Artemios G. Voyiatzis

According to our database1, Artemios G. Voyiatzis authored at least 50 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
On inferring how resources are shared in IoT ecosystems; a graph theoretic approach.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

A unified architecture for integrating energy harvesting IoT devices with the Mobile Edge Cloud.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

USBlock: Blocking USB-Based Keypress Injection Attacks.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
On the effects of ring oscillator length and hardware Trojan size on an FPGA-based implementation of AES.
Microprocessors and Microsystems - Embedded Hardware Design, 2017

Merged Mining: Curse of Cure?
IACR Cryptology ePrint Archive, 2017

u'smile - Secure Mobile Environments.
ERCIM News, 2017

A Performance Assessment of Network Address Shuffling in IoT Systems.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017

Merged Mining: Curse or Cure?
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

A Trust-based Resilient Routing Mechanism for the Internet of Things.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Lightweight Address Hopping for Defending the IPv6 IoT.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Combinatorial Methods in Security Testing.
IEEE Computer, 2016

An HMM-Based Anomaly Detection Approach for SCADA Systems.
Proceedings of the Information Security Theory and Practice, 2016

A survey on network resiliency methodologies against weather-based disruptions.
Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), 2016

TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

An Efficient Reconfigurable Ring Oscillator for Hardware Trojan Detection.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

TERO-Based Detection of Hardware Trojans on FPGA Implementation of the AES Algorithm.
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016

Efficient triggering of Trojan hardware logic.
Proceedings of the 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS), 2016

Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Secure cyber-physical production systems: Solid steps towards realization.
Proceedings of the 1st International Workshop on Cyber-Physical Production Systems, 2016

Notary-Assisted Certificate Pinning for Improved Security of Android Apps.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Dynacargo: An Urban Solid Waste Collection Information System.
ERCIM News, 2015

Architecture and Implementation Issues, Towards a Dynamic Waste Collection Management System.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Privacy-preserving routing in delay tolerant networks based on Bloom filters.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Exciting FPGA cryptographic Trojans using combinatorial testing.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis.
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, 2015

A Modbus/TCP Fuzzer for testing internetworked industrial systems.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015

A versatile scalable smart waste-bin system based on resource-limited embedded devices.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015

A Comparison of TERO and RO Timing Sensitivity for Hardware Trojan Detection Applications.
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

2014
Dynamic cargo routing on-the-Go: The case of urban solid waste collection.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

FPGA Trojan Detection Using Length-Optimized Ring Oscillators.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

2013
Security challenges in embedded systems.
ACM Trans. Embedded Comput. Syst., 2013

An empirical study on efficiency and effectiveness of localized vs. Latin-based CAPTCHA challenges.
Proceedings of the 17th Panhellenic Conference on Informatics, 2013

On Users' Preference on Localized vs. Latin-Based CAPTCHA Challenges.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

2012
DAPHNE: A Disruption-Tolerant Application Proxy for e-Health Network Environments.
Proceedings of the Wireless Mobile Communication and Healthcare, 2012

2011
Design and implementation of an efficient integer count sort in CUDA GPUs.
Concurrency and Computation: Practice and Experience, 2011

An Empirical Study on the Web Password Strength in Greece.
Proceedings of the 15th Panhellenic Conference on Informatics, 2011

Performance of the Controlled Randomness Protocol on .NET Compact Framework Embedded Systems.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

On the necessity of user-friendly CAPTCHA.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
When Security Meets Usability: A User-Centric Approach on a Crossroads Priority Problem.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2009
Network Stack Optimization for Improved IPsec Performance on Linux.
Proceedings of the SECRYPT 2009, 2009

Fighting spammers with spam.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

Optimizations for High-Performance IPsec Execution.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Design Issues in Secure Embedded Systems.
Proceedings of the Embedded Systems Design and Verification, 2009

2008
The security of the Fiat-Shamir scheme in the presence of transient hardware faults.
ACM Trans. Embedded Comput. Syst., 2008

2005
An introduction to side channel cryptanalysis of RSA.
ACM Crossroads, 2005

CryptoPalm: A Cryptographic Library for PalmOS.
Proceedings of the Advances in Informatics, 2005

2004
A Fault-Injection Attack on Fiat-Shamir Cryptosystems.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
Pulse: A Class of Super-Worms against Network Infrastructure.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
Active hardware attacks and proactive countermeasures.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002


  Loading...