1. A. N. Bikos, N. Sklavos, "Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE", IEEE Transactions on Dependable and Secure Computing, Vol. ##, Issue ##, pp. ###-###, 2017.
  2. A.P. Fournaris, N. Sklavos, "Secure Embedded System Hardware Design – A Flexible Security and Trust Enhanced Approach", Computer & Electrical Engineering, Elsevier Science Press, Vol. 40, Issue 1, pp. 121-133, 2014.
  3. A. Bikos, N. Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks", IEEE Security and Privacy, Issue March/April, Vol. 11, No. 2, pp. 55-62, 2013.
  4. P. Kitsos, N. Sklavos, G. Provelengios, A. N. Skodras, “FPGA-based Performance Analysis of Stream Ciphers ZUC, Snow3g, Grain v1, Mickey v2, Trivium and E0”, Embedded Hardware Design: Microprocessors and Microsystems, Elsevier, Vol. 37, Issue 2, pp. 235-245, 2013.
  5. P. Kitsos, N. Sklavos, M. Parousi, A. N. Skodras, "On the Hardware Implementation of Lightweight Block Ciphers for RFID", Computer & Electrical Engineering, Elsevier Science Press, Vol. 38, Number 1, pp. 148-160, 2012.
  6. A. Bechtsoudis, N. Sklavos, "Aiming at Higher Network Security Through Extensive Penetration Trees", IEEE Latin America Transactions, Volume 10, Issue 3, 2012.
  7. Rodrigo Roman, Cristina Alcaraz Tello, Javier Lopez, Nicolas Sklavos "Key Management Systems for Sensor Networks in the Context of the Internet of Things", Computers & Electrical Engineering, Elsevier Science Press, Vol. 37, Number 2, pp. 147-159, 2011.
  8. Anil Kumar, Rhouma Rhouma, Yong Wang, Nicolas Sklavos, M.K. Ghose, "A blind source separation-based method for multiple images encryption", Comments on, Communications in Nonlinear Science and Numerical Simulation, Elsevier Science, Volume 16, Issue 3, pp. 1675-1686, March 2011.
  9. N. Sklavos, "On the Hardware Implementation Cost of Crypto-Processors Architectures", Information Systems Security, The official journal of (ISC)2, A Taylor & Francis Group Publication, Vol. 19, Issue: 2, pp. 53-60, 2010.
  10. P. Kitsos, N. Sklavos, O. Koufopavlou, "UMTS Security: System Architecture and Hardware Implementation", Wireless Communications and Mobile Computing Journal, John Wiley Editions, Vol. 7, Issue: 4, pp. 483-494, 2007.
  11. S. Zeadally, N. Sklavos, M. Rathakrishnan, S. Fowler, "End-to-End Security Across Wired-Wireless Networks for Mobile Users", Information Systems Security, The official journal of (ISC)2, A Taylor & Francis Group Publication, Vol. 16, Issue: 5, pp. 264-277, 2007.
  12. N. Sklavos, P. Kitsos, K. Papadopoulos, O. Koufopavlou,"Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security", Journal of Supercomputing, Springer-Verlag, Vol. 36, No 4, pp. 33-50, 2006.
  13. N. Sklavos, P. Souras, "Economic Models and Approaches in Information Security for Computer Networks", International Journal of Network Security (IJNS), Science Publications, Vol. 2, No 1, Issue: January 2006, pp. 14-20, 2006.
  14. A.A. Moldovyan, N.A. Moldovyan, N. Sklavos, "Controlled Elements for Designing Ciphers Suitable to Efficient VLSI Implementation", Telecommunications Systems Journal, Springer-Verlag, Selected Paper from IEEE Mediterranean Electrotechnical Conference 2004, Vol. 32, No 2-3, pp. 149-163, Issue: July 2006.
  15. N. Sklavos, O. Koufopavlou, "On the Hardware Implementation of RIPEMD Family Processor: Networking High Speed Hashing, up to 2 Gbps", Computers and Electrical Engineering, Elsevier Science, Vol. 31, Issue: 6, pp. 361-379, 2005.
  16. N. Sklavos, P. Kitsos, E. Alexopoulos, O. Koufopavlou, "Open Mobile Alliance (OMA) Security Layer: Architecture Implementation and Performance Evaluation of the Integrity Unit", New Generation Computing: Computing Paradigms and Computational Intelligence, Springer-Verlag, Vol. 23, No 1, pp. 77-100, 2005.
  17. N. Sklavos, N.A. Moldovyan, O. Koufopavlou, "High Speed Networking: Design and Implementation of Two New DDP-Based Ciphers", Mobile Networks and Applications-MONET, Springer-Verlag , Vol. 25, Issue 1-2, pp. 219-231, 2005.
  18. N. Sklavos, O. Koufopavlou, "Implementation of the SHA-2 Hash Family Standard Using FPGAs", J ournal of Supercomputing, Springer-Verlag , Vol. 31, No 3, pp. 227-248, 2005.
  19. P. Kitsos, N. Sklavos, M.D. Galanis, O. Koufopavlou, "64-bit Block Ciphers: Hardware Implementations and Comparison Analysis", Computers and Electrical Engineering, Elsevier Science, Vol. 30, Issue: 8, pp. 593-604, 2004.
  20. N. Sklavos, O. Koufopavlou,"Data Dependent Rotations, a Trustworthy Approach for Future Encryption Systems/Ciphers: Low Cost and High Performance", Computers and Security, Elsevier Science Journal, Vol. 22, Number 7, pp. 585-588, 2003.
  21. P. Kitsos, N. Sklavos, K. Papadomanolakis, O. Koufopavlou, "Hardware Implementation of the Bluetooth Security", IEEE Pervasive Computing, Mobile and Ubiquitous Systems, Volume 2, Number 1, pp. 21-29, 2003.
  22. N. Sklavos, A. Papakonstantinou, Sp. Theoharis, O. Koufopavlou,"Low Power Implementation of an Encryption/Decryption System with Asynchronous Techniques", VLSI Design, An International Journal of Custom-Chip Design, Simulation, and Testing, Taylor and Francis Journal, Vol. 15, Issue 1, pp. 455-468, 2002.
  23. N. Sklavos, O. Koufopavlou, "Architectures and VLSI Implementations of the AES-Proposal Rijndael", IEEE Transactions on Computers, Vol. 51, Issue 12, pp. 1454-1459, 2002.

Who's online

We have 26 guests and no members online