Logo
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Ελληνικά 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Σύνδεση
Πλοήγηση ανά Θέμα 
  •   Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
  • Πλοήγηση ανά Θέμα
  •   Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
  • Πλοήγηση ανά Θέμα
JavaScript is disabled for your browser. Some features of this site may not work without it.
Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
Όλο το DSpace
  • Κοινότητες & Συλλογές
  • Ανά ημερομηνία δημοσίευσης
  • Συγγραφείς
  • Τίτλοι
  • Λέξεις κλειδιά

Πλοήγηση ανά Θέμα "Cryptography"

  • 0-9
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Α
  • Β
  • Γ
  • Δ
  • Ε
  • Ζ
  • Η
  • Θ
  • Ι
  • Κ
  • Λ
  • Μ
  • Ν
  • Ξ
  • Ο
  • Π
  • Ρ
  • Σ
  • Τ
  • Υ
  • Φ
  • Χ
  • Ψ
  • Ω

Ταξινόμηση κατά:

Σειρά:

Αποτελέσματα:

Αποτελέσματα 1-20 από 21

  • τίτλος
  • ημερομηνία δημοσίευσης
  • ημερομηνία υποβολής
  • αύξουσα
  • φθίνουσα
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
    • Thumbnail

      A 2.45GHz power harvesting circuit in 90nm CMOS 

      Giannakas, G.; Plessas, F.; Nassopoulos, G.; Stamoulis, G. (2010)
      In this work, an overview of the state-of-the-art of the design techniques of power harvesting (rectifYing) circuits is presented. The evolution of each circuit, the advantages and design constraints, are investigated and ...
    • Thumbnail

      A Blockchained Secure and Integrity-Preserved Architecture for Military Logistics Operations 

      Demertzis K., Kikiras P., Iliadis L. (2022)
      The employment of 5G Internet of Things (5G-IoT), smart automation, and AI analytics can provide improved military logistics, by enhancing inventory control, reordering, accuracy, flexibility mobility, and real-time ...
    • Thumbnail

      A distributed biometric authentication scheme based on blockchain 

      Toutara F., Spathoulas G. (2020)
      Biometric authentication is the preferred authentication scheme in modern computing systems. While it offers enhanced usability, it also requires cautious handling of sensitive users' biometric templates. In this paper, a ...
    • Thumbnail

      Employing blockchain and physical unclonable functions for counterfeit IoT devices detection 

      Negka L., Gketsios G., Anagnostopoulos N.A., Spathoulas G., Kakarountas A., Katzenbeisser S. (2019)
      Counterfeit copycat devices have become one of the most important problems in IoT ecosystem. The number of IoT devices manufactured has grown exponentially through last years. In order to be competitive in terms of production ...
    • Thumbnail

      Federated Blockchained Supply Chain Management: A CyberSecurity and Privacy Framework 

      Demertzis K., Iliadis L., Pimenidis E., Tziritas N., Koziri M., Kikiras P., Tonkin M. (2021)
      The complete transformation of the supply chain in a truly integrated and fully automated process, presupposes the continuous and endless collection of digital information from every stage of the production scale. The aim ...
    • Thumbnail

      A framework for secure data delivery in wireless sensor networks 

      Perlepes, L.; Zaharis, A.; Stamoulis, G.; Kikiras, P. (2012)
      Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could ...
    • Thumbnail

      Implementation and performance analysis of SEAL encryption on FPGA, GPU and multi-core processors 

      Theoharoulis, K.; Antoniadis, C.; Bellas, N.; Antonopoulos, C. D. (2011)
      Accelerators, such as field programmable gate arrays (FPGAs) and graphics processing units (GPUs), are special purpose processors designed to speed up compute-intensive sections of applications. FPGAs are highly customizable, ...
    • Thumbnail

      iMuse Mobile Tour: A personalized multimedia museum guide opens to groups 

      Fevgas, A.; Tsompanopoulou, P.; Bozanis, P. (2011)
      In the recent years, there is a growing interest in exploiting the advances of mobile and pervasive computing to museum environments. A mobile museum guide, named iMuse Mobile Tour is presented in this paper. The guide ...
    • Thumbnail

      Low power monolithic 3D IC design of asynchronous AES core 

      Penmetsa N.L., Sotiriou C., Lim S.K. (2015)
      In this paper, we demonstrate, for the first time, that a monolithic 3D implementation of an asynchronous AES encryption core can achieve up to 50.3% footprint reduction, 25.7% improvement in power, 34.3% shorter wirelength ...
    • Thumbnail

      Machine learning for all: A more robust federated learning framework 

      Ilias C., Georgios S. (2019)
      Machine learning and especially deep learning are appropriate for solving multiple problems in various domains. Training such models though, demands significant processing power and requires large data-sets. Federated ...
    • Thumbnail

      The next generation cognitive security operations center: Network flow forensics using cybersecurity intelligence 

      Demertzis K., Kikiras P., Tziritas N., Sanchez S.L., Iliadis L. (2018)
      A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The ...
    • Thumbnail

      An open web services - Based framework for data mining of biomedical image data 

      Doukas, C.; Maglogiannis, I.; Chatziioannou, A. (2009)
      Mining of biomedical image data is a complex procedure that requires several processing phases, such as data acquisition, preprocessing (e.g., image enhancement, color processing), feature extraction and classification. ...
    • Thumbnail

      A performance enhancement approach based on tweak process scheduling for a P1619 core 

      Tsakoulis T., Theodoridis G., Kakarountas A. (2016)
      The IEEE P1619 standard was developed to protect data in shared storage media. Most of the works that have been presented until now have adopted a no robust scheduling scheme to implement various architectures. At first, ...
    • Thumbnail

      Privacy preserving platform for profitable mobile crowd sensing and users' adoption 

      Spathoulas G., Vennou P., Loukidis A. (2017)
      Mobile crowd sensing enables users to collaborate in terms of data collection. In practice, end users collect data through their smart devices and then share it with other users, who .nd it useful. A data request consists ...
    • Thumbnail

      Privacy preserving record linkage approaches 

      Verykios, V. S.; Karakasidis, A.; Mitrogiannis, V. K. (2009)
      Privacy-preserving record linkage is a very important task, mostly because of the very sensitive nature of the personal data. The main focus in this task is to find a way to match records from among different organisation ...
    • Thumbnail

      Secure aggregation of users' privacy preferences in shared IoT environments 

      Tsagiopoulou S., Spathoulas G., Kakarountas A. (2021)
      Internet of Things (IoT) technology has emerged as a core aspect of everyday life, since the number of deployed devices increases exponentially day by day. IoT offers the automation of many actions and strengthens the ...
    • Thumbnail

      Security and Privacy Concerns for Healthcare Wearable Devices and Emerging Alternative Approaches 

      Boumpa E., Tsoukas V., Gkogkidis A., Spathoulas G., Kakarountas A. (2022)
      The wide use of wearable devices rises a lot of concerns about the privacy and security of personal data that are collected and stored by such services. This concern is even higher when such data is produced by healthcare ...
    • Thumbnail

      Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes 

      Ferrag M.A., Maglaras L., Argyriou A., Kosmanos D., Janicke H. (2018)
      This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ...
    • Thumbnail

      Security Revisited: Honeytokens meet Google Authenticator 

      Papaspirou V., Papathanasaki M., Maglaras L., Kantzavelou I., Douligeris C., Ferrag M.A., Janicke H. (2022)
      In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ...
    • Thumbnail

      Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts 

      Spathoulas G., Theodoridis G., Damiris G.-P. (2021)
      Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to ...
      Η δικτυακή πύλη της Ευρωπαϊκής Ένωσης
      Ψηφιακή Ελλάδα
      ΕΣΠΑ 2007-2013
      Με τη συγχρηματοδότηση της Ελλάδας και της Ευρωπαϊκής Ένωσης
      htmlmap 

       

      Πλοήγηση

      Όλο το DSpaceΚοινότητες & ΣυλλογέςΑνά ημερομηνία δημοσίευσηςΣυγγραφείςΤίτλοιΛέξεις κλειδιά

      Ο λογαριασμός μου

      ΣύνδεσηΕγγραφή (MyDSpace)
      Πληροφορίες-Επικοινωνία
      ΑπόθεσηΣχετικά μεΒοήθειαΕπικοινωνήστε μαζί μας
      Επιλογή ΓλώσσαςΌλο το DSpace
      EnglishΕλληνικά
      Η δικτυακή πύλη της Ευρωπαϊκής Ένωσης
      Ψηφιακή Ελλάδα
      ΕΣΠΑ 2007-2013
      Με τη συγχρηματοδότηση της Ελλάδας και της Ευρωπαϊκής Ένωσης
      htmlmap