The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Emmanouil Magkos: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos
    An Equitably Fair On-line Auction Scheme. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:72-83 [Conf]
  2. Emmanouil Magkos, Panayiotis Kotzanikolaou, Vassilios Chrissikopoulos
    An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2001, pp:186-195 [Conf]
  3. Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos
    Receipt-Freeness in Large-Scale Elections without Untappable Channels. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:683-694 [Conf]
  4. Nikos Alexandris, Emmanouil Magkos, Vassilios Chrissikopoulos
    Software-Based Receipt-Freeness in On-Line Elections. [Citation Graph (0, 0)][DBLP]
    Network Security, 2001, pp:33-44 [Conf]
  5. Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos
    Strong Forward Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:109-122 [Conf]
  6. Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos
    Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:581-587 [Conf]
  7. Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos
    A Framework for Secure and Verifiable Logging in Public Communication Networks. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:273-284 [Conf]
  8. Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos
    Uncoercible e-Bidding Games. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2004, v:4, n:1-2, pp:113-125 [Journal]
  9. Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos
    A spatial stochastic model for worm propagation: scale effects. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:87-92 [Journal]

  10. Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography. [Citation Graph (, )][DBLP]


  11. A Novel Stochastic Approach for Modeling Random Scanning Worms. [Citation Graph (, )][DBLP]


  12. Uncertainty for Anonymity and 2-Dimensional Range Query Distortion. [Citation Graph (, )][DBLP]


  13. Accuracy in Privacy-Preserving Data Mining Using the Paradigm of Cryptographic Elections. [Citation Graph (, )][DBLP]


  14. Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems. [Citation Graph (, )][DBLP]


  15. Strengthening Privacy Protection in VANETs. [Citation Graph (, )][DBLP]


  16. Secure log management for privacy assurance in electronic communications. [Citation Graph (, )][DBLP]


  17. Accurate and large-scale privacy-preserving data mining using the election paradigm. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002