Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design Issues in Secure Embedded Systems., , and . Embedded Systems Design and Verification, chapter 18, CRC Press, 2nd edition, (2009)Αρχιτεκτονική ασφάλειας δικτύων ενσωματωμένων συστημάτων. University of Patras, Greece, (2008)National Archive of PhD Theses: oai:10442/26344.TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach., , , , and . QRS, page 69-73. IEEE, (2016)Pipelined SHA-3 Implementations on FPGA: Architecture and Performance Analysis., , and . CS2@HiPEAC, page 13-18. ACM, (2015)A unified architecture for integrating energy harvesting IoT devices with the Mobile Edge Cloud., , , , , and . WF-IoT, page 13-18. IEEE, (2018)Pulse: A Class of Super-Worms against Network Infrastructure., and . ICDCS Workshops, page 28-. IEEE Computer Society, (2003)Active hardware attacks and proactive countermeasures., and . ISCC, page 361-366. IEEE Computer Society, (2002)A Comparison of TERO and RO Timing Sensitivity for Hardware Trojan Detection Applications., and . DSD, page 547-550. IEEE Computer Society, (2015)A Performance Assessment of Network Address Shuffling in IoT Systems., , , , and . EUROCAST (1), volume 10671 of Lecture Notes in Computer Science, page 197-204. Springer, (2017)u'smile - Secure Mobile Environments., , , and . ERCIM News, (2017)