The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

George Stephanides: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alexander Chatzigeorgiou, George Stephanides
    Evaluating Performance and Power of Object-Oriented Vs. Procedural Programming in Embedded Processors. [Citation Graph (0, 0)][DBLP]
    Ada-Europe, 2002, pp:65-75 [Conf]
  2. Konstantinos Chalkias, George Stephanides
    Timed Release Cryptography from Bilinear Pairings Using Hash Chains. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:130-140 [Conf]
  3. Athanasios Perdos, Alexander Chatzigeorgiou, George Stephanides
    Simulation Software for a Network Modelling Lab. [Citation Graph (0, 0)][DBLP]
    ICALT, 2003, pp:290-291 [Conf]
  4. Athanasios Perdos, Alexander Chatzigeorgiou, George Stephanides
    Teaching Queuing Systems Modeling Using UML. [Citation Graph (0, 0)][DBLP]
    ICALT, 2004, pp:- [Conf]
  5. Athanasios Perdos, Alexander Chatzigeorgiou, George Stephanides
    Evaluation of a Queuing Theory and Systems Modeling Course Based on UML. [Citation Graph (0, 0)][DBLP]
    ICALT, 2006, pp:507-509 [Conf]
  6. George Stephanides, Mirel Cosulschi, Mihai Gabroveanu, Nicolae Constantinescu
    AHPA-Calculating Hub and Authority for Information Retrieval. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:36- [Conf]
  7. Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
    A Qualitative Evaluation of Security Patterns. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:132-144 [Conf]
  8. Alexander Chatzigeorgiou, Spiros Xanthos, George Stephanides
    Evaluating Object-Oriented Designs with Link Analysis. [Citation Graph (0, 0)][DBLP]
    ICSE, 2004, pp:656-665 [Conf]
  9. Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides, Ignatios S. Deligiannis
    Probabilistic Evaluation of Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    IEEE METRICS, 2004, pp:26-33 [Conf]
  10. Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
    Quantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:554-564 [Conf]
  11. Kostas Zotos, George Stephanides
    Analysis of Object-Oriented Numerical Libraries. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2006, pp:253-258 [Conf]
  12. George Stephanides, Nicolae Constantinescu, Mirel Cosulschi, Mihai Gabroveanu
    RSA-Padding Signatures with Attack Studies. [Citation Graph (0, 0)][DBLP]
    WEBIST (1), 2006, pp:97-100 [Conf]
  13. George Stephanides, Mihai Gabroveanu, Mirel Cosulschi, Nicolae Constantinescu
    A Distributed Algorithm for Mining Fuzzy Association Rules. [Citation Graph (0, 0)][DBLP]
    WEBIST, 2005, pp:206-209 [Conf]
  14. Konstantinos Chalkias, George Filiadis, George Stephanides
    Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm. [Citation Graph (0, 0)][DBLP]
    IEC (Prague), 2005, pp:137-142 [Conf]
  15. Theodosios Tsiakis, George Stephanides, George Pekos
    Trust and Security in Electronic Payments: What We Have and Need to Know? [Citation Graph (0, 0)][DBLP]
    WEC (5), 2005, pp:147-150 [Conf]
  16. Theodosios Tsiakis, George Stephanides
    The concept of security and trust in electronic payments. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:10-15 [Journal]
  17. Theodosios Tsiakis, George Stephanides
    The economic approach of information security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:105-108 [Journal]
  18. Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
    A qualitative analysis of software security patterns. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:379-392 [Journal]
  19. Konstantinos Paparrizos, Nikolaos Samaras, George Stephanides
    A new efficient primal dual simplex algorithm. [Citation Graph (0, 0)][DBLP]
    Computers & OR, 2003, v:30, n:9, pp:1383-1399 [Journal]
  20. Alexander Chatzigeorgiou, George Stephanides
    Energy Metric for Software Systems. [Citation Graph (0, 0)][DBLP]
    Software Quality Journal, 2002, v:10, n:4, pp:355-371 [Journal]
  21. Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides
    Predicting the Probability of Change in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2005, v:31, n:7, pp:601-614 [Journal]
  22. Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides, Spyros T. Halkidis
    Design Pattern Detection Using Similarity Scoring. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2006, v:32, n:11, pp:896-909 [Journal]
  23. Konstantinos Paparrizos, Nikolaos Samaras, George Stephanides
    An efficient simplex type algorithm for sparse and dense linear programs. [Citation Graph (0, 0)][DBLP]
    European Journal of Operational Research, 2003, v:148, n:2, pp:323-334 [Journal]
  24. Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides
    Improved Anonymous Timed-Release Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:311-326 [Conf]

  25. A Provably Secure One-Pass Two-Party Key Establishment Protocol. [Citation Graph (, )][DBLP]


  26. Moving from Requirements to Design Confronting Security Issues: A Case Study. [Citation Graph (, )][DBLP]


  27. On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols. [Citation Graph (, )][DBLP]


  28. Low-cost Anonymous Timed-Release Encryption. [Citation Graph (, )][DBLP]


  29. An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. [Citation Graph (, )][DBLP]


  30. The Collatz Problem in a New Perspective: Energy Consumption Analysis. [Citation Graph (, )][DBLP]


  31. Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki. [Citation Graph (, )][DBLP]


Search in 0.513secs, Finished in 0.515secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002