE Globecom Workshops, 775-780, 2012
112012
HB − MAC: Improving the Random − HB # Authentication Protocol
P Rizomiliotis
International Conference on Trust, Privacy and Security in Digital Business …, 2009
102009
A holistic approach to RFID security and privacy
E Rekleitis, P Rizomiliotis, S Gritzalis
Proc. 1st Int’l Workshop Security of the Internet of Things, 2010
92010
On the security of the Feng–Liao–Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
P Rizomiliotis
Designs, Codes and Cryptography 57 (3), 283-292, 2010
82010
Time synchronization: pivotal element in cloud forensics
N Marangos, P Rizomiliotis, L Mitrou
Security and Communication Networks 9 (6), 571-582, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20