| 2007 |
29 | | Tasos Dagiuklas,
Nicolas Sklavos:
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, Belgium 2007 |
28 | | Nicolas Sklavos,
Spyros G. Denazis,
Odysseas G. Koufopavlou:
AAA and mobile networks: security aspects and architectural efficiency.
MobiMedia 2007: 45 |
27 | | Paris Kitsos,
Nicolas Sklavos:
Guest Editors' Introduction to the Special Issue on Security of Computers and Networks.
Computers & Electrical Engineering 33(5-6): 321-323 (2007) |
26 | | Sherali Zeadally,
Nicolas Sklavos,
Moganakrishnan Rathakrishnan,
Scott Fowler:
End-to-End Security Across Wired-Wireless Networks for Mobile Users.
Information Systems Security 16(5): 264-277 (2007) |
25 | | Nicolas Sklavos,
Máire McLoone,
Xinmiao Zhang:
MONET Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing.
MONET 12(4): 229-230 (2007) |
24 | | Paris Kitsos,
Nicolas Sklavos,
Odysseas G. Koufopavlou:
UMTS security: system architecture and hardware implementation.
Wireless Communications and Mobile Computing 7(4): 483-494 (2007) |
| 2006 |
23 | | Nicolas Sklavos,
Panagiotis Souras:
Economic Models & Approaches in Information Security for Computer Networks.
I. J. Network Security 2(1): 14-20 (2006) |
22 | | Nikolay A. Moldovyan,
Alexander A. Moldovyan,
Ma A. Eremeev,
Nicolas Sklavos:
New Class of Cryptographic Primitives and Cipher Design for Networks Security.
I. J. Network Security 2(2): 114-125 (2006) |
21 | | Christian Rechberger,
Vincent Rijmen,
Nicolas Sklavos:
The NIST Cryptographic Workshop on Hash Functions.
IEEE Security & Privacy 4(1): 54-56 (2006) |
20 | | Alexander A. Moldovyan,
Nick A. Moldovyan,
Nicolas Sklavos:
Controlled elements for designing ciphers suitable to efficient VLSI implementation.
Telecommunication Systems 32(2-3): 149-163 (2006) |
19 | | Nicolas Sklavos,
Paris Kitsos,
K. Papadopoulos,
Odysseas G. Koufopavlou:
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security.
The Journal of Supercomputing 36(1): 33-50 (2006) |
| 2005 |
18 | | Odysseas G. Koufopavlou,
George N. Selimis,
Nicolas Sklavos,
Paris Kitsos:
Cryptography: Circuits and Systems Approach.
PATMOS 2005: 750 |
17 | | Nicolas Sklavos,
Odysseas G. Koufopavlou:
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps.
Computers & Electrical Engineering 31(6): 361-379 (2005) |
16 | | Nicolas Sklavos,
Odysseas G. Koufopavlou:
Access Control in Networks Hierarchy: Implementation of Key Management Protocol.
I. J. Network Security 1(2): 103-109 (2005) |
15 | | Nick A. Moldovyan,
Nicolas Sklavos,
Odysseas G. Koufopavlou:
Pure DDP-Based Cipher: Architecture Analysis, Hardware Implementation Cost and Performance up to 6.5 Gbps.
Int. Arab J. Inf. Technol. 2(1): 24-32 (2005) |
14 | | Michalis D. Galanis,
Paris Kitsos,
Giorgos Kostopoulos,
Nicolas Sklavos,
Constantinos E. Goutis:
Comparison of the Hardware Implementation of Stream Ciphers.
Int. Arab J. Inf. Technol. 2(4): 267-274 (2005) |
13 | | Nicolas Sklavos,
Nick A. Moldovyan,
Odysseas G. Koufopavlou:
High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers.
MONET 10(1-2): 219-231 (2005) |
| 2004 |
12 | | Nick A. Moldovyan,
Ma A. Eremeev,
Nicolas Sklavos,
Odysseas G. Koufopavlou:
New class of the FPGA efficient cryptographic primitives.
ISCAS (2) 2004: 553-556 |
11 | | Paris Kitsos,
Nicolas Sklavos,
Michalis D. Galanis,
Odysseas G. Koufopavlou:
64-bit Block ciphers: hardware implementations and comparison analysis.
Computers & Electrical Engineering 30(8): 593-604 (2004) |
10 | | Nicolas Sklavos,
Nick A. Moldovyan,
Vladimir Gorodetsky,
Odysseas G. Koufopavlou:
Computer Network Security: Report from MMM-ACNS.
IEEE Security & Privacy 2(1): 49-52 (2004) |
9 | | Nicolas Sklavos,
Paris Kitsos,
Epaminondas Alexopoulos,
Odysseas G. Koufopavlou:
Open Mobile Alliance (OMA) Security Layer: Architecture, Implementation and Performance Evaluation of the Integrity Unit.
New Generation Comput. 23(1): (2004) |
| 2003 |
8 | | Nicolas Sklavos,
Odysseas G. Koufopavlou:
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions.
ISCAS (5) 2003: 153-156 |
7 | | Nicolas Sklavos,
Alexander A. Moldovyan,
Odysseas G. Koufopavlou:
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.
MMM-ACNS 2003: 337-348 |
6 | | Nicolas Sklavos,
Odysseas G. Koufopavlou:
Architectures and FPGA Implementations of the SCO(-1, -2, -3) Ciphers Family.
VLSI-SOC 2003: 68-73 |
5 | | Nicolas Sklavos,
Odysseas G. Koufopavlou:
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance.
Computers & Security 22(7): 585-588 (2003) |
4 | | Nicolas Sklavos,
Epaminondas Alexopoulos,
Odysseas G. Koufopavlou:
Networking Data Integrity: High Speed Architectures and Hardware Implementations.
Int. Arab J. Inf. Technol. 1(0): (2003) |
| 2002 |
3 | | Nicolas Sklavos,
Paris Kitsos,
K. Papadomanolakis,
Odysseas G. Koufopavlou:
Random number generator architecture and VLSI implementation.
ISCAS (4) 2002: 854-857 |
2 | | Paris Kitsos,
Nicolas Sklavos,
Nicolas G. Koufopavlou:
Hardware implementation of the SAFER+ encryption algorithm for the Bluetooth system.
ISCAS (4) 2002: 878-881 |
1 | | Nicolas Sklavos,
Odysseas G. Koufopavlou:
Architectures and VLSI Implementations of the AES-Proposal Rijndael.
IEEE Trans. Computers 51(12): 1454-1459 (2002) |