


default search action
Konstantinos Limniotis
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Stylianos Gerasimou, Konstantinos Limniotis:
A study on privacy and security aspects of personalised apps. Int. J. Inf. Sec. 23(5): 3217-3239 (2024) - [j16]Paraskevi Christodoulou
, Konstantinos Limniotis
:
Data Protection Issues in Automated Decision-Making Systems Based on Machine Learning: Research Challenges. Network 4(1): 91-113 (2024) - 2023
- [j15]Sotirios Brotsis
, Konstantinos-Panagiotis Grammatikakis
, Dimitrios Kavallieros
, Antonio I. Mazilu
, Nicholas Kolokotronis
, Konstantinos Limniotis
, Costas Vassilakis
:
Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems. Internet Things 24: 100968 (2023) - 2022
- [j14]Antonios Patergianakis
, Konstantinos Limniotis
:
Privacy Issues in Stylometric Methods. Cryptogr. 6(2): 17 (2022) - 2021
- [j13]Sotirios Brotsis
, Konstantinos Limniotis
, Gueltoum Bendiab
, Nicholas Kolokotronis
, Stavros Shiaeles
:
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance. Comput. Networks 191: 108005 (2021) - [j12]Konstantinos Limniotis
:
Cryptography as the Means to Protect Fundamental Human Rights. Cryptogr. 5(4): 34 (2021) - [c23]Georgios Kermezis, Konstantinos Limniotis
, Nicholas Kolokotronis
:
User-Generated Pseudonyms Through Merkle Trees. APF 2021: 89-105 - [i12]Sotirios Brotsis, Konstantinos Limniotis, Gueltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles:
On the Suitability of Blockchain Platforms for IoT Applications: Architectures, Security, Privacy, and Performance. CoRR abs/2109.02352 (2021) - [i11]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Gueltoum Bendiab, Stavros Shiaeles:
On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues. CoRR abs/2109.03574 (2021) - [i10]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles:
On the Security of Permissioned Blockchain Solutions for IoT Applications. CoRR abs/2109.03621 (2021) - [i9]Stylianos Monogios, Konstantinos Limniotis, Nicholas Kolokotronis, Stavros Shiaeles:
A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps. CoRR abs/2109.03664 (2021) - [i8]Georgios Kermezis, Konstantinos Limniotis, Nicholas Kolokotronis:
User-generated pseudonyms through Merkle trees. CoRR abs/2109.03673 (2021) - [i7]Christopher Braker, Stavros Shiaeles, Gueltoum Bendiab, Nick Savage, Konstantinos Limniotis:
BotSpot: Deep Learning Classification of Bot Accounts within Twitter. CoRR abs/2109.03710 (2021) - 2020
- [c22]Sotirios Brotsis
, Nicholas Kolokotronis
, Konstantinos Limniotis
, Stavros Shiaeles
:
On the Security of Permissioned Blockchain Solutions for IoT Applications. NetSoft 2020: 465-472 - [c21]Christopher Braker, Stavros Shiaeles
, Gueltoum Bendiab, Nick Savage, Konstantinos Limniotis
:
BotSpot: Deep Learning Classification of Bot Accounts Within Twitter. NEW2AN/ruSMART 2020: 165-175 - [c20]Sotirios Brotsis
, Nicholas Kolokotronis
, Konstantinos Limniotis
, Gueltoum Bendiab, Stavros Shiaeles
:
On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues. SERVICES 2020: 197-204
2010 – 2019
- 2019
- [j11]Nicholas Kolokotronis
, Konstantinos Limniotis
, Stavros Shiaeles
, Romain Griffiths:
Secured by Blockchain: Safeguarding Internet of Things Devices. IEEE Consumer Electron. Mag. 8(3): 28-34 (2019) - [j10]Konstantinos Limniotis
, Nicholas Kolokotronis
:
The Error Linear Complexity Spectrum as a Cryptographic Criterion of Boolean Functions. IEEE Trans. Inf. Theory 65(12): 8345-8356 (2019) - [c19]Stylianos Monogios, Konstantinos Limniotis
, Nicholas Kolokotronis
, Stavros Shiaeles
:
A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps. e-Democracy 2019: 34-48 - [c18]Olga Gkotsopoulou
, Elisavet Charalambous, Konstantinos Limniotis
, Paul Quinn, Dimitris Kavallieros
, Gohar Sargsyan, Stavros Shiaeles
, Nicholas Kolokotronis
:
Data Protection by Design for cybersecurity systems in a Smart Home environment. NetSoft 2019: 101-109 - [c17]Sotirios Brotsis
, Nicholas Kolokotronis
, Konstantinos Limniotis
, Stavros Shiaeles
, Dimitris Kavallieros
, Emanuele Bellini, Clément Pavué:
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments. NetSoft 2019: 110-114 - [i6]Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths:
Blockchain Technologies for Enhanced Security and Privacy in the Internet of Things. CoRR abs/1903.04794 (2019) - [i5]Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Dimitris Kavallieros, Emanuele Bellini, Clément Pavué:
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments. CoRR abs/1903.10770 (2019) - [i4]Olga Gkotsopoulou, Elisavet Charalambous, Konstantinos Limniotis, Paul Quinn, Dimitris Kavallieros, Gohar Sargsyan, Stavros Shiaeles, Nicholas Kolokotronis:
Data Protection by Design for Cybersecurity Systems in a Smart Home Environment. CoRR abs/1903.10778 (2019) - 2018
- [j9]Dimitrios Alvanos, Konstantinos Limniotis
, Stavros Stavrou:
On the Cryptographic Features of a VoIP Service. Cryptogr. 2(1): 3 (2018) - [j8]Konstantinos Limniotis
, Nicholas Kolokotronis
:
Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction. Des. Codes Cryptogr. 86(8): 1685-1706 (2018) - [c16]Dimitrios Kontogeorgis, Konstantinos Limniotis
, Ioanna Kantzavelou
:
An evaluation of the HTTPS adoption in websites in Greece: estimating the users awareness. PCI 2018: 46-51 - 2017
- [c15]Vasileios Chatzistefanou, Konstantinos Limniotis
:
On the (Non-)anonymity of Anonymous Social Networks. e-Democracy 2017: 153-168 - 2016
- [c14]Efthymios Iosifidis, Konstantinos Limniotis
:
A study of lightweight block ciphers in TLS: The case of Speck. PCI 2016: 64 - 2015
- [c13]Konstantinos Limniotis
, Nicholas Kolokotronis
:
Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes. BalkanCryptSec 2015: 3-16 - 2013
- [j7]Konstantinos Limniotis
, Nicholas Kolokotronis
, Nicholas Kalouptsidis:
Secondary constructions of Boolean functions with maximum algebraic immunity. Cryptogr. Commun. 5(3): 179-199 (2013) - 2012
- [c12]Nicholas Kolokotronis, Konstantinos Limniotis:
On the second-order nonlinearity of cubic Maiorana-McFarland Boolean functions. ISITA 2012: 596-600 - [c11]Nicholas Kolokotronis, Konstantinos Limniotis:
A greedy algorithm for checking normality of cryptographic boolean functions. ISITA 2012: 601-605 - [i3]Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity. IACR Cryptol. ePrint Arch. 2012: 46 (2012) - 2011
- [c10]Zoe Kardasiadou, Evi Chatziliasi, Konstantinos Limniotis
:
E-Government in Greece: Serving State's Economic Needs - Respecting the Fundamental Right to Data Protection. ICGS3/e-Democracy 2011: 179-185 - [c9]Konstantinos Limniotis
, Nicholas Kolokotronis
, Nicholas Kalouptsidis:
Constructing Boolean functions in odd number of variables with maximum algebraic immunity. ISIT 2011: 2686-2690 - [i2]Nicholas Kolokotronis, Konstantinos Limniotis:
Maiorana-McFarland Functions with High Second-Order Nonlinearity. IACR Cryptol. ePrint Arch. 2011: 212 (2011)
2000 – 2009
- 2009
- [j6]Nicholas Kolokotronis
, Konstantinos Limniotis
, Nicholas Kalouptsidis:
Factorization of determinants over finite fields and application in stream ciphers. Cryptogr. Commun. 1(2): 175-205 (2009) - [j5]Tuvi Etzion, Nicholas Kalouptsidis, Nicholas Kolokotronis
, Konstantinos Limniotis
, Kenneth G. Paterson:
Properties of the error linear complexity spectrum. IEEE Trans. Inf. Theory 55(10): 4681-4686 (2009) - [j4]Nicholas Kolokotronis
, Konstantinos Limniotis
, Nicholas Kalouptsidis:
Best affine and quadratic approximations of particular classes of Boolean functions. IEEE Trans. Inf. Theory 55(11): 5211-5222 (2009) - 2008
- [j3]Konstantinos Limniotis
, Nicholas Kolokotronis
, Nicholas Kalouptsidis:
On the Linear Complexity of Sequences Obtained by State Space Generators. IEEE Trans. Inf. Theory 54(4): 1786-1793 (2008) - [c8]Tuvi Etzion, Nicholas Kalouptsidis, Nicholas Kolokotronis
, Konstantinos Limniotis
, Kenneth G. Paterson:
On the error linear complexity profiles of binary sequences of period 2n. ISIT 2008: 2400-2404 - 2007
- [b1]Konstantinos Limniotis:
Τεχνικές επεξεργασίας σήματος στην κρυπτογραφία. National and Kapodistrian University of Athens, Greece, 2007 - [j2]Konstantinos Limniotis
, Nicholas Kolokotronis
, Nicholas Kalouptsidis:
On the Nonlinear Complexity and Lempel-Ziv Complexity of Finite Length Sequences. IEEE Trans. Inf. Theory 53(11): 4293-4302 (2007) - [c7]Nicholas Kolokotronis
, Konstantinos Limniotis
, Nicholas Kalouptsidis:
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators. Inscrypt 2007: 246-255 - [c6]Nicholas Kolokotronis
, Konstantinos Limniotis
, Nicholas Kalouptsidis:
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions. IMACC 2007: 73-91 - [c5]Nicholas Kolokotronis
, Konstantinos Limniotis
, Nicholas Kalouptsidis:
Best Affine Approximations of Boolean Functions and Applications to Low Order Approximations. ISIT 2007: 1836-1840 - [i1]Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Best Quadratic Approximations of Cubic Boolean Functions. IACR Cryptol. ePrint Arch. 2007: 37 (2007) - 2006
- [j1]Konstantinos Limniotis
, Yiorgos Tsiatouhas
, Themistoklis Haniotakis, Angela Arapoyanni:
A Design Technique for Energy Reduction in NORA CMOS Logic. IEEE Trans. Circuits Syst. I Regul. Pap. 53-I(12): 2647-2655 (2006) - [c4]Konstantinos Limniotis
, Nicholas Kolokotronis
, Nicholas Kalouptsidis:
New Results on the Linear Complexity of Binary Sequences. ISIT 2006: 2003-2007 - [c3]Konstantinos Limniotis
, Nicholas Kolokotronis
, Nicholas Kalouptsidis:
Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression. SETA 2006: 168-179 - [c2]Nicholas Kolokotronis
, Konstantinos Limniotis
, Nicholas Kalouptsidis:
Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants. SETA 2006: 271-284 - 2003
- [c1]Yiorgos Tsiatouhas
, Konstantinos Limniotis
, Angela Arapoyanni, Themistoklis Haniotakis:
A low power NORA circuit design technique based on charge recycling. ICECS 2003: 224-227
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint