Yannis C. Stamatiou

Orcid: 0000-0002-8925-9427

  • University of Patras, Computer Engineering and Informatics Department, Greece

According to our database1, Yannis C. Stamatiou authored at least 83 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


On the Existence of Consensus Converging Organized Groups in Large Social Networks.
Proceedings of the Structural Information and Communication Complexity, 2024

Random Number Generators: Principles and Applications.
Cryptogr., September, 2023

The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation.
J. Cybersecur. Priv., January, 2023

A Generic, Flexible Smart City Platform focused on Citizen Security and Privacy.
Proceedings of the 27th Pan-Hellenic Conference on Progress in Computing and Informatics, 2023

On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats.
Int. J. Inf. Sec., 2022

Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol.
Future Internet, 2022

How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem.
Cryptogr., 2022

On the Undecidability of the Panopticon Detection Problem.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

Modelling Cyber-Risk in an Economic Perspective.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

An algorithm for computing the universal Gröbner Basis of graph ideals.
Int. J. Comput. Math. Comput. Syst. Theory, 2019

Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

<i>p</i>QUANT: A User-Centered Privacy Risk Analysis Framework.
Proceedings of the Risks and Security of Internet and Systems, 2019

Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks.
Proceedings of the 21st Pan-Hellenic Conference on Informatics, 2017

On a new edge function on complete weighted graphs and its application for locating Hamiltonian cycles of small weight.
Optim. Lett., 2016

Innovative Applications and Services Based on Privacy Enhanced Distributed Computations on IoT Devices.
Proceedings of the 18th IEEE Conference on Business Informatics, 2016

Increasing Trust Towards eCommerce: - Privacy Enhancing Technologies Against Price Discrimination.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016

Privacy Awareness Diffusion in Social Networks.
IEEE Secur. Priv., 2015

Partial Order Preserving Encryption Search Trees.
Proceedings of the Database and Expert Systems Applications, 2015

Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

User Acceptance of Privacy-ABCs: An Exploratory Study.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Reducing Redundant Information in Search Results Employing Approximation Algorithms.
Proceedings of the Database and Expert Systems Applications, 2014

A Framework for Protecting Voters' Privacy In Electronic Voting Procedures.
J. Cases Inf. Technol., 2013

Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

Agent agreement protocols based on golay error-correcting code.
Proceedings of the 4th International Conference on Information, 2013

Uncovering Mobile Phone Users' Malicious Activities Using Open Source Tools.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

Consolidating a Heuristic for Incremental Decision Tree Learning through asymptotic Analysis.
Int. J. Artif. Intell. Tools, 2011

Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm.
Proceedings of the Information Security and Assurance - International Conference, 2011

Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs.
Proceedings of the Security Technology, 2011

Formal correctness of security protocols by Giampaolo Bella, Springer-Verlag.
SIGACT News, 2010

On the Efficient Generation of Prime-Order Elliptic Curves.
J. Cryptol., 2010

Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

Geometric approaches for creating low power, low interference connectivity patterns in static, structureless sensor networks.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?
Proceedings of the Next Generation Society. Technological and Legal Issues, 2009

Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A step-wise refinement approach for enhancing e-voting acceptance.
Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, 2008

A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Cryptography and Cryptanalysis Through Computational Intelligence.
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007

Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005.
SIGACT News, 2007

Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography.
Math. Comput. Model., 2007

Efficient generation of secure elliptic curves.
Int. J. Inf. Sec., 2007

Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers.
Appl. Math. Comput., 2007

A Trust-Centered Approach for Building E-Voting Systems.
Proceedings of the Electronic Government, 6th International Conference, 2007

Trust in global computing systems as a limit property emerging from short range random interactions.
Proceedings of the The Second International Conference on Availability, 2007

A Worm Propagation Model Based on People's Email Acquaintance Profiles.
Proceedings of the Internet and Network Economics, Second International Workshop, 2006

Deterministic key pre-distribution schemes for mobile ad-hoc networks based on set systems with limited intersection sizes.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

The Threshold Behaviour of the Fixed Radius Random Graph Model and Applications to the Key Management Problem of Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2006

Distributively Increasing the Percentage of Similarities Between Strings with Applications to Key Agreement.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

The Satisfiability Threshold Conjecture: Techniques Behind Upper Bound Improvements.
Proceedings of the Computational Complexity and Statistical Physics., 2006

Proving Conditional Randomness using The Principle of Deferred Decisions.
Proceedings of the Computational Complexity and Statistical Physics., 2006

An Efficient Watermarking Method for MP3 Audio Files.
Proceedings of the International Enformatika Conference, 2005

"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience.
Proceedings of the Information Security, 8th International Conference, 2005

Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations.
Proceedings of the Information Security and Cryptology, 2004

Electronic National Lotteries.
Proceedings of the Financial Cryptography, 2004

On the Use of Weber Polynomials in Elliptic Curve Cryptography.
Proceedings of the Public Key Infrastructure, 2004

Locating information with uncertainty in fully interconnected networks: The case of nondistributed memory.
Networks, 2003

Threshold Phenomena: The Computer Scientist's Viewpoint.
Bull. EATCS, 2003

The CORAS approach for model-based risk management applied to a telemedicine service.
Proceedings of the New Navigators: from Professionals to Patients, 2003

On the Construction of Prime Order Elliptic Curves.
Proceedings of the Progress in Cryptology, 2003

Dynamically Modifiable Ciphers Using a Reconfigurable CAST-128 Based Algorithm on ATMEL's FPSLIC(tm) Reconfigurable FPGA Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Enhancing the Security of Block Ciphers with the Aid of Parallel Substitution Box Construction.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

A Software Library for Elliptic Curve Cryptography.
Proceedings of the Algorithms, 2002

On the Efficient Generation of Elliptic Curves over Prime Fields.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

Erratum to Bounding the Unsatisfiability Threshold of Random 3-SAT.
Random Struct. Algorithms, 2001

The unsatisfiability threshold revisited.
Electron. Notes Discret. Math., 2001

Random Constraint Satisfaction: A More Accurate Picture.
Constraints An Int. J., 2001

Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval.
Comput. J., 2001

An Information Hiding Method Based on Computational Intractable Problems.
Proceedings of the Advances in Informatics, 8th Panhellenic Conference on Informatics, 2001

A compressed-domain watermarking algorithm for mpeg audio layer 3.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

Coupon Collectors, q-Binomial Coefficients and the Unsatisfiability Threshold.
Proceedings of the Theoretical Computer Science, 7th Italian Conference, 2001

Bounding the unsatisfiability threshold of random 3-SAT.
Random Struct. Algorithms, 2000

On Parallel Partial Solutions and Approximation Schemes for Local Consistency in Networks of Constraints.
Constraints An Int. J., 2000

A Note on the Non-Colorability Threshold of a Random Graph.
Electron. J. Comb., 2000

Locating Information with Uncertainty in Fully Interconnected Networks.
Proceedings of the Distributed Computing, 14th International Conference, 2000

Monotonicity and inert fugitive search games.
Electron. Notes Discret. Math., 1999

Approximating the unsatisfiability threshold of random formulas.
Random Struct. Algorithms, 1998

Massively parallel support for nonmonotonic reasoning.
Proceedings of the Parallel Processing for Artificial Intelligence 3, 1997

Partiality and Approximation Schemes for Local Consistency in Networks of Constraints.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1995

Partial Arc Consistency.
Proceedings of the Over-Constrained Systems, 1995