Improved anonymous timed-release encryption K Chalkias, D Hristu-Varsakelis, G Stephanides European Symposium on Research in Computer Security, 311-326, 2007 | 36 | 2007 |
Two types of key-compromise impersonation attacks against one-pass key establishment protocols K Chalkias, F Baldimtsi, D Hristu-Varsakelis, G Stephanides International Conference on E-Business and Telecommunications, 227-238, 2007 | 29 | 2007 |
A multi-grid graphical password scheme K Chalkias, A Alexiadis, G Stephanides Proceedings of the 6th International Conference on Artificial Intelligence …, 2006 | 28 | 2006 |
Timed release cryptography from bilinear pairings using hash chains K Chalkias, G Stephanides IFIP International Conference on Communications and Multimedia Security, 130-140, 2006 | 21 | 2006 |
Low-cost anonymous timed-release encryption D Hristu-Varsakelis, K Chalkias, G Stephanides Third International Symposium on Information Assurance and Security, 77-82, 2007 | 16 | 2007 |
Parallel collection of live data using Hadoop K Talattinis, A Sidiropoulou, K Chalkias, G Stephanides 2010 14th Panhellenic Conference on Informatics, 66-71, 2010 | 14 | 2010 |
On the key-compromise impersonation vulnerability of one-pass key establishment protocols K Chalkias, F Mpaldimtsi, D Hristu-Varsakelis, G Stephanides SECRYPT, 2007 | 13 | 2007 |
A provably secure one-pass two-party key establishment protocol K Chalkias, ST Halkidis, D Hristu-Varsakelis, G Stephanides, A Alexiadis International Conference on Information Security and Cryptology, 108-122, 2007 | 7 | 2007 |
Mathematical problems and algorithms for timed-release encryption K Chalkias, F Baldimtsi, D Hristu-Varsakelis, G Stephanides Bulletin of the Transilvania University of Brasov 15 (50), 1-4, 2008 | 5 | 2008 |
Practical Implementation of Identity Based Encryption for Secure E-mail Communication A Kihidis, K Chalkias, G Stephanides 2010 14th Panhellenic Conference on Informatics, 101-106, 2010 | 4 | 2010 |
A versatile secure protocol for anonymous timed-release encryption D Hristu-Varsakelis, K Chalkias, G Stephanides Journal of Information Assurance and Security 2, 80-88, 2008 | 4 | 2008 |
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm. K Chalkias, G Filiadis, G Stephanides IEC (Prague), 137-142, 2005 | 4 | 2005 |
Lessons learned from an open-source University project P Basdaras, K Chalkias, A Chatzigeorgiou, I Deligiannis, P Tsakiri, ... WSEAS TRANSACTIONS ON ADVANCES IN ENGINEERING EDUCATION 3 (5), 317, 2006 | 3 | 2006 |
Implementing a Graphical Password Scheme that uses Nested Grids A Alexiadis, K Chalkias, G Stephanides ICITST 2006 (best paper), 2006 | 3 | 2006 |
Going beyond the coinbase transaction fee: Alternative reward schemes for miners in blockchain systems H Gjermundrød, K Chalkias, I Dionysiou Proceedings of the 20th Pan-Hellenic Conference on Informatics, 35, 2016 | 2 | 2016 |
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography K Chalkias, F Baldimtsi, D Hristu-Varsakelis, G Stephanides 2008 The Fourth International Conference on Information Assurance and …, 2008 | 2 | 2008 |
Pairing-Based Timed-Release Cryptography K Chalkias, F Baldimtsi, D Hristu-Varsakelis, G Stephanides NIST Identity Based Encryption Workshop, 2008 | 2 | 2008 |
A Compatible Implementation between Identity-based and Certificateless Encryption Schemes. A Polychroniadou, K Chalkias, G Stephanides WEBIST, 225-230, 2012 | 1 | 2012 |
Automatic Identification of Low-Risk Trading Opportunities in Sport Betting Exchange Markets M Ioulianou, I Christofi, K Talattinis, K Chalkias, G Stephanides BALCOR 2011 108, 2011 | 1 | 2011 |
Attacks on the AKACP Protocol K Chalkias, F Baldimtsi, D Hristu-Varsakelis, ST Halkidis, G Stephanides IACR Cryptology ePrint Archive, 2010 | 1 | 2010 |