default search action
Yannis C. Stamatiou
Person information
- affiliation: University of Patras, Computer Engineering and Informatics Department, Greece
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c52]Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Existence of Consensus Converging Organized Groups in Large Social Networks. SIROCCO 2024: 507-512 - 2023
- [j28]Anastasios N. Bikos, Panagiotis E. Nastou, Georgios Petroudis, Yannis C. Stamatiou:
Random Number Generators: Principles and Applications. Cryptogr. 7(4): 54 (2023) - [j27]Vasileios Vlachos, Yannis C. Stamatiou, Sotiris E. Nikoletseas:
The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation. J. Cybersecur. Priv. 3(1): 26-43 (2023) - [c51]Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents. CSCML 2023: 501-510 - [c50]Yannis C. Stamatiou, Constantinos Halkiopoulos, Hera Antonopoulou:
A Generic, Flexible Smart City Platform focused on Citizen Security and Privacy. PCI 2023: 232-236 - [i4]Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the existence of highly organized communities in networks of locally interacting agents. CoRR abs/2304.04480 (2023) - 2022
- [j26]Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem. Cryptogr. 6(3): 42 (2022) - [j25]Despoina Chochtoula, Aristidis Ilias, Yannis C. Stamatiou, Christos Makris:
Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol. Future Internet 14(8): 232 (2022) - [j24]Vasileios Vlachos, Yannis C. Stamatiou, Pantelis Tzamalis, Sotiris E. Nikoletseas:
The SAINT observatory subsystem: an open-source intelligence tool for uncovering cybersecurity threats. Int. J. Inf. Sec. 21(5): 1091-1106 (2022) - [c49]Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the Undecidability of the Panopticon Detection Problem. CSCML 2022: 78-87 - 2021
- [c48]Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis. CSCML 2021: 230-243 - [c47]Ioannis Bothos, Vasileios Vlachos, Dimitris M. Kyriazanos, Ioannis C. Stamatiou, Konstantinos Giorgios Thanos, Pantelis Tzamalis, Sotirios E. Nikoletseas, Stelios C. A. Thomopoulos:
Modelling Cyber-Risk in an Economic Perspective. CSR 2021: 372-377 - [i3]Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
On the undecidability of the Panopticon detection problem. CoRR abs/2107.05220 (2021)
2010 – 2019
- 2019
- [j23]Yannis C. Stamatiou, Christos Tatakis:
An algorithm for computing the universal Gröbner Basis of graph ideals. Int. J. Comput. Math. Comput. Syst. Theory 4(2): 67-75 (2019) - [c46]Welderufael B. Tesfay, Dimitra Nastouli, Yannis C. Stamatiou, Jetzabel M. Serna:
pQUANT: A User-Centered Privacy Risk Analysis Framework. CRiSIS 2019: 3-16 - [c45]Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou:
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement). CSCML 2019: 324-327 - 2017
- [c44]Vasileios Vlachos, Yannis C. Stamatiou, Adelina Madhja, Sotiris E. Nikoletseas:
Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security risks. PCI 2017: 27:1-27:4 - 2016
- [j22]Panayotis E. Nastou, Vasilis Papadinas, Panos M. Pardalos, Yannis C. Stamatiou:
On a new edge function on complete weighted graphs and its application for locating Hamiltonian cycles of small weight. Optim. Lett. 10(6): 1203-1220 (2016) - [c43]Christos Makris, Konstantinos Patikas, Yannis C. Stamatiou:
Increasing Trust Towards eCommerce: - Privacy Enhancing Technologies Against Price Discrimination. WEBIST (1) 2016: 25-31 - [c42]Artemis D. Avgerou, Panayotis E. Nastou, Yannis C. Stamatiou:
Innovative Applications and Services Based on Privacy Enhanced Distributed Computations on IoT Devices. CBI (2) 2016: 20-25 - 2015
- [j21]Artemis D. Avgerou, Yannis C. Stamatiou:
Privacy Awareness Diffusion in Social Networks. IEEE Secur. Priv. 13(6): 44-50 (2015) - [c41]Kyriakos Ispoglou, Christos Makris, Yannis C. Stamatiou, Elias C. Stavropoulos, Athanasios K. Tsakalidis, Vasileios Iosifidis:
Partial Order Preserving Encryption Search Trees. DEXA (2) 2015: 49-56 - [p5]Yannis C. Stamatiou, Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Welderufael Tesfay:
Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust. Attribute-based Credentials for Trust 2015: 197-239 - 2014
- [c40]Christos Makris, Yannis Plegas, Yannis C. Stamatiou, Elias C. Stavropoulos, Athanasios K. Tsakalidis:
Reducing Redundant Information in Search Results Employing Approximation Algorithms. DEXA (2) 2014: 240-247 - [c39]Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis C. Stamatiou:
User Acceptance of Privacy-ABCs: An Exploratory Study. HCI (24) 2014: 375-386 - 2013
- [j20]Christos Manolopoulos, Dimitris Sofotassios, Paul G. Spirakis, Yannis C. Stamatiou:
A Framework for Protecting Voters' Privacy In Electronic Voting Procedures. J. Cases Inf. Technol. 15(2): 1-33 (2013) - [c38]Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou, Christina Vichou:
Agent agreement protocols based on golay error-correcting code. IISA 2013: 1-6 - [c37]Yannis C. Stamatiou:
Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond. Privacy and Identity Management 2013: 64-76 - 2012
- [c36]Vasiliki Liagkou, George Metakides, Apostolos Pyrgelis, Christoforos L. Raptopoulos, Paul G. Spirakis, Yannis C. Stamatiou:
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials. APF 2012: 140-156 - [c35]P. A. Kotsopoulos, Yannis C. Stamatiou:
Uncovering Mobile Phone Users' Malicious Activities Using Open Source Tools. ASONAM 2012: 927-933 - 2011
- [j19]Dimitris Kalles, Athanasios Papagelis, Yannis C. Stamatiou:
Consolidating a Heuristic for Incremental Decision Tree Learning through asymptotic Analysis. Int. J. Artif. Intell. Tools 20(1): 29-52 (2011) - [c34]Panayotis E. Nastou, Yannis C. Stamatiou:
A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs. FGIT-SecTech 2011: 155-166 - [c33]Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution. ICGS3/e-Democracy 2011: 72-79 - [c32]Ioannis Chatzigiannakis, Apostolos Pyrgelis, Paul G. Spirakis, Yannis C. Stamatiou:
Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices. MASS 2011: 715-720 - [c31]Gerasimos C. Meletiou, Yannis C. Stamatiou, Apostolos Tsiakalos:
Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm. ISA 2011: 177-187 - [i2]Ioannis Chatzigiannakis, Apostolos Pyrgelis, Paul G. Spirakis, Yannis C. Stamatiou:
Elliptic Curve Based Zero Knowledge Proofs and Their Applicability on Resource Constrained Devices. CoRR abs/1107.1626 (2011) - 2010
- [j18]Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis:
On the Efficient Generation of Prime-Order Elliptic Curves. J. Cryptol. 23(3): 477-503 (2010) - [j17]Yannis C. Stamatiou:
Formal correctness of security protocols by Giampaolo Bella, Springer-Verlag. SIGACT News 41(1): 47-50 (2010)
2000 – 2009
- 2009
- [c30]Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou:
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks. IAS 2009: 171-174 - [c29]Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou:
Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? e-Democracy 2009: 199-208 - [c28]Panagiotis Papaioannou, Panagiotis E. Nastou, Yannis C. Stamatiou, Christos D. Zaroliagis:
Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device. ISADS 2009: 41-48 - [c27]Vasilis Papadinas, Yannis C. Stamatiou:
Geometric approaches for creating low power, low interference connectivity patterns in static, structureless sensor networks. ISADS 2009: 237-242 - 2008
- [c26]Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou:
A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer Networks. IAS 2008: 167-171 - [c25]Christos Manolopoulos, Dimitris Sofotassios, Polyxeni Nakou, Yannis C. Stamatiou, Anastasia Panagiotaki, Paul G. Spirakis:
A step-wise refinement approach for enhancing e-voting acceptance. ICEGOV 2008: 275-280 - [i1]Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
A probabilistic key agreement scheme for sensor networks without key predistribution. CoRR abs/0806.1812 (2008) - 2007
- [j16]Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis:
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers. Appl. Math. Comput. 184(1): 63-72 (2007) - [j15]Alexis C. Kaporis, Lefteris M. Kirousis, Yannis C. Stamatiou, Malvina Vamvakari, Michele Zito:
The unsatisfiability threshold revisited. Discret. Appl. Math. 155(12): 1525-1538 (2007) - [j14]Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis:
Efficient generation of secure elliptic curves. Int. J. Inf. Sec. 6(1): 47-63 (2007) - [j13]Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Dimitris K. Tasoulis, Michael N. Vrahatis:
Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography. Math. Comput. Model. 46(1-2): 174-179 (2007) - [j12]Yannis C. Stamatiou:
Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News 38(3): 22-27 (2007) - [c24]Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
Trust in global computing systems as a limit property emerging from short range random interactions. ARES 2007: 741-748 - [c23]Athanasios Antoniou, C. Korakas, Christos Manolopoulos, Anastasia Panagiotaki, Dimitris Sofotassios, Paul G. Spirakis, Yannis C. Stamatiou:
A Trust-Centered Approach for Building E-Voting Systems. EGOV 2007: 366-377 - [p4]Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis:
Cryptography and Cryptanalysis Through Computational Intelligence. Computational Intelligence in Information Assurance and Security 2007: 1-49 - 2006
- [c22]Effie Makri, Yannis C. Stamatiou:
Distributively Increasing the Percentage of Similarities Between Strings with Applications to Key Agreement. ADHOC-NOW 2006: 211-223 - [c21]Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
The Threshold Behaviour of the Fixed Radius Random Graph Model and Applications to the Key Management Problem of Sensor Networks. ALGOSENSORS 2006: 130-139 - [c20]Effie Makri, Yannis C. Stamatiou:
Deterministic key pre-distribution schemes for mobile ad-hoc networks based on set systems with limited intersection sizes. MASS 2006: 833-838 - [c19]Thodoros Komninos, Yannis C. Stamatiou, G. Vavitsas:
A Worm Propagation Model Based on People's Email Acquaintance Profiles. WINE 2006: 343-352 - [p3]Lefteris M. Kirousis, Yannis C. Stamatiou, Michele Zito:
The Satisfiability Threshold Conjecture: Techniques Behind Upper Bound Improvements. Computational Complexity and Statistical Physics 2006: 159-178 - [p2]Alexis C. Kaporis, Lefteris M. Kirousis, Yannis C. Stamatiou:
Proving Conditional Randomness using The Principle of Deferred Decisions. Computational Complexity and Statistical Physics 2006: 179-194 - 2005
- [c18]Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung:
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. ISC 2005: 44-58 - [c17]Dimitrios Koukopoulos, Yannis C. Stamatiou:
An Efficient Watermarking Method for MP3 Audio Files. IEC (Prague) 2005: 154-159 - 2004
- [c16]Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis:
On the Use of Weber Polynomials in Elliptic Curve Cryptography. EuroPKI 2004: 335-349 - [c15]Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung:
Electronic National Lotteries. Financial Cryptography 2004: 147-163 - [c14]Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis:
Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations. ICISC 2004: 261-278 - 2003
- [j11]Yannis C. Stamatiou:
Threshold Phenomena: The Computer Scientist's Viewpoint. Bull. EATCS 80: 199-234 (2003) - [j10]Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Yannis C. Stamatiou:
Locating information with uncertainty in fully interconnected networks: The case of nondistributed memory. Networks 42(3): 169-180 (2003) - [c13]Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis:
On the Construction of Prime Order Elliptic Curves. INDOCRYPT 2003: 309-322 - [c12]Yannis C. Stamatiou, Eva Skipenes, Eva Henriksen, Nikos Stathiakis, Adamantios Sikianakis, Eliana Charalambous, Nikos Antonakis, Ketil Stølen, Folker den Braber, Mass Soldal Lund, Katerina Papadaki, George Valvis:
The CORAS approach for model-based risk management applied to a telemedicine service. MIE 2003: 206-211 - 2002
- [c11]Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis:
On the Efficient Generation of Elliptic Curves over Prime Fields. CHES 2002: 333-348 - [c10]Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis:
A Software Library for Elliptic Curve Cryptography. ESA 2002: 625-636 - [c9]Panayotis E. Nastou, Yannis C. Stamatiou:
Enhancing the Security of Block Ciphers with the Aid of Parallel Substitution Box Construction. ICDCS Workshops 2002: 29-34 - [c8]Panayotis E. Nastou, Yannis C. Stamatiou:
Dynamically Modifiable Ciphers Using a Reconfigurable CAST-128 Based Algorithm on ATMEL's FPSLIC(tm) Reconfigurable FPGA Architecture. IPDPS 2002 - 2001
- [j9]Alexis C. Kaporis, Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Yannis C. Stamatiou, Elias C. Stavropoulos:
Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval. Comput. J. 44(4): 221-229 (2001) - [j8]Dimitris Achlioptas, Michael S. O. Molloy, Lefteris M. Kirousis, Yannis C. Stamatiou, Evangelos Kranakis, Danny Krizanc:
Random Constraint Satisfaction: A More Accurate Picture. Constraints An Int. J. 6(4): 329-344 (2001) - [j7]Alexis C. Kaporis, Lefteris M. Kirousis, Yannis C. Stamatiou, Malvina Vamvakari, Michele Zito:
The unsatisfiability threshold revisited. Electron. Notes Discret. Math. 9: 81-95 (2001) - [j6]Svante Janson, Yannis C. Stamatiou, Malvina Vamvakari:
Erratum to Bounding the Unsatisfiability Threshold of Random 3-SAT. Random Struct. Algorithms 18(1): 99-100 (2001) - [c7]Alexis C. Kaporis, Lefteris M. Kirousis, Yannis C. Stamatiou, Malvina Vamvakari, Michele Zito:
Coupon Collectors, q-Binomial Coefficients and the Unsatisfiability Threshold. ICTCS 2001: 328-338 - [c6]Dimitrios Koukopoulos, Yannis C. Stamatiou:
A compressed-domain watermarking algorithm for mpeg audio layer 3. MM&Sec 2001: 7-10 - [c5]Spyridoula M. Armeni, Dimitris Christodoulakis, Ioannis Kostopoulos, Polychronis D. Kountrias, Yannis C. Stamatiou, Michalis Nik Xenos:
An Information Hiding Method Based on Computational Intractable Problems. Panhellenic Conference on Informatics 2001: 262-278 - 2000
- [j5]Alexis C. Kaporis, Lefteris M. Kirousis, Yannis C. Stamatiou:
A Note on the Non-Colorability Threshold of a Random Graph. Electron. J. Comb. 7 (2000) - [j4]Nick D. Dendris, Lefteris M. Kirousis, Yannis C. Stamatiou, Dimitrios M. Thilikos:
On Parallel Partial Solutions and Approximation Schemes for Local Consistency in Networks of Constraints. Constraints An Int. J. 5(3): 251-273 (2000) - [j3]Svante Janson, Yannis C. Stamatiou, Malvina Vamvakari:
Bounding the unsatisfiability threshold of random 3-SAT. Random Struct. Algorithms 17(2): 103-116 (2000) - [c4]Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Yannis C. Stamatiou:
Locating Information with Uncertainty in Fully Interconnected Networks. DISC 2000: 283-296
1990 – 1999
- 1999
- [j2]Yannis C. Stamatiou, Dimitrios M. Thilikos:
Monotonicity and inert fugitive search games. Electron. Notes Discret. Math. 3: 184 (1999) - 1998
- [j1]Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Yannis C. Stamatiou:
Approximating the unsatisfiability threshold of random formulas. Random Struct. Algorithms 12(3): 253-269 (1998) - 1997
- [c3]Dimitris Achlioptas, Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Michael S. O. Molloy, Yannis C. Stamatiou:
Random Constraint Satisfaction: A More Accurate Picture. CP 1997: 107-120 - [p1]Basilis Boutsinas, Yannis C. Stamatiou, Georgios Pavlides:
Massively parallel support for nonmonotonic reasoning. Parallel Processing for Artificial Intelligence 3 1997: 41-67 - 1995
- [c2]Nick Lendris, Lefteris M. Kirousis, Yannis C. Stamatiou, Dimitrios M. Thilikos:
Partial Arc Consistency. Over-Constrained Systems 1995: 229-236 - [c1]Nick D. Dendris, Lefteris M. Kirousis, Yannis C. Stamatiou, Dimitrios M. Thilikos:
Partiality and Approximation Schemes for Local Consistency in Networks of Constraints. FSTTCS 1995: 210-224
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint