Approximating the unsatisfiability threshold of random formulas LM Kirousis, E Kranakis, D Krizanc, YC Stamatiou Random Structures & Algorithms 12 (3), 253-269, 1998 | 211 | 1998 |
Random constraint satisfaction: A more accurate picture D Achlioptas, LM Kirousis, E Kranakis, D Krizanc, MSO Molloy, ... Principles and Practice of Constraint Programming-CP97: Third International …, 1997 | 158 | 1997 |
Bounding the unsatisfiability threshold of random 3‐SAT S Janson, YC Stamatiou, M Vamvakari Random Structures & Algorithms 17 (2), 103-116, 2000 | 100 | 2000 |
Model-based risk assessment–the CORAS approach K Stolen, F Den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ... iTrust Workshop, 2002 | 87 | 2002 |
Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices I Chatzigiannakis, A Pyrgelis, PG Spirakis, YC Stamatiou 2011 IEEE eighth international conference on mobile ad-hoc and sensor …, 2011 | 84 | 2011 |
Random constraint satisfaction: A more accurate picture D Achlioptas, MSO Molloy, LM Kirousis, YC Stamatiou, E Kranakis, ... Constraints 6, 329-344, 2001 | 78 | 2001 |
Evolutionary computation based cryptanalysis: A first study EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005 | 50 | 2005 |
Gamification acceptance for learners with different E-skills A Panagiotarou, YC Stamatiou, C Pierrakeas, A Kameas International Journal of Learning, Teaching and Educational Research 19 (2 …, 2020 | 49 | 2020 |
Cryptography and cryptanalysis through computational intelligence EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Computational Intelligence in Information Assurance and Security, 1-49, 2007 | 45 | 2007 |
Secure distributed cloud storage based on the blockchain technology and smart contracts S Gousteris, YC Stamatiou, C Halkiopoulos, H Antonopoulou, ... Emerging Science Journal 7 (2), 469-479, 2023 | 40 | 2023 |
A trust-centered approach for building e-voting systems A Antoniou, C Korakas, C Manolopoulos, A Panagiotaki, D Sofotassios, ... Electronic Government: 6th International Conference, EGOV 2007, Regensburg …, 2007 | 37 | 2007 |
The CORAS approach for model-based risk management applied to a telemedicine service Y Stamatiou, E Skipenes, E Henriksen, N Stathiakis, A Sikianakis, ... The New Navigators: from Professionals to Patients, 206-211, 2003 | 35 | 2003 |
Model-based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks K Stølen, F den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ... Business Component-Based Software Engineering, 189-207, 2003 | 35 | 2003 |
Utilizing a restricted access e-learning platform for reform, equity, and self-development in correctional facilities YC Stamatiou, C Halkiopoulos, A Giannoulis, H Antonopoulou Emerging Science Journal 6, 241-252, 2022 | 31 | 2022 |
A compressed-domain watermarking algorithm for mpeg audio layer 3 DK Koukopoulos, YC Stamatiou Proceedings of the 2001 workshop on Multimedia and security: new challenges …, 2001 | 31 | 2001 |
User acceptance of privacy-abcs: An exploratory study Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 30 | 2014 |
A software library for elliptic curve cryptography E Konstantinou, Y Stamatiou, C Zaroliagis European Symposium on Algorithms, 625-637, 2002 | 30 | 2002 |
A note on the non-colorability threshold of a random graph AC Kaporis, LM Kirousis, YC Stamatiou the electronic journal of combinatorics 7, R29-R29, 2000 | 27 | 2000 |
A transparent watermarking method for color images S Armeni, D Christodoulakis, I Kostopoulos, Y Stamatiou, M Xenos First IEEE Balcan Conference on Signal Processing, Communications, Circuits …, 2000 | 24 | 2000 |
On the construction of prime order elliptic curves E Konstantinou, YC Stamatiou, C Zaroliagis International Conference on Cryptology in India, 309-322, 2003 | 22 | 2003 |