Nicolas Sklavos
Nicolas Sklavos
Computer Engineering and Informatics Department (CEID), University of Patras, Greece
Verified email at - Homepage
Cited by
Cited by
Key management systems for sensor networks in the context of the Internet of Things
R Roman, C Alcaraz, J Lopez, N Sklavos
Computers & Electrical Engineering 37 (2), 147-159, 2011
Architectures and VLSI implementations of the AES-proposal Rijndael
N Sklavos, O Koufopavlou
IEEE Transactions on computers 51 (12), 1454-1459, 2002
Wireless security and cryptography: specifications and implementations
N Sklavos, X Zhang
CRC Press, 2007
LTE/SAE security issues on 4G wireless networks
A N. Bikos, N Sklavos
IEEE Security & Privacy 11 (2), 55-62, 2013
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
N Sklavos, O Koufopavlou
Proceedings of the 2003 International Symposium on Circuits and Systems …, 2003
Cryptographic technologies and protocol standards for Internet of Things
S Zeadally, AK Das, N Sklavos
Internet of Things 14, 2021
Implementation of the SHA-2 hash family standard using FPGAs
N Sklavos, O Koufopavlou
The journal of Supercomputing 31, 227-248, 2005
Hardware implementation of the RC4 stream cipher
P Kitsos, G Kostopoulos, N Sklavos, O Koufopavlou
2003 46th Midwest symposium on circuits and systems 3, 1363-1366, 2003
Hardware Implementation of Bluetooth Security
P Kitsos, N Sklavos, K Papadomanolakis, O Koufopavlou
IEEE Pervasive Computing, Mobile and Ubiquitous Systems 2 (1), 21-29, 2003
Cryptography and Security in Internet of Things (IoT): Models, Schemes, and Implementations
N Sklavos, ID Zaharakis
8th IFIP International Conference on New Technologies, Mobility and Security …, 2016
Mobile Communications World: Security Implementations Aspects - A State of the Art
N Sklavos, O Koufopavlou
CSJM 11 (2), 168-187, 2003
High speed networking security: design and implementation of two new DDP-based ciphers
N Sklavos, NA Moldovyan, O Koufopavlou
Mobile Networks and Applications 10, 219-231, 2005
Hardware Security and Trust
N Sklavos, R Chaves, G Di Natale, F Regazzoni
Springer, 2017
Smart Home Automation: GSM Security System Design & Implementation
E Isa, N Sklavos
3rd Pan-Hellinic Conference on Electronics and Telecommunications (PACET'15 …, 2017
Aiming at higher network security through extensive penetration tests
A Bechtsoudis, N Sklavos
IEEE Latin America Transactions 10 (3), 1752-1756, 2012
A comparative study of hardware architectures for lightweight block ciphers
P Kitsos, N Sklavos, M Parousi, AN Skodras
Computers & Electrical Engineering 38 (1), 148-160, 2012
FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0
P Kitsos, N Sklavos, G Provelengios, AN Skodras
Microprocessors and Microsystems 37 (2), 235-245, 2013
Comparison of the hardware architectures and FPGA implementations of stream ciphers
MD Galanis, P Kitsos, G Kostopoulos, N Sklavos, O Koufopavlou, ...
Proceedings of the 2004 11th IEEE International Conference on Electronics …, 2004
On the hardware implementation cost of crypto-processors architectures
N Sklavos
Information Security Journal: A Global Perspective 19 (2), 53-60, 2010
Approaches for Preventing Honeypot Detection and Compromise
M Tsikerdekis, S Zeadally, A Schlesener, N Sklavos
Global Information Infrastructure and Networking Symposium (GIIS’18), 2018
The system can't perform the operation now. Try again later.
Articles 1–20