Follow
Yannis Stamatiou
Yannis Stamatiou
Verified email at ceid.upatras.gr
Title
Cited by
Cited by
Year
Approximating the unsatisfiability threshold of random formulas
LM Kirousis, E Kranakis, D Krizanc, YC Stamatiou
Random Structures & Algorithms 12 (3), 253-269, 1998
2091998
Random constraint satisfaction: A more accurate picture
D Achlioptas, LM Kirousis, E Kranakis, D Krizanc, MSO Molloy, ...
Principles and Practice of Constraint Programming-CP97: Third International …, 1997
1581997
Bounding the unsatisfiability threshold of random 3‐SAT
S Janson, YC Stamatiou, M Vamvakari
Random Structures & Algorithms 17 (2), 103-116, 2000
1002000
Model-based risk assessment–the CORAS approach
K Stolen, F Den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ...
iTrust Workshop, 2002
862002
Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices
I Chatzigiannakis, A Pyrgelis, PG Spirakis, YC Stamatiou
2011 IEEE eighth international conference on mobile ad-hoc and sensor …, 2011
792011
Random constraint satisfaction: A more accurate picture
D Achlioptas, MSO Molloy, LM Kirousis, YC Stamatiou, E Kranakis, ...
Constraints 6, 329-344, 2001
772001
Evolutionary computation based cryptanalysis: A first study
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005
502005
Gamification acceptance for learners with different E-skills
A Panagiotarou, YC Stamatiou, C Pierrakeas, A Kameas
International Journal of Learning, Teaching and Educational Research 19 (2 …, 2020
452020
Cryptography and cryptanalysis through computational intelligence
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Computational Intelligence in Information Assurance and Security, 1-49, 2007
432007
A trust-centered approach for building e-voting systems
A Antoniou, C Korakas, C Manolopoulos, A Panagiotaki, D Sofotassios, ...
Electronic Government: 6th International Conference, EGOV 2007, Regensburg …, 2007
362007
The CORAS approach for model-based risk management applied to a telemedicine service
Y Stamatiou, E Skipenes, E Henriksen, N Stathiakis, A Sikianakis, ...
The New Navigators: from Professionals to Patients, 206-211, 2003
352003
Model-based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks
K Stølen, F den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ...
Business Component-Based Software Engineering, 189-207, 2003
352003
Secure distributed cloud storage based on the blockchain technology and smart contracts
S Gousteris, YC Stamatiou, C Halkiopoulos, H Antonopoulou, ...
Emerging Science Journal 7 (2), 469-479, 2023
322023
A compressed-domain watermarking algorithm for mpeg audio layer 3
DK Koukopoulos, YC Stamatiou
Proceedings of the 2001 workshop on Multimedia and security: new challenges …, 2001
312001
User acceptance of privacy-abcs: An exploratory study
Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
302014
A software library for elliptic curve cryptography
E Konstantinou, Y Stamatiou, C Zaroliagis
European Symposium on Algorithms, 625-637, 2002
302002
A note on the non-colorability threshold of a random graph
AC Kaporis, LM Kirousis, YC Stamatiou
the electronic journal of combinatorics 7, R29-R29, 2000
272000
A transparent watermarking method for color images
S Armeni, D Christodoulakis, I Kostopoulos, Y Stamatiou, M Xenos
First IEEE Balcan Conference on Signal Processing, Communications, Circuits …, 2000
242000
Utilizing a restricted access e-learning platform for reform, equity, and self-development in correctional facilities
YC Stamatiou, C Halkiopoulos, A Giannoulis, H Antonopoulou
Emerging Science Journal 6, 241-252, 2022
232022
On the construction of prime order elliptic curves
E Konstantinou, YC Stamatiou, C Zaroliagis
International Conference on Cryptology in India, 309-322, 2003
222003
The system can't perform the operation now. Try again later.
Articles 1–20