Name
Papers
Collaborators
GEORGE STEPHANIDES
38
32
Citations 
PageRank 
Referers 
311
23.44
680
Referees 
References 
646
340
Search Limit
100680
Title
Citations
PageRank
Year
Rating Systems Vs Machine Learning on the context of sports00.342014
The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.00.342012
A novel technique for image steganography based on a high payload method and edge detection280.922012
A Compatible Implementation between Identity-based and Certificateless Encryption Schemes.00.342012
Practical Implementation of Identity Based Encryption for Secure E-mail Communication.00.342010
A Queuing Theory and Systems Modeling Course Based on Unified Modeling Language (UML).00.342010
Parallel Collection of Live Data Using Hadoop.10.372010
Attacks on the AKACP Protocol.10.382010
Moving from Requirements to Design Confronting Security Issues: A Case Study00.342009
Surveying Wi-Fi Security - Presentation Of Wi-Fi Security Measures, Varius Wi-Fi Attacks And A Classification Survey Of Wi-Fi Networks In Thessaloniki00.342008
Facilitating software extension with design patterns and Aspect-Oriented Programming140.582008
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography00.342008
Architectural Risk Analysis of Software Systems Based on Security Patterns230.782008
Improved anonymous timed-release encryption220.812007
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols20.392007
Analysis of Object-Oriented Numerical Libraries00.342006
Quantitative evaluation of systems with security patterns using a fuzzy approach40.512006
Timed release cryptography from bilinear pairings using hash chains120.582006
AHPA-Calculating Hub and Authority for Information Retrieval00.342006
A qualitative analysis of software security patterns170.962006
Evaluation of a Queuing Theory and Systems Modeling Course Based on UML10.372006
Application of graph theory to OO software engineering160.822006
A Distributed Algorithm for Mining Fuzzy Association Rules20.392005
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm00.342005
Aspect-oriented programming301.722005
The economic approach of information security261.212005
Trust And Security In Electronic Payments: What We Have And Need To Know?00.342005
The GN-authenticated key agreement00.342005
Predicting the probability of change in object-oriented systems431.242005
The Collatz Problem in a New Perspective: Energy Consumption Analysis00.342005
Probabilistic Evaluation of Object-Oriented Systems60.582004
Teaching Queuing Systems Modeling Using UML10.442004
Evaluating object-oriented designs with link analysis141.602004
An efficient simplex type algorithm for sparse and dense linear programs120.952003
A new efficient primal dual simplex algorithm130.872003
Simulation software for a network modelling lab20.592003
Energy Metric for Software Systems60.742002
Evaluating Performance and Power of Object-Oriented Vs. Procedural Programming in Embedded Processors150.912002