Search the dblp DataBase
George Stephanides :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Alexander Chatzigeorgiou , George Stephanides Evaluating Performance and Power of Object-Oriented Vs. Procedural Programming in Embedded Processors. [Citation Graph (0, 0)][DBLP ] Ada-Europe, 2002, pp:65-75 [Conf ] Konstantinos Chalkias , George Stephanides Timed Release Cryptography from Bilinear Pairings Using Hash Chains. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:130-140 [Conf ] Athanasios Perdos , Alexander Chatzigeorgiou , George Stephanides Simulation Software for a Network Modelling Lab. [Citation Graph (0, 0)][DBLP ] ICALT, 2003, pp:290-291 [Conf ] Athanasios Perdos , Alexander Chatzigeorgiou , George Stephanides Teaching Queuing Systems Modeling Using UML. [Citation Graph (0, 0)][DBLP ] ICALT, 2004, pp:- [Conf ] Athanasios Perdos , Alexander Chatzigeorgiou , George Stephanides Evaluation of a Queuing Theory and Systems Modeling Course Based on UML. [Citation Graph (0, 0)][DBLP ] ICALT, 2006, pp:507-509 [Conf ] George Stephanides , Mirel Cosulschi , Mihai Gabroveanu , Nicolae Constantinescu AHPA-Calculating Hub and Authority for Information Retrieval. [Citation Graph (0, 0)][DBLP ] ICDE Workshops, 2006, pp:36- [Conf ] Spyros T. Halkidis , Alexander Chatzigeorgiou , George Stephanides A Qualitative Evaluation of Security Patterns. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:132-144 [Conf ] Alexander Chatzigeorgiou , Spiros Xanthos , George Stephanides Evaluating Object-Oriented Designs with Link Analysis. [Citation Graph (0, 0)][DBLP ] ICSE, 2004, pp:656-665 [Conf ] Nikolaos Tsantalis , Alexander Chatzigeorgiou , George Stephanides , Ignatios S. Deligiannis Probabilistic Evaluation of Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] IEEE METRICS, 2004, pp:26-33 [Conf ] Spyros T. Halkidis , Alexander Chatzigeorgiou , George Stephanides Quantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:554-564 [Conf ] Kostas Zotos , George Stephanides Analysis of Object-Oriented Numerical Libraries. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2006, pp:253-258 [Conf ] George Stephanides , Nicolae Constantinescu , Mirel Cosulschi , Mihai Gabroveanu RSA-Padding Signatures with Attack Studies. [Citation Graph (0, 0)][DBLP ] WEBIST (1), 2006, pp:97-100 [Conf ] George Stephanides , Mihai Gabroveanu , Mirel Cosulschi , Nicolae Constantinescu A Distributed Algorithm for Mining Fuzzy Association Rules. [Citation Graph (0, 0)][DBLP ] WEBIST, 2005, pp:206-209 [Conf ] Konstantinos Chalkias , George Filiadis , George Stephanides Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm. [Citation Graph (0, 0)][DBLP ] IEC (Prague), 2005, pp:137-142 [Conf ] Theodosios Tsiakis , George Stephanides , George Pekos Trust and Security in Electronic Payments: What We Have and Need to Know? [Citation Graph (0, 0)][DBLP ] WEC (5), 2005, pp:147-150 [Conf ] Theodosios Tsiakis , George Stephanides The concept of security and trust in electronic payments. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:1, pp:10-15 [Journal ] Theodosios Tsiakis , George Stephanides The economic approach of information security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:2, pp:105-108 [Journal ] Spyros T. Halkidis , Alexander Chatzigeorgiou , George Stephanides A qualitative analysis of software security patterns. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:5, pp:379-392 [Journal ] Konstantinos Paparrizos , Nikolaos Samaras , George Stephanides A new efficient primal dual simplex algorithm. [Citation Graph (0, 0)][DBLP ] Computers & OR, 2003, v:30, n:9, pp:1383-1399 [Journal ] Alexander Chatzigeorgiou , George Stephanides Energy Metric for Software Systems. [Citation Graph (0, 0)][DBLP ] Software Quality Journal, 2002, v:10, n:4, pp:355-371 [Journal ] Nikolaos Tsantalis , Alexander Chatzigeorgiou , George Stephanides Predicting the Probability of Change in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2005, v:31, n:7, pp:601-614 [Journal ] Nikolaos Tsantalis , Alexander Chatzigeorgiou , George Stephanides , Spyros T. Halkidis Design Pattern Detection Using Similarity Scoring. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2006, v:32, n:11, pp:896-909 [Journal ] Konstantinos Paparrizos , Nikolaos Samaras , George Stephanides An efficient simplex type algorithm for sparse and dense linear programs. [Citation Graph (0, 0)][DBLP ] European Journal of Operational Research, 2003, v:148, n:2, pp:323-334 [Journal ] Konstantinos Chalkias , Dimitrios Hristu-Varsakelis , George Stephanides Improved Anonymous Timed-Release Encryption. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:311-326 [Conf ] A Provably Secure One-Pass Two-Party Key Establishment Protocol. [Citation Graph (, )][DBLP ] Moving from Requirements to Design Confronting Security Issues: A Case Study. [Citation Graph (, )][DBLP ] On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols. [Citation Graph (, )][DBLP ] Low-cost Anonymous Timed-Release Encryption. [Citation Graph (, )][DBLP ] An Implementation Infrastructure for Server-Passive Timed-Release Cryptography. [Citation Graph (, )][DBLP ] The Collatz Problem in a New Perspective: Energy Consumption Analysis. [Citation Graph (, )][DBLP ] Surveying Wi-Fi Security - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki. [Citation Graph (, )][DBLP ] Search in 0.018secs, Finished in 0.020secs