default search action
Nicholas Kolokotronis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c62]Panagiotis Leonis, Konstantinos Ntouros, Antonio I. Mazilu, Sotirios Brotsis, Nicholas Kolokotronis:
SEAGuard: A Blockchain-Based Security Framework for IoT Maritime Transportation Systems. CSR 2024: 421-426 - [c61]Stavros Shiaeles, Nicholas Kolokotronis, Emanuele Bellini:
Message from the Chairs. CSR 2024: xvii-xviii - 2023
- [j24]Sotirios Brotsis, Konstantinos-Panagiotis Grammatikakis, Dimitrios Kavallieros, Antonio I. Mazilu, Nicholas Kolokotronis, Konstantinos Limniotis, Costas Vassilakis:
Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems. Internet Things 24: 100968 (2023) - [j23]Gueltoum Bendiab, Amina HameurLaine, Georgios Germanos, Nicholas Kolokotronis, Stavros Shiaeles:
Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence. IEEE Trans. Intell. Transp. Syst. 24(4): 3614-3637 (2023) - [c60]Panagiotis I. Radoglou-Grammatikis, Athanasios Liatifis, Christos Dalamagkas, Alexios Lekidis, Konstantinos Voulgaridis, Thomas Lagkas, Nikolaos Fotos, Sofia-Anna Menesidou, Thomas Krousarlis, Pedro Ruzafa Alcazar, Juan Francisco Martinez, Antonio F. Skarmeta, Alberto Molinuevo Martín, Iñaki Angulo, Jesus Villalobos Nieto, Hristo Koshutanski, Rodrigo Diaz Rodriguez, Ilias Siniosoglou, Orestis Mavropoulos, Konstantinos Kyranou, Theocharis Saoulidis, Allon Adir, Ramy Masalha, Emanuele Bellini, Nicholas Kolokotronis, Stavros Shiaeles, Jose Garcia Franquelo, George Lalas, Andreas Zalonis, Antonis Voulgaridis, Angelina D. Bintoudi, Konstantinos Votis, David Pampliega, Panagiotis G. Sarigiannidis:
ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing. ARES 2023: 51:1-51:8 - [c59]Panagiotis Sotiropoulos, Christos-Minas Mathas, Costas Vassilakis, Nicholas Kolokotronis:
Minimizing Software-Rooted Risk through Library Implementation Selection. CSR 2023: 496-502 - [c58]Anastasios Papathanasiou, Georgios Germanos, Nicholas Kolokotronis, Euripidis Glavas:
Cognitive Email Analysis with Automated Decision Support for Business Email Compromise Prevention. SEEDA-CECNSM 2023: 1-5 - 2022
- [j22]Joseph R. Rose, Matthew Swann, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
IDERES: Intrusion detection and response system using machine learning and attack graphs. J. Syst. Archit. 131: 102722 (2022) - [c57]Evangelos Chaskos, Jason Diakoumakos, Nicholas Kolokotronis, George Lepouras:
Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model. ARES 2022: 72:1-72:9 - [c56]Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis:
A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems. ARES 2022: 76:1-76:10 - [c55]Sotirios Brotsis, Nicholas Kolokotronis:
Blockchain-Enabled Digital Forensics for the IoT: Challenges, Features, and Current Frameworks. CSR 2022: 131-137 - [c54]Nicholas Kolokotronis, Maria Dareioti, Stavros Shiaeles, Emanuele Bellini:
An Intelligent Platform for Threat Assessment and Cyber-Attack Mitigation in IoMT Ecosystems. GLOBECOM (Workshops) 2022: 541-546 - 2021
- [j21]Sotirios Brotsis, Konstantinos Limniotis, Gueltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles:
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance. Comput. Networks 191: 108005 (2021) - [c53]Georgios Kermezis, Konstantinos Limniotis, Nicholas Kolokotronis:
User-Generated Pseudonyms Through Merkle Trees. APF 2021: 89-105 - [c52]Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Costas Vassilakis, Stavros Shiaeles:
Understanding and Mitigating Banking Trojans: From Zeus to Emotet. CSR 2021: 121-128 - [c51]Efthimios Pantelidis, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks. CSR 2021: 129-134 - [c50]Jason Diakoumakos, Evangelos Chaskos, Nicholas Kolokotronis, George Lepouras:
Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model. CSR 2021: 186-191 - [c49]Nikolaos Koutsouris, Costas Vassilakis, Nicholas Kolokotronis:
Cyber-Security Training Evaluation Metrics. CSR 2021: 192-197 - [c48]David Buckley, Gueltoum Bendiab, Stavros Shiaeles, Nick Savage, Nicholas Kolokotronis:
CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services. ICC Workshops 2021: 1-6 - [c47]Joseph R. Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT. NetSoft 2021: 409-415 - [d1]Joseph R. Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
913 Malicious Network Traffic PCAPs and Binary Visualisation Images Dataset. IEEE DataPort, 2021 - [i28]Faisal Alsakran, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study. CoRR abs/2101.06519 (2021) - [i27]Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis, Vasiliki-Georgia Bilali, Dimitris Kavallieros:
Threat Landscape for Smart Grid Systems. CoRR abs/2105.04264 (2021) - [i26]Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles:
Advanced Metering Infrastructures: Security Risks and Mitigation. CoRR abs/2105.04272 (2021) - [i25]David Buckley, Gueltoum Bendiab, Stavros Shiaeles, Nick Savage, Nicholas Kolokotronis:
CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services. CoRR abs/2108.12705 (2021) - [i24]Christos-Minas Mathas, Costas Vassilakis, Nicholas Kolokotronis:
A Trust Management System for the IoT domain. CoRR abs/2109.01599 (2021) - [i23]Georgios Germanos, Dimitris Kavallieros, Nicholas Kolokotronis, Nikolaos Georgiou:
Privacy Issues in Voice Assistant Ecosystems. CoRR abs/2109.01606 (2021) - [i22]Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Costas Vassilakis, Stavros Shiaeles:
Understanding and Mitigating Banking Trojans: From Zeus to Emotet. CoRR abs/2109.01610 (2021) - [i21]Sotirios Brotsis, Konstantinos Limniotis, Gueltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles:
On the Suitability of Blockchain Platforms for IoT Applications: Architectures, Security, Privacy, and Performance. CoRR abs/2109.02352 (2021) - [i20]Joseph R. Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT. CoRR abs/2109.02544 (2021) - [i19]Efthimios Pantelidis, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
Insider Detection using Deep Autoencoder and Variational Autoencoder Neural Networks. CoRR abs/2109.02568 (2021) - [i18]Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis:
Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation. CoRR abs/2109.03375 (2021) - [i17]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Gueltoum Bendiab, Stavros Shiaeles:
On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues. CoRR abs/2109.03574 (2021) - [i16]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles:
On the Security of Permissioned Blockchain Solutions for IoT Applications. CoRR abs/2109.03621 (2021) - [i15]Nicholas Kolokotronis, Sotirios Brotsis, Georgios Germanos, Costas Vassilakis, Stavros Shiaeles:
On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection. CoRR abs/2109.03635 (2021) - [i14]Stylianos Monogios, Konstantinos Limniotis, Nicholas Kolokotronis, Stavros Shiaeles:
A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps. CoRR abs/2109.03664 (2021) - [i13]Georgios Kermezis, Konstantinos Limniotis, Nicholas Kolokotronis:
User-generated pseudonyms through Merkle trees. CoRR abs/2109.03673 (2021) - [i12]Stavros Shiaeles, Nicholas Kolokotronis, Emanuele Bellini:
IoT Vulnerability Data Crawling and Analysis. CoRR abs/2109.09526 (2021) - [i11]Christos Constantinides, Stavros Shiaeles, Bogdan V. Ghita, Nicholas Kolokotronis:
A Novel Online Incremental Learning Intrusion Prevention System. CoRR abs/2109.09530 (2021) - 2020
- [j20]Kyriakos Fytrakis, Nicholas Kolokotronis, Konstantinos Katsanos, Nicholas Kalouptsidis:
Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints. IEEE Access 8: 119312-119323 (2020) - [j19]Nikolaos Dalezios, Stavros Shiaeles, Nicholas Kolokotronis, Bogdan Ghita:
Digital forensics cloud log unification: Implementing CADF in Apache CloudStack. J. Inf. Secur. Appl. 54: 102555 (2020) - [c46]Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis, Vasiliki-Georgia Bilali, Dimitris Kavallieros:
Threat landscape for smart grid systems. ARES 2020: 111:1-111:7 - [c45]Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles:
Advanced metering infrastructures: security risks and mitigation. ARES 2020: 113:1-113:8 - [c44]Gueltoum Bendiab, Stavros Shiaeles, Abdulrahman Alruban, Nicholas Kolokotronis:
IoT Malware Network Traffic Classification using Visual Representation and Deep Learning. NetSoft 2020: 444-449 - [c43]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles:
On the Security of Permissioned Blockchain Solutions for IoT Applications. NetSoft 2020: 465-472 - [c42]Emanuele Bellini, Stavros Shiaeles, Nicholas Kolokotronis:
2nd IEEE Services Workshop on Cyber Security and Resilience in the Internet of Things (CSRIoT 2020). SERVICES 2020: 1 - [c41]Christos-Minas Mathas, Costas Vassilakis, Nicholas Kolokotronis:
A Trust Management System for the IoT domain. SERVICES 2020: 183-188 - [c40]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Gueltoum Bendiab, Stavros Shiaeles:
On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues. SERVICES 2020: 197-204 - [c39]Georgios Germanos, Dimitris Kavallieros, Nicholas Kolokotronis, Nikolaos Georgiou:
Privacy Issues in Voice Assistant Ecosystems. SERVICES 2020: 205-212 - [i10]Gueltoum Bendiab, Stavros Shiaeles, Abdulrahman Alruban, Nicholas Kolokotronis:
IoT Malware Network Traffic Classification using Visual Representation and Deep Learning. CoRR abs/2010.01712 (2020)
2010 – 2019
- 2019
- [j18]Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths:
Secured by Blockchain: Safeguarding Internet of Things Devices. IEEE Consumer Electron. Mag. 8(3): 28-34 (2019) - [j17]Konstantinos Limniotis, Nicholas Kolokotronis:
The Error Linear Complexity Spectrum as a Cryptographic Criterion of Boolean Functions. IEEE Trans. Inf. Theory 65(12): 8345-8356 (2019) - [c38]Thanasis Chantzios, Paris Koloveas, Spiros Skiadopoulos, Nicholas Kolokotronis, Christos Tryfonopoulos, Vasiliki-Georgia Bilali, Dimitris Kavallieros:
The Quest for the Appropriate Cyber-threat Intelligence Sharing Platform. DATA 2019: 369-376 - [c37]Stylianos Monogios, Konstantinos Limniotis, Nicholas Kolokotronis, Stavros Shiaeles:
A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps. e-Democracy 2019: 34-48 - [c36]Irina Baptista, Stavros Shiaeles, Nicholas Kolokotronis:
A Novel Malware Detection System Based on Machine Learning and Binary Visualization. ICC Workshops 2019: 1-6 - [c35]Olga Gkotsopoulou, Elisavet Charalambous, Konstantinos Limniotis, Paul Quinn, Dimitris Kavallieros, Gohar Sargsyan, Stavros Shiaeles, Nicholas Kolokotronis:
Data Protection by Design for cybersecurity systems in a Smart Home environment. NetSoft 2019: 101-109 - [c34]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Dimitris Kavallieros, Emanuele Bellini, Clément Pavué:
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments. NetSoft 2019: 110-114 - [c33]Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan V. Ghita, Nicholas Kolokotronis:
Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation. NEW2AN 2019: 65-76 - [c32]Christos Constantinides, Stavros Shiaeles, Bogdan V. Ghita, Nicholas Kolokotronis:
A Novel Online Incremental Learning Intrusion Prevention System. NTMS 2019: 1-6 - [c31]Nicholas Kolokotronis, Sotirios Brotsis, Georgios Germanos, Costas Vassilakis, Stavros Shiaeles:
On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection. SERVICES 2019: 21-28 - [c30]Stavros Shiaeles, Nicholas Kolokotronis, Emanuele Bellini:
IoT Vulnerability Data Crawling and Analysis. SERVICES 2019: 78-83 - [c29]Faisal Alsakran, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study. SSCC 2019: 87-98 - [i9]Keltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles, Samia Boucherkha:
A Novel Blockchain-based Trust Model for Cloud Identity Management. CoRR abs/1903.04767 (2019) - [i8]Konstantinos-Panagiotis Grammatikakis, Angela Ioannou, Stavros Shiaeles, Nicholas Kolokotronis:
Are cracked applications really free? An empirical analysis on Android devices. CoRR abs/1903.04793 (2019) - [i7]Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths:
Blockchain Technologies for Enhanced Security and Privacy in the Internet of Things. CoRR abs/1903.04794 (2019) - [i6]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Dimitris Kavallieros, Emanuele Bellini, Clément Pavué:
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments. CoRR abs/1903.10770 (2019) - [i5]Olga Gkotsopoulou, Elisavet Charalambous, Konstantinos Limniotis, Paul Quinn, Dimitris Kavallieros, Gohar Sargsyan, Stavros Shiaeles, Nicholas Kolokotronis:
Data Protection by Design for Cybersecurity Systems in a Smart Home Environment. CoRR abs/1903.10778 (2019) - [i4]Irina Baptista, Stavros Shiaeles, Nicholas Kolokotronis:
A Novel Malware Detection System Based On Machine Learning and Binary Visualization. CoRR abs/1904.00859 (2019) - 2018
- [j16]Konstantinos Limniotis, Nicholas Kolokotronis:
Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction. Des. Codes Cryptogr. 86(8): 1685-1706 (2018) - [j15]Konstantinos Ntemos, Jorge Plata-Chaves, Nicholas Kolokotronis, Nicholas Kalouptsidis, Marc Moonen:
Secure Information Sharing in Adversarial Adaptive Diffusion Networks. IEEE Trans. Signal Inf. Process. over Networks 4(1): 111-124 (2018) - [c28]Keltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles, Samia Boucherkha:
WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. DASC/PiCom/DataCom/CyberSciTech 2018: 724-729 - [c27]Konstantinos-Panagiotis Grammatikakis, Angela Ioannou, Stavros Shiaeles, Nicholas Kolokotronis:
WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices. DASC/PiCom/DataCom/CyberSciTech 2018: 730-735 - 2017
- [c26]Konstantinos Ntemos, Nicholas Kalouptsidis, Nicholas Kolokotronis:
Trust-based strategies for wireless networks under partial monitoring. EUSIPCO 2017: 2591-2595 - 2016
- [j14]Nicholas Kolokotronis, Alexandros Katsiotis, Nicholas Kalouptsidis:
Secretly Pruned Convolutional Codes: Security Analysis and Performance Results. IEEE Trans. Inf. Forensics Secur. 11(7): 1500-1514 (2016) - [c25]Nicholas Kolokotronis, Manos Athanasakos:
Improving physical layer security in DF relay networks via two-stage cooperative jamming. EUSIPCO 2016: 1173-1177 - [c24]Konstantinos Ntemos, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Using trust to mitigate malicious and selfish behavior of autonomous agents in CRNs. PIMRC 2016: 1-7 - 2015
- [c23]Konstantinos Limniotis, Nicholas Kolokotronis:
Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes. BalkanCryptSec 2015: 3-16 - [c22]Konstantinos Ntemos, Nicholas Kalouptsidis, Nicholas Kolokotronis:
Managing trust in diffusion adaptive networks with malicious agents. EUSIPCO 2015: 91-95 - [c21]Nicholas Kolokotronis, Kyriakos Fytrakis, Alexandros Katsiotis, Nicholas Kalouptsidis:
A cooperative jamming protocol for physical layer security in wireless networks. ICASSP 2015: 5803-5807 - [c20]Alexandros Katsiotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Secure encoder designs based on turbo codes. ICC 2015: 4315-4320 - 2014
- [c19]Nicholas Kolokotronis, Kyriakos Fytrakis, Alexandros Katsiotis, Nicholas Kalouptsidis:
Cooperation for secure wireless communications with resource-bounded eavesdroppers. GLOBECOM Workshops 2014: 1379-1384 - [c18]Nicholas Kolokotronis, Alexandros Katsiotis, Nicholas Kalouptsidis:
Short paper: attacking and defending lightweight PHY security schemes for wireless communications. WISEC 2014: 177-182 - 2013
- [j13]Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Secondary constructions of Boolean functions with maximum algebraic immunity. Cryptogr. Commun. 5(3): 179-199 (2013) - [c17]Alexandros Katsiotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Physical layer security via secret trellis pruning. PIMRC 2013: 507-512 - 2012
- [c16]Nicholas Kolokotronis, Konstantinos Limniotis:
On the second-order nonlinearity of cubic Maiorana-McFarland Boolean functions. ISITA 2012: 596-600 - [c15]Nicholas Kolokotronis, Konstantinos Limniotis:
A greedy algorithm for checking normality of cryptographic boolean functions. ISITA 2012: 601-605 - [i3]Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity. IACR Cryptol. ePrint Arch. 2012: 46 (2012) - 2011
- [c14]Nicholas Kalouptsidis, Nicholas Kolokotronis:
Fast decoding of regular LDPC codes using greedy approximation algorithms. ISIT 2011: 2005-2009 - [c13]Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Constructing Boolean functions in odd number of variables with maximum algebraic immunity. ISIT 2011: 2686-2690 - [i2]Nicholas Kolokotronis, Konstantinos Limniotis:
Maiorana-McFarland Functions with High Second-Order Nonlinearity. IACR Cryptol. ePrint Arch. 2011: 212 (2011)
2000 – 2009
- 2009
- [j12]Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Factorization of determinants over finite fields and application in stream ciphers. Cryptogr. Commun. 1(2): 175-205 (2009) - [j11]Tuvi Etzion, Nicholas Kalouptsidis, Nicholas Kolokotronis, Konstantinos Limniotis, Kenneth G. Paterson:
Properties of the error linear complexity spectrum. IEEE Trans. Inf. Theory 55(10): 4681-4686 (2009) - [j10]Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Best affine and quadratic approximations of particular classes of Boolean functions. IEEE Trans. Inf. Theory 55(11): 5211-5222 (2009) - 2008
- [j9]Nicholas Kolokotronis:
Cryptographic properties of nonlinear pseudorandom number generators. Des. Codes Cryptogr. 46(3): 353-363 (2008) - [j8]Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
On the Linear Complexity of Sequences Obtained by State Space Generators. IEEE Trans. Inf. Theory 54(4): 1786-1793 (2008) - [c12]Nicholas Kolokotronis:
On symplectic matrices of cubic Boolean forms and connections with second order nonlinearity. ISIT 2008: 1636-1640 - [c11]Tuvi Etzion, Nicholas Kalouptsidis, Nicholas Kolokotronis, Konstantinos Limniotis, Kenneth G. Paterson:
On the error linear complexity profiles of binary sequences of period 2n. ISIT 2008: 2400-2404 - 2007
- [j7]Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
On the Nonlinear Complexity and Lempel-Ziv Complexity of Finite Length Sequences. IEEE Trans. Inf. Theory 53(11): 4293-4302 (2007) - [c10]Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators. Inscrypt 2007: 246-255 - [c9]Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions. IMACC 2007: 73-91 - [c8]Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Best Affine Approximations of Boolean Functions and Applications to Low Order Approximations. ISIT 2007: 1836-1840 - [i1]Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Best Quadratic Approximations of Cubic Boolean Functions. IACR Cryptol. ePrint Arch. 2007: 37 (2007) - 2006
- [c7]Nicholas Kolokotronis:
Cryptographic Properties of Stream Ciphers Based on T-functions. ISIT 2006: 1604-1608 - [c6]Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
New Results on the Linear Complexity of Binary Sequences. ISIT 2006: 2003-2007 - [c5]Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression. SETA 2006: 168-179 - [c4]Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants. SETA 2006: 271-284 - 2005
- [j6]Panagiotis Rizomiliotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
On the quadratic span of binary sequences. IEEE Trans. Inf. Theory 51(5): 1840-1848 (2005) - 2004
- [j5]Nicholas Kolokotronis, George Gatt, Nicholas Kalouptsidis:
On the generation of sequences simulating higher order white noise for system identification. Signal Process. 84(5): 833-852 (2004) - 2003
- [b1]Nicholas Kolokotronis:
Μη γραμμική επεξεργασία σήματος και εφαρμογές στην κρυπτογραφία. National and Kapodistrian University of Athens, Greece, 2003 - [j4]Nicholas Kolokotronis, Nicholas Kalouptsidis:
On the linear complexity of nonlinearly filtered PN-sequences. IEEE Trans. Inf. Theory 49(11): 3047-3059 (2003) - 2002
- [j3]C. Margaritis, Nicholas Kolokotronis, Panagiota Papadopoulou, Drakoulis Martakos:
Securing Web-based Information Systems: A Model and Implementation Guidelines. Informatica (Slovenia) 26(2) (2002) - [j2]Nicholas Kolokotronis, Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
Minimum linear span approximation of binary sequences. IEEE Trans. Inf. Theory 48(10): 2758-2764 (2002) - [c3]Nicholas Kolokotronis, George Gatt, Nicholas Kalouptsidis:
On the generation of sequences simulating higher order white noise for system identification. EUSIPCO 2002: 1-4 - 2001
- [c2]C. Margaritis, Nicholas Kolokotronis, Panagiota Papadopoulou, Panagiotis Kanellis, Drakoulis Martakos:
A Model and Implementation Guidelines for Information Security Strategies in Web Environments. Conference on Information Security Management & Small Systems Security 2001: 13-34 - [c1]Nicholas Kolokotronis, Panagiotis Rizomiliotis, Nicholas Kalouptsidis:
First-Order Optimal Approximation of Binary Sequences. SETA 2001: 242-256
1990 – 1999
- 1999
- [j1]Eleftherios Kofidis, Nicholas Kolokotronis, Aliki Vassilarakou, Sergios Theodoridis, Dionisis A. Cavouras:
Wavelet-based medical image compression. Future Gener. Comput. Syst. 15(2): 223-243 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint