Logo
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Ελληνικά 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Σύνδεση
Πλοήγηση ανά Θέμα 
  •   Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
  • Πλοήγηση ανά Θέμα
  •   Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
  • Πλοήγηση ανά Θέμα
JavaScript is disabled for your browser. Some features of this site may not work without it.
Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
Όλο το DSpace
  • Κοινότητες & Συλλογές
  • Ανά ημερομηνία δημοσίευσης
  • Συγγραφείς
  • Τίτλοι
  • Λέξεις κλειδιά

Πλοήγηση ανά Θέμα "Authentication"

  • 0-9
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Α
  • Β
  • Γ
  • Δ
  • Ε
  • Ζ
  • Η
  • Θ
  • Ι
  • Κ
  • Λ
  • Μ
  • Ν
  • Ξ
  • Ο
  • Π
  • Ρ
  • Σ
  • Τ
  • Υ
  • Φ
  • Χ
  • Ψ
  • Ω

Ταξινόμηση κατά:

Σειρά:

Αποτελέσματα:

Αποτελέσματα 1-20 από 28

  • τίτλος
  • ημερομηνία δημοσίευσης
  • ημερομηνία υποβολής
  • αύξουσα
  • φθίνουσα
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
    • Thumbnail

      Abax: 2D/3D legaliser supporting look-ahead legalisation and blockage strategies 

      Sketopoulos N., Sotiriou C., Simoglou S. (2018)
      Abax is a modern version of the classical Abacus, minimum displacement, greedy legaliser. Abax supports single-tier 2D or 3D legalisation for multiple, logic-on-logic 3D-IC tiers, efficient look-ahead legalisation of ...
    • Thumbnail

      A Blockchained Secure and Integrity-Preserved Architecture for Military Logistics Operations 

      Demertzis K., Kikiras P., Iliadis L. (2022)
      The employment of 5G Internet of Things (5G-IoT), smart automation, and AI analytics can provide improved military logistics, by enhancing inventory control, reordering, accuracy, flexibility mobility, and real-time ...
    • Thumbnail

      Cross-layer optimized authentication and error control for wireless 3D medical video streaming over LTE 

      Liu Y., Liu J., Argyriou A., Ci S. (2017)
      3D video for tele-medicine applications is gradually gaining momentum since the 3D technology can provide precise location information. However, the weak link for 3D video streaming is the necessary wireless link of the ...
    • Thumbnail

      A distributed biometric authentication scheme based on blockchain 

      Toutara F., Spathoulas G. (2020)
      Biometric authentication is the preferred authentication scheme in modern computing systems. While it offers enhanced usability, it also requires cautious handling of sensitive users' biometric templates. In this paper, a ...
    • Thumbnail

      Domocus: Lock free parallel legalization in standard cell placement 

      Oikonomou P., Koziri M.G., Dadaliaris A.N., Loukopoulos T., Stamoulis G.I. (2017)
      In the cell placement problem a circuit's cells must be placed within a specified chip area so that they are row aligned and contain no overlaps. The problem is usually tackled in phases, whereby in the first phase a global ...
    • Thumbnail

      Enhanced tetris legalization 

      Dadaliaris A.N., Nerantzaki E., Oikonomou P., Hatzaras Y., Troumpoulou A.-O., Arvanitakis I., Stamoulis G.I. (2016)
      Legalization and detailed placement methods for standard cell designs, are two of the most notable topics in current VLSI research. Being the final steps in a classic placement procedure they must be efficient in terms of ...
    • Thumbnail

      Exploiting Net Connectivity in Legalization and Detailed Placement Scenarios 

      Dadaliaris A., Kranas G., Oikonomou P., Floros G., Dossis M. (2022)
      Standard-cell placement is the fundamental step in a typical VLSI/ASIC design flow. Its result, paired with the outcome of the routing procedure can be the decisive factor in rendering a design manufacturable. Global ...
    • Thumbnail

      Foodomics in bee product research: a systematic literature review 

      Kafantaris I., Amoutzias G.D., Mossialos D. (2021)
      Foodomics is an emerging research field in food science that applies advanced omics technologies to assess relevant aspects related to food and nutrition, with the ultimate goal to improve human health and well-being. Many ...
    • Thumbnail

      The importance of biometric sensor continuous secure monitoring 

      Papanikolaou, A.; Georgiadis, G.; Ilioudis, C.; Pimenidis, E. (2008)
      The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the ...
    • Thumbnail

      Investigation and trade-offs in 3DIC partitioning methodologies: N/A 

      Sketopoulos N., Sotiriou C.P., Samaras V. (2019)
      In this work, we compare alternative 3DIC partitioning methodologies, in terms of slack, number of inter-tier vias, Tier Area Ratio (TAR) and HPWL design parameters. The popular 3DIC postplacement, bin-based Fidducia-Mattheyses ...
    • Thumbnail

      Multi-screen lock: Visual passwords from user’s social data 

      Tsoukas V., Gkogkidis A., Kakarountas A., Giannakas G. (2019)
      A critical issue for a mobile device user is the protection of stored sensitive data and their access, via the device. A widely used technique for protecting the mobile device with a display is the lock screen. Many security ...
    • Thumbnail

      A novel Two-Factor HoneyToken Authentication Mechanism 

      Papaspirou V., Maglaras L., Ferrag M.A., Kantzavelou I., Janicke H., Douligeris C. (2021)
      The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the ...
    • Thumbnail

      Performance evaluation of tetris-based legalization heuristics 

      Dadaliaris A.N., Oikonomou P., Nerantzaki E., Loukopoulos T., Koziri M.G., Stamoulis G.I. (2016)
      Algorithms for standard cell placement legalization have attracted significant research efforts in the past. A prominent member of this category is the Tetris algorithm which is a simple and particularly fast method for ...
    • Thumbnail

      Physico-chemical and sensory attributes in conjunction with multivariate analysis of two potato (Solanum tuberosum L.) cultivars after 90 days of storage: an exploratory authentication study 

      Arvanitoyannis, I. S.; Vaitsi, O.; Mavromatis, A. (2008)
      Two cultivars of potato (Spunta and Agria), were studied in terms of their physico-chemical and sensory characteristics. These cultivars were cultivated in three geographical regions of Greece (Macedonia, North Greece; ...
    • Thumbnail

      R-Abax: A radiation hardening legalisation algorithm satisfying TMR spacing constraints 

      Georgakidis C., Sotiriou C., Sketopoulos N., Krstic M., Schrape O., Breitenreiter A. (2020)
      Faults caused by ionising radiation have become a significant reliability issue in modern ICs. However, the Radiation Hardening (RADHARD) design flow differs from the standard design flow. Thus, there is not sufficient ...
    • Thumbnail

      Radiation Hardening Legalisation Satisfying TMR Spacing Constraints with Respect to HPWL 

      Georgakidis C., Sotiriou C. (2020)
      Reduction in device feature sizes and supply voltage renders modern Integrated Circuits (ICs) more susceptible to Soft Errors (SEs), i.e. Transient Faults caused by ionising radiation. Moreover, the RADiation HARDening ...
    • Thumbnail

      Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes 

      Ferrag M.A., Maglaras L., Argyriou A., Kosmanos D., Janicke H. (2018)
      This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ...
    • Thumbnail

      Security Revisited: Honeytokens meet Google Authenticator 

      Papaspirou V., Papathanasaki M., Maglaras L., Kantzavelou I., Douligeris C., Ferrag M.A., Janicke H. (2022)
      In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ...
    • Thumbnail

      Solon: A holistic approach for modelling, managing and mining legal sources 

      Koniaris M., Papastefanatos G., Anagnostopoulos I. (2018)
      Recently there has been an exponential growth of the number of publicly available legal resources. Portals allowing users to search legal documents, through keyword queries, are now widespread. However, legal documents are ...
    • Thumbnail

      Speed optimized face recognition on mobile devices using Eigenfaces decomposition 

      Doukas, C.; Maglogiannis, M. (2010)
      Face recognition on mobile devices can be utilized for security applications (e.g., user authentication) or in the context of pervasive and assistive computing for the support of elderly suffering from dementia in recognizing ...
      Η δικτυακή πύλη της Ευρωπαϊκής Ένωσης
      Ψηφιακή Ελλάδα
      ΕΣΠΑ 2007-2013
      Με τη συγχρηματοδότηση της Ελλάδας και της Ευρωπαϊκής Ένωσης
      htmlmap 

       

      Πλοήγηση

      Όλο το DSpaceΚοινότητες & ΣυλλογέςΑνά ημερομηνία δημοσίευσηςΣυγγραφείςΤίτλοιΛέξεις κλειδιά

      Ο λογαριασμός μου

      ΣύνδεσηΕγγραφή (MyDSpace)
      Πληροφορίες-Επικοινωνία
      ΑπόθεσηΣχετικά μεΒοήθειαΕπικοινωνήστε μαζί μας
      Επιλογή ΓλώσσαςΌλο το DSpace
      EnglishΕλληνικά
      Η δικτυακή πύλη της Ευρωπαϊκής Ένωσης
      Ψηφιακή Ελλάδα
      ΕΣΠΑ 2007-2013
      Με τη συγχρηματοδότηση της Ελλάδας και της Ευρωπαϊκής Ένωσης
      htmlmap