Courses
Journals
- Nomikos, A. Nieto, P. Makris, D. N. Skoutas, D. Vouyioukas, P. Rizomiliotis, J. Lopez, C. Skianis, Relay selection for secure 5G green communications, Telecommunication Systems, Vol. 59, pp. 169-187, 2015, Springer,
- Marangos, P. Rizomiliotis, L. Mitrou, Time Synchronization: Pivotal Element in Cloud Forensics, Security and Communication Networks , 2014, Wiley,
- Rekleitis, P. Rizomiliotis, S. Gritzalis, How to Protect Security and Privacy in the Internet of Things: A Policy-based RFID tag management protocol, Security and Communication Networks, Vol. 7, No. 12, pp. 2669-2683, 2014, Wiley,
- Rizomiliotis, S. Gritzalis, On the security of AUTH, an authentication protocol based on the subspace LPN problem, International Journal of Information Security, Vol. 12, No. 2, pp. 151-154, 2013, Springer,
- Katsiotis, P. Rizomiliotis, N. Kalouptsidis, Flexible Convolutional Codes: Variable Rate and Complexity, IEEE Transactions on Communications, Vol. 3, pp. 608-613, 2012, IEEE Press,
- Rizomiliotis, On the Security of the Feng-Liao-Yang family of Boolean functions with optimal algebraic immunity against fast algebraic attacks, Designs, Codes and Cryptography, Vol. 57, No. 3, pp. 283-292, 2010, Springer,
- Rizomiliotis, On the Resistance of Boolean Functions against Algebraic Attacks using Univariate Polynomial Representation, IEEE Transactions on Information Theory, Vol. 56, pp. 4014-4024, 2010, IEEE Press,
- Katsiotis, P. Rizomiliotis, N. Kalouptsidis, New Constructions of High-Performance Low-Complexity Convolutional Codes, IEEE Transactions on Communications, Vol. 58, No. 7, pp. 1950 – 1961, 2010, IEEE Press,
- Rizomiliotis, A. Bogris, D. Syvridis, Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication, IEEE Journal of Quantum Electronics, Vol. 46, No. 3, pp. 377-383, 2010, IEEE Press,
- Rizomiliotis, Improving the high order nonlinearity lower bound for Boolean functions with given Algebraic Immunity, Discrete Applied Mathematics, Vol. 158, No. 18, pp. 2049-2055, 2010, Elsevier,
- Rizomiliotis, E. Rekleitis, S. Gritzalis, Security Analysis of the Song-Mitchell Authentication Protocol for Low-Cost RFID tags, IEEE Communications Letters, Vol. 13, No. 4, pp. 274-276, 2009, IEEE Press
- Rizomiliotis, A. Tsohou, C. Lambrinoudakis, S. Gritzalis, Security and Privacy Issues in Bipolar Disorder Research, The Journal on Information Technology in Healthcare, Vol. 7, No. 4, pp. 244-250, 2009, HL7 Ramius Corp
- Bogris, P. Rizomiliotis, K. Chlouverakis, A. Argyris, D. Syvridis, Feedback phase in optically generated chaos: A secret key for cryptography applications, IEEE Journal of Quantum Electronics, Vol. 44, pp. 119-124, 2008, IEEE Press ,
- Rizomiliotis, Constructing Periodic Binary Sequences of Maximum Nonlinear Span, IEEE Transactions on Information Theory, Vol. 52, No. 9, pp. 4257-4261, 2006, IEEE Press ,
- Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 5, pp. 1840-1848, 2005, IEEE Press,
- Rizomiliotis, N. Kalouptsidis, Results on the nonlinear span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 4, pp. 1555-1563, 2005, IEEE Press ,
- Kolokotronis, P. Rizomiliotis, N. Kalouptsidis, Minimum linear span approximation of binary sequences, IEEE Transactions on Information Theory, Vol. 48, No. 10, pp. 2758-2764, 2002, IEEE Press ,
Conferences
- Rizomiliotis, E. Molla, S. Gritzalis, REX: a Searchable Symmetric Encryption Scheme Supporting Range Queries, ACM CCSW 2017 9th ACM Cloud Computing Security Workshop, A. Stavrou, G. Karame, (eds), pp. 29-37, November 2017, Dallas, Texas, USA, ACM Press,
- Rizomiliotis, S. Gritzalis, ORAM based forward privacy preserving Dynamic Searchable Symmetric Encryption Schemes, ACM CCSW 2015 7th ACM Cloud Computing Security Workshop, C. Nita-Rotaru, F. Kerschbaum, (eds), pp. 65-76, October 2015, Denver, USA, ACM Press,
- Latsiou, P. Rizomiliotis, The Rainy Season of Cryptography, Proceedings of the 18th Panhellenic Conference on Informatics, pp. 1-6, October 2014, ACM,
- Rizomiliotis, Oblivious RAM: State of the Art and New Constructions, BalkanCrypt 2013, T. Baicheva, S. Nikova, T. Yalcin, (eds), (to appear), November 2013, Sofia, Bulgaria
- Rizomiliotis, S. Gritzalis, Revisiting Lightweight Authentication Protocols based on Hard Learning Problems, ACM WiSec 2013 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, A.-R. Sadeghi, M. Gruteser, (eds), pp. 125-130, April 2013, Budapest, Hungary, ACM Press,
- Ntalianis, E. Sardis, N. Tsapatsoulis, A. Doulamis, P. Rizomiliotis, Multiocular Surveillance of Wide Dynamic Environments Based on Optical Vision, Event Modeling and End-to-End Data Encryption – A Cloud-based Monitoring approach of Maritime Activities, IEEE GlobeCom 2012, Man-Sec Workshop, H. Eslambolchi, (ed), December 2012, Anaheim, California, USA, IEEE Press
- Marangos, P. Rizomiliotis, L. Mitrou, Digital Forensics in the Cloud Computing Era, IEEE GlobeCom 2012, Man-Sec Workshop, H. Eslambolchi, (ed), December 2012, Anaheim, California, USA, IEEE Press
- Rizomiliotis, C. Skianis, PASSIVE: Policy-Assessed system-level Security, 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012 ), S. Fischer-Hübner, S. Katsikas , (eds), September 2012, Vienna, Austria, Springer
- Katsiotis, N. Kalouptsidis, P. Rizomiliotis, Recursive Flexible Convolutional Encoders for Parallel Concatenation, International Symposium on Turbo Codes & Iterative Information Processing (ISTC), E. Agrell, J. B. Anderson, E. G. Larsson, (eds), August 2012, Gothenburg, Sweden, IEEE Press
- Rizomiliotis, S. Gritzalis, GHB#: a provably secure HB-like lightweight authentication protocol, ACNS 2012 10th International Conference on Applied Cryptography and Network Security, F.Bao, P. Samarati, (eds), pp. 489-506, June 2012, Singapore, Springer Lecture Notes in Computer Science LNCS,
- Makris, D. N. Skoutas, P. Rizomiliotis, C. Skianis, A User-Oriented, Customizable Infrastructure Sharing Approach for Hybrid Cloud Computing Environments, IEEE International Conference on Cloud Computing Technology and Science 2011 (IEEE CloudCom), (to appear), November 2011, Athens, Greece, IEEE Press
- Rizomiliotis, E. Rekleitis, S. Gritzalis, Designing secure RFID authentication protocols is (still) a non-trivial task, NSS 2011 5th International Conference on Network and Systems Security, P. Samarati, S. Foresti, J. Hu, (eds), pp. 73-80, September 2011, Milan, Italy, IEEE CPS Conference Publishing Services,
- Agudo, D. Nunez , G. Giammatteo, P. Rizomiliotis, C. Lambrinoudakis, Cryptography goes to the Cloud, Secure and Trust Computing, data management, and Applications (STA) 2011, STAVE workshop, J. Lopez, (ed), (to appear), June 2011, Loutraki, Greece, Springer CCIS
- Rekleitis, P. Rizomiliotis, S. Gritzalis, A holistic approach to RFID security and privacy, SecIoT 2010 1st International Workshop on the Security of the Internet of Things, J. Zhou. et al., (eds), December 2010, Tokyo, Japan,
- Rekleitis, P. Rizomiliotis, S. Gritzalis, An Agent Based Back-end RFID Tag Management System, TrustBus’10 7th International Conference on Trust, Privacy and Security in Digital Business, S.Katsikas, J.Lopez, M. Soriano , (eds), pp. 165-176, August 2010, Bilbao, Spain, Springer Berlin Heidelberg,
- Rizomiliotis, Misusing universal hash functions: security analysis of a hardware efficient stream cipher using LFSR based hash function, IEEE Information Theory Workshop, January 2010, Cairo, Egypt, IEEE Press
- Rizomiliotis, HB −MAC: Improving the Random− HB# authentication protocol, Trustbus 2009, Fischer-Huebner S., Lambrinoudakis C., (eds), pp. 159-168, September 2009, Linz, Austria, Springer
- Tsohou, P. Rizomiliotis, C. Lambrinoudakis, S. Gritzalis, Security and Privacy Issues in Bipolar Disorder Research, ICICTH 7th International Conference on Information and Communication Technologies in Health, A. Hasman et al., (eds), July 2009, Samos, Greece, INEAG
- Katsiotis, P. Rizomiliotis, N. Kalouptsidis, New Constructions of Low-Complexity Convolutional Codes, IEEE International Conference on Communications 2009 , 2009, Dresden, Germany, IEEE Press
- Rizomiliotis, A. Bogris, D. Syvridis, Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication, IEEE International Conference on Communications 2009 , 2009, Dresden, Germany, IEEE Press
- Rizomiliotis, Vectorial Boolean Functions: algebraic immunity and annihilators, Enhancing Crypto-Primitives with Techniques from Coding Theory, NATO Advanced Research Workshop, 2009, Veliko Turnovo, Bulgaria, IOS Press
- Rizomiliotis, Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity, 11th IMA International Conference on Cryptography and Coding, pp. 204-219, December 2007, Cirencester, UK, Springer
- Rizomiliotis, Periodic Binary Sequences of Maximum Nonlinear Span, 2005 IEEE International Symposium on Information Theory, pp. 469-473, September 2005, Adelaide, Australia, IEEE Press
- Rizomiliotis, Family of p-ary sequences with oprimal correlation property and large linear span from Helleseth-Gong sequences, International Symposium on Information Theory and its Applications, October 2004, Parma
- Rizomiliotis, N. Kalouptsidis, Result on the nonlinear span of binary sequences, 2004 IEEE International Symposium on Information Theory, pp. 124, June 2004, Chicago, IL USA, IEEE Press
- P. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, 2003 IEEE International Symposium on Information Theory, pp. 377, July 2003, Yokohama, Japan, IEEE Press
- Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, 2003 IEEE International Symposium on Information Theory, pp. 377, July 2003, Yokohama, Japan, IEEE Press
- Kolokotronis, P. Rizomiliotis, N. Kalouptsidis, First-order optimal approximation of binary sequences, 2001 Conference on Sequences and Their Applications, T. Helleseth, P. V. Kumar, and K. Yang , (eds), pp. 242-256, May 2001, Bergen, Norway, Series in Discrete Mathematics and Theoretical Computer Science, Springer
Books
Book Chapters
- Bertsima, I. Varlamis, P. Rizomiliotis, “Strengthening Privacy in Healthcare Social Networks”, chapter in Medical Data Privacy Handbook, Aris Gkoulalas‐Divanis and Grigorios Loukides , (eds), 2015, Springer,
- Rizomiliotis, “Practical cryptography”, chapter in Modern Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. K. Katsikas, V. Chryssikopoulos, (eds), 2011, Papasotiriou Pubs. (in Greek)
- Rekleitis, P. Rizomiliotis, S. Gritzalis, “Privacy Threats and countermeasures in RFID environments”, chapter in Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 193-220, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek)
- Kokolakis, P. Rizomiliotis, A. Benameur, S.-K. Sinha, “Security and Dependability Solutions for Web Services and Workflows”, chapter in Security and Dependability for Ambient Intelligence, G. Spanoudakis, A. Mana, S. Kokolakis, (eds), pp. 97-106, 2009, Springer