« Προηγούμενο12Επόμενο »

Περιοδικό

2007
Elisavet Konstantinou, I. Chatzigiannakis, V. Liagkou, P. Spirakis, (2007), Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks, Electronic Notes in Theoretical Computer Science, Vol = 171, (1), pp. = 17-31   
Elisavet Konstantinou, Y. Stamatiou, C. Zaroliagis, (2007), Efficient Generation of Secure Elliptic Curves, International Journal of Information Security, Vol = 6, (1), pp. = 47-63   
2009
Elisavet Konstantinou, A. Kontogeorgis, (2009), Computing Polynomials of the Ramanujan t_n class invariants, Canadian Mathematical Bulletin, Vol = 52, (4), pp. = 583-597   
2010
Elisavet Konstantinou, Y. Stamatiou, C. Zaroliagis, A. Kontogeorgis, (2010), On the Efficient Generation of Prime Order Elliptic Curves, Journal of Cryptology, Vol = 23, pp. = 477-503   
Stefanos Gritzalis, Georgios Kambourakis, Elisavet Konstantinou, (2010), Revisiting WiMAX MBS Security, Computers and Mathematics with Applications, Vol = 60, (2), pp. = 217-223   
Stefanos Gritzalis, Georgios Kambourakis, Elisavet Konstantinou, Georgios Karopoulos, (2010), A Framework for Identity Privacy in SIP, Journal of Network and Computer Applications, Vol = 33, (1), pp. = 16-28   
Georgios Kambourakis, Elisavet Konstantinou, Anastasia Douma, Marios Anagnostopoulos, Georgios Fotiadis, (2010), Efficient Certification Path Discovery for MANET, EURASIP Journal on Wireless Communications and Networking, Vol = 2010, pp. = 1-16   
Elisavet Konstantinou, A. Kontogeorgis, (2010), Ramanujan’s Class Invariants and Their Use in Elliptic Curve Cryptography, Computers and Mathematics with Applications, Vol = 59, (8), pp. = 2901-2917   
2011
Stefanos Gritzalis, Georgios Kambourakis, Elisavet Konstantinou, Eleni Klaoudatou, (2011), A Survey on Cluster-based Group Key Agreement Protocols for WSNs, IEEE Communications Surveys and Tutorials, Vol = 13, (3), pp. = 429-442   
Elisavet Konstantinou, (2011), Efficient Cluster-based Group Key Agreement Protocols for Wireless Ad Hoc Networks, Journal of Networks and Computer Applications, Vol = 34, (1), pp. = 384-393