Dr. Panagiotis Rizomiliotis

Dr. Panagiotis Rizomiliotis was born in Athens, Greece. He received a B.Sc. degree in Informatics with honours in 1997 and a M.Sc. in radioelectrical engineering in 1999 from the National and Kapodistrian University of Athens. He holds a Ph.D. in pseudorandom sequences design with applications in cryptography and communications from the National and Kapodistrian University of Athens. In 2005, Panagiotis joined the COSIC group at Katholieke Universiteit Leuven and he worked as a postdoctoral researcher until 2007. His research was funded, the first year, by the Marie Curie Fellowship he received and, the second year, by the Flemish Fund for Scientific Research (F.W.O.-Vlaanderen). Since 2010, he has been elected assistant professor at the University of the Aegean. His main research interests include applied cryptography, pseudorandom sequence design, information theory, systems security and privacy.
  1. Nomikos, A. Nieto, P. Makris, D. N. Skoutas, D. Vouyioukas, P. Rizomiliotis, J. Lopez, C. Skianis, Relay selection for secure 5G green communications, Telecommunication Systems, Vol. 59, pp. 169-187, 2015, Springer, 
  2. Marangos, P. Rizomiliotis, L. Mitrou, Time Synchronization: Pivotal Element in Cloud Forensics, Security and Communication Networks , 2014, Wiley, 
  3. Rekleitis, P. Rizomiliotis, S. Gritzalis, How to Protect Security and Privacy in the Internet of Things: A Policy-based RFID tag management protocol, Security and Communication Networks, Vol. 7, No. 12, pp. 2669-2683, 2014, Wiley, 
  4. Rizomiliotis, S. Gritzalis, On the security of AUTH, an authentication protocol based on the subspace LPN problem, International Journal of Information Security, Vol. 12, No. 2, pp. 151-154, 2013, Springer,
  5. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, Flexible Convolutional Codes: Variable Rate and Complexity, IEEE Transactions on Communications, Vol. 3, pp. 608-613, 2012, IEEE Press, 
  6. Rizomiliotis, On the Security of the Feng-Liao-Yang family of Boolean functions with optimal algebraic immunity against fast algebraic attacks, Designs, Codes and Cryptography, Vol. 57, No. 3, pp. 283-292, 2010, Springer, 
  7. Rizomiliotis, On the Resistance of Boolean Functions against Algebraic Attacks using Univariate Polynomial Representation, IEEE Transactions on Information Theory, Vol. 56, pp. 4014-4024, 2010, IEEE Press, 
  8. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, New Constructions of High-Performance Low-Complexity Convolutional Codes, IEEE Transactions on Communications, Vol. 58, No. 7, pp. 1950 – 1961, 2010, IEEE Press, 
  9. Rizomiliotis, A. Bogris, D. Syvridis, Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication, IEEE Journal of Quantum Electronics, Vol. 46, No. 3, pp. 377-383, 2010, IEEE Press, 
  10. Rizomiliotis, Improving the high order nonlinearity lower bound for Boolean functions with given Algebraic Immunity, Discrete Applied Mathematics, Vol. 158, No. 18, pp. 2049-2055, 2010, Elsevier, 
  11. Rizomiliotis, E. Rekleitis, S. Gritzalis, Security Analysis of the Song-Mitchell Authentication Protocol for Low-Cost RFID tags, IEEE Communications Letters, Vol. 13, No. 4, pp. 274-276, 2009, IEEE Press
  12. Rizomiliotis, A. Tsohou, C. Lambrinoudakis, S. Gritzalis, Security and Privacy Issues in Bipolar Disorder Research, The Journal on Information Technology in Healthcare, Vol. 7, No. 4, pp. 244-250, 2009, HL7 Ramius Corp
  13. Bogris, P. Rizomiliotis, K. Chlouverakis, A. Argyris, D. Syvridis, Feedback phase in optically generated chaos: A secret key for cryptography applications, IEEE Journal of Quantum Electronics, Vol. 44, pp. 119-124, 2008, IEEE Press , 
  14. Rizomiliotis, Constructing Periodic Binary Sequences of Maximum Nonlinear Span, IEEE Transactions on Information Theory, Vol. 52, No. 9, pp. 4257-4261, 2006, IEEE Press , 
  15. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 5, pp. 1840-1848, 2005, IEEE Press, 
  16. Rizomiliotis, N. Kalouptsidis, Results on the nonlinear span of binary sequences, IEEE Transactions on Information Theory, Vol. 51, No. 4, pp. 1555-1563, 2005, IEEE Press , 
  17. Kolokotronis, P. Rizomiliotis, N. Kalouptsidis, Minimum linear span approximation of binary sequences, IEEE Transactions on Information Theory, Vol. 48, No. 10, pp. 2758-2764, 2002, IEEE Press ,
  1. Rizomiliotis, E. Molla, S. Gritzalis, REX: a Searchable Symmetric Encryption Scheme Supporting Range Queries, ACM CCSW 2017 9th ACM Cloud Computing Security Workshop, A. Stavrou, G. Karame, (eds), pp. 29-37, November 2017, Dallas, Texas, USA, ACM Press,
  2. Rizomiliotis, S. Gritzalis, ORAM based forward privacy preserving Dynamic Searchable Symmetric Encryption Schemes, ACM CCSW 2015 7th ACM Cloud Computing Security Workshop, C. Nita-Rotaru, F. Kerschbaum, (eds), pp. 65-76, October 2015, Denver, USA, ACM Press, 
  3. Latsiou, P. Rizomiliotis, The Rainy Season of Cryptography, Proceedings of the 18th Panhellenic Conference on Informatics, pp. 1-6, October 2014, ACM, 
  4. Rizomiliotis, Oblivious RAM: State of the Art and New Constructions, BalkanCrypt 2013, T. Baicheva, S. Nikova, T. Yalcin, (eds), (to appear), November 2013, Sofia, Bulgaria
  5. Rizomiliotis, S. Gritzalis, Revisiting Lightweight Authentication Protocols based on Hard Learning Problems, ACM WiSec 2013 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, A.-R. Sadeghi, M. Gruteser, (eds), pp. 125-130, April 2013, Budapest, Hungary, ACM Press, 
  6. Ntalianis, E. Sardis, N. Tsapatsoulis, A. Doulamis, P. Rizomiliotis, Multiocular Surveillance of Wide Dynamic Environments Based on Optical Vision, Event Modeling and End-to-End Data Encryption – A Cloud-based Monitoring approach of Maritime Activities, IEEE GlobeCom 2012, Man-Sec Workshop, H. Eslambolchi, (ed), December 2012, Anaheim, California, USA, IEEE Press
  7. Marangos, P. Rizomiliotis, L. Mitrou, Digital Forensics in the Cloud Computing Era, IEEE GlobeCom 2012, Man-Sec Workshop, H. Eslambolchi, (ed), December 2012, Anaheim, California, USA, IEEE Press
  8. Rizomiliotis, C. Skianis, PASSIVE: Policy-Assessed system-level Security, 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012 ), S. Fischer-Hübner, S. Katsikas , (eds), September 2012, Vienna, Austria, Springer
  9. Katsiotis, N. Kalouptsidis, P. Rizomiliotis, Recursive Flexible Convolutional Encoders for Parallel Concatenation, International Symposium on Turbo Codes & Iterative Information Processing (ISTC), E. Agrell, J. B. Anderson, E. G. Larsson, (eds), August 2012, Gothenburg, Sweden, IEEE Press
  10. Rizomiliotis, S. Gritzalis, GHB#: a provably secure HB-like lightweight authentication protocol, ACNS 2012 10th International Conference on Applied Cryptography and Network Security, F.Bao, P. Samarati, (eds), pp. 489-506, June 2012, Singapore, Springer Lecture Notes in Computer Science LNCS, 
  11. Makris, D. N. Skoutas, P. Rizomiliotis, C. Skianis, A User-Oriented, Customizable Infrastructure Sharing Approach for Hybrid Cloud Computing Environments, IEEE International Conference on Cloud Computing Technology and Science 2011 (IEEE CloudCom), (to appear), November 2011, Athens, Greece, IEEE Press
  12. Rizomiliotis, E. Rekleitis, S. Gritzalis, Designing secure RFID authentication protocols is (still) a non-trivial task, NSS 2011 5th International Conference on Network and Systems Security, P. Samarati, S. Foresti, J. Hu, (eds), pp. 73-80, September 2011, Milan, Italy, IEEE CPS Conference Publishing Services, 
  13. Agudo, D. Nunez , G. Giammatteo, P. Rizomiliotis, C. Lambrinoudakis, Cryptography goes to the Cloud, Secure and Trust Computing, data management, and Applications (STA) 2011, STAVE workshop, J. Lopez, (ed), (to appear), June 2011, Loutraki, Greece, Springer CCIS
  14. Rekleitis, P. Rizomiliotis, S. Gritzalis, A holistic approach to RFID security and privacy, SecIoT 2010 1st International Workshop on the Security of the Internet of Things, J. Zhou. et al., (eds), December 2010, Tokyo, Japan, 
  15. Rekleitis, P. Rizomiliotis, S. Gritzalis, An Agent Based Back-end RFID Tag Management System, TrustBus’10 7th International Conference on Trust, Privacy and Security in Digital Business, S.Katsikas, J.Lopez, M. Soriano , (eds), pp. 165-176, August 2010, Bilbao, Spain, Springer Berlin Heidelberg, 
  16. Rizomiliotis, Misusing universal hash functions: security analysis of a hardware efficient stream cipher using LFSR based hash function, IEEE Information Theory Workshop, January 2010, Cairo, Egypt, IEEE Press
  17. Rizomiliotis, HB −MAC: Improving the Random− HB# authentication protocol, Trustbus 2009, Fischer-Huebner S., Lambrinoudakis C., (eds), pp. 159-168, September 2009, Linz, Austria, Springer
  18. Tsohou, P. Rizomiliotis, C. Lambrinoudakis, S. Gritzalis, Security and Privacy Issues in Bipolar Disorder Research, ICICTH 7th International Conference on Information and Communication Technologies in Health, A. Hasman et al., (eds), July 2009, Samos, Greece, INEAG
  19. Katsiotis, P. Rizomiliotis, N. Kalouptsidis, New Constructions of Low-Complexity Convolutional Codes, IEEE International Conference on Communications 2009 , 2009, Dresden, Germany, IEEE Press
  20. Rizomiliotis, A. Bogris, D. Syvridis, Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication, IEEE International Conference on Communications 2009 , 2009, Dresden, Germany, IEEE Press
  21. Rizomiliotis, Vectorial Boolean Functions: algebraic immunity and annihilators, Enhancing Crypto-Primitives with Techniques from Coding Theory, NATO Advanced Research Workshop, 2009, Veliko Turnovo, Bulgaria, IOS Press
  22. Rizomiliotis, Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity, 11th IMA International Conference on Cryptography and Coding, pp. 204-219, December 2007, Cirencester, UK, Springer
  23. Rizomiliotis, Periodic Binary Sequences of Maximum Nonlinear Span, 2005 IEEE International Symposium on Information Theory, pp. 469-473, September 2005, Adelaide, Australia, IEEE Press
  24. Rizomiliotis, Family of p-ary sequences with oprimal correlation property and large linear span from Helleseth-Gong sequences, International Symposium on Information Theory and its Applications, October 2004, Parma
  25. Rizomiliotis, N. Kalouptsidis, Result on the nonlinear span of binary sequences, 2004 IEEE International Symposium on Information Theory, pp. 124, June 2004, Chicago, IL USA, IEEE Press
  26. P. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, 2003 IEEE International Symposium on Information Theory, pp. 377, July 2003, Yokohama, Japan, IEEE Press
  27. Rizomiliotis, N. Kolokotronis, N. Kalouptsidis, On the quadratic span of binary sequences, 2003 IEEE International Symposium on Information Theory, pp. 377, July 2003, Yokohama, Japan, IEEE Press
  28. Kolokotronis, P. Rizomiliotis, N. Kalouptsidis, First-order optimal approximation of binary sequences, 2001 Conference on Sequences and Their Applications, T. Helleseth, P. V. Kumar, and K. Yang , (eds), pp. 242-256, May 2001, Bergen, Norway, Series in Discrete Mathematics and Theoretical Computer Science, Springer

Book Chapters

  1. Bertsima, I. Varlamis, P. Rizomiliotis, “Strengthening Privacy in Healthcare Social Networks”, chapter in Medical Data Privacy Handbook, Aris Gkoulalas‐Divanis and Grigorios Loukides , (eds), 2015, Springer,
  2. Rizomiliotis, “Practical cryptography”, chapter in Modern Cryptography: Theory and Applications, M. Burmester, S. Gritzalis, S. K. Katsikas, V. Chryssikopoulos, (eds), 2011, Papasotiriou Pubs. (in Greek)
  3. Rekleitis, P. Rizomiliotis, S. Gritzalis, “Privacy Threats and countermeasures in RFID environments”, chapter in Privacy and Information and Communication Technologies: Technical and Legal Issues, C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. K. Katsikas, (eds), pp. 193-220, 2010, Athens, Greece, Papasotiriou Pubs. (in Greek)
  4. Kokolakis, P. Rizomiliotis, A. Benameur, S.-K. Sinha, “Security and Dependability Solutions for Web Services and Workflows”, chapter in Security and Dependability for Ambient Intelligence, G. Spanoudakis, A. Mana, S. Kokolakis, (eds), pp. 97-106, 2009, Springer

 

© 2019 University of Piraeus, Department of Digital Systems, Systems Security Laboratory. All Rights Reserved.
Facebook
Twitter
YouTube
LinkedIn