Key management systems for sensor networks in the context of the Internet of Things R Roman, C Alcaraz, J Lopez, N Sklavos Computers & Electrical Engineering 37 (2), 147-159, 2011 | 422 | 2011 |
Architectures and VLSI implementations of the AES-proposal Rijndael N Sklavos, O Koufopavlou IEEE Transactions on computers 51 (12), 1454-1459, 2002 | 191 | 2002 |
Wireless security and cryptography: specifications and implementations N Sklavos, X Zhang CRC Press, 2007 | 170* | 2007 |
LTE/SAE security issues on 4G wireless networks A N. Bikos, N Sklavos IEEE Security & Privacy 11 (2), 55-62, 2013 | 156 | 2013 |
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions N Sklavos, O Koufopavlou Proceedings of the 2003 International Symposium on Circuits and Systems …, 2003 | 125 | 2003 |
Cryptographic technologies and protocol standards for Internet of Things S Zeadally, AK Das, N Sklavos Internet of Things 14, 2021 | 122 | 2021 |
Implementation of the SHA-2 hash family standard using FPGAs N Sklavos, O Koufopavlou The journal of Supercomputing 31, 227-248, 2005 | 122 | 2005 |
Hardware implementation of the RC4 stream cipher P Kitsos, G Kostopoulos, N Sklavos, O Koufopavlou 2003 46th Midwest symposium on circuits and systems 3, 1363-1366, 2003 | 103 | 2003 |
Hardware Implementation of Bluetooth Security P Kitsos, N Sklavos, K Papadomanolakis, O Koufopavlou IEEE Pervasive Computing, Mobile and Ubiquitous Systems 2 (1), 21-29, 2003 | 83 | 2003 |
Cryptography and Security in Internet of Things (IoT): Models, Schemes, and Implementations N Sklavos, ID Zaharakis 8th IFIP International Conference on New Technologies, Mobility and Security …, 2016 | 77 | 2016 |
Mobile Communications World: Security Implementations Aspects - A State of the Art N Sklavos, O Koufopavlou CSJM 11 (2), 168-187, 2003 | 72* | 2003 |
High speed networking security: design and implementation of two new DDP-based ciphers N Sklavos, NA Moldovyan, O Koufopavlou Mobile Networks and Applications 10, 219-231, 2005 | 64 | 2005 |
Hardware Security and Trust N Sklavos, R Chaves, G Di Natale, F Regazzoni Springer, 2017 | 59 | 2017 |
Aiming at higher network security through extensive penetration tests A Bechtsoudis, N Sklavos IEEE Latin America Transactions 10 (3), 1752-1756, 2012 | 58 | 2012 |
Smart Home Automation: GSM Security System Design & Implementation E Isa, N Sklavos 3rd Pan-Hellinic Conference on Electronics and Telecommunications (PACET'15 …, 2017 | 57 | 2017 |
FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0 P Kitsos, N Sklavos, G Provelengios, AN Skodras Microprocessors and Microsystems 37 (2), 235-245, 2013 | 57 | 2013 |
A comparative study of hardware architectures for lightweight block ciphers P Kitsos, N Sklavos, M Parousi, AN Skodras Computers & Electrical Engineering 38 (1), 148-160, 2012 | 56 | 2012 |
On the hardware implementation cost of crypto-processors architectures N Sklavos Information Security Journal: A Global Perspective 19 (2), 53-60, 2010 | 56 | 2010 |
Comparison of the hardware architectures and FPGA implementations of stream ciphers MD Galanis, P Kitsos, G Kostopoulos, N Sklavos, O Koufopavlou, ... Proceedings of the 2004 11th IEEE International Conference on Electronics …, 2004 | 54 | 2004 |
Approaches for Preventing Honeypot Detection and Compromise M Tsikerdekis, S Zeadally, A Schlesener, N Sklavos Global Information Infrastructure and Networking Symposium (GIIS’18), 2018 | 53 | 2018 |