Остановите войну!
for scientists:
default search action
Panagiotis Rizomiliotis
Publications
- 2024
- [j17]Aikaterini Triakosia, Panagiotis Rizomiliotis, Cecilia Tonelli, Fabio Federici, Valerio Senni:
Secure outsourcing of manufacturing compliance checks. Int. J. Inf. Sec. 23(1): 609-627 (2024) - 2023
- [j16]Eirini Molla, Panagiotis Rizomiliotis, Stefanos Gritzalis:
Efficient searchable symmetric encryption supporting range queries. Int. J. Inf. Sec. 22(4): 785-798 (2023) - 2022
- [j15]Alexandros Vasilaras, Donatos Dosis, Michael Kotsis, Panagiotis Rizomiliotis:
Retrieving deleted records from Telegram. Digit. Investig. 43(Supplement): 301447 (2022) - [c25]Panagiotis Rizomiliotis, Aikaterini Triakosia:
On Matrix Multiplication with Homomorphic Encryption. CCSW 2022: 53-61 - [c24]Alexandros Vasilaras, Donatos Dosis, Michael Kotsis, Panagiotis Rizomiliotis:
Android Device Incident Response: Viber Analysis. CSR 2022: 138-142 - [c23]Panagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes:
Partially Oblivious Neural Network Inference. SECRYPT 2022: 158-169 - [c22]Aikaterini Triakosia, Panagiotis Rizomiliotis, Konstantinos Tserpes, Cecilia Tonelli, Valerio Senni, Fabio Federici:
Homomorphic Encryption in Manufacturing Compliance Checks. TrustBus 2022: 81-95 - [i2]Panagiotis Rizomiliotis, Christos Diou, Aikaterini Triakosia, Ilias Kyrannas, Konstantinos Tserpes:
Partially Oblivious Neural Network Inference. CoRR abs/2210.15189 (2022) - 2019
- [c21]Panagiotis Rizomiliotis, Stefanos Gritzalis:
Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips. CCSW 2019: 141-152 - 2017
- [c20]Panagiotis Rizomiliotis, Eirini Molla, Stefanos Gritzalis:
REX: A Searchable Symmetric Encryption Scheme Supporting Range Queries. CCSW 2017: 29-37 - 2016
- [j14]Nikolaos Marangos, Panagiotis Rizomiliotis, Lilian Mitrou:
Time synchronization: pivotal element in cloud forensics. Secur. Commun. Networks 9(6): 571-582 (2016) - 2015
- [j13]Nikolaos Nomikos, Ana Nieto, Prodromos Makris, Dimitrios N. Skoutas, Demosthenes Vouyioukas, Panagiotis Rizomiliotis, Javier López, Charalambos Skianis:
Relay selection for secure 5G green communications. Telecommun. Syst. 59(1): 169-187 (2015) - [c19]Panagiotis Rizomiliotis, Stefanos Gritzalis:
ORAM Based Forward Privacy Preserving Dynamic Searchable Symmetric Encryption Schemes. CCSW 2015: 65-76 - [p3]Maria Bertsima, Iraklis Varlamis, Panagiotis Rizomiliotis:
Strengthening Privacy in Healthcare Social Networks. Medical Data Privacy Handbook 2015: 613-635 - 2014
- [j12]Evangelos Rekleitis, Panagiotis Rizomiliotis, Stefanos Gritzalis:
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. Secur. Commun. Networks 7(12): 2669-2683 (2014) - 2013
- [j11]Panagiotis Rizomiliotis, Stefanos Gritzalis:
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem. Int. J. Inf. Sec. 12(2): 151-154 (2013) - [c17]Panagiotis Rizomiliotis, Stefanos Gritzalis:
Revisiting lightweight authentication protocols based on hard learning problems. WISEC 2013: 125-130 - 2012
- [c16]Panagiotis Rizomiliotis, Stefanos Gritzalis:
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. ACNS 2012: 489-506 - [c15]Klimis S. Ntalianis, Emmanuel Sardis, Nicolas Tsapatsoulis, Anastasios D. Doulamis, Panagiotis Rizomiliotis:
Multiocular surveilance of wide dynamic environments based on optical vision, event modelling and end-to-end data encryption: A cloud-based monitoring approach of maritime activities. GLOBECOM Workshops 2012: 742-746 - [c14]Nikolaos Marangos, Panagiotis Rizomiliotis, Lilian Mitrou:
Digital forensics in the Cloud Computing Era. GLOBECOM Workshops 2012: 775-780 - [c12]Panagiotis Rizomiliotis, Charalambos Skianis:
PASSIVE: Policy-Assessed System-Level Security of Sensitive Information Processing in Virtualised Environments. TrustBus 2012: 227-228 - 2011
- [c11]Prodromos Makris, Dimitrios N. Skoutas, Panagiotis Rizomiliotis, Charalabos Skianis:
A User-Oriented, Customizable Infrastructure Sharing Approach for Hybrid Cloud Computing Environments. CloudCom 2011: 432-439 - [c10]Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis:
Designing secure RFID authentication protocols is (still) a non-trivial task. NSS 2011: 73-80 - [c9]Isaac Agudo, David Nuñez, Gabriele Giammatteo, Panagiotis Rizomiliotis, Costas Lambrinoudakis:
Cryptography Goes to the Cloud. STA Workshops 2011: 190-197 - [e1]Costas Lambrinoudakis, Panagiotis Rizomiliotis, Tomasz Wiktor Wlodarczyk:
IEEE 3rd International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29 - December 1, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-0090-2 [contents] - 2010
- [c8]Evangelos Rekleitis, Panagiotis Rizomiliotis, Stefanos Gritzalis:
An Agent Based Back-End RFID Tag Management System. TrustBus 2010: 165-176 - 2009
- [j5]Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis:
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags. IEEE Commun. Lett. 13(4): 274-276 (2009) - [p2]Spyros Kokolakis, Panagiotis Rizomiliotis, Azzedine Benameur, Smriti Kumar Sinha:
Security and Dependability Solutions for Web Services and Workflows. Security and Dependability for Ambient Intelligence 2009: 97-106
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint