Spyros S. Magliveras
  According to our database1,
  Spyros S. Magliveras
  authored at least 49 papers
  between 1981 and 2019.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2019
    Des. Codes Cryptogr., 2019
    
  
  2017
    Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2017
    
  
  2013
  2012
Related decompositions and new constructions of the Higman-Sims and Hall-Janko graphs.
    
  
    Australas. J Comb., 2012
    
  
  2011
    Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011
    
  
    Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011
    
  
    Proceedings of the Information Security, Coding Theory and Related Combinatorics, 2011
    
  
  2010
    Des. Codes Cryptogr., 2010
    
  
  2009
    EURASIP J. Inf. Secur., 2009
    
  
  2008
Compression independent object encryption for ensuring privacy in video surveillance.
    
  
    Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
    
  
    Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
    
  
  2007
    Multim. Syst., 2007
    
  
    J. Netw. Comput. Appl., 2007
    
  
    EURASIP J. Inf. Secur., 2007
    
  
  2006
    Proceedings of the Image Analysis and Recognition, Third International Conference, 2006
    
  
  2005
    IACR Cryptol. ePrint Arch., 2005
    
  
    Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
    
  
    Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
    
  
  2004
    Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
    
  
  2002
New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups.
    
  
    J. Cryptol., 2002
    
  
Efficient Key Management for Secure Group Communications with Bursty Behavior.
  
    Proceedings of the IASTED International Conference on Communications, 2002
    
  
  2001
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.
    
  
    Proceedings of the Information and Communications Security, Third International Conference, 2001
    
  
  2000
    Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
    
  
  1999
  1998
    Australas. J Comb., 1998
    
  
  1997
    Proceedings of the 7th Data Compression Conference (DCC '97), 1997
    
  
  1996
  1995
    IEEE J. Sel. Areas Commun., 1995
    
  
  1994
    IEEE Trans. Geosci. Remote. Sens., 1994
    
  
    Proceedings of the Advances in Cryptology, 1994
    
  
  1993
Simple method for enhancing the performance of lossy plus lossless image compression schemes.
    
  
    J. Electronic Imaging, 1993
    
  
  1992
  1991
    Proceedings of the IEEE Data Compression Conference, 1991
    
  
  1989
    Discret. Math., 1989
    
  
    Proceedings of the Computing in the 90's, 1989
    
  
  1988
  1987
  1981