Nicholas Kolokotronis

According to our database1, Nicholas Kolokotronis authored at least 41 papers between 1999 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Secure Information Sharing in Adversarial Adaptive Diffusion Networks.
IEEE Trans. Signal and Information Processing over Networks, 2018

Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction.
Des. Codes Cryptography, 2018

WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Trust-based strategies for wireless networks under partial monitoring.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Secretly Pruned Convolutional Codes: Security Analysis and Performance Results.
IEEE Trans. Information Forensics and Security, 2016

Using trust to mitigate malicious and selfish behavior of autonomous agents in CRNs.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Improving physical layer security in DF relay networks via two-stage cooperative jamming.
Proceedings of the 24th European Signal Processing Conference, 2016

2015
Secure encoder designs based on turbo codes.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A cooperative jamming protocol for physical layer security in wireless networks.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Managing trust in diffusion adaptive networks with malicious agents.
Proceedings of the 23rd European Signal Processing Conference, 2015

Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
Short paper: attacking and defending lightweight PHY security schemes for wireless communications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Cooperation for secure wireless communications with resource-bounded eavesdroppers.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2013
Secondary constructions of Boolean functions with maximum algebraic immunity.
Cryptography and Communications, 2013

Physical layer security via secret trellis pruning.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

2012
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity.
IACR Cryptology ePrint Archive, 2012

A greedy algorithm for checking normality of cryptographic boolean functions.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

On the second-order nonlinearity of cubic Maiorana-McFarland Boolean functions.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Maiorana-McFarland Functions with High Second-Order Nonlinearity.
IACR Cryptology ePrint Archive, 2011

Constructing Boolean functions in odd number of variables with maximum algebraic immunity.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Fast decoding of regular LDPC codes using greedy approximation algorithms.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2009
Best affine and quadratic approximations of particular classes of Boolean functions.
IEEE Trans. Information Theory, 2009

Properties of the error linear complexity spectrum.
IEEE Trans. Information Theory, 2009

Factorization of determinants over finite fields and application in stream ciphers.
Cryptography and Communications, 2009

2008
On the Linear Complexity of Sequences Obtained by State Space Generators.
IEEE Trans. Information Theory, 2008

Cryptographic properties of nonlinear pseudorandom number generators.
Des. Codes Cryptography, 2008

On symplectic matrices of cubic Boolean forms and connections with second order nonlinearity.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

On the error linear complexity profiles of binary sequences of period 2n.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
On the Nonlinear Complexity and Lempel-Ziv Complexity of Finite Length Sequences.
IEEE Trans. Information Theory, 2007

Best Quadratic Approximations of Cubic Boolean Functions.
IACR Cryptology ePrint Archive, 2007

Best Affine Approximations of Boolean Functions and Applications to Low Order Approximations.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions.
Proceedings of the Cryptography and Coding, 2007

Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression.
Proceedings of the Sequences and Their Applications, 2006

Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants.
Proceedings of the Sequences and Their Applications, 2006

2005
On the quadratic span of binary sequences.
IEEE Trans. Information Theory, 2005

2003
On the linear complexity of nonlinearly filtered PN-sequences.
IEEE Trans. Information Theory, 2003

2002
Minimum linear span approximation of binary sequences.
IEEE Trans. Information Theory, 2002

On the generation of sequences simulating higher order white noise for system identification.
Proceedings of the 11th European Signal Processing Conference, 2002

1999
Wavelet-based medical image compression.
Future Generation Comp. Syst., 1999


  Loading...