George Stephanides

According to our database1, George Stephanides authored at least 49 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
RatingsLib: A python library for rating methods with applications.
Softw. Impacts, December, 2022

2019
Forecasting Soccer Outcome Using Cost-Sensitive Models Oriented to Investment Opportunities.
Int. J. Comput. Sci. Sport, 2019

Leakage-resilient lattice-based partially blind signatures.
IET Inf. Secur., 2019

2018
Pairing-Based Cryptography on the Internet of Things: A Feasibility Study.
Proceedings of the Wired/Wireless Internet Communications, 2018

2014
Rating Systems Vs Machine Learning on the context of sports.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

2012
A novel technique for image steganography based on a high payload method and edge detection.
Expert Syst. Appl., 2012

A Compatible Implementation between Identity-based and Certificateless Encryption Schemes.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.
Proceedings of the SECRYPT 2012, 2012

2010
Attacks on the AKACP Protocol.
IACR Cryptol. ePrint Arch., 2010

A Queuing Theory and Systems Modeling Course Based on Unified Modeling Language (UML).
Proceedings of the Knowledge Management, Information Systems, E-Learning, and Sustainability Research, 2010

Parallel Collection of Live Data Using Hadoop.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

Practical Implementation of Identity Based Encryption for Secure E-mail Communication.
Proceedings of the 14th Panhellenic Conference on Informatics, 2010

2009
Moving from Requirements to Design Confronting Security Issues: A Case Study.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Architectural Risk Analysis of Software Systems Based on Security Patterns.
IEEE Trans. Dependable Secur. Comput., 2008

Facilitating software extension with design patterns and Aspect-Oriented Programming.
J. Syst. Softw., 2008

Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki.
Proceedings of the WINSYS 2008, 2008

An Implementation Infrastructure for Server-Passive Timed-Release Cryptography.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Improving technical trading systems by using a new MATLAB-based genetic algorithm procedure.
Math. Comput. Model., 2007

On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols.
Proceedings of the SECRYPT 2007, 2007

Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Improved Anonymous Timed-Release Encryption.
Proceedings of the Computer Security, 2007

A Provably Secure One-Pass Two-Party Key Establishment Protocol.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Low-cost Anonymous Timed-Release Encryption.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Design Pattern Detection Using Similarity Scoring.
IEEE Trans. Software Eng., 2006

A qualitative analysis of software security patterns.
Comput. Secur., 2006

Application of graph theory to OO software engineering.
Proceedings of the 2006 Workshop on interdisciplinary software engineering research, 2006

RSA-Padding Signatures with Attack Studies.
Proceedings of the WEBIST 2006, 2006

Analysis of Object-Oriented Numerical Libraries.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Quantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

AHPA-Calculating Hub and Authority for Information Retrieval.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Evaluation of a Queuing Theory and Systems Modeling Course Based on UML.
Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, 2006

Timed Release Cryptography from Bilinear Pairings Using Hash Chains.
Proceedings of the Communications and Multimedia Security, 2006

2005
Predicting the Probability of Change in Object-Oriented Systems.
IEEE Trans. Software Eng., 2005

The economic approach of information security.
Comput. Secur., 2005

The concept of security and trust in electronic payments.
Comput. Secur., 2005

The GN-authenticated key agreement.
Appl. Math. Comput., 2005

Trust and Security in Electronic Payments: What We Have and Need to Know?
Proceedings of the Third World Enformatika Conference, 2005

Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm.
Proceedings of the International Enformatika Conference, 2005

A Distributed Algorithm for Mining Fuzzy Association Rules.
Proceedings of the WEBIST 2005, 2005

The Collatz Problem in a New Perspective: Energy Consumption Analysis.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2005

2004
Probabilistic Evaluation of Object-Oriented Systems.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

Evaluating Object-Oriented Designs with Link Analysis.
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004

A Qualitative Evaluation of Security Patterns.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Teaching Queuing Systems Modeling Using UML.
Proceedings of the IEEE International Conference on Advanced Learning Technologies, 2004

2003
An efficient simplex type algorithm for sparse and dense linear programs.
Eur. J. Oper. Res., 2003

A new efficient primal dual simplex algorithm.
Comput. Oper. Res., 2003

Simulation Software for a Network Modelling Lab.
Proceedings of the 2003 IEEE International Conference on Advanced Learning Technologies, 2003

2002
Energy Metric for Software Systems.
Softw. Qual. J., 2002

Evaluating Performance and Power of Object-Oriented Vs. Procedural Programming in Embedded Processors.
Proceedings of the Reliable Software Technologies, 2002


  Loading...