default search action
Artemios G. Voyiatzis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c42]Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl:
USBlock: Blocking USB-Based Keypress Injection Attacks. DBSec 2018: 278-295 - [c41]V. Balasubramanian, Nikolaos Kouvelas, Kishor Chandra, R. Venkatesha Prasad, Artemios G. Voyiatzis, William Liu:
A unified architecture for integrating energy harvesting IoT devices with the Mobile Edge Cloud. WF-IoT 2018: 13-18 - [c40]Nikolaos Kouvelas, Venkatraman Balasubramanian, Artemios G. Voyiatzis, Ranga Rao Venkatesha Prasad, Dirk Pesch:
On inferring how resources are shared in IoT ecosystems; a graph theoretic approach. WF-IoT 2018: 760-766 - 2017
- [j7]Filippos Pirpilidis, Kyriakos G. Stefanidis, Artemios G. Voyiatzis, Paris Kitsos:
On the effects of ring oscillator length and hardware Trojan size on an FPGA-based implementation of AES. Microprocess. Microsystems 54: 75-82 (2017) - [c39]Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl:
Lightweight Address Hopping for Defending the IPv6 IoT. ARES 2017: 20:1-20:10 - [c38]Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann:
A Trust-based Resilient Routing Mechanism for the Internet of Things. ARES 2017: 27:1-27:6 - [c37]Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl:
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. ARES 2017: 33:1-33:6 - [c36]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse or Cure? DPM/CBT@ESORICS 2017: 316-333 - [c35]Aljosha Judmayer, Georg Merzdovnik, Johanna Ullrich, Artemios G. Voyiatzis, Edgar R. Weippl:
A Performance Assessment of Network Address Shuffling in IoT Systems. EUROCAST (1) 2017: 197-204 - [i3]Georg Merzdovnik, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl:
u'smile - Secure Mobile Environments. ERCIM News 2017(109) (2017) - [i2]Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse of Cure? IACR Cryptol. ePrint Arch. 2017: 791 (2017) - 2016
- [j6]Dimitris E. Simos, Rick Kuhn, Artemios G. Voyiatzis, Raghu Kacker:
Combinatorial Methods in Security Testing. Computer 49(10): 80-83 (2016) - [j5]Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Stefan Brunthaler, Stefan Katzenbeisser, Edgar R. Weippl:
Time is on my side: Steganography in filesystem metadata. Digit. Investig. 18 Supplement: S76-S86 (2016) - [c34]Georg Merzdovnik, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl:
Notary-Assisted Certificate Pinning for Improved Security of Android Apps. ARES 2016: 365-371 - [c33]Johanna Ullrich, Artemios G. Voyiatzis, Edgar R. Weippl:
Secure cyber-physical production systems: Solid steps towards realization. CPPS@CPSWeek 2016: 1-4 - [c32]Georg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios G. Voyiatzis, Edgar R. Weippl:
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services. DBSec 2016: 331-346 - [c31]Artemios G. Voyiatzis, Kyriakos G. Stefanidis, Paris Kitsos:
Efficient triggering of Trojan hardware logic. DDECS 2016: 200-205 - [c30]Paris Kitsos, Kyriakos Stefanidis, Artemios G. Voyiatzis:
TERO-Based Detection of Hardware Trojans on FPGA Implementation of the AES Algorithm. DSD 2016: 678-681 - [c29]Filippos Pirpilidis, Artemios G. Voyiatzis, Lambros Pyrgas, Paris Kitsos:
An Efficient Reconfigurable Ring Oscillator for Hardware Trojan Detection. PCI 2016: 66 - [c28]Dimitris E. Simos, Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, Raghu Kacker:
TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach. QRS 2016: 69-73 - [c27]Massimo Tornatore, João André, Péter Babarczi, Torsten Braun, Eirik Larsen Følstad, Poul E. Heegaard, Ali Hmaity, Marija Furdek, Luísa Jorge, Wojciech Kmiecik, Carmen Mas Machuca, Lúcia Martins, Carmo Medeiros, Francesco Musumeci, Alija Pasic, Jacek Rak, Steven Simpson, Rui Travanca, Artemios G. Voyiatzis:
A survey on network resiliency methodologies against weather-based disruptions. RNDM 2016: 23-34 - [c26]Kyriakos Stefanidis, Artemios G. Voyiatzis:
An HMM-Based Anomaly Detection Approach for SCADA Systems. WISTP 2016: 85-99 - 2015
- [c25]Paris Kitsos, Artemios G. Voyiatzis:
A Comparison of TERO and RO Timing Sensitivity for Hardware Trojan Detection Applications. DSD 2015: 547-550 - [c24]Andreas Papalambrou, Dimitrios Karadimas, John V. Gialelis, Artemios G. Voyiatzis:
A versatile scalable smart waste-bin system based on resource-limited embedded devices. ETFA 2015: 1-8 - [c23]Artemios G. Voyiatzis, Konstantinos Katsigiannis, Stavros A. Koubias:
A Modbus/TCP Fuzzer for testing internetworked industrial systems. ETFA 2015: 1-6 - [c22]Harris E. Michail, Lenos Ioannou, Artemios G. Voyiatzis:
Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis. CS2@HiPEAC 2015: 13-18 - [c21]Paris Kitsos, Dimitris E. Simos, Jose Torres-Jimenez, Artemios G. Voyiatzis:
Exciting FPGA cryptographic Trojans using combinatorial testing. ISSRE 2015: 69-76 - [c20]Lenos Ioannou, Harris E. Michail, Artemios G. Voyiatzis:
High performance pipelined FPGA implementation of the SHA-3 hash algorithm. MECO 2015: 68-71 - [c19]Evangelos Papapetrou, Vasileios F. Bourgos, Artemios G. Voyiatzis:
Privacy-preserving routing in delay tolerant networks based on Bloom filters. WOWMOM 2015: 1-9 - [c18]George Asimakopoulos, Sotiris P. Christodoulou, Andreas Gizas, Vassilis Triantafillou, Giannis Tzimas, John V. Gialelis, Artemios G. Voyiatzis, Dimitrios Karadimas, Andreas Papalambrou:
Architecture and Implementation Issues, Towards a Dynamic Waste Collection Management System. WWW (Companion Volume) 2015: 1383-1388 - [i1]Artemios G. Voyiatzis, John V. Gialelis:
Dynacargo: An Urban Solid Waste Collection Information System. ERCIM News 2015(100) (2015) - 2014
- [c17]Paris Kitsos, Artemios G. Voyiatzis:
FPGA Trojan Detection Using Length-Optimized Ring Oscillators. DSD 2014: 675-678 - [c16]Paris Kitsos, Artemios G. Voyiatzis:
Towards a hardware Trojan detection methodology. MECO 2014: 18-23 - [c15]Artemios G. Voyiatzis, John V. Gialelis, Dimitrios Karadimas:
Dynamic cargo routing on-the-Go: The case of urban solid waste collection. WiMob 2014: 58-65 - 2013
- [j4]Dimitrios N. Serpanos, Artemios G. Voyiatzis:
Security challenges in embedded systems. ACM Trans. Embed. Comput. Syst. 12(1s): 66:1-66:10 (2013) - [c14]Christos Fidas, Artemios G. Voyiatzis:
On Users' Preference on Localized vs. Latin-Based CAPTCHA Challenges. INTERACT (4) 2013: 358-365 - [c13]Christos Fidas, Artemios G. Voyiatzis:
An empirical study on efficiency and effectiveness of localized vs. Latin-based CAPTCHA challenges. Panhellenic Conference on Informatics 2013: 91-97 - 2012
- [c12]Emmanouil Spanakis, Artemios G. Voyiatzis:
DAPHNE: A Disruption-Tolerant Application Proxy for e-Health Network Environments. MobiHealth 2012: 88-95 - 2011
- [j3]Vasileios Kolonias, Artemios G. Voyiatzis, George Goulas, Efthymios Housos:
Design and implementation of an efficient integer count sort in CUDA GPUs. Concurr. Comput. Pract. Exp. 23(18): 2365-2381 (2011) - [c11]Christos Fidas, Artemios G. Voyiatzis, Nikolaos M. Avouris:
On the necessity of user-friendly CAPTCHA. CHI 2011: 2623-2626 - [c10]Kyriakos Stefanidis, Artemios G. Voyiatzis, Dimitrios N. Serpanos:
Performance of the Controlled Randomness Protocol on .NET Compact Framework Embedded Systems. NTMS 2011: 1-5 - [c9]Artemios G. Voyiatzis, Christos Fidas, Dimitrios N. Serpanos, Nikolaos M. Avouris:
An Empirical Study on the Web Password Strength in Greece. Panhellenic Conference on Informatics 2011: 212-216 - 2010
- [c8]Christos Fidas, Artemios G. Voyiatzis, Nikolaos M. Avouris:
When Security Meets Usability: A User-Centric Approach on a Crossroads Priority Problem. Panhellenic Conference on Informatics 2010: 112-117
2000 – 2009
- 2009
- [c7]Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos:
Optimizations for High-Performance IPsec Execution. ICETE (Selected Papers) 2009: 199-211 - [c6]Alexandros Antonopoulos, Kyriakos Stefanidis, Artemios G. Voyiatzis:
Fighting spammers with spam. ISADS 2009: 411-416 - [c5]Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos:
Network Stack Optimization for Improved IPsec Performance on Linux. SECRYPT 2009: 83-91 - [p1]Anastasios Fragopoulos, Dimitrios N. Serpanos, Artemios G. Voyiatzis:
Design Issues in Secure Embedded Systems. Embedded Systems Design and Verification 2009: 18 - 2008
- [b1]Artemios G. Voyiatzis:
Αρχιτεκτονική ασφάλειας δικτύων ενσωματωμένων συστημάτων. University of Patras, Greece, 2008 - [j2]Artemios G. Voyiatzis, Dimitrios N. Serpanos:
The security of the Fiat-Shamir scheme in the presence of transient hardware faults. ACM Trans. Embed. Comput. Syst. 7(3): 31:1-31:13 (2008) - 2005
- [j1]Artemios G. Voyiatzis:
An introduction to side channel cryptanalysis of RSA. ACM Crossroads 11(3): 4 (2005) - [c4]Georgios Alexandridis, Artemios G. Voyiatzis, Dimitrios N. Serpanos:
CryptoPalm: A Cryptographic Library for PalmOS. Panhellenic Conference on Informatics 2005: 651-660 - [r1]Dimitrios N. Serpanos, Artemios G. Voyiatzis, Anastasios Fragopoulos:
Design Issues in Secure Embedded Systems. Embedded Systems Handbook 2005 - 2004
- [c3]Artemios G. Voyiatzis, Dimitrios N. Serpanos:
A Fault-Injection Attack on Fiat-Shamir Cryptosystems. ICDCS Workshops 2004: 618-621 - 2003
- [c2]Artemios G. Voyiatzis, Dimitrios N. Serpanos:
Pulse: A Class of Super-Worms against Network Infrastructure. ICDCS Workshops 2003: 28- - 2002
- [c1]Artemios G. Voyiatzis, Dimitrios N. Serpanos:
Active hardware attacks and proactive countermeasures. ISCC 2002: 361-366
Coauthor Index
aka: Dimitrios N. Serpanos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint