Blockchain solutions for forensic evidence preservation in IoT environments S Brotsis, N Kolokotronis, K Limniotis, S Shiaeles, D Kavallieros, E Bellini, ... 2019 IEEE Conference on Network Softwarization (NetSoft), 110-114, 2019 | 97 | 2019 |
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance S Brotsis, K Limniotis, G Bendiab, N Kolokotronis, S Shiaeles Computer Networks 191, 108005, 2021 | 91 | 2021 |
On the security and privacy of hyperledger fabric: Challenges and open issues S Brotsis, N Kolokotronis, K Limniotis, G Bendiab, S Shiaeles 2020 IEEE World Congress on Services (SERVICES), 197-204, 2020 | 71 | 2020 |
On the nonlinear complexity and Lempel–Ziv complexity of finite length sequences K Limniotis, N Kolokotronis, N Kalouptsidis IEEE Transactions on Information Theory 53 (11), 4293-4302, 2007 | 50 | 2007 |
Properties of the error linear complexity spectrum T Etzion, N Kalouptsidis, N Kolokotronis, K Limniotis, KG Paterson IEEE Transactions on Information Theory 55 (10), 4681-4686, 2009 | 47 | 2009 |
Secured by blockchain: Safeguarding internet of things devices N Kolokotronis, K Limniotis, S Shiaeles, R Griffiths IEEE Consumer Electronics Magazine 8 (3), 28-34, 2019 | 35 | 2019 |
Best affine and quadratic approximations of particular classes of Boolean functions N Kolokotronis, K Limniotis, N Kalouptsidis IEEE transactions on information theory 55 (11), 5211-5222, 2009 | 19 | 2009 |
A design technique for energy reduction in NORA CMOS logic K Limniotis, Y Tsiatouhas, T Haniotakis, A Arapoyanni IEEE Transactions on Circuits and Systems I: Regular Papers 53 (12), 2647-2655, 2006 | 19 | 2006 |
Lower bounds on sequence complexity via generalised Vandermonde determinants N Kolokotronis, K Limniotis, N Kalouptsidis Sequences and Their Applications–SETA 2006: 4th International Conference …, 2006 | 19 | 2006 |
On the linear complexity of sequences obtained by state space generators K Limniotis, N Kolokotronis, N Kalouptsidis IEEE transactions on information theory 54 (4), 1786-1793, 2008 | 15 | 2008 |
Secondary constructions of Boolean functions with maximum algebraic immunity K Limniotis, N Kolokotronis, N Kalouptsidis Cryptography and Communications 5, 179-199, 2013 | 13* | 2013 |
Nonlinear span, minimal realizations of sequences over finite fields and De Bruijn generators N Kalouptsidis, K Limniotis Proc. Int. Symp. Inf. Theory and Appl, 794-799, 2004 | 13 | 2004 |
Cryptography as the means to protect fundamental human rights K Limniotis Cryptography 5 (4), 34, 2021 | 12 | 2021 |
New results on the linear complexity of binary sequences K Limniotis, N Kolokotronis, N Kalouptsidis 2006 IEEE International Symposium on Information Theory, 2003-2007, 2006 | 12 | 2006 |
Data Protection by Design for cybersecurity systems in a Smart Home environment O Gkotsopoulou, E Charalambous, K Limniotis, P Quinn, D Kavallieros, ... 2019 IEEE Conference on Network Softwarization (NetSoft), 101-109, 2019 | 11 | 2019 |
On the security of permissioned blockchain solutions for iot applications S Brotsis, N Kolokotronis, K Limniotis, S Shiaeles 2020 6th IEEE Conference on Network Softwarization (NetSoft), 465-472, 2020 | 10 | 2020 |
BotSpot: Deep learning classification of bot accounts within twitter C Braker, S Shiaeles, G Bendiab, N Savage, K Limniotis Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2020 | 10 | 2020 |
On the second-order nonlinearity of cubic Maiorana-McFarland Boolean functions N Kolokotronis, K Limniotis 2012 International Symposium on Information Theory and its Applications, 596-600, 2012 | 10* | 2012 |
Data pseudonymisation: advanced techniques and use cases C Lauradoux, K Limniotis, M Hansen, M Jensen, P Eftasthopoulos European Union Agency for Cybersecurity, 2021 | 9 | 2021 |
Boolean functions with maximum algebraic immunity: further extensions of the Carlet–Feng construction K Limniotis, N Kolokotronis Designs, Codes and Cryptography 86, 1685-1706, 2018 | 8 | 2018 |