Approximating the unsatisfiability threshold of random formulas LM Kirousis, E Kranakis, D Krizanc, YC Stamatiou Random Structures & Algorithms 12 (3), 253-269, 1998 | 207 | 1998 |
Random constraint satisfaction: A more accurate picture D Achlioptas, LM Kirousis, E Kranakis, D Krizanc, MSO Molloy, ... Principles and Practice of Constraint Programming-CP97: Third International …, 1997 | 162 | 1997 |
Bounding the unsatisfiability threshold of random 3‐SAT S Janson, YC Stamatiou, M Vamvakari Random Structures & Algorithms 17 (2), 103-116, 2000 | 100 | 2000 |
Model-based risk assessment–the CORAS approach K Stolen, F Den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ... iTrust Workshop, 2002 | 80 | 2002 |
Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices I Chatzigiannakis, A Pyrgelis, PG Spirakis, YC Stamatiou 2011 IEEE eighth international conference on mobile ad-hoc and sensor …, 2011 | 74 | 2011 |
Random constraint satisfaction: A more accurate picture D Achlioptas, MSO Molloy, LM Kirousis, YC Stamatiou, E Kranakis, ... Constraints 6, 329-344, 2001 | 73 | 2001 |
Evolutionary computation based cryptanalysis: A first study EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005 | 47 | 2005 |
Cryptography and cryptanalysis through computational intelligence EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Computational Intelligence in Information Assurance and Security, 1-49, 2007 | 40 | 2007 |
Model-based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks K Stølen, F den Braber, T Dimitrakos, R Fredriksen, BA Gran, SH Houmb, ... Business Component-Based Software Engineering, 189-207, 2003 | 37 | 2003 |
A trust-centered approach for building e-voting systems A Antoniou, C Korakas, C Manolopoulos, A Panagiotaki, D Sofotassios, ... Electronic Government: 6th International Conference, EGOV 2007, Regensburg …, 2007 | 34 | 2007 |
The CORAS approach for model-based risk management applied to a telemedicine service Y Stamatiou, E Skipenes, E Henriksen, N Stathiakis, A Sikianakis, ... The New Navigators: from Professionals to Patients, 206-211, 2003 | 34 | 2003 |
A compressed-domain watermarking algorithm for mpeg audio layer 3 DK Koukopoulos, YC Stamatiou Proceedings of the 2001 workshop on Multimedia and security: new challenges …, 2001 | 31 | 2001 |
A software library for elliptic curve cryptography E Konstantinou, Y Stamatiou, C Zaroliagis European Symposium on Algorithms, 625-637, 2002 | 30 | 2002 |
Gamification acceptance for learners with different E-skills A Panagiotarou, YC Stamatiou, C Pierrakeas, A Kameas International Journal of Learning, Teaching and Educational Research 19 (2 …, 2020 | 29 | 2020 |
User acceptance of privacy-abcs: An exploratory study Z Benenson, A Girard, I Krontiris, V Liagkou, K Rannenberg, Y Stamatiou Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 28 | 2014 |
A note on the non-colorability threshold of a random graph AC Kaporis, LM Kirousis, YC Stamatiou the electronic journal of combinatorics 7, R29-R29, 2000 | 28 | 2000 |
A transparent watermarking method for color images S Armeni, D Christodoulakis, I Kostopoulos, Y Stamatiou, M Xenos First IEEE Balcan Conference on Signal Processing, Communications, Circuits …, 2000 | 24 | 2000 |
On the efficient generation of elliptic curves over prime fields E Konstantinou, YC Stamatiou, C Zaroliagis International Workshop on Cryptographic Hardware and Embedded Systems, 333-348, 2002 | 22 | 2002 |
Coupon Collectors, q-Binomial Coefficients and the Unsatisfiability Threshold A Restivo, SR Della Rocca, L Roversi, AC Kaporis, LM Kirousis, ... Theoretical Computer Science: 7th Italian Conference, ICTCS 2001 Torino …, 2001 | 21 | 2001 |
Locating information with uncertainty in fully interconnected networks LM Kirousis, E Kranakis, D Krizanc, YC Stamatiou Distributed Computing: 14th International Conference, DISC 2000 Toledo …, 2000 | 21 | 2000 |