Περισσότερα - Τμήμα Διοίκησης Επιχειρήσεων

Âéïãñáöéêü Óçìåßùìá
1 Äåêåìâñßïõ 2013
ÐñïóùðéêÜ Óôïé÷åßá
¼íïìá:
Åðþíõìï:
¼íïìá ãïíÝùí:
ÔñÝ÷ïõóá èÝóç:
Çìåñïìçíßá ãÝííçóçò:
ÏéêïãåíåéáêÞ êáôÜóôáóç:
Äéåýèõíóç:
ÇëåêôñïíéêÞ äéåýèõíóç:
ÃéÜííçò
Óôáìáôßïõ
Êùíóôáíôßíïò êáé Ìáñßá
ÁíáðëçñùôÞò ÊáèçãçôÞò, ÔìÞìá Äéïßêçóçò Åðé÷åéñÞóåùí,
ÐáíåðéóôÞìéï ÐÜôñáò êáé
Óýìâïõëïò ôïõ ÔïìÝá ÁóöÜëåéáò Ðëçñïöïñéáêþí ÓõóôçìÜôùí óôï
Éíóôéôïýôï Ôå÷íïëïãßáò Õðïëïãéóôþí êáé Åêäüóåùí - <<ÄÉÏÖÁÍÔÏÓ>>
17 Éáíïõáñßïõ 1968 óôï Âüëï
ÓõæåõãìÝíïò ìå ôçí Åõãåíßá Ãåùñãßïõ-ÖùôåéíÞò Èåïäïóïðïýëïõ,
ìå Ýíá ðáéäß
ÐáíåðéóôÞìéï ÐÜôñáò,
ÔìÞìá Äéïßêçóçò Åðé÷åéñÞóåùí,
Ñßï, ÐÜôñá, 26504
[email protected]
ÓðïõäÝò
Áðïöïßôçóå áðü ôï ôìÞìá Ìç÷áíéêþí Çëåêôñïíéêþí Õðïëïãéóôþí êáé ÐëçñïöïñéêÞò ôïõ
Ðáíåðéóôçìßïõ ÐÜôñáò ìå âáèìü <<Üñéóôá>> 8.86/10, ôïí Éïýíéï ôïõ 1990. Ôïí Éïýíéï
ôïõ 1991 îåêßíçóå óôï ßäéï ôìÞìá ìåôáðôõ÷éáêÝò óðïõäÝò õðü ôçí åðßâëåøç ôïõ ÊáèçãçôÞ
ê. ÅëåõèÝñéïõ Êõñïýóç óôçí ðåñéï÷Þ ôùí Èåìåëéþóåùí ôçò ÅðéóôÞìçò ôùí Õðïëïãéóôþí
êáé ôï ÄåêÝìâñéï ôïõ 1997 õðåñáóðßóôçêå ìå åðéôõ÷ßá ôç äéäáêôïñéêÞ ôïõ äéáôñéâÞ. Êáè'
üëç ôç äéÜñêåéá ôùí ìåôáðôõ÷éáêþí óðïõäþí ôïõ õðÞñîå õðüôñïöïò (EMY) ôïõ Éäñýìáôïò
Êñáôéêþí Õðïôñïöéþí. Ôï 1999 ðåñÜôùóå óðïõäÝò óôï Åëëçíéêü Áíïéêôü ÐáíåðéóôÞìéï óôç
ÈåìáôéêÞ Åíüôçôá <<ÁíïéêôÞ êáé åî ÁðïóôÜóåùò Åêðáßäåõóç>> êáé Ýëáâå Ðéóôïðïéçôéêü
Ìåôáðôõ÷éáêÞò Åðéìüñöùóçò ìå âáèìü <<Üñéóôá>> 9.1/10.
ÄéðëùìáôéêÞ Åñãáóßá
Ç äéðëùìáôéêÞ ôïõ åñãáóßá åêðïíÞèçêå õðü ôçí åðïðôåßá ôïõ ÊáèçãçôÞ ê. ÁèáíÜóéïõ Ôóáêáëßäç
êáé åß÷å ôßôëï Åðáíáæýãéóç áðü ôç Ñßæá ðñïò ôá Öýëëá ôùí Red-Black ÄÝíôñùí êáé ç ÓõìðåñéöïñÜ
ôïõò óå ÐåñéâÜëëïíôá ÐáñÜëëçëçò Åðåîåñãáóßáò.
ÄéäáêôïñéêÞ ÄéáôñéâÞ
Ôï ÄåêÝìâñéï ôïõ 1997 õðåñáóðßóôçêå ìå åðéôõ÷ßá ôç äéäáêôïñéêÞ ôïõ äéáôñéâÞ ðïõ ðñáãìáôïðïéÞèçêå
õðü ôçí åðßâëåøç ôïõ ÊáèçãçôÞ ê. ÅëåõèÝñéïõ Êõñïýóç êáé åß÷å ôßôëï Èåùñßá êáé ÅöáñìïãÝò
ÐñïâëçìÜôùí Éêáíïðïßçóçò Ðåñéïñéóìþí, ÊáôáíåìçìÝíï ðåñéâÜëëïí-ÐáñÜëëçëïé êáé ôõ÷áéïðïéçìÝíïé
áëãüñéèìïé-Ìç ìïíüôïíïé óõëëïãéóìïß êáé ôï ÖåâñïõÜñéï ôïõ 1998 ïñêßóôçêå äéäÜêôïñáò.
ÌåôáäéäáêôïñéêÝò óðïõäÝò
1
Áðü ôï ÓåðôÝìâñéï ôïõ 1998 ìÝ÷ñé ôï ÓåðôÝìâñéï ôïõ 1999 Þôáí ìåôáäéäáêôïñéêüò õðüôñïöïò
óôï ÐáíåðéóôÞìéï ôïõ Carleton óôçí Ottawa ôïõ ÊáíáäÜ. Åß÷å ëÜâåé ìßá õðïôñïößá NATO ìÝóù
ôïõ Åëëçíéêïý Õðïõñãåßïõ ÅèíéêÞò Ïéêïíïìßáò (áñéèìüò õðïôñïößáò 106384/∆OO 1222/2-798) êáé ìßá õðïôñïößá áðü ôï Êáíáäéêü Ýñãï MITACS ìå ôïí ôßôëï CANCCOM (Complex
Adaptive Networks for Computing and Communication). ÊáôÜ ôç äéÜñêåéá ôùí ìåôáäéäáêôïñéêþí
ôïõ óðïõäþí, åêôüò áðü ôçí åñåõíçôéêÞ ôïõ äñáóôçñéüôçôá, äßäáîå êáé ìáèÞìáôá ãéá Ðñïãñáììáôéóìü
ÓõóôçìÜôùí ìå ÷ñÞóç áíôéêåéìåíïóôñáöïýò ðñïãñáììáôéóìïý, óôç ãëþóóá C++.
ÐñïóêëÞóåéò ãéá ïìéëßá Þ åñåõíçôéêÞ óõíåñãáóßá ìÝóá áðü áíôáãùíéóôéêÜ ðñïãñÜììáôá
•
•
•
•
•
ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï PI4EST, the 8th International Summer School on Privacy
and Identity Management for Emerging Services and Technologies. This Summer School
is hosted by PI.lab in Nijmegen, the Netherlands on 17-21 June 2013.
Ðñüóêëçóç ãéá ðáñïõóßáóç ôçò ðéëïôéêÞò åöáñìïãÞò ôïõ åñåõíçôéêïý Ýñãïõ ABC4Trust
ùò åöáñìïãÞ áñéóôåßáò óôï CYBER SECURITY & PRIVACY EU FORUM 2013 (CSP
EU FORUM), Brussels: 18-19 April, 2013.
ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï 6th Panhellenic Conference on Informatics with international participation (PCI 2012) ìå èÝìá ôéò ôå÷íïëïãßåò Privacy by Design ìå Ýìöáóç óôá
Attribute Based Credentials êáé ôéò åöáñìïãÝò ôïõò.
Ìüíïò åñåõíçôÞò ôïõ Ýñãïõ Dynamically Reconfigurable block ciphers through parallel substitution box construction, contract no. HPRI-1999-CT-00071. Ôï Ýñãï õëïðïéÞèçêå áðü 8
Óåðôåìâñßïõ Ýùò 20 Óåðôåìâñßïõ 2008 óôéò åãêáôáóôÜóåéò ôïõ Barcelona Supercomputing
Center (BSC), ðïõ åßíáé ìÝëïò ôïõ Åõñùðáúêïý ïñãáíéóìïý HPC-Europa ãéá High Performance Computing. Óôá ðëáßóéá ôïõ Ýñãïõ áíáðôý÷èçêå ðáñÜëëçëï ëïãéóìéêü êáôáóêåõÞò
s-boxes ìå õøçëÞ ìç ãñáììéêüôçôá, ìå ÷ñÞóç ôçò âéâëéïèÞêçò MPICH óôïí ðáñÜëëçëï
õðïëïãéóôÞ ôïõ BSC MareNostrum (10240 processing cores, BladeCenter JS21 Cluster,
PPC 970, 2.3 GHz, Myrinet).
¸íáò åê ôùí êýñéùí ïìéëçôþí óôéò çìåñßäåò Ôå÷íïëïãéêÞò Êáéíïôïìßáò êáé Áñéóôåßáò ôïõ
Ðåñéöåñåéáêïý Ðüëïõ Êáéíïôïìßáò ÄõôéêÞò ÅëëÜäïò, 22−25 Óåðôåìâñßïõ 2008, ÐÜôñá.
Ôßôëïé ïìéëéþí:
{
{
•
ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï 2ï Åðéóôçìïíéêü Óõìðüóéï Öïéôçôþí ôïõ ôìÞìáôïò Ìç÷áíéêþí
Ðëçñïöïñéáêþí êáé Åðéêïéíùíéáêþí ÓõóôçìÜôùí ôïõ Ðáíåðéóôçìßïõ Áéãáßïõ, ìå èÝìá
ÁóöÜëåéá êáé Ðñïóôáóßá ôçò Éäéùôéêüôçôáò óôçí Êïéíùíßá ôçò Ðëçñïöïñßáò, 23−24 Íïåìâñßïõ
2007. Ôßôëïò ïìéëßáò:
{
•
Ï ¢îïíáò ÁóöÜëåéáò Ðëçñïöïñéáêþí ÓõóôçìÜôùí êáé Äéêôýùí.
ÓõóôÞìáôá õðïóôÞñéîçò çëåêôñïíéêÞò øçöïöïñßáò: áðáéôÞóåéò êáé ôå÷íéêÝò áíôéìåôþðéóÞò
ôïõò - ç ðëáôöüñìá ÐÍÕÊÁ.
A Trust-centered Approach for Building E-voting Systems.
ÓåðôÝìâñéïò 2002: ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï ÐáíåðéóôÞìéï ôïõ Liverpool, ÔìÞìá
ÅðéóôÞìçò ôùí Õðïëïãéóôþí, ãéá íá äþóåé ïìéëßåò óôá ðëáßóéá åñåõíçôéêïý óåìéíáñßïõ
ôïõ ôìÞìáôïò. Ôï èÝìá ôùí ïìéëéþí Þôáí ôá êáôùöëéêÜ öáéíüìåíá óôçí ÅðéóôÞìç ôùí
Õðïëïãéóôþí êáé ôçò ÖõóéêÞò.
2
•
•
•
•
Áýãïõóôïò 2002: ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï workshop Random Structures óôï Isaac
Newton Institute for Mathematical Sciences, Cambridge, ìå èÝìá ôçí äéáôÞñçóç ôõ÷áéüôçôáò
óå áëãüñéèìïõò äéá÷åßñéóçò ôõ÷áßùí óõíäõáóôéêþí äïìþí.
Éïýëéïò 2001: ÐñïóêëåêëçìÝíïò ïìéëçôÞò óôï Ôñßôï ÐáíåëëÞíéï Óõìðüóéï ËïãéêÞò (ìå
äéåèíåßò óõììåôï÷Ýò) ðïõ ðñáãìáôïðïéÞèçêå óôá Áíþãåéá, óôï ÇñÜêëåéï ôçò Êñçôçò.
Ç ïìéëßá ôïõ Þôáí ãýñù áðü èåùñçôéêÜ æçôÞìáôá êáé åöáñìïãÝò ôïõ ÐñïâëÞìáôïò
Éêáíïðïßçóçò Ðåñéïñéóìþí.
ÄåêÝìâñéïò 1996: ÅðéóêÝðôçò óôï Éíóôéôïýôï ÐëçñïöïñéêÞò Max-Planck óôï Æááñìðñïýêåí
ôçò Ãåñìáíßáò ãéá äÝêá çìÝñåò. Ðáñïõóßáóå ôçí åñåõíçôéêÞ ôïõ äñáóôçñéüôçôá åðÜíù
óôçí õðïëïãéóôéêÞ ðïëõðëïêüôçôá ðáñÜëëçëçò åðßëõóçò óôï Ðñüâëçìá Éêáíïðïßçóçò
Ðåñéïñéóìþí êáèþò åðßóçò êáé ôçò åðéâïëÞò ÌåñéêÞò ÔïðéêÞò ÓõíÝðåéáò óå Äßêôõá
Ðåñéïñéóìþí.
ÄåêÝìâñéïò 1993: ÅðéóêÝðôçò óôï ÐáíåðéóôÞìéï ôçò Êáñëóñïýçò óôç Ãåñìáíßá, ãéá ìßá
åâäïìÜäá. Ðáñïõóßáóå ôçí åñåõíçôéêÞ ôïõ äñáóôçñéüôçôá óôï Ðñüâëçìá Éêáíïðïßçóçò
Ðåñéïñéóìþí.
ÐñïóêëÞóåéò ãéá äéäáóêáëßá óå äéåèíÞ ó÷ïëåßá
•
•
•
•
ÐñïóêåêëçìÝíïò óôï 4th AIT Annual Workshop on PRactical AspeCts of SEcurity - PRACSE
2009 ðïõ äéïñãÜíùóå ôï Athens Information Technology (AIT) center óôçí ÁèÞíá áðü
11/6/2009 Ýùò 12/6/2009. Ôï èÝìá ôçò ïìéëßáò Þôáí ôï åîÞò:
- Principles of good block-cipher design: the S-box parameter.
ÐñïóêåêëçìÝíïò óôï 2nd AIT Annual Workshop on PRactical AspeCts of SEcurity - PRACSE
2007 ðïõ äéïñãÜíùóå ôï Athens Information Technology (AIT) center óôçí ÁèÞíá áðü
2/11/2007 Ýùò êáé 3/11/2007. Ôï èÝìá ôçò ïìéëßáò Þôáí ôï åîÞò:
- A trust-centered approach for building e-voting systems.
ÐñïóêåêëçìÝíïò óôï 1st AIT Annual Workshop on PRactical AspeCts of SEcurity - PRACSE
2006 ðïõ äéïñãÜíùóå ôï Athens Information Technology (AIT) center óôçí ÁèÞíá áðü
16/6/2006 Ýùò êáé 17/6/2006. Ôá èÝìáôá ôùí äýï ïìéëéþí ðïõ äüèçêáí Þôáí ôá åîÞò:
- AUTHENTICATION PROTOCOLS: Notions of Authentication, Basic techniques and
Typical Attacks.
- EVALUATION OF REAL WORLD PROTOCOL STANDARDS: IPSec, SSH, SSL,
Kerberos.
ÐñïóêåêëçìÝíïò íá äéäÜîåé ìßá åíüôçôá ó÷åôéêÜ ìå ÊáôùöëéêÜ Öáéíüìåíá óôçí ÅðéóôÞìç
ôùí Õðïëïãéóôþí óôï The Logic and Interaction Programme, 28 Éáíïõáñßïõ−1 Ìáñôßïõ
2002, ðïõ Ýëáâå ÷þñá óôç Ìáóóáëßá, Ãáëëßá, êáé óõíäéïñãáíþèçêå áðü ôï Institut de
Mathematiques de Luminy (IML) êáé ôï Laboratoire d' Informatique Fondamentale de Marseille (LIF).
ÐñïóêëÞóåéò ãéá êñßóç åñåõíçôéêþí åñãáóéþí óå äéåèíÞ ðåñéïäéêÜ
•
Ðñüóêëçóç ãéá êñßóç Üñèñùí óôï Mathematical Reviews ôçò American Mathematical
Society (AMS).
3
•
Ôáêôéêüò êñéôÞò óôá ðåñéïäéêÜ Computers & Security, Theoretical Computer Science,
SIAM journal on Computing, Discrete Mathematics, Computer Magazine IEEE, Transactions on Computers IEEE, Journal of Systems and Software.
Óõììåôï÷Þ óå åðéôñïðÝò ðñïãñÜììáôïò óõíåäñßùí
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 13th International Conference on Cryptology and
Network Security (CANS-2014).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Special Session on Trusted Computing for Critical
Information Infrastructures - T(CI)2. The event was held in conjunction with the 4th International Conference on Information, Intelligence, Systems and Applications - IISA2013,
10-12 July 2013.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Fourth International Conference on Technical and
Legal Aspects of the e-Society 2012 (CYBERLAWS 2013).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Sixth International Conference on Sensor Technologies and Applications - SENSORCOMM 2012.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Third International Conference on Technical and
Legal Aspects of the e-Society 2012 (CYBERLAWS 2012).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ IEEE Symposium on Wireless Technology & Applications 2012 (ISWTA 2012).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ International Symposium on Foundation of Open
Source Intelligence and Security Informatics, 2012 (FOSINT-SI 2012).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The IADIS e-Commerce 2012 conference.
ÌÝëïò ôçò åðéóôïðÞò ðñïãñÜììáôïò ôïõ European Intelligence and Security Informatics
Conference (EISIC 2012).
ÌÝëïò ôçò åðéóôïðÞò ðñïãñÜììáôïò ôïõ 7th IEEE International Workshop on Wireless and
Sensor Networks Security (IEEE WSNS 2011).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 7th European Conference on Computer Network
Defense (EC2ND 2011).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The 5th International Conference on Information
Security and Assurance (ISA 2011).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 7th International Conference on Global Security,
Safety & Sustainability (ICGS3 11).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The IADIS e-Commerce 2011 conference.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Second International Conference on Security-enriched
Urban Computing and Smart Grid (SUComS) 2011.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011), Security Track.
4
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The Sixth IEEE International Workshop on Wireless
and Sensor Networks Security (WSNS'10)
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ First International Conference on Security-enriched
Urban Computing and Smart Grid (SUComS) 2010.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Webit eGov Summit, 2010, organized by the eAcademy, eEducation Institute of Bulgaria.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ APSIPA (Asia-Pacific Signal and Information Processing Association) Annual Summit and Conference 2010.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Seventh European Workshop on Public Key Services,
Applications and Infrastructures (EUROPKI 2010).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 15th European Symposium on Research in Computer Security (ESORICS 2010).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The IADIS e-Commerce 2010 conference.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 2nd International Conference on Advanced Science
and Technology (AST 2010).
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The 4th International Conference on Information
Security and Assurance (ISA 2010).
ÐñïóêåêëçìÝíïò ôï ÄåêÝìâñéï 2009 ùò rapporteur óôçí êñßóç Åõñùðáúêþí Ýñãùí ôïõ
7ïõ ðëáéóßïõ óôçí ðñüóêëçóç PHOTONICS.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ International Conference on Information Security
and Cryptology (Inscrypt), Inscrypt 2009, Inscrypt 2010.
ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 1st International Conference on Sensor Networks
Applications, Experimentation and Logistics (SENSAPPEAL 2009).
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò ôïõ 2009 International Conference on Security and
Cryptography (SECRYPT 2009).
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò ôïõ Fifth International Conference on Security and
Privacy in Communication Networks (SecureComm 2009).
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò ôïõ 2009 International Conference on Security Technology (SecTech 2009), 2010 International Conference on Security Technology (SecTech 2010).
ÐñïóêåêëçìÝíïò äýï öïñÝò (2006 êáé 2007) ùò åéäéêüò óå èÝìáôá êñõðôïãñáößáò êáé
áóöÜëåéáò ðëçñïöïñéáêþí óõóôçìÜôùí ãéá êñßóç Åõñùðáúêþí Ýñãùí ôïõ 7ïõ ðëáéóßïõ.
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Programm Committee) óôï ECAI 2008 Workshop
The Quest for Approximate and Exact Equilibria in Games (ExCalibur).
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Programm Committee) óôï óõíÝäñéï SECRYPT
(International Conference on Security and Cryptography) 2008. SECRYPT is part of
ICETE, the International Joint Conference on e-Business and Telecommunications.
5
•
•
•
•
•
•
•
•
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï 5th European PKI Workshop (EUROPKI 2008).
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï IADIS Conference on
e-Commerce 2007.
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï 6th International Conference on AD-HOC Networks & Wireless (ADHOC-NOW 2006).
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï Inscrypt (formerly CISC
- Conference on Information Security and Cryptology) (CISC 2006, INSCRYPT 2007).
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï International Workshop
on Information Security Applications (WISA 2005, WISA 2006, WISA 2007).
ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) êáé åðéêåöáëÞò ôçò ÏñãáíùôéêÞò
ÅðéôñïðÞò (Organizing Committee) óôï 9ï Colloquium on Structural Information and
Communication Complexity (SIROCCO '02).
ÌÝëïò ôçò ÏñãáíùôéêÞò ÅðéôñïðÞò (Organizing Committee) óôï Third Annual European
Symposium on Algorithms (ESA '95).
ÌÝëïò ôçò ÏñãáíùôéêÞò ÅðéôñïðÞò óôï 2ï Colloquium on Structural Information and
Communication Complexity (SIROCCO '95).
ÓõóôÜóåéò
•
•
•
•
•
Professor Svante Janson, Uppsala University, Department of Mathematics P. O. Box 480
S-751 06 Uppsala, Sweden.
e-mail: [email protected], tel.: +46 18 4713188, fax.: +46 18 4713201.
Professor Lefteris Kirousis, University of Patras, School of Engineering, Department of
Computer Engineering and Informatics, 26500 Rio, Patras, Greece.
e-mail: [email protected], tel.: +30 61 99 77 02, fax.: +30 61 99 19 09.
Professor Evangelos Kranakis, Carleton University, School of Computer Science, 1125
Colonel By Drive, Ottawa, Ontario, K1S 5B6, Canada.
e-mail: [email protected], tel.: (613) 520-4330, fax.: (613) 520-4334.
Professor Danny Krizanc, Wesleyan University, Mathematics Department, Computer Science Group, Middletown, CT 06459 USA.
email: [email protected], tel.: 860-685-2186, fax.: 860-685-2571.
Professor David Peleg, Faculty of Mathematics and Computer Science, The Weizmann
Institute of Science, Rehovot 76100, Israel.
e-mail: [email protected], tel.: +972-8-934-3478, fax.: +972-8-934-4122.
Åìðåéñßá óå åñåõíçôéêÜ êáé áíáðôõîéáêÜ Ýñãá
•
Ðåñéöåñåéáêüò
Ðüëïò
Êáéíïôïìßáò
ÄõôéêÞò
ÅëëÜäáò
(ÐÐÊ-ÄÅ).
×ñüíïò
åêôÝëåóçò
Ï Ðåñéöåñåéáêüò Ðüëïò Êáéíïôïìßáò ÄõôéêÞò ÅëëÜäáò (ÐÐÊ-ÄÅ)
åßíáé ìéá Ýíùóç öïñÝùí ôïõ äçìüóéïõ êáé éäéùôéêïý ôïìÝá, ìå óôü÷ï ôçí áíÜðôõîç,
ðñïþèçóç êáé åêìåôÜëëåõóç ôçò êáéíïôïìßáò óôçí ÐåñéöÝñåéá ÄõôéêÞò ÅëëÜäáò (ÐÄÅ).
Ýñãïõ:
2007-2008.
6
Êåíôñéêüò óôü÷ïò åßíáé ç ïñãÜíùóç êáé éó÷õñïðïßçóç ôùí äåóìþí ìåôáîý ôùí Åñåõíçôéêþí
/ Ôå÷íïëïãéêþí & Åðé÷åéñçìáôéêþí ÖïñÝùí ôçò ÐÄÅ ìå óêïðü ôçí åêðüíçóç åíåñãåéþí
ðïõ åíéó÷ýïõí ôéò ôå÷íïëïãéêÝò êáé êáéíïôïìéêÝò åðéäüóåéò ôçò ÐåñéöÝñåéáò. ÁðïôÝëåóìá
ôùí ðñïóðáèåéþí óôá ðëáßóéá ôïõ Ýñãïõ áõôïý Þôáí ç ÐåñéöåñåéáêÞ Ôå÷íïëïãéêÞ Ðëáôöüñìá
ôïõ ÐÐÊ-ÄÅ (http://www.westplatform.gr/) ãéá ôçí ðñïáãùãÞ ôçò åöáñìïóìÝíçò Ýñåõíáò
óôçí ðåñéï÷Þ ôùí âéïìç÷áíéêþí óõóôçìÜôùí & åðéêïéíùíéþí, ôïõ âéïìç÷áíéêïý åëÝã÷ïõ,
ôùí åíóùìáôùìÝíùí óõóôçìÜôùí êáé ôçò áóöáëåßáò ðëçñïöïñéáêþí óõóôçìÜôùí êáé
äéêôýùí. Ï ê. Óôáìáôßïõ óõììåôåß÷å ùò êýñéïò åñåõíçôÞò óôïí ôÝôáñôï Üîïíá, ôçò
ÁóöÜëåéáò Ðëçñïöïñéáêþí ÓõóôçìÜôùí êáé Äéêôýùí êáé ç óõììåôï÷Þ ôïõ åðéêåíôñþèçêå
óå èÝìáôá êñõðôïãñáößáò êáé áóöÜëåéáò êáèþò êáé ôçò åöáñìïãÞò áõôþí ãéá ôçí õðïóôÞñéîç
ôçò áóöáëïýò ëåéôïõñãßáò åðé÷åéñÞóåùí êáé ïñãáíéóìþí.
•
¸ñåõíá êáé ÁíÜðôõîç ÓõóôçìÜôùí ÇëåêôñïíéêÞò Øçöïöïñßáò âáóéóìÝíùí óå ÔõðéêÝò
Ìåèüäïõò Ó÷åäßáóçò êáé Äéá÷åßñéóçò Êéíäýíùí ìå åóôßáóç óôçí ÐñïóÝëêõóç ôçò Åìðéóôïóýíçò
ôïõ Ðïëßôç - ÐÍÕÊÁ (http://www.pnyka.cti.gr).
×ñüíïò åêôÝëåóçò Ýñãïõ: 2006 - 2008.
Ôï åñåõíçôéêü/áíáðôõîéáêü Ýñãï ÐÍÕÊÁ, ìå ÷ñçìáôïäüôçóç áðü ôçí ÃåíéêÞ Ãñáììáôåßá
¸ñåõíáò êáé Ôå÷íïëïãßáò, õëïðïéÞèçêå áðü ôï Åñåõíçôéêü Áêáäçìáúêü Éíóôéôïýôï Ôå÷íïëïãßáò
Õðïëïãéóôþí (EA ITY) óå óõíåñãáóßá ìå ôçí åôáéñßá ÅXPERTNET ÐñïçãìÝíåò ÅöáñìïãÝò
ÁÅ óôï ðëáßóéï åíüò åñåõíçôéêïý ðñïãñÜììáôïò ôçò ÃÃÅÔ. Óôü÷ïò Þôáí ç ó÷åäßáóç êáé
õëïðïßçóç åíüò ïëïêëçñùìÝíïõ óõóôÞìáôïò õðïóôÞñéîçò çëåêôñïíéêÞò øçöïöïñßáò ìÝóù
Internet, ìå Ýìöáóç óôçí ðñïóôáóßá ôçò éäéùôéêüôçôáò ôïõ ðïëßôç. Ôï óýóôçìá ÐÍÕÊÁ
õðïóôçñßæåé üëá ôá óôÜäéá ìéáò çëåêôñïíéêÞò øçöïöïñßáò üðùò åããñáöÞ/ðéóôïðïßçóç,
õðïâïëÞ øÞöïõ, êáôáìÝôñçóç áðïôåëåóìÜôùí êáé åðáëÞèåõóç. Ãéá ôç ìåãéóôïðïßçóç
ôïõ âáèìïý ðñïóôáóßáò ôçò éäéùôéêüôçôáò ôïõ øçöïöüñïõ, ôï óýóôçìá åíóùìáôþíåé
ðïëëÝò ôå÷íïëïãéêÝò êáéíïôïìßåò üðùò ðëÞñùò êáôáíåìçìÝíç áñ÷éôåêôïíéêÞ, ïìïìïñöéêÞ
êñõðôïãñÜöçóç êáôùöëßïõ, óõóêåõÝò õëéêïý ãéá ôçí áðïèÞêåõóç ôùí êëåéäéþí êëð. êáé
Ý÷åé áíáðôõ÷èåß åî' ïëïêëÞñïõ ìå åñãáëåßá áíïéêôïý êþäéêá Ýôóé þóôå íá äéåõêïëýíåôáé
ç åðáëçèåõóéìüôçôÜ ôïõ. Ìðïñåß, åðßóçò, íá ðáñáìåôñïðïéçèåß ãéá íá õðïóôçñßîåé
äéáöïñåôéêÝò ìïñöÝò øçöïöïñßáò, áðü áðëÝò äéáäéêáóßåò Ýêöñáóçò ãíþìçò ìÝ÷ñé åêëïãÝò
êáé äçìïøçößóìáôá ìåãÜëçò êëßìáêáò. Ï ó÷åäéáóìüò ôïõ óõóôÞìáôïò Ýãéíå ìå ôç ÷ñÞóç
ôõðéêþí ìåèüäùí áíÜëõóçò êáé äéá÷åßñéóçò êéíäýíùí üðùò ôï ðëáßóéï CORAS äßíïíôáò
Ýôóé Ýìöáóç óôçí ðñïóÝëêõóç ôçò äçìüóéáò åìðéóôïóýíçò. Ôï óýóôçìá åöáñìüóôçêå ìå
åðéôõ÷ßá óå ìéá äïêéìáóôéêÞ çëåêôñïíéêÞ øçöïöïñßá ìåôáîý ôùí ìåëþí ôïõ ÔÅÅ ÄõôéêÞò
ÅëëÜäáò åíþ óõììåôåß÷å ðáñÜëëçëá óôï äéáãùíéóìü e-voting ðïõ äéïñãÜíùóå ôï Competence Center for Electronic Voting and Participation (http://www.e-voting-competition.at/)
ìå ÷ïñçãü ôïí áõóôñéáêü ïñãáíéóìü Internet Foundation Austria (IFA) üðïõ êáé áðÝóðáóå
ôï ðñþôï âñáâåßï.
•
Ôå÷íéêüò óýìâïõëïò ôçò EXPERTNET ÐñïçãìÝíåò ÅöáñìïãÝò ÁÅ óå Ýñãá ìå êýñéá
óõíéóôþóá ôçí áóöÜëåéá ðëçñïöïñéáêþí óõóôçìÜôùí.
×ñüíïò óõíåñãáóßáò:
2004-
. Ï ê. Óôáìáôßïõ äéáôÝëåóå ôå÷íéêüò óýìâïõëïò óå ôÝóóåñá Ýñãá ó÷åôéêÜ ìå
ôçí áóöÜëåéá ðëçñïöïñéáêþí óõóôçìÜôùí êáé ôçí çëåêôñïíéêÞ äéáêõâÝñíçóç.
Óôü÷ïò ôïõ Ýñãïõ Þôáí ç äçìéïõñãßá ìßáò ïëïêëçñùìÝíçò ðëáôöüñìáò
ãéá ôç óýíäåóç äçìáñ÷åßùí (óå åõñùðáúêü åðßðåäï) êáé ôçí õðïóôÞñéîç áóöáëïýò áíôáëëáãÞò
åããñÜöùí ìåôáîý ôïõò (ìå ÷ñÞóç êáôÜëëçëùí êñõðôïãñáöéêþí ôå÷íéêþí êáé Õðïäïìþí
Äçìüóéïõ Êëåéäéïý - PKI).
Ôï Ýñãï áõôü åß÷å ùò óôü÷ï ôçí
õëïðïßçóç ìßáò ðëáôöüñìáò äéá÷åßñéóçò çëåêôñïíéêþí ôéìïëïãßùí ìå áóöÜëåéá óôçñéãìÝíç
óå ÕðïäïìÞ Äçìüóéïõ Êëåéäéïý - PKI êáé êáôÜëëçëá êñõðôïãñáöéêÜ ðñùôüêïëëá.
Ï óôü÷ïò ôïõ Ýñãïõ Þôáí ç äçìéïõñãßá åíüò áíïéêôïý óõóôÞìáôïò,
ðïõ êáëåßôáé e-city Platform, ãéá ôçí õðïóôÞñéîç ëåéôïõñãéþí çëåêôñïíéêÞò äéáêõâÝñíõóçò
-2007
(i) IST
STREP Ýñão e-Mayor:
(ii) IST eTen Ýñãï Selis:
(iii)
IST IP Ýñãï Intelcities:
7
ìå áóöÜëåéá êáé äéáëåéôïõñãéêüôçôá.
Ôï Ýñãï áõôü åß÷å ùò óôï÷ï ôç äçìéïõñãßá óõóôÞìáôïò âéïìåôñéêïý åëÝã÷ïõ åéóåñ÷ïìÝíùí
óå áèëçôéêïýò ÷þñïõò ìå âÜóç ôá ÷áñáêôçñéóôéêÜ ôùí äáêôõëéêþí ôïõò áðïôõðùìÜôùí
(iv) ¸ñãï õðïóôçñéæüìåíï áðü ÃÃÅÔ, Bioathletics:
•
Ðáéãíßäéá ðñüâëåøçò áñéèìþí EXTRA 5 êáé SUPER 3 ôïõ ÏÐÁÐ. ×ñüíïò åêôÝëåóçò
Óôá ðëáßóéá ôïõ Ýñãïõ áõôïý, ï ê. Óôáìáôßïõ ó÷åäßáóå ôï ëïãéóìéêü
êáé ôçí áñ÷éôåêôïíéêÞ õëéêïý ôïõ åíüò óõóôÞìáôïò ãÝíåóçò ôõ÷áéùí áñéèìþí ãéá ôá íÝá
ðáéãíßäéá ôïõ ÏÐÁÐ EXTRA 5 êáé SUPER 3. Åðéðñüóèåôá, õëïðïßçóå ôá ðéï êñßóéìá
êñõðôïãñáöéêÜ ìÝñç ôïõ óõóôÞìáôïò êáé äéåýèõíå ïìÜäá ðñïãñáììáôéóôþí ôïõ ÅÁÉÔÕ
ðïõ åðéôÝëåóå ôçí ôåëéêÞ ïëïêëÞñùóç.
Ôï óýóôçìá ãÝíåóçò ôùí áñéèìþí ðïõ ó÷åäßáóå ï ê. Óôáìáôßïõ ðåñéëáìâÜíåé ôá ðéï êÜôù
êýñéá ìÝñç:
Ýñãïõ: 2001--2002.
1. Ôñåéò ãåíÞôñéåò ðñáãìáôéêÜ ôõ÷áßùí áñéèìþí (ìßá âáóéóìÝíç óå shot-noise óå äßïäï
zener, ìßá âáóéóìÝíç óå èåñìéêü èüñõâï óå áíôßóôáóç êáé ìßá âáóéóìÝíç óôçí
ôõ÷áéüôçôá óôç äéáöïñÜ öÜóçò ìåôáîý äýï ðçãþí ÷ñïíéóìïý óôï motherboard ôïõ
õðïëïãéóôÞ).
2. Äýï êñõðôïãñáöéêÜ áóöáëåßò ãåíÞôñéåò øåõäïôõ÷áßùí áñéèìþí, BBS êáé RSA, êáé
äýï âáóéóìÝíåò óå êáôÜëëçëá ôñïðïðïéçìÝíïõò block ciphers. Åðßóçò, óõìðåéëÞöèçêáí
êáé ïé áëãüñéèìïé Ôïõò áëãüñéèìïõò Ì êáé Â ãéá ôçí ðïëýðëåîç ôçò åîüäïõ ôùí
ðáñáðÜíù áëãïñßèìùí. (Ïé M êáé B ðåñéãñÜöïíôáé óôï âéâëßï Seminumerical Algorithms ôïõ Knuth.)
•
Ôç ó÷åäßáóç êáé õëïðïßçóç óõìðëçñþíïõí, ìåôáîý Üëëùí, åéäéêÜ ó÷Þìáôá bit-commitment,
åðåîåñãáóßáò seeds (ó÷Þìá Naor-Reingold), signature verification, cross-verification ôùí
ðáñáãüìåíùí áñéèìþí ìÝóá áðü ôçí åããñáöÞ ôïõò óå CD-ROM áìÝóùò ìåôÜ ôçí ðáñãùãÞ
ôïõò, êáé ðéóôïðïßçóçò ôçò ôáõôüôçôáò ôùí õðïëïãéóôþí ðïõ ðáñÜãïõí ôïõò áñéèìïýò ôùí
êëçñþóåùí.
Ôï Åõñùðáúêü áõôü Ýñãï åß÷å
ùò óôü÷ï ôçí ðáñáãùãÞ åíüò ïëïêëçñùìÝíïõ óõóôÞìáôïò ãéá ôçí ðñïóôáóßá DVD-ROM
áðü áíôéãñáöÞ ôï ïðïßï ðåñéëáìâÜíåé ìç÷áíéóìïýò õøçëÞò áóöÜëåéáò ãéá ôçí öõóéêÞ
ðñïóôáóßá ôïõ DVD-ROM áðü áíôéãñáöÞ (ôï ïðïßï åßíáé Þäç ðáôÝíôá ôçò åôáéñßáò
MLS ðïõ åßíáé êáé ç åôáéñßá õðåýèõíç ôïõ Ýñãïõ) êáé ãéá ôçí ðñïóôáóßá ôùí äåäïìÝíùí
ôïõ (êáôÜ ôçí áðïèÞêåõóç êáé ôç ìåôáöïñÜ ôïõò). Ðéï óõãêåêñéìÝíá, ç ïìÜäá ôçí ïðïßá
äéåõèýíåé ï ê. Óôáìáôßïõ åß÷å áíáëÜâåé ôá õðïÝñãá ôçò êñõðôïãñÜöçóçò/áðïêñõðôïãñÜöçóçò
äåäïìÝíùí ìå áëãïñéèìéêÜ ðáñáãüìåíïõò Feistel êñõðôáëãüñéèìïõò âáóéóìÝíïõò óôç
ìåèïäïëïãßá ó÷åäßáóçò ôïõ CAST-128, ôçò õäáôïãñÜöçóçò øçöéáêþí áñ÷åßùí Þ÷ïõ (audio watermarking) êáé ôç äçìéïõñãßá åéäéêþí âéâëéïèçêþí ëïãéóìéêïý êñõðôïãñáößáò
äçìüóéïõ êëåéäéïý êáé áëãüñéèìùí êñõðôáíÜëõóçò ìå ÷ñÞóç Åëëåéðôéêþí Êáìðõëþí ãéá
ôï ÷ôßóéìï áóöáëþí åöáñìïãþí çëåêôñïíéêïý åìðïñßïõ.
ÐÝñá áðü ôçí åðßâëåøç ôçò ïìÜäáò, áíÝëáâå êáé ðåñÜôôùóå ðñïóùðéêÜ ôï ìÝñïò ôçò
êáôáóêåõÞò ôùí åöáñìïãþí êñõðôïãñÜöçóçò/áðïêñõðôïãñÜöçóçò üðïõ ó÷åäßáóå êáé
õëïðïßçóç Ýíá ãåíéêü êñõðôáëãüñéèìï block ìå åðáíáðñïóäéïñßóéìá (reconfigurable)
êïõôéÜ áíôéêáôÜóôáóçò (substitution boxes Þ s-boxes) ðïõ âáóßæåôáé óôçí ðáñáãùãÞ êáé
óõíäõáóìü Boolean óõíáñôÞóåùí bent Ýôóé þóôå ïé êñõðôáëãüñéèìïé íá åßíáé áíèåêôéêïß
óôç ãñáììéêÞ êáé äéáöïñéêÞ êñõðôáíÜëõóç. Óôï êïììÜôé ôçò õäáôïãñÜöçóçò øçöéáêþí
áñ÷åßùí Þ÷ïõ, ó÷åäßáóå êáé õëïðïßçóå ôï ìÝñïò ôçò äçìéïõñãßáò ôïõ øçöéáêïý õäáôïãñáöÞìáôïò
ìå ÷ñÞóç ôçò èåùñßáò êáôùöëéêþí öáéíïìÝíùí óå õðïëïãéóôéêÜ äýóêïëá ðñïâëÞìáôá Ýôóé
IST Ýñãï ``ASPIS''. ×ñüíïò åêôÝëåóçò Ýñãïõ: 2000--2002.
8
•
•
þóôå ôá õäáôïãñáöÞìáôá íá áíôéðñïóùðåýïõí óôéãìéüôõðá ôùí ðñïâëçìÜôùí áõôþí. Ðéï
óõãêåêñéìÝíá, ÷ñçóéìïðïßçóå ôï NP-ðëÞñåò ðñüâëçìá ôïõ ÷ñùìáôéóìïý åíüò ãñáöÞìáôïò
ìå 3 ôï ðïëý ÷ñþìáôá (3-COLORING) ãéá íá äçìéïõñãåß óôéãìéüôõðá (ãñáöÞìáôá)
ôïõ ðñïâëÞìáôïò ðïõ Ý÷ïõí Ýíá óõãêåêñéìÝíï ÷ñùìáôéóìü êáé ðïõ âñßóêïíôáé óôçí
ðåñéï÷Þ ðïõ, ðåéñáìáôéêÜ, äéáöáßíåôáé íá óõóóùñåýïíôáé ðïëëÜ äýóêïëá íá åðéëõèïýí
óôéãìéüôõðá. Ãíþóç ôïõ ÷ñùìáôéóìïý, óõíåðÜãåôáé ôáõôïðïßçóç ôïõ ÷ñÞóôç. ÔÝëïò, åß÷å
ìåãÜëç óõììåôï÷Þ óôï ìÝñïò ôçò ó÷åäßáóçò êáé õëïðïßçóçò ôïõ ëïãéóìéêïý êñõðôïãñáößáò
åëëåéðôéêþí êáìðõëþí ìå êáëÝò êñõðôïãñáöéêÝò éäéüôçôåò, ÷ñçóéìïðïéþíôáò ôçí ôå÷íéêÞ
ôïõ Ìéãáäéêïý Ðïëëáðëáóéáóìïý (Complex Multiplication) ìå áñéèìçôéêÞ ìéãáäéêþí
áñéèìþí áðåñéüñéóôçò áêñßâåéáò.
: Áõôü ôï Ýñãï åß÷å ùò óôü÷ï
ôçí áíÜðôõîç êáé ôç äïêéìÞ ìéáò ïëïêëçñùìÝíçò ìåèïäïëïãßáò áíÜëõóçò áóöÜëåéáò
êáé åðéêéíäõíüôçôáò óå åöáñìïãÝò üðïõ ç áóöÜëåéá åßíáé óçìáíôéêÞ áðáßôçóç (ð.÷.
åöáñìïãÝò ôçëåúáôñéêþí õðçñåóéþí). Ç ìåèïäïëïãßá áõôÞ óôçñßæåôáé óå çìéôõðéêÞ ìïíôåëïðïßçóç
(semiformal modeling) êáé ôçí ðñïóáñìïãÞ ìåèüäùí áíÜëõóçò ñßóêïõ óå åöáñìïãÝò
õøçëÞò åðéêéíäõíüôçôáò (safety analysis) üðùò åßíáé, ãéá ðáñÜäåéãìá, ç áíÜëõóç ñßóêïõ
óå Ýíáí ðõñçíéêü áíôéäñáóôÞñá. Óôï Ýñãï áõôü, ôï ÅÁÉÔÕ ìáæß ìå äýï Üëëïõò óõíåñãÜôåò
ôïõ Ýñãïõ, (ôï Éíóôéôïýôï Ôå÷íïëïãßáò êáé ¸ñåõíáò (ÉÔÅ) óôï ÇñÜêëåéï ÊñÞôçò êáé ç
NCT-National Centre for Telemedicine ôçò Íïñâçãßáò), èá ó÷åäéÜóåé êáé èá äéåõèýíåé ôéò
äïêéìÝò áíÜëõóçò áóöÜëåéáò óôï äßêôõï õðïóôÞñéîçò ôçëåúáôñéêþí åöáñìïãþí HYGEIANET
ðïõ áíáðôý÷èçêå áðü ôï ÉÔÅ êáé ôï ïðïßï óõíäÝåé ôá íïóïêïìåßá êáé ôá êÝíôñá õãåßáò
óå üëç ôçí ÊñÞôç. Ïé äïêéìÝò èá åðéêåíôñþóïõí óôçí ðáñáãùãÞ çìéôõðéêþí ìïíôÝëùí
(ìå ÷ñÞóç ðáñáëëáãþí ôçò UML−Universal Modeling Language) äýï åöáñìïãþí ôïõ
äéêôýïõ ôçëåúáôñéêÞò óôá ïðïßá õðÜñ÷ïõí õøçëÝò áðáéôÞóåéò áóöÜëåéáò: ôçò åöáñìïãÞò
ATTRACT ðáñáêïëïýèçóçò áðü áðüóôáóç ôçò ðïñåßá áóèìáôéêþí ðáéäéþí êáé ôçò
åöáñìïãÞò ÔçëåÊáñäéïëïãßáò ðïõ õðïóôÞñßæåé äéÜãíùóç êáé ðáñáêïëïýèçóç áðü áðüóôáóç
êáñäéáêþí áóèåíåéþí. Ôá ìïíôÝëá ðïõ èá ðáñá÷èïýí èá õðïóôïýí áíÜëõóç ìå ÷ñÞóç
ôçò ìåèïäïëïãßáò ôïõ Ýñãïõ êáé ôá áðïôåëÝóìáôá èá êïéíïðïéçèïýí êáé èá áíáëõèïýí
óôïõò ãéáôñïýò óôï Ðáíåðéóôçìéáêü Íïóïêïìåßï Çñáêëåßïõ, þóôå íá ôïõò âïçèÞóïõí íá
êáôáíïÞóïõí êáëýôåñá ôé óçìáßíåé áóöÜëåéá êáé ðþò áõôÞ åðéôõã÷Üíåôáé óôéò åöáñìïãÝò
ðïõ ÷ñçóéìïðïéïýí êáèõìåñéíá, êáèþò êáé óôïõò ôå÷íéêïýò ðïõ áíÜðôõîáí ôéò åöáñìïãÝò
ôçëåúáôñéêÞò Ýôóé þóôå íá ôïõò âïçèÞóïõí íá ôéò êÜíïõí áóöáëÝóôåñåò. ÔÝëïò ôá áðïôåëÝóìáôá
áõôÜ èá áîéïëïãçèïýí áðü ôïõò óõíåñãÜôåò ôïõ CORAS ìå âÜóç êñéôÞñéá ðïõ Ý÷ïõí
êáèïñéóôåß áðü ôï ÅÁÉÔÕ Ýôóé þóôå íá âåëôéùèåß ç ìåèïäïëïãßá.
: Óôï Ýñãï áõôü, ï óôü÷ïò
ôïõ ÅÁÉÔÕ Þôáí íá ó÷åäéÜóåé êáé íá õëïðïéÞóåé Ýíá ðïëõ÷ñçóôéêü ëïãéóìéêü äåé÷åßñéóçò
ñßóêïõ ãéá éäéùôéêÞ åôáéñßá ðïõ õðïóôçñßæåß ðáãíßäéá ðñüãíùóçò óå áèëçôéêÜ ãåãïíüôá.
Ôï ëïãéóìéêü áõôü èá Ýðñåðå íá áíáãíùñßæåé êáé íá åðéóçìáßíåé êáôáóôÜóåéò ðïõ ôåßíïõí
íá äçìéïõñãçèïýí êáé ðïõ ðéèáíüí íá ïäçãÞóïõí ôçí åôáéñßá óå óçìáíôéêÞ ïéêïíïìéêÞ
æçìéÜ. ìôáí ï ó÷åäéáóôÞò ôïõ ëïãéóìéêïý êáé, åðéðñüóèåôá, õëïðïßçóå ôç âÜóç äåäïìÝíùí
(âáóéóìÝíç óå äïìÞ B-trees ìå ôá öýëëá óå äéðëÜ äéáóõíäåäåìÝíç ëßóôá) êáé ôï óýóôçìá
óõëëïãÞò êáé óôáôéóôéêÞò åðåîåñãáóßáò åéóåñ÷üìåíùí äåäïìÝíùí). Ôï ëïãéóìéêü õëïðïéÞèçêå
ìå ÷ñÞóç ôïõ C++ Builder Enterprise 4.0 ôçò Borland óå ðåñéâÜëëïí WINDOWS NT.
Ç âÜóç äåäïìÝíùí ðïõ õëïðïßçóå ìå ÷ñÞóç ôùí B-trees êáé ìå åêìåôÜëëåõóç ôçò êýñéáò
ìíÞìçò ãéá óõ÷íÜ ðñïóðåëáóüìåíá äåäïìÝíá (ó÷Þìá cache LRU), öôÜíåé ôá÷ýôçôåò ðïõ
îåðåñíïýí êáôÜ ôÜîåéò ìåãÝèïõò ôçí áðüäïóç ôïõ ðñïçãïýìåíïõ óõóôÞìáôïò ôçò åôáéñßáò
ðïõ âáóéæüôáí óå åìðïñéêü ðáêÝôï äéá÷åßñéóçò âÜóåùí äåäïìÝíùí. Åðéðñüóèåôá, ôï
IST Ýñãï ``CORAS''. ×ñüíïò åêôÝëåóçò Ýñãïõ: 2000--2003
¸ñãï ``ÓÔÏÉ×ÇÌÁ''. ×ñüíïò åêôÝëåóçò Ýñãïõ:
9
2000--2002.
•
óôáôéóôéêü êïììÜôé ôïõ ëïãéóìéêïý õëïðïéåß äéÜöïñïõò åëÝã÷ïõò óôáôéóôéêÞò ôõ÷áéüôçôáò
êáé ðáñÜãåé Ýíáí áñéèìü áðü óôáôéóôéêÜ äåäïìÝíá ÷ñÞóéìá ãéá ôçí ðñüâëåøç ôçò ðïñåßáò
ôïõ ðáéãíéäéïý. ÔÝëïò õëïðïßçóå êáé Ýíá ìÝñïò äçìéïõñãßáò êáé ãñÞãïñçò (ëüãù ôùí Âtrees) åêôÝëåóçò ``what-if'' óåíáñßùí ãéá Ýëåã÷ï åðéêßíäõíùí åîåëßîåùí, ãéá ôçí åôáéñßá,
ôïõ äéáãùíéóìïý.
: Ï ê. Óôáìáôßïõ
Þôáí ï ìüíïò ó÷åäéáóôÞò êáé ðñïãñáììáôéóôÞò ìßáò åöáñìïãÞò ãÝíåóçò êñõðôïãñáöéêÜ
áóöáëþí øåõäïôõ÷áßùí áñéèìþí ðïõ áíÝëáâå ôï ÅÁÉÔÕ ãéá ìßá éäéùôéêÞ åôáéñßá õðïóôÞñéîçò
êñáôéêþí ðáéãíéäéþí ôý÷çò êáé ðñüãíùóçò áèëçôéêþí ãåãïíüôùí. Ôï ëïãéóìéêü äïêéìÜóôçêå
ìå ÷ñÞóç äéÜöïñùí óôáôéóôéêþí åëÝã÷ùí ðïõ õëïðïéÞèçêáí åéäéêÜ ãéá ôï óêïðü áõôü êáé
óôï ôÝëïò åêäüèçêå ðéóôïðïéçôéêü ôõ÷áéüôçôáò áðü ôïí ÄéåõèõíôÞ ôïõ ÅÁÉÔÕ ÊáèçãçôÞ
ê. Ð. ÓðõñÜêç. Ôï ëïãéóìéêü õëïðïéïýóå ôéò ãåííÞôñéåò BBS (áðü ôïõò Blum-BlumShub, ãåííÞôñéá ðïõ âáóßæåôáé óôá ôåôñáãùíéêÜ õðüëïéðá) êáé RSA (áðü ôïõò RivestShamir-Adleman, ðïõ âáóßæåôáé óôç óõíÜñôçóç êñõðôïãñÜöçóçò RSA) óå óõíäõáóìü ôçò
åîüäïõ ôïõò ìå ôïí áëãüñéèìï M ôïõ Knuth êáé áðïôåëïýôáí áðü ìÝñç ðïõ Ýôñå÷áí óå
UNIX, DOS, VAX êáé åðéêïéíùíïýóáí ìÝóù TCP/IP ãéá íá áíôáëÜîïõí ðëçñïöïñßåò
çëåêôñïíéêÞò õðïãñáöÞò êáé íá ôñïöïäïôïýí ìå øåõäïôõ÷áßïõò áñéèìïýò ôïí êåíôñéêü
õðïëïãéóôÞ ôçò åôáéñßáò.
¸ñãï ``KENO'' (Óôéãìéáßï Lotto). ×ñüíïò åêôÝëåóçò Ýñãïõ: 1997--1998.
ÊåöÜëáéá óå âéâëßá
•
•
•
•
•
•
E. Konstantinou, P. Nastou, Y. Stamatiou, C. Zaroliagis, Securing Embedded Computing
Systems through Elliptic Curve Cryptography, Encyclopedia of Embedded Computing Systems, Mohamed Khalgui, Olfa Mosbahi, Antonio Valentini, (eds), 2012, IGI Global, (to
appear).
Ð. ÍÜóôïõ, Ð. ÓðõñÜêçò, êáé Ã. Óôáìáôßïõ, Ðñþôïé áñéèìïß, äéáêñéôüò ëïãÜñéèìïò, êáé
ðáñáãïíôïðïßçóç: Èåùñßá êáé Áëãüñéèìïé, êåöÜëáéï óå óõëëïãéêü ôüìï ìå ôßôëï Óýã÷ñïíç
Êñõðôïãñáößá: Èåùñßá êáé ÅöáñìïãÝò, ìå åðéìåëçôÝò ôïõ ôüìïõ ôïõò ÊáèçãçôÝò Mike
Burmester, ÓôÝöáíï Ãêñßôæáëç, ÓùêñÜôç ÊÜôóéêá, êáé Âáóßëåéï ×ñõóéêüðïõëï, Åêäüóåéò
Ðáðáóùôçñßïõ, 2010.
P. Kammas, T. Komninos, P. Spirakis, Y.C. Stamatiou, and H. Tsaknakis, Worm propagation
models in Networks: theory and analysis, In (forthcoming): Pichappan, P. (ed.), Handbook
of Research on Threat Management and Information Security: Models for Countering
Attacks, Breaches and Intrusions, IGI Global.
×. Ìáíùëüðïõëïò, Ä. ÓïöïôÜóéïò, Ð. ÓðõñÜêçò, êáé Ã. Óôáìáôßïõ, ÆçôÞìáôá ðñïóôáóßáò
ôçò éäéùôéêüôçôáò óå óõóôÞìáôá ÇëåêôñïíéêÞò Øçöïöïñßáò, ðñïóêåêëçìÝíï êåöÜëáéï
óå óõëëïãÞ ìå ôßôëï Ðñïóôáóßá ôçò Éäéùôéêüôçôáò óôéò Ôå÷íïëïãßåò ÐëçñïöïñéêÞò êáé
Åðéêïéíùíéþí: Ôå÷íéêÜ êáé ÍïìéêÜ ÈÝìáôá, áíáìåíüìåíç Ýêäïóç ôï 2009.
E. Makri and Y.C. Stamatiou, Deterministic and randomized key pre-distribution schemes
for mobile ad-hoc networks: foundations and example constructions, to appear in a book
dedicated to security issues in mobile networks to be published by Nova Science Publishers
in 2008.
E.C. Laskari, G.C. Meletiou, Y.C. Stamatiou, and M.N. Vrahatis, Cryptography and Cryptanalysis through Computational Intelligence, to be included in a book title Computational
Intelligence in Information Assurance and Security'', to be bublished by Nova Science Publishers.
10
•
•
•
D. Koukopoulos and Y.C. Stamatiou, Digital Audio Watermarking Techniques for MP3 Audio Files, to be included in a book titled ``Digital Audio Watermarking Techniques and
Technologies: Applications and Benchmarking'', to be published by Idea Group in 2007.
P.E. Nastou and Y.C. Stamatiou, An on chip, CAST-128 based block cipher with dynamically
reconfigurable s-boxes generated in parallel, in book titled Embedded Cryptographic Hardware:
Methodologies & Architectures, Nova Science Publishers, NY, USA, 2004.
Ketil Stølen, Folker den Braber, Theo Dimitrakos, Rune Fredriksen, Bjørn Axel Gran, SivHilde Houmb, Yannis C. Stamatiou, and Jan Øyvind Aagedal, Model-based risk assessment
in a component-based software engineering process--using the CORAS approach to identify
security risks, Chapter 11 in: Business CBSE (Component-Based Software Engineering),
•
pages 189-207, Kluwer Academic Publishers, 2003
B.B. Boutsinas, Y.C. Stamatiou, and G. Pavlides, Massively Parallel Support for Nonmonotonic Reasoning, Parallel Processing for AI 3, James Geller, Hiroaki Kitano and Christian
Suttner (eds.), Elsevier Publishers, pages 41−66, 1997.
ÓõããñáöÞ âéâëßùí
1. Ó. Ñåíôïýëçò êáé Ã.Ê. Óôáìáôßïõ, ÏÕÔÏÐÉÁ: ¸íá õðïëïãéóôéêü ðåñéâÜëëïí áíÜðôõîçò
êáé ìåëÝôçò ôå÷íçôÞò æùÞò, õðü Ýêäïóç CTI Press−ÍÝá ÃñÜììáôá, áíáìåíüìåíï ôï 2009.
2. Ã.Ê. Óôáìáôßïõ, Áñ÷Ýò ÓõíäõáóôéêÞò, Åêäüóåéò Åëëçíéêïý Áíïéêôïý Ðáíåðéóôçìßïõ, 2005.
3. Ð. ÍÜóôïõ, Ð. ÓðõñÜêçò, êáé Ã.Ê. Óôáìáôßïõ, Óýã÷ñïíç êñõðôïãñáößá: Ìéá îÝãíïéáóôç
äéáäñïìÞ óôá ìïíïðÜôéá ôçò, CTI Press−ÍÝá ÃñÜììáôá, 2004.
4. ×. Ìðïýñáò, Ë.Ì. Êõñïýóçò, Ð. ÓðõñÜêçò, êáé Ã.Ê. Óôáìáôßïõ, ÅéóáãùãÞ óôïõò ÃñÜöïõò:
Èåùñßá, ÐñïâëÞìáôá êáé Ëýóåéò, Åêäüóåéò GUTENBERG, ISBN 960−01−0815−3, 1999.
ÓõããñáöÞ óçìåéþóåùí ãéá äéåèíÞ åðéóôçìïíéêÜ ó÷ïëåßá
Yannis Stamatiou, Threshold Phenomena: The Computer Scientist's Point of View, óçìåéþóåéò
50 óåëßäùí ãéá ôç äéäáóêáëßá ôçò åíüôçôáò ÊáôùöëéêÜ Öáéíüìåíá óôçí ÅðéóôÞìç ôùí Õðïëïãéóôþí
óôï The LOGIC AND INTERACTION Programme, 28 Éáíïõáñßïõ−1 Ìáñôßïõ 2002, ðïõ Ýëáâå
÷þñá óôç Ìáóáëëßá, Ãáëëßá, êáé óõíäéïñãáíþèçêå áðü ôï Institut de Mathematiques de Luminy
(IML) êáé ôï Laboratoire d' Informatique Fondamentale de Marseille (LIF).
ÁíÜðôõîç ëïãéóìéêïý áíïéêôïý êþäéêá
1. ÂéâëéïèÞêç õëïðïßçóçò êñõðôïãñáöéêþí óõóôçìÜôùí ìå âÜóç ôéò ÅëëåéðôéêÝò Êáìðýëåò.
Ç âéâëéïèÞêç ðåñéëáâÜíåé êþäéêá ãéá ôç äçìéïõñãßá åëëåéðôéêþí êáìðõëþí ìå âÜóç
ôç ìÝèïäï ôïõ Ìéãáäéêïý Ðïëëáðëáóéáóìïý (Complex Multiplication Method), ãéá ôçí
åýñåóç óçìåßùí åðÜíù óå áõôÝò, ãéá ôçí åêôÝëåóç âáóéêþí áëãåâñéêþí ðñÜîåùí ìåôáîý
óçìåßùí ôçò êáìðýëçò êáèþò êáé ãéá ôïí Ýëåã÷ï ôçò êñõðôïãñáöéêÞò áóöÜëåéáò ôùí
êáìðõëþí áõôþí.
Ç âéâëéïèÞêç áíáðôý÷èçêå áðü êïéíïý áðü ôïí ê. ÆáñïëéÜãêç, ôçí ê. Êùíóôáíôßíïõ
êáé ôïí ê. Óôáìáôßïõ. Åßíáé ãñáììÝíç óå ANSI C êáé åßíáé åýêïëá ìåôáöÝñóéìç óå
ïðïéïäÞðïôå õðïëïãéóôéêü óýóôçìá.
Ç âéâëéïèÞêç, ìáæß ìå åã÷åéñßäéï åãêáôÜóôáóçò êáé ðáñáäåßãìáôá ÷ñÞóçò ôçò, åßíáé
äéáèÝóéìç óôçí éóôïóåëßäá http://www.ceid.upatras.gr/faculty/zaro/software/ecc-lib/
11
2. ÂéâëéïèÞêç áõôüìáôçò ðáñáãùãÞò S-box (substitution box) âáóéóìÝíùí óå ëïãéêÝò óõíáñôÞóåéò
bent. Ç âéâëéïèÞêç ðåñéëáìâÜíåé êþäéêá ãéá ôçí êáôáóêåõÞ S-box ãéá åíóùìÜôùóÞ
ôïõò óå êñõðôáëãüñéèìïõò block ìå óôÞëåò ðïõ áðïôåëïýíôáé áðü ëïãéêÝò óõíáñôÞóåéò
ìÝãéóôçò ìç ãñáììéêüôçôáò, ïé ïðïßåò êáëïýíôáé bent. Ï êþäéêáò ðåñéëáìâÜíåé êáé
äéáäéêáóßåò ãéá ôïí õðïëïãéóìü ãñáììéêïý óõíäõáóìïý ëïãéêþí óõíáñôÞóåùí, ãéá ôï
ãñÞãïñï õðïëïãéóìü ôïõ Walsh-Hadamard ìåôáó÷çìáôéóìïý, ãéá ôïí Ýëåã÷ï ìç ãñáììéêüôçôáò
ëïãéêþí óõíáñôÞóåùí êáé s-box êáèþò êáé ãéá ôïí õðïëïãéóìü åíüò áñéèìïý ðáñáìÝôñùí
÷ñÞóéìùí ãéá ôçí ôçí åêôßìçóç ôçò áóöÜëåéáò ôùí ðáñáãüìåíùí S-box.
Ç âéâëéïèÞêç Ý÷åé áíáðôõ÷èåß áðü ôïí ê. Óôáìáôßïõ óôç ãëþóóá ðñïãñáììáôéóìïý C êáé
óå ðåñéâÜëëïí Borland C/C++ 5.0 êáé åßíáé äéáèÝóéìç óå êÜèå åíäéáöåñüìåíï.
Äéáêñßóåéò
•
•
Ðñþôï âñáâåßï ãéá ôï ðëçñïöïñéáêü óýóôçìá ýðïóôÞñéîçò çëåêôñïíéêþí øçöïöïñéþí
ìåãÜëçò êëßìáêáò ÐÍÕÊÁ óôïí ðáíåõñùðáúêü äéáãùíéóìü óõóôçìÜôùí eVoting ðïõ
Ýëáâå ÷þñá óôï Bregenz ôçò Áõóôñßáò ôïí Áýãïõóôï ôïõ 2008. Ï ê. Óôáìáôßïõ Þôáí
êýñéïò åñåõíçôÞò óôçí ïìÜäá Ýñãïõ ìå óçìáíôéêÞ óõììåôï÷Þ óôç ó÷åäßáóç êáé õëïðïéÞóç
ôïõ óõóôÞìáôïò.
Âñáâåßï ERICSSON ãéá ôï 2006 ãéá ôçí ðñïðôõ÷éáêÞ åñãáóßá ìå ôßôëï Õëïðïßçóç ÅîïìïéùôÞ
ÊÜñôáò SIM Êéíçôþí Ôçëåöþíùí êáé Ðåéñáìáôéóìïß ìå ÊñõðôïãñáöéêÝò ÅöáñìïãÝò, ðïõ
åêðïíÞèçêå áðü ôïí ê. ÄçìÞôñç Ìåíäñéíü óôï Åëëçíéêü Áíïéêôü ÐáíåðéóôÞìéï õðü ôçí
åðßâëåøç ôïõ ê. Óôáìáôßïõ.
ÅñåõíçôéêÝò äçìïóéåýóåéò óå äéåèíÞ ðåñéïäéêÜ ìå êñéôÝò
1
1. C. Manolopoulos, D. Sofotassios, P. Spirakis, and Y.C. Stamatiou. A Framework for
Protecting Voters' Privacy in Electronic Voting Procedures. To appear at Journal of Cases
on Information Technology (JCIT), 2013.
2. P.E. Nastou, P. Spirakis, Y.C. Stamatiou and A. Tsiakalos, ``On the Derivation of a ClosedForm Expression for the Solutions of Generalized Abel Differential Equations'', International Journal of Differential Equations, Hindawi Press, June 2013.
3. P. Nastou, Y.C. Stamatiou, and A. Tsiakalos. Solving a Class of ODEs Arising in the
Analysis of a Computer Security Process using Generalized Hyper-Lambert Functions.
International Journal of Applied Mathematics and Computation, Vol 4 No. 3, pp 67-76,
2012.
4. P. Kammas, C. Manolopoulos, and Y.C. Stamatiou, Modelling of Long Term Viability of
Financial Agents Based on their 159 Short Range Economic Behaviour. Global Business
& Economics Anthology Volume II, Issue 1, pp. 159-171, December 2011.
5. D. Kalles, A. Papagelis, Y.C. Stamatiou: Consolidating a Heuristic for Incremental Decision Tree Learning through asymptotic Analysis. International Journal on Artificial Intelligence Tools 20(1): 29-52 (2011).
1
Åêôüò áðü ôç äçìïóßåõóç ìå ôïõò ê.
ÂïõôóéíÜ êáé ê.
áëöáâçôéêÞ áíáãñáöÞ ôùí ïíïìÜôùí.
12
Ðáõëßäç,
Ý÷åé óõììåôÜó÷åé ìüíï óå åñãáóßåò ìå
6. P. Kammas, T. Komninos, and Y.C. Stamatiou, Queuing theory based models for studying
intrusion evolution and elimination in computer networks, Journal of Information Assurance and Security (JIAS), Special Issue on Intrusion and Malware Detection, Volume 4,
Issue 3, pp. 200-208, June 2009.
(Óýìðôõîç ôùí åñãáóéþí Ó[16] êáé Ó[12].)
7. Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis: On the Efficient Generation of Prime-Order Elliptic Curves. Journal of Cryptology
23(3): 477-503 (2010).
8. E. Makri and Y.C. Stamatiou, An Interactive, Similarity Increasing Algorithm for Random Strings with Applications to Key Agreement in ad hoc Networks, Studies in Applied
Mathematics Vol. 121, No. 2, pp. 141−155, 2008.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[25].)
9. C. Manolopoulos, A. Panagiotaki, D. Sofotasios, P. Spirakis, and Y. Stamatiou. The Design,
Implementation and Evaluation of an Internet-based eVoting System. 12th Pan-Hellenic
Conference on Informatics (PCI 2008), 2008.
10. N. Glinos and Y.C. Stamatiou, On the equivalence between random graph models, accepted for publication at Journal of Discrete Mathematical Science & Cryptography, TARU
publications, 2008.
11. A.C. Kaporis, L.M. Kirousis, Y.C. Stamatiou, M. Vamvakari, and M. Zito, The unsatisfiability threshold revisited, Discrete Applied Mathematics 155, 1525−1538, Elsevier, 2007.
12. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, Efficient generation of secure elliptic
curves, International Journal of Information Security, 6(1): 47−63, 2007.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[29].)
13. E.C. Laskari, G.C. Meletiou, Y.C. Stamatiou, D.K. Tasoulis, and M.N. Vrahatis, Assessing
the Effectiveness of Artificial Neural Networks on Problems Related to Elliptic Curve
Cryptography, Mathematical and Computer Modelling, Volume 46, Issues 1−2, 174−179,
Elsevier, 2007.
14. E.C. Laskari, G.C. Meletiou, Y.C. Stamatiou, and M.N. Vrahatis, Applying evolutionary
computation methods for the cryptanalysis of Feistel ciphers, Applied Mathematics and
Computation 184(1): 63−72, Elsevier, 2007.
15. T. Komninos, P. Spirakis, Y.C. Stamatiou, G. Vavitsas, A worm propagation model based
on scale free network structures and people's email acquaintance profiles, IJCSNS − International Journal of Computer Science and Network Security, No. 2, Vol. 7 February
2007.
16. S. Antonopoulou, Y.C. Stamatiou, and M. Vamvakari, An asymptotic expansion for the
q -binomial series using singularity analysis for generating functions, Journal of Discrete
Mathematical Sciences & Cryptography, No. 3, Vol. 10, 313−328, 2007.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[53].)
13
17. L.M. Kirousis, Y.C. Stamatiou, and M. Zito, The unsatisfiability threshold conjecture: the
techniques behind upper bound improvements, Computational Complexity and Statistical
Physics, Oxford University, pages 159−178, 2006.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[36].)
18. A. Kaporis, L. Kirousis, and Y.C. Stamatiou, How to prove conditional randomness using the Principle of Deferred Decisions, Computational Complexity and Statistical Physics,
Oxford University Press, New York, 179−194, 2006.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[37].)
19. E.C. Laskari, G.C. Meletiou, Y.C. Stamatiou and M.N. Vrahatis, Evolutionary computation based cryptanalysis: A first study, Journal of Nonlinear Analysis: Theory, Methods &
Applications, Volume 63, Issues 5−7, e823−e830, Elsevier, 2005.
20. D. Koukopoulos and Y.C. Stamatiou, A Watermarking Scheme for MP3 Audio Files,
International Journal of Signal Processing (IJSP), Vol. 2, No. 3, pp. 206−213, 2005.
21. P.E. Nastou and Y.C. Stamatiou, An on chip, CAST-128 based block cipher with dynamically reconfigurable s-boxes generated in parallel. Volume on Embedded Cryptographic
Hardware: Methodologies & Architectures, Nova Publishers, 135−152, 2004.
(Óýìðôõîç êáé åðÝêôáóç ôùí åñãáóéþí Ó[38] êáé Ó[40].)
22. L.M. Kirousis, E. Kranakis, D. Krizanc, and Y.C. Stamatiou, Locating Information with
Uncertainty in Fully Interconnected Networks: The Case of Non-Distributed Memory,
NETWORKS , Issue 3, 169−180, 2003.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[50].)
23. Y.C. Stamatiou, Threshold Phenomena: The Computer Scientist's Viewpoint, EATCS (European Association of Theoretical Computer Science) Bulletin , 199−234, June 2003.
24. S. Armeni, D. Christodoulakis, I. Kostopoulos, Y.C. Stamatiou, and M. Xenos, Secure
information hiding based on computationally intractable problems. Journal of Discrete
Mathematical Sciences & Cryptography Vol. 6, No. 1, 21−33, April 2003.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[41].)
25. D. Achlioptas, L.M. Kirousis, E. Kranakis, D. Krizanc, M. S.O. Molloy, and Y.C. Stamatiou,
Random Constraint Satisfaction: A More Accurate Picture, Constraints , 329−344, 2001.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[55].)
26. L.M. Kirousis, Y.C. Stamatiou, and M. Vamvakari, Upper Bounds and Asymptotics for the
q -binomial Coefficients, Studies in Applied Mathematics
, 43−62, 2001.
27. A.C. Kaporis, L.M. Kirousis, E. Kranakis, D. Krizanc, Y.C. Stamatiou and E.C. Stavropoulos, Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval, Computer Journal , 221−229, 2001.
28. N.D. Dendris, L.M. Kirousis, Y.C. Stamatiou, and D.M. Thilikos, On Parallel Partial Solutions and Approximation Schemes for Local Consistency in Networks of Constraints,
Constraints , 251−273, 2000.
(ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[56].)
42
80
6
107
44
5
14
29. S. Janson, Y.C. Stamatiou, and M. Vamvakari, Bounding the Unsatisfiability Threshold of
Random 3-SAT, Random Structures and Algorithms , 103−116, 2000.
30. A.C. Kaporis, L.M. Kirousis, and Y.C. Stamatiou, A note on the non-colorability threshold
of a random graph, Electronic Journal of Combinatorics , #R29, 2000.
31. Y.C. Stamatiou, Phase Transitions in Mathematics and in Physics: Two Faces of the same
coin?, Carleton Journal of Computer Science , 57−69, 1999.
32. L.M. Kirousis, E. Kranakis, D. Krizanc, and Y.C. Stamatiou, Approximating the Unsatisfiability Threshold of Random Formulas, Random Structures and Algorithms , 253−269,
1998.
17
7
3
12
ÅñåõíçôéêÝò äçìïóéåýóåéò óå äéåèíÞ óõíÝäñéá ìå êñéôÝò
1. Z. Benenson, I. Krontiris, V. Liagkou, K. Rannenberg, A. Schopf, D. Schro der, and Y.
Stamatiou. Understanding and Using Anonymous Credentials. 9th Symposium on Usable
Privacy and Security (SOUPS 2013).
2. P. Spirakis and Y, Stamatiou. Attribute Based Credentials towards refined public consultation results and effective eGovernance. In Proc. Cyber Security Privacy EU FORUM
and Trust in the Digital World 2013 collection of research papers, Brussels, LNCS, Springer
Verlag, expected in 2013.
3. Panayotis E. Nastou, Paul Spirakis, Yannis Stamatiou and Christina Vichou. Agent Agreement Protocols based on Golay Error-Correcting Code. In Proc. 4th IEEE International
Conference on Information, Intelligence, Systems and Applications (IISA2013), 2013.
4. Vasiliki Liagkou, George Metakides, Apostolis Pyrgelis, Christoforos Raptopoulos, P. Spirakis, and Yannis Stamatiou. Privacy preserving course evaluations in Greek higher education institutes: an e-Participation case study with the empowerment of Attribute Based
Credentials. Annual Privacy Forum 2012 (Electronic proceedings).
5. P. Kotsopoulos and Y. Stamatiou. Proc. IEEE/ACM International Conference on Advances
in Social Networks Analysis and Mining (ASONAM), pp. 927--933, 2012.
6. P. E. Nastou, Y. C. Stamatiou and A. Tsiakalos, ``The Solution of a Differential Equation
Describing the Evolution of a Key Agreement Protocol'', EUROSIAM 2011, 29--30 of
December 2011, Montreux, Switzerland.
7. Panayotis E. Nastou, Yannis C. Stamatiou: A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs. In Proc. Security Technology - International Conference FGIT-SecTech, 2011: 155--166.
8. G. C. Meletiou, Y.C. Stamatiou, and A. Tsiakalos. Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm. 5th International
Conference on Information Security and Assurance (ISA 2011), LNCS, Springer Verlag,
177--187, 2011.
9. Ioannis Chatzigiannakis, Apostolos Pyrgelis, Paul G. Spirakis, Yannis C. Stamatiou: Elliptic
Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained
Devices. In Proc. EEE 8th International Conference on Mobile Adhoc and Sensor Systems,
MASS 2011, Workshop: Wireless and Sensor Network Security Workshop (WSNS 2011): 715-720, 2011.
15
10. P. Spirakis and Y.C. Stamatiou, Kolmogorov complexity arguments in propositional logic, in
Proc. 7th Panhellenic Logic Symposium (PLS7) (with international participation), 2009.
11. V. Liagkou, P. Spirakis, and Y.C. Stamatiou, Can formalism alone provide an answer to
the quest of a viable definition of trust in the WWW society?, in Proc. 3rd International
Conference on e-Democracy (e-Democracy 2009), 2009.
12. P. Kammas, T. Komninos, and Y.C. Stamatiou, Modeling the co-evololution DNS worms
and anti-worms in IPv6 networks, in Proc. The Fifth International Conference on Information
Assurance and Security (IAS09), 2009.
13. P. Papaioannou, P. Nastou, Y.C. Stamatiou, and Christos Zaroliagis, Secure Elliptic Curve
Generation and Key Establishment on a 802.11 WLAN Embedded Device, accepted at the
9th International Symposium on Autonomous Decentralized Systems (ISADS 2009).
14. V. Papadinas and Y.C. Stamatiou, Geometric approaches for creating low power, low
interference connectivity patterns in static, structureless sensor networks, accepted at the
First International Workshop on Autonomous Embedded Systems and Networking (AESN
2009), a workshop of ISADS 2009.
15. C. Manolopoulos, P. Nakou, A. Panagiotaki, D. Sofotasios, P. Spirakis, and Y.C. Stamatiou,
A step-wise refinement approach for enhancing eVoting acceptance, accepted at 2nd Int.
Conf. on Theory and Practice of Electronic Governance (ICEGOV 2008), 2008.
16. P. Kammas, T. Komninos, and Y.C. Stamatiou, A queuing theory based model for studying
intrusion evolution and elimination in computer network, accepted for presentation at 4th
International Conference on Information Assurance and Security (IAS 2008).
17. C. Manolopoulos, A. Panagiotaki, D. Sofotasios, and Y.C. Stamatiou, Experience and
Benefits from the application of a Formal Risk Assessment Framework in the Evoting
domain, accepted for presentation at the 7th International Conference on eGovernment
(EGOV 2008).
18. Y.C. Stamatiou, The theoretical analysis of an agreement protocol using Lambert functions,
presented at the 2008 International Workshop on Applied Probability, Invited Session with
title Discrete distributions and asymptotic behaviour.
19. N. Glinos, Y.C. Stamatiou, and M. Vavakari, A statistical/algorithmic framework for modeling fixed odds games, accepted for presentation at the 17th IASTED International Conference
on Applied Simulation and Modelling (ASM 2008).
20. A. Antoniou, C. Korakas, C. Manolopoulos, A. Panagiotaki, D. Sofotassios, . G. Spirakis,
Y. C. Stamatiou, A Trust-Centered Approach for Building E-Voting Systems, in Proc.
6th International Conference on eGovernment (EGOV 2007), 366−377, Lecture Notes in
Computer Science, Springer-Verlag, 2007.
21. V. Liagkou, E. Makri, P. Spirakis, and Y.C. Stamatiou, The Digital Territory as a complex
system of interacting agents, emergent properties and technologies, presented as a short
paper at the European Conference on Complex Systems ECCS 2007.
22. V. Liagkou, E. Makri, P. Spirakis, and Y.C. Stamatiou, Trust in global computing systems as
a limit property emerging from short range random interactions, in Proc. Second International Conference on Availability, Reliability and Security (ARES 2007, The International
Dependability Conference), 741−748, IEEE, 2007.
16
23. T. Komninos, Y. C. Stamatiou, and G. Vavitsas, A Worm Propagation Model Based on
People's Email Acquaintance Profiles, in Proc. 2nd international Workshop on Internet &
Network Economics (WINE 2006), 343−352, Lecture Notes in Computer Science, Springer
Verlag, 2006.
24. E. Makri and Y.C. Stamatiou, Deterministic Key Pre-distribution Schemes for Mobile AdHoc Networks based on Set Systems with Limited Intersection Sizes, in Proc. 2nd IEEE
International Workshop on Wireless and Sensor Networks Security (WSNS'06), 2006.
25. E. Makri and Y.C. Stamatiou, Distributively Increasing the Percentage of Similarities Between Strings with Applications to Key Agreement, in Proc. 5th International Conference
on AD-HOC Networks & Wireless (ADHOC-NOW 2006), pp. 211−223, Springer Verlag,
2006.
26. V. Liagkou, E. Makri, P. Spirakis, and Y.C. Stamatiou The threshold behaviour of the fixed
radius random graph model and applications to the key management problem of sensor
networks, in Proc. ALGOSENSORS 2006, pp. 130−139, Springer Verlag, 2006.
27. E. Konstantinou, V. Liagkou, P.G. Spirakis, Y.C. Stamatiou, M. Yung, Trust Engineering:
From Requirements to System Design and Maintenance - A Working National Lottery
System Experience, in Proc. 8th International Security Conference (ISC 2005), pp. 44-58,
Springer-Verlag, 2005.
28. Dimitrios Koukopoulos and Yannis C. Stamatiou, An Efficient Watermarking Method for
MP3 Audio Files, in Proc. International Enformatica Conference (IEC 2005), pp. 154-159,
2005.
29. E. Konstantinou, A. Kontogeorgis, Y.C. Stamatiou, and C. Zaroliagis, Generating Prime
Order Elliptic Curves Difficulties and Efficiency Considerations, 7th International Conference on Information Security & Cryptography (ICISC 2004), pp. 261-278, Springer-Verlag,
2005.
30. T. Komninos, P. Spirakis, Y.C. Stamatiou, E. Valeontis, H. Yannakopoulos, A Software
Tool for Distributed Intrusion Detection in Computer Networks, best poster award at
Twenty-Third Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing PODC 2004.
31. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the Use of Weber Polynomials
in Elliptic Curve Cryptography, in Proc. Public Key Infrastructure: First European PKI
Workshop, Research and Applications (EURO-PKI 2004), pp. 335-349, Springer Verlag,
2005.
32. E. Konstantinou, V. Liagkou, P. Spirakis, Y.C. Stamatiou, and M. Yung, Electronic National Lotteries, in Proc. 8th International Conference on Financial Cryptography (FC 2004),
pp. 147-163, Springer Verlag, 2004.
33. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the construction of prime order
Elliptic Curves, in Proc. 4th International Conference on Cryptology in India (INDOCRYPT
2003), pp. 309-322, 2003.
34. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the efficient generation of Elliptic
Curves over Prime Fields. In Proc. 4th International Workshop on Cryptographic Hardware
17
and Embedded Systems (CHES 2002), B.S. Kaliski Jr., C.K. Koc, C. Paar (eds.), 333 −348,
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
Springer Verlag, 2002.
E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, A software library for Elliptic Curve
cryptography. In Proc. 10th European Symposium on Algorithms (ESA 2002), Engineering
and Applications track, 625−636, Springer Verlag, 2002.
L.M. Kirousis, Y.C. Stamatiou, and M. Zito, The unsatisfiability threshold conjecture: the
techniques behind upper bound improvements. Presented at the Phase Transitions and
Algorithmic Complexity Workshop that was organized from June 3 to June 5 2002 by the
Institute for Pure and Applied Mathematics, University of California, Los Angeles.
A.C. Kaporis, L.M. Kirousis, and Y.C. Stamatiou, How to prove conditional randomness
using the Principle of Deferred Decisions. Presented at the Phase Transitions and Algorithmic Complexity Workshop that was organized from June 3 to June 5 2002 by the Institute
for Pure and Applied Mathematics, University of California, Los Angeles.
P. Nastou and Y.C. Stamatiou, Enhancing the security of block ciphers with the aid of parallel substitution box construction. Accepted at First International Workshop on Assurance
in Distributed Systems and Networks (ADSN), pp. 29-34, IEEE Computer Society, 2002.
D. Koukopoulos and Y.C. Stamatiou, A Real-Time Compressed-Domain Watermarking
Scheme for Mpeg Audio Layer 3. Watermarking 2002, March 2002.
P. Nastou and Y.C. Stamatiou, Dynamically modifiable ciphers using a reconfigurable
CAST-128 based algorithm on ATMEL's FPSLIC reconfigurable FPGA architecture. Presented at the 9th Reconfigurable Architectures Workshop (RAW 2002), April 2002. The
proceedings will be published by IEEE Computer Society Press. Also, Technical Report
TR-01100901, ATMEL HELLAS SA.
S. Armeni, D. Christodoulakis, I. Kostopoulos, Y.C. Stamatiou, and M. Xenos, Proving
copyright ownership using hard instances of combinatorial intractable problems. In Proc.
8th Panhellenic Conference in Informatics (Nicosia, 2002), Y. Manolopoulos and S. Evripidou
(eds.), 137−145, Livanis Publications, 2002. Also in Proc. Advances in Informatics, Vol.
2563, pp. 262--278, Springer Verlag, 2003.
P. Spirakis and Y.C. Stamatiou, How to prove the possession of a secret without revealing it with
applications to person identification, in Proc. 1st e-Democracy conference with international
participation − Electronic Democracy: Information Society and Citizen's rights, 2003.
Y.C. Stamatiou, E. Henriksen, M.S. Lund, E. Mantzouranis, M. Psarros, E. Skipenes, N.
Stathiakis, and K. Stølen, Experiences from using model-based risk assessment to evaluate the security of a telemedicine application, presented at Telemedicine in Care Delivery
(TICD), Pisa, Italy, 2002.
Y.C. Stamatiou, E. Henriksen, E. Mantzouranis, E.-M. Knudsen, K. Papadaki, M. Psarros,
E. Skipenes, N. Stathiakis, K. Stølen, and G. Valvis, Experience and results from applying
a model-based risk assessment methodology, in the security analysis of a Tele-cardiology
application, presented at the 7th European conference on Electronic Health Records (TEHRE
2002), London, UK, 2002.
18
45. Y.C. Stamatiou, E. Skipenes, E. Henriksen, N. Stathiakis, A. Sikianakis, E. Charalambous,
N. Antonakis, K. Stølen, F. den Braber, M.S. Lundf, K. Papadaki , G. Valvis, The CORAS
approach for model-based risk management applied to a telemedicine service, accepted at
the 18th Medical Informatics Europe (MIE 2003), St. Malo, France, 2003.
46. D. Koukopoulos and Y.C. Stamatiou, A compressed domain watermarking algorithm for
Mpeg Layer 3. In Proc. Multimedia and Security Workshop at ACM Multimedia 2001
(Ottawa, 2001), 7−10, ACM Press, 2001.
47. L.M. Kirousis, Y.C. Stamatiou, and M. Zito, Upper bounds on the satisfiability threshold:
A review of the rigorous results. Presented at the Workshop on Computational Complexity
and Statistical Physics, Santa Fe Institute, 4−6, September 2001.
It will be included in a special volume dedicated to threshold phenomena in combinatorics and physics, to be published by the Sante Fe Institute (SFI) publications. The title
was changed to The unsatisfiability threshold conjecture: the techniques behind upper bound
improvements.
48. A.C. Kaporis, L.M. Kirousis, Y.C. Stamatiou, M. Vamvakari, and M. Zito, Coupon Collectors, q-Binomial Coefficients and the Unsatisfiability Threshold. In Proc. 7th Italian
Conference on Theoretical Computer Science (ICTCS 2001) (Torino 2001), A. Restivo, S.
Ronchi della Rocca, and L. Roversi (eds.), 328−338, Springer-Verlag, 2001.
Åßíáé ìßá áíáíåùìÝíç Ýêäïóç ôçò åñãáóßáò ìå ôßôëï The unsatisfiability threshold revisited,
ôùí ßäéùí óõããñáöÝùí, ðïõ ðáñïõóéÜóôçêå óôï SAT 2001.
49. A.C. Kaporis, L.M. Kirousis, Y.C. Stamatiou, M. Vamvakari, and M. Zito, The unsatisfiability threshold revisited. It appeared in: Working Notes of Workshop on Theory and
Applications of Satisfiability Testing (SAT 2001), Boston, Massachusetts, H. Kautz and B. Selman (eds.), 185−194, 2001. Also, in Electronic Notes in Discrete Mathematics H. Kautz
and B. Selman (eds.), Vol. 9, Elsevier Science Publishers, 2001. Also to appear in Journal
of Discrete Mathematics.
50. L.M. Kirousis, E. Kranakis, D. Krizanc, and Y.C. Stamatiou, Locating Information with
Uncertainty in Fully Interconnected Networks. In Proc. 14th International Symposium
on Distributed Computing (DISC 2000), Vol. 1914 of Lecture Notes in Computer Science
(Toledo, 2000), M. Herlihy (ed.), 183−296, Springer-Verlag, 2000.
51. S. Armeni, D. Christodoulakis, I. Kostopoulos, Y.C. Stamatiou, and M. Xenos, A Transparent Watermarking Method for Color Images, Proceedings of the IEEE first Balkan Conference on Signal Processing, Communications, Circuits and Systems, Istanbul, Turkey, 2000.
52. P. Bose, R. Dagher, E. Kranakis, D. Krizanc, and Y. C. Stamatiou, Experimental comparison between Location Update and Caching protocols for user tracking in Wireless Networks. In Proc. 1st International Conference on Software Engineering Applied to Networking
& Parallel/Distributed Computing (SNPD 2000) (Reims, 2000), Hacene Fouchal and Roger
Y. Lee (eds.), 189−196, Published by the International Association for Computer and
Information Science (ACIS), 2000.
53. Y.C. Stamatiou and M. Vamvakari, An asymptotic expansion for the q-hypergeometric
series using singularity analysis for generating functions. Presented at the Fifth International
Symposium on Orthogonal Polynomials, Special Functions and their Applications (OPSFA
19
1999) (Patras, 1999), Book of abstracts, 84−85, Department of Mathematics, University of
54.
55.
56.
57.
58.
Patras, 1999.
Y.C. Stamatiou and D.M. Thilikos, Monotonicity and Inert Fugitive Search Games. Presented at the 6th Twente Workshop on Graphs and Combinatorial Optimization and it appears
in Electronic Notes in Discrete Mathematics, H.J. Broersma, U. Faigle, C. Hoede and J.L.
Hurink (eds.), Vol. 3, Elsevier Science Publishers, 2000.
D. Achlioptas, L.M. Kirousis, E. Kranakis, D. Krizanc, M. S.O. Molloy, and Y.C. Stamatiou,
Random Constraint Satisfaction: A More Accurate Picture, In Proc. Third International
Conference on Principles and Practice of Constraint Programming (CP 97) (Schloss Hagenberg, 1997), Vol. 1330 of Lecture Notes in Computer Science, 107−120, Springer-Verlag,
1997. Also, in the Constraints journal.
N.D. Dendris, L.M. Kirousis, Y.C. Stamatiou, and D.M. Thilikos, Partiality and Approximation Schemes for Local Consistency in Networks of Constraints, also in the Constraints
journal. Åðßóçò Proc. of the 15th Conference on the Foundations of Software Technology
and Theoretical Computer Science (FST & TCS) (Bangalore, 1995), P.S. Thiagarajan (ed.),
Vol. 1026 of Lecture Notes in Computer Science, Springer-Verlag, 210−224, 1995.
Ìßá óõíôïìåõìÝíç Ýêäïóç ôçò åñãáóßáò áõôÞò ìå ôßôëï Partial Arc Consistency åìöáíßóôçêå
óôï óõíÝäñéï Over-Constrained Systems (Cassis, 1995), Michael Jampel (ed.), Vol. 1106 of
Lecture Notes in Computer Science, Springer-Verlag, 229−236, 1996.
B.B. Boutsinas, Y.C. Stamatiou, and G. Pavlides, Parallel Reasoning using Weighted Inheritance Networks, Working Notes, Third International Workshop on Parallel Processing for
Artificial Intelligence (Montreal, 1995), 29−39, 1995.
An expanded version of this work with title Massively Parallel Support for Nonmonotonic
Reasoning, also appeared in a book dedicated to the application of parallel processing
techniques in Artificial Intelligence: Parallel Processing for AI 3, James Geller, Hiroaki
Kitano and Christian Suttner (eds.), 41−66, Elsevier Publishers, 1997.
B.B. Boutsinas and Y.C. Stamatiou, A knowledge-based approach for recognizing polyhedral scenes. In Proc. 13th IASTED International Conference on Applied Informatics (Austria
1995), M.H. Hamza (ed.), IASTED publications, 160−163, 1995.
Åñãáóßåò åðéóêüðçóçò êáé ðáñïõóéÜóåéò
1. Ð. ÓðõñÜêçò êáé Ã.Ê. Óôáìáôßïõ, ÍÝåò êáôåõèýíóåéò óôçí Êñõðôïãñáößá, ðáñïõóßáóç óôï
Ðñþôï Óõìðüóéï ÐëçñïöïñéêÞò êáé Åðé÷åéñçóéáêÞò ¸ñåõíáò ôùí Åëëçíéêþí Åíüðëùí
ÄõíÜìåùí, Ðïëåìéêü Ìïõóåßï, ÁèÞíá, 2−3 Íïåìâñßïõ, 1999.
2. Ð. ÓðõñÜêçò êáé Ã.Ê. Óôáìáôßïõ, ÁðïäïôéêÜ ðñùôüêïëëá ãéá ôçí áíß÷íåõóç êéíïýìåíùí
ùôáêïõóôþí óå äßêôõá õðïëïãéóôþí, ðáñïõóßáóç óôï Ðñþôï Óõìðüóéï ÐëçñïöïñéêÞò
êáé Åðé÷åéñçóéáêÞò ¸ñåõíáò ôùí Åëëçíéêþí Åíüðëùí ÄõíÜìåùí, Ðïëåìéêü Ìïõóåßï,
ÁèÞíá, 2−3 Íïåìâñßïõ, 1999. (Ïìéëßá óôçñéãìÝíç óå åñåõíçôéêÞ åñãáóßá ôùí Ç. Áíôùíïðïýëïõ,
Ð. ÓðõñÜêç, êáé Â. ÔáìðáêÜ.)
¢ëëåò óõããñáöéêÝò äñáóôçñéüôçôåò
ÊñáôÜ ìå ôïí ÊáèçãçôÞ ê. ÓðõñÜêç êáé ôïí Äñ. Ðáíáãéþôç ÍÜóôïõ ìßá ìüíéìç óôÞëç óôï
ðåñéïäéêü <<¢ìõíá êáé Äéðëùìáôßá>> áöéåñùìÝíç óå èÝìáôá êñõðôïãñáößáò êáé êñõðôáíÜëõóçò.
20