Âéïãñáöéêü Óçìåßùìá 1 Äåêåìâñßïõ 2013 ÐñïóùðéêÜ Óôïé÷åßá ¼íïìá: Åðþíõìï: ¼íïìá ãïíÝùí: ÔñÝ÷ïõóá èÝóç: Çìåñïìçíßá ãÝííçóçò: ÏéêïãåíåéáêÞ êáôÜóôáóç: Äéåýèõíóç: ÇëåêôñïíéêÞ äéåýèõíóç: ÃéÜííçò Óôáìáôßïõ Êùíóôáíôßíïò êáé Ìáñßá ÁíáðëçñùôÞò ÊáèçãçôÞò, ÔìÞìá Äéïßêçóçò Åðé÷åéñÞóåùí, ÐáíåðéóôÞìéï ÐÜôñáò êáé Óýìâïõëïò ôïõ ÔïìÝá ÁóöÜëåéáò Ðëçñïöïñéáêþí ÓõóôçìÜôùí óôï Éíóôéôïýôï Ôå÷íïëïãßáò Õðïëïãéóôþí êáé Åêäüóåùí - <<ÄÉÏÖÁÍÔÏÓ>> 17 Éáíïõáñßïõ 1968 óôï Âüëï ÓõæåõãìÝíïò ìå ôçí Åõãåíßá Ãåùñãßïõ-ÖùôåéíÞò Èåïäïóïðïýëïõ, ìå Ýíá ðáéäß ÐáíåðéóôÞìéï ÐÜôñáò, ÔìÞìá Äéïßêçóçò Åðé÷åéñÞóåùí, Ñßï, ÐÜôñá, 26504 [email protected] ÓðïõäÝò Áðïöïßôçóå áðü ôï ôìÞìá Ìç÷áíéêþí Çëåêôñïíéêþí Õðïëïãéóôþí êáé ÐëçñïöïñéêÞò ôïõ Ðáíåðéóôçìßïõ ÐÜôñáò ìå âáèìü <<Üñéóôá>> 8.86/10, ôïí Éïýíéï ôïõ 1990. Ôïí Éïýíéï ôïõ 1991 îåêßíçóå óôï ßäéï ôìÞìá ìåôáðôõ÷éáêÝò óðïõäÝò õðü ôçí åðßâëåøç ôïõ ÊáèçãçôÞ ê. ÅëåõèÝñéïõ Êõñïýóç óôçí ðåñéï÷Þ ôùí Èåìåëéþóåùí ôçò ÅðéóôÞìçò ôùí Õðïëïãéóôþí êáé ôï ÄåêÝìâñéï ôïõ 1997 õðåñáóðßóôçêå ìå åðéôõ÷ßá ôç äéäáêôïñéêÞ ôïõ äéáôñéâÞ. Êáè' üëç ôç äéÜñêåéá ôùí ìåôáðôõ÷éáêþí óðïõäþí ôïõ õðÞñîå õðüôñïöïò (EMY) ôïõ Éäñýìáôïò Êñáôéêþí Õðïôñïöéþí. Ôï 1999 ðåñÜôùóå óðïõäÝò óôï Åëëçíéêü Áíïéêôü ÐáíåðéóôÞìéï óôç ÈåìáôéêÞ Åíüôçôá <<ÁíïéêôÞ êáé åî ÁðïóôÜóåùò Åêðáßäåõóç>> êáé Ýëáâå Ðéóôïðïéçôéêü Ìåôáðôõ÷éáêÞò Åðéìüñöùóçò ìå âáèìü <<Üñéóôá>> 9.1/10. ÄéðëùìáôéêÞ Åñãáóßá Ç äéðëùìáôéêÞ ôïõ åñãáóßá åêðïíÞèçêå õðü ôçí åðïðôåßá ôïõ ÊáèçãçôÞ ê. ÁèáíÜóéïõ Ôóáêáëßäç êáé åß÷å ôßôëï Åðáíáæýãéóç áðü ôç Ñßæá ðñïò ôá Öýëëá ôùí Red-Black ÄÝíôñùí êáé ç ÓõìðåñéöïñÜ ôïõò óå ÐåñéâÜëëïíôá ÐáñÜëëçëçò Åðåîåñãáóßáò. ÄéäáêôïñéêÞ ÄéáôñéâÞ Ôï ÄåêÝìâñéï ôïõ 1997 õðåñáóðßóôçêå ìå åðéôõ÷ßá ôç äéäáêôïñéêÞ ôïõ äéáôñéâÞ ðïõ ðñáãìáôïðïéÞèçêå õðü ôçí åðßâëåøç ôïõ ÊáèçãçôÞ ê. ÅëåõèÝñéïõ Êõñïýóç êáé åß÷å ôßôëï Èåùñßá êáé ÅöáñìïãÝò ÐñïâëçìÜôùí Éêáíïðïßçóçò Ðåñéïñéóìþí, ÊáôáíåìçìÝíï ðåñéâÜëëïí-ÐáñÜëëçëïé êáé ôõ÷áéïðïéçìÝíïé áëãüñéèìïé-Ìç ìïíüôïíïé óõëëïãéóìïß êáé ôï ÖåâñïõÜñéï ôïõ 1998 ïñêßóôçêå äéäÜêôïñáò. ÌåôáäéäáêôïñéêÝò óðïõäÝò 1 Áðü ôï ÓåðôÝìâñéï ôïõ 1998 ìÝ÷ñé ôï ÓåðôÝìâñéï ôïõ 1999 Þôáí ìåôáäéäáêôïñéêüò õðüôñïöïò óôï ÐáíåðéóôÞìéï ôïõ Carleton óôçí Ottawa ôïõ ÊáíáäÜ. Åß÷å ëÜâåé ìßá õðïôñïößá NATO ìÝóù ôïõ Åëëçíéêïý Õðïõñãåßïõ ÅèíéêÞò Ïéêïíïìßáò (áñéèìüò õðïôñïößáò 106384/∆OO 1222/2-798) êáé ìßá õðïôñïößá áðü ôï Êáíáäéêü Ýñãï MITACS ìå ôïí ôßôëï CANCCOM (Complex Adaptive Networks for Computing and Communication). ÊáôÜ ôç äéÜñêåéá ôùí ìåôáäéäáêôïñéêþí ôïõ óðïõäþí, åêôüò áðü ôçí åñåõíçôéêÞ ôïõ äñáóôçñéüôçôá, äßäáîå êáé ìáèÞìáôá ãéá Ðñïãñáììáôéóìü ÓõóôçìÜôùí ìå ÷ñÞóç áíôéêåéìåíïóôñáöïýò ðñïãñáììáôéóìïý, óôç ãëþóóá C++. ÐñïóêëÞóåéò ãéá ïìéëßá Þ åñåõíçôéêÞ óõíåñãáóßá ìÝóá áðü áíôáãùíéóôéêÜ ðñïãñÜììáôá • • • • • ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï PI4EST, the 8th International Summer School on Privacy and Identity Management for Emerging Services and Technologies. This Summer School is hosted by PI.lab in Nijmegen, the Netherlands on 17-21 June 2013. Ðñüóêëçóç ãéá ðáñïõóßáóç ôçò ðéëïôéêÞò åöáñìïãÞò ôïõ åñåõíçôéêïý Ýñãïõ ABC4Trust ùò åöáñìïãÞ áñéóôåßáò óôï CYBER SECURITY & PRIVACY EU FORUM 2013 (CSP EU FORUM), Brussels: 18-19 April, 2013. ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï 6th Panhellenic Conference on Informatics with international participation (PCI 2012) ìå èÝìá ôéò ôå÷íïëïãßåò Privacy by Design ìå Ýìöáóç óôá Attribute Based Credentials êáé ôéò åöáñìïãÝò ôïõò. Ìüíïò åñåõíçôÞò ôïõ Ýñãïõ Dynamically Reconfigurable block ciphers through parallel substitution box construction, contract no. HPRI-1999-CT-00071. Ôï Ýñãï õëïðïéÞèçêå áðü 8 Óåðôåìâñßïõ Ýùò 20 Óåðôåìâñßïõ 2008 óôéò åãêáôáóôÜóåéò ôïõ Barcelona Supercomputing Center (BSC), ðïõ åßíáé ìÝëïò ôïõ Åõñùðáúêïý ïñãáíéóìïý HPC-Europa ãéá High Performance Computing. Óôá ðëáßóéá ôïõ Ýñãïõ áíáðôý÷èçêå ðáñÜëëçëï ëïãéóìéêü êáôáóêåõÞò s-boxes ìå õøçëÞ ìç ãñáììéêüôçôá, ìå ÷ñÞóç ôçò âéâëéïèÞêçò MPICH óôïí ðáñÜëëçëï õðïëïãéóôÞ ôïõ BSC MareNostrum (10240 processing cores, BladeCenter JS21 Cluster, PPC 970, 2.3 GHz, Myrinet). ¸íáò åê ôùí êýñéùí ïìéëçôþí óôéò çìåñßäåò Ôå÷íïëïãéêÞò Êáéíïôïìßáò êáé Áñéóôåßáò ôïõ Ðåñéöåñåéáêïý Ðüëïõ Êáéíïôïìßáò ÄõôéêÞò ÅëëÜäïò, 22−25 Óåðôåìâñßïõ 2008, ÐÜôñá. Ôßôëïé ïìéëéþí: { { • ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï 2ï Åðéóôçìïíéêü Óõìðüóéï Öïéôçôþí ôïõ ôìÞìáôïò Ìç÷áíéêþí Ðëçñïöïñéáêþí êáé Åðéêïéíùíéáêþí ÓõóôçìÜôùí ôïõ Ðáíåðéóôçìßïõ Áéãáßïõ, ìå èÝìá ÁóöÜëåéá êáé Ðñïóôáóßá ôçò Éäéùôéêüôçôáò óôçí Êïéíùíßá ôçò Ðëçñïöïñßáò, 23−24 Íïåìâñßïõ 2007. Ôßôëïò ïìéëßáò: { • Ï ¢îïíáò ÁóöÜëåéáò Ðëçñïöïñéáêþí ÓõóôçìÜôùí êáé Äéêôýùí. ÓõóôÞìáôá õðïóôÞñéîçò çëåêôñïíéêÞò øçöïöïñßáò: áðáéôÞóåéò êáé ôå÷íéêÝò áíôéìåôþðéóÞò ôïõò - ç ðëáôöüñìá ÐÍÕÊÁ. A Trust-centered Approach for Building E-voting Systems. ÓåðôÝìâñéïò 2002: ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï ÐáíåðéóôÞìéï ôïõ Liverpool, ÔìÞìá ÅðéóôÞìçò ôùí Õðïëïãéóôþí, ãéá íá äþóåé ïìéëßåò óôá ðëáßóéá åñåõíçôéêïý óåìéíáñßïõ ôïõ ôìÞìáôïò. Ôï èÝìá ôùí ïìéëéþí Þôáí ôá êáôùöëéêÜ öáéíüìåíá óôçí ÅðéóôÞìç ôùí Õðïëïãéóôþí êáé ôçò ÖõóéêÞò. 2 • • • • Áýãïõóôïò 2002: ÐñïóêåêëçìÝíïò ïìéëçôÞò óôï workshop Random Structures óôï Isaac Newton Institute for Mathematical Sciences, Cambridge, ìå èÝìá ôçí äéáôÞñçóç ôõ÷áéüôçôáò óå áëãüñéèìïõò äéá÷åßñéóçò ôõ÷áßùí óõíäõáóôéêþí äïìþí. Éïýëéïò 2001: ÐñïóêëåêëçìÝíïò ïìéëçôÞò óôï Ôñßôï ÐáíåëëÞíéï Óõìðüóéï ËïãéêÞò (ìå äéåèíåßò óõììåôï÷Ýò) ðïõ ðñáãìáôïðïéÞèçêå óôá Áíþãåéá, óôï ÇñÜêëåéï ôçò Êñçôçò. Ç ïìéëßá ôïõ Þôáí ãýñù áðü èåùñçôéêÜ æçôÞìáôá êáé åöáñìïãÝò ôïõ ÐñïâëÞìáôïò Éêáíïðïßçóçò Ðåñéïñéóìþí. ÄåêÝìâñéïò 1996: ÅðéóêÝðôçò óôï Éíóôéôïýôï ÐëçñïöïñéêÞò Max-Planck óôï Æááñìðñïýêåí ôçò Ãåñìáíßáò ãéá äÝêá çìÝñåò. Ðáñïõóßáóå ôçí åñåõíçôéêÞ ôïõ äñáóôçñéüôçôá åðÜíù óôçí õðïëïãéóôéêÞ ðïëõðëïêüôçôá ðáñÜëëçëçò åðßëõóçò óôï Ðñüâëçìá Éêáíïðïßçóçò Ðåñéïñéóìþí êáèþò åðßóçò êáé ôçò åðéâïëÞò ÌåñéêÞò ÔïðéêÞò ÓõíÝðåéáò óå Äßêôõá Ðåñéïñéóìþí. ÄåêÝìâñéïò 1993: ÅðéóêÝðôçò óôï ÐáíåðéóôÞìéï ôçò Êáñëóñïýçò óôç Ãåñìáíßá, ãéá ìßá åâäïìÜäá. Ðáñïõóßáóå ôçí åñåõíçôéêÞ ôïõ äñáóôçñéüôçôá óôï Ðñüâëçìá Éêáíïðïßçóçò Ðåñéïñéóìþí. ÐñïóêëÞóåéò ãéá äéäáóêáëßá óå äéåèíÞ ó÷ïëåßá • • • • ÐñïóêåêëçìÝíïò óôï 4th AIT Annual Workshop on PRactical AspeCts of SEcurity - PRACSE 2009 ðïõ äéïñãÜíùóå ôï Athens Information Technology (AIT) center óôçí ÁèÞíá áðü 11/6/2009 Ýùò 12/6/2009. Ôï èÝìá ôçò ïìéëßáò Þôáí ôï åîÞò: - Principles of good block-cipher design: the S-box parameter. ÐñïóêåêëçìÝíïò óôï 2nd AIT Annual Workshop on PRactical AspeCts of SEcurity - PRACSE 2007 ðïõ äéïñãÜíùóå ôï Athens Information Technology (AIT) center óôçí ÁèÞíá áðü 2/11/2007 Ýùò êáé 3/11/2007. Ôï èÝìá ôçò ïìéëßáò Þôáí ôï åîÞò: - A trust-centered approach for building e-voting systems. ÐñïóêåêëçìÝíïò óôï 1st AIT Annual Workshop on PRactical AspeCts of SEcurity - PRACSE 2006 ðïõ äéïñãÜíùóå ôï Athens Information Technology (AIT) center óôçí ÁèÞíá áðü 16/6/2006 Ýùò êáé 17/6/2006. Ôá èÝìáôá ôùí äýï ïìéëéþí ðïõ äüèçêáí Þôáí ôá åîÞò: - AUTHENTICATION PROTOCOLS: Notions of Authentication, Basic techniques and Typical Attacks. - EVALUATION OF REAL WORLD PROTOCOL STANDARDS: IPSec, SSH, SSL, Kerberos. ÐñïóêåêëçìÝíïò íá äéäÜîåé ìßá åíüôçôá ó÷åôéêÜ ìå ÊáôùöëéêÜ Öáéíüìåíá óôçí ÅðéóôÞìç ôùí Õðïëïãéóôþí óôï The Logic and Interaction Programme, 28 Éáíïõáñßïõ−1 Ìáñôßïõ 2002, ðïõ Ýëáâå ÷þñá óôç Ìáóóáëßá, Ãáëëßá, êáé óõíäéïñãáíþèçêå áðü ôï Institut de Mathematiques de Luminy (IML) êáé ôï Laboratoire d' Informatique Fondamentale de Marseille (LIF). ÐñïóêëÞóåéò ãéá êñßóç åñåõíçôéêþí åñãáóéþí óå äéåèíÞ ðåñéïäéêÜ • Ðñüóêëçóç ãéá êñßóç Üñèñùí óôï Mathematical Reviews ôçò American Mathematical Society (AMS). 3 • Ôáêôéêüò êñéôÞò óôá ðåñéïäéêÜ Computers & Security, Theoretical Computer Science, SIAM journal on Computing, Discrete Mathematics, Computer Magazine IEEE, Transactions on Computers IEEE, Journal of Systems and Software. Óõììåôï÷Þ óå åðéôñïðÝò ðñïãñÜììáôïò óõíåäñßùí • • • • • • • • • • • • • • • • ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 13th International Conference on Cryptology and Network Security (CANS-2014). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Special Session on Trusted Computing for Critical Information Infrastructures - T(CI)2. The event was held in conjunction with the 4th International Conference on Information, Intelligence, Systems and Applications - IISA2013, 10-12 July 2013. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Fourth International Conference on Technical and Legal Aspects of the e-Society 2012 (CYBERLAWS 2013). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Sixth International Conference on Sensor Technologies and Applications - SENSORCOMM 2012. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Third International Conference on Technical and Legal Aspects of the e-Society 2012 (CYBERLAWS 2012). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ IEEE Symposium on Wireless Technology & Applications 2012 (ISWTA 2012). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ International Symposium on Foundation of Open Source Intelligence and Security Informatics, 2012 (FOSINT-SI 2012). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The IADIS e-Commerce 2012 conference. ÌÝëïò ôçò åðéóôïðÞò ðñïãñÜììáôïò ôïõ European Intelligence and Security Informatics Conference (EISIC 2012). ÌÝëïò ôçò åðéóôïðÞò ðñïãñÜììáôïò ôïõ 7th IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2011). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 7th European Conference on Computer Network Defense (EC2ND 2011). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The 5th International Conference on Information Security and Assurance (ISA 2011). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 7th International Conference on Global Security, Safety & Sustainability (ICGS3 11). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The IADIS e-Commerce 2011 conference. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Second International Conference on Security-enriched Urban Computing and Smart Grid (SUComS) 2011. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011), Security Track. 4 • • • • • • • • • • • • • • • • • • ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The Sixth IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'10) ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ First International Conference on Security-enriched Urban Computing and Smart Grid (SUComS) 2010. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Webit eGov Summit, 2010, organized by the eAcademy, eEducation Institute of Bulgaria. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ APSIPA (Asia-Pacific Signal and Information Processing Association) Annual Summit and Conference 2010. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ Seventh European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI 2010). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 15th European Symposium on Research in Computer Security (ESORICS 2010). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The IADIS e-Commerce 2010 conference. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 2nd International Conference on Advanced Science and Technology (AST 2010). ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ The 4th International Conference on Information Security and Assurance (ISA 2010). ÐñïóêåêëçìÝíïò ôï ÄåêÝìâñéï 2009 ùò rapporteur óôçí êñßóç Åõñùðáúêþí Ýñãùí ôïõ 7ïõ ðëáéóßïõ óôçí ðñüóêëçóç PHOTONICS. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ International Conference on Information Security and Cryptology (Inscrypt), Inscrypt 2009, Inscrypt 2010. ÌÝëïò ôçò åðéôñïðÞò ðñïãñÜììáôïò ôïõ 1st International Conference on Sensor Networks Applications, Experimentation and Logistics (SENSAPPEAL 2009). ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò ôïõ 2009 International Conference on Security and Cryptography (SECRYPT 2009). ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò ôïõ Fifth International Conference on Security and Privacy in Communication Networks (SecureComm 2009). ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò ôïõ 2009 International Conference on Security Technology (SecTech 2009), 2010 International Conference on Security Technology (SecTech 2010). ÐñïóêåêëçìÝíïò äýï öïñÝò (2006 êáé 2007) ùò åéäéêüò óå èÝìáôá êñõðôïãñáößáò êáé áóöÜëåéáò ðëçñïöïñéáêþí óõóôçìÜôùí ãéá êñßóç Åõñùðáúêþí Ýñãùí ôïõ 7ïõ ðëáéóßïõ. ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Programm Committee) óôï ECAI 2008 Workshop The Quest for Approximate and Exact Equilibria in Games (ExCalibur). ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Programm Committee) óôï óõíÝäñéï SECRYPT (International Conference on Security and Cryptography) 2008. SECRYPT is part of ICETE, the International Joint Conference on e-Business and Telecommunications. 5 • • • • • • • • ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï 5th European PKI Workshop (EUROPKI 2008). ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï IADIS Conference on e-Commerce 2007. ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï 6th International Conference on AD-HOC Networks & Wireless (ADHOC-NOW 2006). ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï Inscrypt (formerly CISC - Conference on Information Security and Cryptology) (CISC 2006, INSCRYPT 2007). ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) óôï International Workshop on Information Security Applications (WISA 2005, WISA 2006, WISA 2007). ÌÝëïò ôçò ÅðéôñïðÞò ÐñïãñÜììáôïò (Program Committee) êáé åðéêåöáëÞò ôçò ÏñãáíùôéêÞò ÅðéôñïðÞò (Organizing Committee) óôï 9ï Colloquium on Structural Information and Communication Complexity (SIROCCO '02). ÌÝëïò ôçò ÏñãáíùôéêÞò ÅðéôñïðÞò (Organizing Committee) óôï Third Annual European Symposium on Algorithms (ESA '95). ÌÝëïò ôçò ÏñãáíùôéêÞò ÅðéôñïðÞò óôï 2ï Colloquium on Structural Information and Communication Complexity (SIROCCO '95). ÓõóôÜóåéò • • • • • Professor Svante Janson, Uppsala University, Department of Mathematics P. O. Box 480 S-751 06 Uppsala, Sweden. e-mail: [email protected], tel.: +46 18 4713188, fax.: +46 18 4713201. Professor Lefteris Kirousis, University of Patras, School of Engineering, Department of Computer Engineering and Informatics, 26500 Rio, Patras, Greece. e-mail: [email protected], tel.: +30 61 99 77 02, fax.: +30 61 99 19 09. Professor Evangelos Kranakis, Carleton University, School of Computer Science, 1125 Colonel By Drive, Ottawa, Ontario, K1S 5B6, Canada. e-mail: [email protected], tel.: (613) 520-4330, fax.: (613) 520-4334. Professor Danny Krizanc, Wesleyan University, Mathematics Department, Computer Science Group, Middletown, CT 06459 USA. email: [email protected], tel.: 860-685-2186, fax.: 860-685-2571. Professor David Peleg, Faculty of Mathematics and Computer Science, The Weizmann Institute of Science, Rehovot 76100, Israel. e-mail: [email protected], tel.: +972-8-934-3478, fax.: +972-8-934-4122. Åìðåéñßá óå åñåõíçôéêÜ êáé áíáðôõîéáêÜ Ýñãá • Ðåñéöåñåéáêüò Ðüëïò Êáéíïôïìßáò ÄõôéêÞò ÅëëÜäáò (ÐÐÊ-ÄÅ). ×ñüíïò åêôÝëåóçò Ï Ðåñéöåñåéáêüò Ðüëïò Êáéíïôïìßáò ÄõôéêÞò ÅëëÜäáò (ÐÐÊ-ÄÅ) åßíáé ìéá Ýíùóç öïñÝùí ôïõ äçìüóéïõ êáé éäéùôéêïý ôïìÝá, ìå óôü÷ï ôçí áíÜðôõîç, ðñïþèçóç êáé åêìåôÜëëåõóç ôçò êáéíïôïìßáò óôçí ÐåñéöÝñåéá ÄõôéêÞò ÅëëÜäáò (ÐÄÅ). Ýñãïõ: 2007-2008. 6 Êåíôñéêüò óôü÷ïò åßíáé ç ïñãÜíùóç êáé éó÷õñïðïßçóç ôùí äåóìþí ìåôáîý ôùí Åñåõíçôéêþí / Ôå÷íïëïãéêþí & Åðé÷åéñçìáôéêþí ÖïñÝùí ôçò ÐÄÅ ìå óêïðü ôçí åêðüíçóç åíåñãåéþí ðïõ åíéó÷ýïõí ôéò ôå÷íïëïãéêÝò êáé êáéíïôïìéêÝò åðéäüóåéò ôçò ÐåñéöÝñåéáò. ÁðïôÝëåóìá ôùí ðñïóðáèåéþí óôá ðëáßóéá ôïõ Ýñãïõ áõôïý Þôáí ç ÐåñéöåñåéáêÞ Ôå÷íïëïãéêÞ Ðëáôöüñìá ôïõ ÐÐÊ-ÄÅ (http://www.westplatform.gr/) ãéá ôçí ðñïáãùãÞ ôçò åöáñìïóìÝíçò Ýñåõíáò óôçí ðåñéï÷Þ ôùí âéïìç÷áíéêþí óõóôçìÜôùí & åðéêïéíùíéþí, ôïõ âéïìç÷áíéêïý åëÝã÷ïõ, ôùí åíóùìáôùìÝíùí óõóôçìÜôùí êáé ôçò áóöáëåßáò ðëçñïöïñéáêþí óõóôçìÜôùí êáé äéêôýùí. Ï ê. Óôáìáôßïõ óõììåôåß÷å ùò êýñéïò åñåõíçôÞò óôïí ôÝôáñôï Üîïíá, ôçò ÁóöÜëåéáò Ðëçñïöïñéáêþí ÓõóôçìÜôùí êáé Äéêôýùí êáé ç óõììåôï÷Þ ôïõ åðéêåíôñþèçêå óå èÝìáôá êñõðôïãñáößáò êáé áóöÜëåéáò êáèþò êáé ôçò åöáñìïãÞò áõôþí ãéá ôçí õðïóôÞñéîç ôçò áóöáëïýò ëåéôïõñãßáò åðé÷åéñÞóåùí êáé ïñãáíéóìþí. • ¸ñåõíá êáé ÁíÜðôõîç ÓõóôçìÜôùí ÇëåêôñïíéêÞò Øçöïöïñßáò âáóéóìÝíùí óå ÔõðéêÝò Ìåèüäïõò Ó÷åäßáóçò êáé Äéá÷åßñéóçò Êéíäýíùí ìå åóôßáóç óôçí ÐñïóÝëêõóç ôçò Åìðéóôïóýíçò ôïõ Ðïëßôç - ÐÍÕÊÁ (http://www.pnyka.cti.gr). ×ñüíïò åêôÝëåóçò Ýñãïõ: 2006 - 2008. Ôï åñåõíçôéêü/áíáðôõîéáêü Ýñãï ÐÍÕÊÁ, ìå ÷ñçìáôïäüôçóç áðü ôçí ÃåíéêÞ Ãñáììáôåßá ¸ñåõíáò êáé Ôå÷íïëïãßáò, õëïðïéÞèçêå áðü ôï Åñåõíçôéêü Áêáäçìáúêü Éíóôéôïýôï Ôå÷íïëïãßáò Õðïëïãéóôþí (EA ITY) óå óõíåñãáóßá ìå ôçí åôáéñßá ÅXPERTNET ÐñïçãìÝíåò ÅöáñìïãÝò ÁÅ óôï ðëáßóéï åíüò åñåõíçôéêïý ðñïãñÜììáôïò ôçò ÃÃÅÔ. Óôü÷ïò Þôáí ç ó÷åäßáóç êáé õëïðïßçóç åíüò ïëïêëçñùìÝíïõ óõóôÞìáôïò õðïóôÞñéîçò çëåêôñïíéêÞò øçöïöïñßáò ìÝóù Internet, ìå Ýìöáóç óôçí ðñïóôáóßá ôçò éäéùôéêüôçôáò ôïõ ðïëßôç. Ôï óýóôçìá ÐÍÕÊÁ õðïóôçñßæåé üëá ôá óôÜäéá ìéáò çëåêôñïíéêÞò øçöïöïñßáò üðùò åããñáöÞ/ðéóôïðïßçóç, õðïâïëÞ øÞöïõ, êáôáìÝôñçóç áðïôåëåóìÜôùí êáé åðáëÞèåõóç. Ãéá ôç ìåãéóôïðïßçóç ôïõ âáèìïý ðñïóôáóßáò ôçò éäéùôéêüôçôáò ôïõ øçöïöüñïõ, ôï óýóôçìá åíóùìáôþíåé ðïëëÝò ôå÷íïëïãéêÝò êáéíïôïìßåò üðùò ðëÞñùò êáôáíåìçìÝíç áñ÷éôåêôïíéêÞ, ïìïìïñöéêÞ êñõðôïãñÜöçóç êáôùöëßïõ, óõóêåõÝò õëéêïý ãéá ôçí áðïèÞêåõóç ôùí êëåéäéþí êëð. êáé Ý÷åé áíáðôõ÷èåß åî' ïëïêëÞñïõ ìå åñãáëåßá áíïéêôïý êþäéêá Ýôóé þóôå íá äéåõêïëýíåôáé ç åðáëçèåõóéìüôçôÜ ôïõ. Ìðïñåß, åðßóçò, íá ðáñáìåôñïðïéçèåß ãéá íá õðïóôçñßîåé äéáöïñåôéêÝò ìïñöÝò øçöïöïñßáò, áðü áðëÝò äéáäéêáóßåò Ýêöñáóçò ãíþìçò ìÝ÷ñé åêëïãÝò êáé äçìïøçößóìáôá ìåãÜëçò êëßìáêáò. Ï ó÷åäéáóìüò ôïõ óõóôÞìáôïò Ýãéíå ìå ôç ÷ñÞóç ôõðéêþí ìåèüäùí áíÜëõóçò êáé äéá÷åßñéóçò êéíäýíùí üðùò ôï ðëáßóéï CORAS äßíïíôáò Ýôóé Ýìöáóç óôçí ðñïóÝëêõóç ôçò äçìüóéáò åìðéóôïóýíçò. Ôï óýóôçìá åöáñìüóôçêå ìå åðéôõ÷ßá óå ìéá äïêéìáóôéêÞ çëåêôñïíéêÞ øçöïöïñßá ìåôáîý ôùí ìåëþí ôïõ ÔÅÅ ÄõôéêÞò ÅëëÜäáò åíþ óõììåôåß÷å ðáñÜëëçëá óôï äéáãùíéóìü e-voting ðïõ äéïñãÜíùóå ôï Competence Center for Electronic Voting and Participation (http://www.e-voting-competition.at/) ìå ÷ïñçãü ôïí áõóôñéáêü ïñãáíéóìü Internet Foundation Austria (IFA) üðïõ êáé áðÝóðáóå ôï ðñþôï âñáâåßï. • Ôå÷íéêüò óýìâïõëïò ôçò EXPERTNET ÐñïçãìÝíåò ÅöáñìïãÝò ÁÅ óå Ýñãá ìå êýñéá óõíéóôþóá ôçí áóöÜëåéá ðëçñïöïñéáêþí óõóôçìÜôùí. ×ñüíïò óõíåñãáóßáò: 2004- . Ï ê. Óôáìáôßïõ äéáôÝëåóå ôå÷íéêüò óýìâïõëïò óå ôÝóóåñá Ýñãá ó÷åôéêÜ ìå ôçí áóöÜëåéá ðëçñïöïñéáêþí óõóôçìÜôùí êáé ôçí çëåêôñïíéêÞ äéáêõâÝñíçóç. Óôü÷ïò ôïõ Ýñãïõ Þôáí ç äçìéïõñãßá ìßáò ïëïêëçñùìÝíçò ðëáôöüñìáò ãéá ôç óýíäåóç äçìáñ÷åßùí (óå åõñùðáúêü åðßðåäï) êáé ôçí õðïóôÞñéîç áóöáëïýò áíôáëëáãÞò åããñÜöùí ìåôáîý ôïõò (ìå ÷ñÞóç êáôÜëëçëùí êñõðôïãñáöéêþí ôå÷íéêþí êáé Õðïäïìþí Äçìüóéïõ Êëåéäéïý - PKI). Ôï Ýñãï áõôü åß÷å ùò óôü÷ï ôçí õëïðïßçóç ìßáò ðëáôöüñìáò äéá÷åßñéóçò çëåêôñïíéêþí ôéìïëïãßùí ìå áóöÜëåéá óôçñéãìÝíç óå ÕðïäïìÞ Äçìüóéïõ Êëåéäéïý - PKI êáé êáôÜëëçëá êñõðôïãñáöéêÜ ðñùôüêïëëá. Ï óôü÷ïò ôïõ Ýñãïõ Þôáí ç äçìéïõñãßá åíüò áíïéêôïý óõóôÞìáôïò, ðïõ êáëåßôáé e-city Platform, ãéá ôçí õðïóôÞñéîç ëåéôïõñãéþí çëåêôñïíéêÞò äéáêõâÝñíõóçò -2007 (i) IST STREP Ýñão e-Mayor: (ii) IST eTen Ýñãï Selis: (iii) IST IP Ýñãï Intelcities: 7 ìå áóöÜëåéá êáé äéáëåéôïõñãéêüôçôá. Ôï Ýñãï áõôü åß÷å ùò óôï÷ï ôç äçìéïõñãßá óõóôÞìáôïò âéïìåôñéêïý åëÝã÷ïõ åéóåñ÷ïìÝíùí óå áèëçôéêïýò ÷þñïõò ìå âÜóç ôá ÷áñáêôçñéóôéêÜ ôùí äáêôõëéêþí ôïõò áðïôõðùìÜôùí (iv) ¸ñãï õðïóôçñéæüìåíï áðü ÃÃÅÔ, Bioathletics: • Ðáéãíßäéá ðñüâëåøçò áñéèìþí EXTRA 5 êáé SUPER 3 ôïõ ÏÐÁÐ. ×ñüíïò åêôÝëåóçò Óôá ðëáßóéá ôïõ Ýñãïõ áõôïý, ï ê. Óôáìáôßïõ ó÷åäßáóå ôï ëïãéóìéêü êáé ôçí áñ÷éôåêôïíéêÞ õëéêïý ôïõ åíüò óõóôÞìáôïò ãÝíåóçò ôõ÷áéùí áñéèìþí ãéá ôá íÝá ðáéãíßäéá ôïõ ÏÐÁÐ EXTRA 5 êáé SUPER 3. Åðéðñüóèåôá, õëïðïßçóå ôá ðéï êñßóéìá êñõðôïãñáöéêÜ ìÝñç ôïõ óõóôÞìáôïò êáé äéåýèõíå ïìÜäá ðñïãñáììáôéóôþí ôïõ ÅÁÉÔÕ ðïõ åðéôÝëåóå ôçí ôåëéêÞ ïëïêëÞñùóç. Ôï óýóôçìá ãÝíåóçò ôùí áñéèìþí ðïõ ó÷åäßáóå ï ê. Óôáìáôßïõ ðåñéëáìâÜíåé ôá ðéï êÜôù êýñéá ìÝñç: Ýñãïõ: 2001--2002. 1. Ôñåéò ãåíÞôñéåò ðñáãìáôéêÜ ôõ÷áßùí áñéèìþí (ìßá âáóéóìÝíç óå shot-noise óå äßïäï zener, ìßá âáóéóìÝíç óå èåñìéêü èüñõâï óå áíôßóôáóç êáé ìßá âáóéóìÝíç óôçí ôõ÷áéüôçôá óôç äéáöïñÜ öÜóçò ìåôáîý äýï ðçãþí ÷ñïíéóìïý óôï motherboard ôïõ õðïëïãéóôÞ). 2. Äýï êñõðôïãñáöéêÜ áóöáëåßò ãåíÞôñéåò øåõäïôõ÷áßùí áñéèìþí, BBS êáé RSA, êáé äýï âáóéóìÝíåò óå êáôÜëëçëá ôñïðïðïéçìÝíïõò block ciphers. Åðßóçò, óõìðåéëÞöèçêáí êáé ïé áëãüñéèìïé Ôïõò áëãüñéèìïõò Ì êáé  ãéá ôçí ðïëýðëåîç ôçò åîüäïõ ôùí ðáñáðÜíù áëãïñßèìùí. (Ïé M êáé B ðåñéãñÜöïíôáé óôï âéâëßï Seminumerical Algorithms ôïõ Knuth.) • Ôç ó÷åäßáóç êáé õëïðïßçóç óõìðëçñþíïõí, ìåôáîý Üëëùí, åéäéêÜ ó÷Þìáôá bit-commitment, åðåîåñãáóßáò seeds (ó÷Þìá Naor-Reingold), signature verification, cross-verification ôùí ðáñáãüìåíùí áñéèìþí ìÝóá áðü ôçí åããñáöÞ ôïõò óå CD-ROM áìÝóùò ìåôÜ ôçí ðáñãùãÞ ôïõò, êáé ðéóôïðïßçóçò ôçò ôáõôüôçôáò ôùí õðïëïãéóôþí ðïõ ðáñÜãïõí ôïõò áñéèìïýò ôùí êëçñþóåùí. Ôï Åõñùðáúêü áõôü Ýñãï åß÷å ùò óôü÷ï ôçí ðáñáãùãÞ åíüò ïëïêëçñùìÝíïõ óõóôÞìáôïò ãéá ôçí ðñïóôáóßá DVD-ROM áðü áíôéãñáöÞ ôï ïðïßï ðåñéëáìâÜíåé ìç÷áíéóìïýò õøçëÞò áóöÜëåéáò ãéá ôçí öõóéêÞ ðñïóôáóßá ôïõ DVD-ROM áðü áíôéãñáöÞ (ôï ïðïßï åßíáé Þäç ðáôÝíôá ôçò åôáéñßáò MLS ðïõ åßíáé êáé ç åôáéñßá õðåýèõíç ôïõ Ýñãïõ) êáé ãéá ôçí ðñïóôáóßá ôùí äåäïìÝíùí ôïõ (êáôÜ ôçí áðïèÞêåõóç êáé ôç ìåôáöïñÜ ôïõò). Ðéï óõãêåêñéìÝíá, ç ïìÜäá ôçí ïðïßá äéåõèýíåé ï ê. Óôáìáôßïõ åß÷å áíáëÜâåé ôá õðïÝñãá ôçò êñõðôïãñÜöçóçò/áðïêñõðôïãñÜöçóçò äåäïìÝíùí ìå áëãïñéèìéêÜ ðáñáãüìåíïõò Feistel êñõðôáëãüñéèìïõò âáóéóìÝíïõò óôç ìåèïäïëïãßá ó÷åäßáóçò ôïõ CAST-128, ôçò õäáôïãñÜöçóçò øçöéáêþí áñ÷åßùí Þ÷ïõ (audio watermarking) êáé ôç äçìéïõñãßá åéäéêþí âéâëéïèçêþí ëïãéóìéêïý êñõðôïãñáößáò äçìüóéïõ êëåéäéïý êáé áëãüñéèìùí êñõðôáíÜëõóçò ìå ÷ñÞóç Åëëåéðôéêþí Êáìðõëþí ãéá ôï ÷ôßóéìï áóöáëþí åöáñìïãþí çëåêôñïíéêïý åìðïñßïõ. ÐÝñá áðü ôçí åðßâëåøç ôçò ïìÜäáò, áíÝëáâå êáé ðåñÜôôùóå ðñïóùðéêÜ ôï ìÝñïò ôçò êáôáóêåõÞò ôùí åöáñìïãþí êñõðôïãñÜöçóçò/áðïêñõðôïãñÜöçóçò üðïõ ó÷åäßáóå êáé õëïðïßçóç Ýíá ãåíéêü êñõðôáëãüñéèìï block ìå åðáíáðñïóäéïñßóéìá (reconfigurable) êïõôéÜ áíôéêáôÜóôáóçò (substitution boxes Þ s-boxes) ðïõ âáóßæåôáé óôçí ðáñáãùãÞ êáé óõíäõáóìü Boolean óõíáñôÞóåùí bent Ýôóé þóôå ïé êñõðôáëãüñéèìïé íá åßíáé áíèåêôéêïß óôç ãñáììéêÞ êáé äéáöïñéêÞ êñõðôáíÜëõóç. Óôï êïììÜôé ôçò õäáôïãñÜöçóçò øçöéáêþí áñ÷åßùí Þ÷ïõ, ó÷åäßáóå êáé õëïðïßçóå ôï ìÝñïò ôçò äçìéïõñãßáò ôïõ øçöéáêïý õäáôïãñáöÞìáôïò ìå ÷ñÞóç ôçò èåùñßáò êáôùöëéêþí öáéíïìÝíùí óå õðïëïãéóôéêÜ äýóêïëá ðñïâëÞìáôá Ýôóé IST Ýñãï ``ASPIS''. ×ñüíïò åêôÝëåóçò Ýñãïõ: 2000--2002. 8 • • þóôå ôá õäáôïãñáöÞìáôá íá áíôéðñïóùðåýïõí óôéãìéüôõðá ôùí ðñïâëçìÜôùí áõôþí. Ðéï óõãêåêñéìÝíá, ÷ñçóéìïðïßçóå ôï NP-ðëÞñåò ðñüâëçìá ôïõ ÷ñùìáôéóìïý åíüò ãñáöÞìáôïò ìå 3 ôï ðïëý ÷ñþìáôá (3-COLORING) ãéá íá äçìéïõñãåß óôéãìéüôõðá (ãñáöÞìáôá) ôïõ ðñïâëÞìáôïò ðïõ Ý÷ïõí Ýíá óõãêåêñéìÝíï ÷ñùìáôéóìü êáé ðïõ âñßóêïíôáé óôçí ðåñéï÷Þ ðïõ, ðåéñáìáôéêÜ, äéáöáßíåôáé íá óõóóùñåýïíôáé ðïëëÜ äýóêïëá íá åðéëõèïýí óôéãìéüôõðá. Ãíþóç ôïõ ÷ñùìáôéóìïý, óõíåðÜãåôáé ôáõôïðïßçóç ôïõ ÷ñÞóôç. ÔÝëïò, åß÷å ìåãÜëç óõììåôï÷Þ óôï ìÝñïò ôçò ó÷åäßáóçò êáé õëïðïßçóçò ôïõ ëïãéóìéêïý êñõðôïãñáößáò åëëåéðôéêþí êáìðõëþí ìå êáëÝò êñõðôïãñáöéêÝò éäéüôçôåò, ÷ñçóéìïðïéþíôáò ôçí ôå÷íéêÞ ôïõ Ìéãáäéêïý Ðïëëáðëáóéáóìïý (Complex Multiplication) ìå áñéèìçôéêÞ ìéãáäéêþí áñéèìþí áðåñéüñéóôçò áêñßâåéáò. : Áõôü ôï Ýñãï åß÷å ùò óôü÷ï ôçí áíÜðôõîç êáé ôç äïêéìÞ ìéáò ïëïêëçñùìÝíçò ìåèïäïëïãßáò áíÜëõóçò áóöÜëåéáò êáé åðéêéíäõíüôçôáò óå åöáñìïãÝò üðïõ ç áóöÜëåéá åßíáé óçìáíôéêÞ áðáßôçóç (ð.÷. åöáñìïãÝò ôçëåúáôñéêþí õðçñåóéþí). Ç ìåèïäïëïãßá áõôÞ óôçñßæåôáé óå çìéôõðéêÞ ìïíôåëïðïßçóç (semiformal modeling) êáé ôçí ðñïóáñìïãÞ ìåèüäùí áíÜëõóçò ñßóêïõ óå åöáñìïãÝò õøçëÞò åðéêéíäõíüôçôáò (safety analysis) üðùò åßíáé, ãéá ðáñÜäåéãìá, ç áíÜëõóç ñßóêïõ óå Ýíáí ðõñçíéêü áíôéäñáóôÞñá. Óôï Ýñãï áõôü, ôï ÅÁÉÔÕ ìáæß ìå äýï Üëëïõò óõíåñãÜôåò ôïõ Ýñãïõ, (ôï Éíóôéôïýôï Ôå÷íïëïãßáò êáé ¸ñåõíáò (ÉÔÅ) óôï ÇñÜêëåéï ÊñÞôçò êáé ç NCT-National Centre for Telemedicine ôçò Íïñâçãßáò), èá ó÷åäéÜóåé êáé èá äéåõèýíåé ôéò äïêéìÝò áíÜëõóçò áóöÜëåéáò óôï äßêôõï õðïóôÞñéîçò ôçëåúáôñéêþí åöáñìïãþí HYGEIANET ðïõ áíáðôý÷èçêå áðü ôï ÉÔÅ êáé ôï ïðïßï óõíäÝåé ôá íïóïêïìåßá êáé ôá êÝíôñá õãåßáò óå üëç ôçí ÊñÞôç. Ïé äïêéìÝò èá åðéêåíôñþóïõí óôçí ðáñáãùãÞ çìéôõðéêþí ìïíôÝëùí (ìå ÷ñÞóç ðáñáëëáãþí ôçò UML−Universal Modeling Language) äýï åöáñìïãþí ôïõ äéêôýïõ ôçëåúáôñéêÞò óôá ïðïßá õðÜñ÷ïõí õøçëÝò áðáéôÞóåéò áóöÜëåéáò: ôçò åöáñìïãÞò ATTRACT ðáñáêïëïýèçóçò áðü áðüóôáóç ôçò ðïñåßá áóèìáôéêþí ðáéäéþí êáé ôçò åöáñìïãÞò ÔçëåÊáñäéïëïãßáò ðïõ õðïóôÞñßæåé äéÜãíùóç êáé ðáñáêïëïýèçóç áðü áðüóôáóç êáñäéáêþí áóèåíåéþí. Ôá ìïíôÝëá ðïõ èá ðáñá÷èïýí èá õðïóôïýí áíÜëõóç ìå ÷ñÞóç ôçò ìåèïäïëïãßáò ôïõ Ýñãïõ êáé ôá áðïôåëÝóìáôá èá êïéíïðïéçèïýí êáé èá áíáëõèïýí óôïõò ãéáôñïýò óôï Ðáíåðéóôçìéáêü Íïóïêïìåßï Çñáêëåßïõ, þóôå íá ôïõò âïçèÞóïõí íá êáôáíïÞóïõí êáëýôåñá ôé óçìáßíåé áóöÜëåéá êáé ðþò áõôÞ åðéôõã÷Üíåôáé óôéò åöáñìïãÝò ðïõ ÷ñçóéìïðïéïýí êáèõìåñéíá, êáèþò êáé óôïõò ôå÷íéêïýò ðïõ áíÜðôõîáí ôéò åöáñìïãÝò ôçëåúáôñéêÞò Ýôóé þóôå íá ôïõò âïçèÞóïõí íá ôéò êÜíïõí áóöáëÝóôåñåò. ÔÝëïò ôá áðïôåëÝóìáôá áõôÜ èá áîéïëïãçèïýí áðü ôïõò óõíåñãÜôåò ôïõ CORAS ìå âÜóç êñéôÞñéá ðïõ Ý÷ïõí êáèïñéóôåß áðü ôï ÅÁÉÔÕ Ýôóé þóôå íá âåëôéùèåß ç ìåèïäïëïãßá. : Óôï Ýñãï áõôü, ï óôü÷ïò ôïõ ÅÁÉÔÕ Þôáí íá ó÷åäéÜóåé êáé íá õëïðïéÞóåé Ýíá ðïëõ÷ñçóôéêü ëïãéóìéêü äåé÷åßñéóçò ñßóêïõ ãéá éäéùôéêÞ åôáéñßá ðïõ õðïóôçñßæåß ðáãíßäéá ðñüãíùóçò óå áèëçôéêÜ ãåãïíüôá. Ôï ëïãéóìéêü áõôü èá Ýðñåðå íá áíáãíùñßæåé êáé íá åðéóçìáßíåé êáôáóôÜóåéò ðïõ ôåßíïõí íá äçìéïõñãçèïýí êáé ðïõ ðéèáíüí íá ïäçãÞóïõí ôçí åôáéñßá óå óçìáíôéêÞ ïéêïíïìéêÞ æçìéÜ. ìôáí ï ó÷åäéáóôÞò ôïõ ëïãéóìéêïý êáé, åðéðñüóèåôá, õëïðïßçóå ôç âÜóç äåäïìÝíùí (âáóéóìÝíç óå äïìÞ B-trees ìå ôá öýëëá óå äéðëÜ äéáóõíäåäåìÝíç ëßóôá) êáé ôï óýóôçìá óõëëïãÞò êáé óôáôéóôéêÞò åðåîåñãáóßáò åéóåñ÷üìåíùí äåäïìÝíùí). Ôï ëïãéóìéêü õëïðïéÞèçêå ìå ÷ñÞóç ôïõ C++ Builder Enterprise 4.0 ôçò Borland óå ðåñéâÜëëïí WINDOWS NT. Ç âÜóç äåäïìÝíùí ðïõ õëïðïßçóå ìå ÷ñÞóç ôùí B-trees êáé ìå åêìåôÜëëåõóç ôçò êýñéáò ìíÞìçò ãéá óõ÷íÜ ðñïóðåëáóüìåíá äåäïìÝíá (ó÷Þìá cache LRU), öôÜíåé ôá÷ýôçôåò ðïõ îåðåñíïýí êáôÜ ôÜîåéò ìåãÝèïõò ôçí áðüäïóç ôïõ ðñïçãïýìåíïõ óõóôÞìáôïò ôçò åôáéñßáò ðïõ âáóéæüôáí óå åìðïñéêü ðáêÝôï äéá÷åßñéóçò âÜóåùí äåäïìÝíùí. Åðéðñüóèåôá, ôï IST Ýñãï ``CORAS''. ×ñüíïò åêôÝëåóçò Ýñãïõ: 2000--2003 ¸ñãï ``ÓÔÏÉ×ÇÌÁ''. ×ñüíïò åêôÝëåóçò Ýñãïõ: 9 2000--2002. • óôáôéóôéêü êïììÜôé ôïõ ëïãéóìéêïý õëïðïéåß äéÜöïñïõò åëÝã÷ïõò óôáôéóôéêÞò ôõ÷áéüôçôáò êáé ðáñÜãåé Ýíáí áñéèìü áðü óôáôéóôéêÜ äåäïìÝíá ÷ñÞóéìá ãéá ôçí ðñüâëåøç ôçò ðïñåßáò ôïõ ðáéãíéäéïý. ÔÝëïò õëïðïßçóå êáé Ýíá ìÝñïò äçìéïõñãßáò êáé ãñÞãïñçò (ëüãù ôùí Âtrees) åêôÝëåóçò ``what-if'' óåíáñßùí ãéá Ýëåã÷ï åðéêßíäõíùí åîåëßîåùí, ãéá ôçí åôáéñßá, ôïõ äéáãùíéóìïý. : Ï ê. Óôáìáôßïõ Þôáí ï ìüíïò ó÷åäéáóôÞò êáé ðñïãñáììáôéóôÞò ìßáò åöáñìïãÞò ãÝíåóçò êñõðôïãñáöéêÜ áóöáëþí øåõäïôõ÷áßùí áñéèìþí ðïõ áíÝëáâå ôï ÅÁÉÔÕ ãéá ìßá éäéùôéêÞ åôáéñßá õðïóôÞñéîçò êñáôéêþí ðáéãíéäéþí ôý÷çò êáé ðñüãíùóçò áèëçôéêþí ãåãïíüôùí. Ôï ëïãéóìéêü äïêéìÜóôçêå ìå ÷ñÞóç äéÜöïñùí óôáôéóôéêþí åëÝã÷ùí ðïõ õëïðïéÞèçêáí åéäéêÜ ãéá ôï óêïðü áõôü êáé óôï ôÝëïò åêäüèçêå ðéóôïðïéçôéêü ôõ÷áéüôçôáò áðü ôïí ÄéåõèõíôÞ ôïõ ÅÁÉÔÕ ÊáèçãçôÞ ê. Ð. ÓðõñÜêç. Ôï ëïãéóìéêü õëïðïéïýóå ôéò ãåííÞôñéåò BBS (áðü ôïõò Blum-BlumShub, ãåííÞôñéá ðïõ âáóßæåôáé óôá ôåôñáãùíéêÜ õðüëïéðá) êáé RSA (áðü ôïõò RivestShamir-Adleman, ðïõ âáóßæåôáé óôç óõíÜñôçóç êñõðôïãñÜöçóçò RSA) óå óõíäõáóìü ôçò åîüäïõ ôïõò ìå ôïí áëãüñéèìï M ôïõ Knuth êáé áðïôåëïýôáí áðü ìÝñç ðïõ Ýôñå÷áí óå UNIX, DOS, VAX êáé åðéêïéíùíïýóáí ìÝóù TCP/IP ãéá íá áíôáëÜîïõí ðëçñïöïñßåò çëåêôñïíéêÞò õðïãñáöÞò êáé íá ôñïöïäïôïýí ìå øåõäïôõ÷áßïõò áñéèìïýò ôïí êåíôñéêü õðïëïãéóôÞ ôçò åôáéñßáò. ¸ñãï ``KENO'' (Óôéãìéáßï Lotto). ×ñüíïò åêôÝëåóçò Ýñãïõ: 1997--1998. ÊåöÜëáéá óå âéâëßá • • • • • • E. Konstantinou, P. Nastou, Y. Stamatiou, C. Zaroliagis, Securing Embedded Computing Systems through Elliptic Curve Cryptography, Encyclopedia of Embedded Computing Systems, Mohamed Khalgui, Olfa Mosbahi, Antonio Valentini, (eds), 2012, IGI Global, (to appear). Ð. ÍÜóôïõ, Ð. ÓðõñÜêçò, êáé Ã. Óôáìáôßïõ, Ðñþôïé áñéèìïß, äéáêñéôüò ëïãÜñéèìïò, êáé ðáñáãïíôïðïßçóç: Èåùñßá êáé Áëãüñéèìïé, êåöÜëáéï óå óõëëïãéêü ôüìï ìå ôßôëï Óýã÷ñïíç Êñõðôïãñáößá: Èåùñßá êáé ÅöáñìïãÝò, ìå åðéìåëçôÝò ôïõ ôüìïõ ôïõò ÊáèçãçôÝò Mike Burmester, ÓôÝöáíï Ãêñßôæáëç, ÓùêñÜôç ÊÜôóéêá, êáé Âáóßëåéï ×ñõóéêüðïõëï, Åêäüóåéò Ðáðáóùôçñßïõ, 2010. P. Kammas, T. Komninos, P. Spirakis, Y.C. Stamatiou, and H. Tsaknakis, Worm propagation models in Networks: theory and analysis, In (forthcoming): Pichappan, P. (ed.), Handbook of Research on Threat Management and Information Security: Models for Countering Attacks, Breaches and Intrusions, IGI Global. ×. Ìáíùëüðïõëïò, Ä. ÓïöïôÜóéïò, Ð. ÓðõñÜêçò, êáé Ã. Óôáìáôßïõ, ÆçôÞìáôá ðñïóôáóßáò ôçò éäéùôéêüôçôáò óå óõóôÞìáôá ÇëåêôñïíéêÞò Øçöïöïñßáò, ðñïóêåêëçìÝíï êåöÜëáéï óå óõëëïãÞ ìå ôßôëï Ðñïóôáóßá ôçò Éäéùôéêüôçôáò óôéò Ôå÷íïëïãßåò ÐëçñïöïñéêÞò êáé Åðéêïéíùíéþí: Ôå÷íéêÜ êáé ÍïìéêÜ ÈÝìáôá, áíáìåíüìåíç Ýêäïóç ôï 2009. E. Makri and Y.C. Stamatiou, Deterministic and randomized key pre-distribution schemes for mobile ad-hoc networks: foundations and example constructions, to appear in a book dedicated to security issues in mobile networks to be published by Nova Science Publishers in 2008. E.C. Laskari, G.C. Meletiou, Y.C. Stamatiou, and M.N. Vrahatis, Cryptography and Cryptanalysis through Computational Intelligence, to be included in a book title Computational Intelligence in Information Assurance and Security'', to be bublished by Nova Science Publishers. 10 • • • D. Koukopoulos and Y.C. Stamatiou, Digital Audio Watermarking Techniques for MP3 Audio Files, to be included in a book titled ``Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarking'', to be published by Idea Group in 2007. P.E. Nastou and Y.C. Stamatiou, An on chip, CAST-128 based block cipher with dynamically reconfigurable s-boxes generated in parallel, in book titled Embedded Cryptographic Hardware: Methodologies & Architectures, Nova Science Publishers, NY, USA, 2004. Ketil Stølen, Folker den Braber, Theo Dimitrakos, Rune Fredriksen, Bjørn Axel Gran, SivHilde Houmb, Yannis C. Stamatiou, and Jan Øyvind Aagedal, Model-based risk assessment in a component-based software engineering process--using the CORAS approach to identify security risks, Chapter 11 in: Business CBSE (Component-Based Software Engineering), • pages 189-207, Kluwer Academic Publishers, 2003 B.B. Boutsinas, Y.C. Stamatiou, and G. Pavlides, Massively Parallel Support for Nonmonotonic Reasoning, Parallel Processing for AI 3, James Geller, Hiroaki Kitano and Christian Suttner (eds.), Elsevier Publishers, pages 41−66, 1997. ÓõããñáöÞ âéâëßùí 1. Ó. Ñåíôïýëçò êáé Ã.Ê. Óôáìáôßïõ, ÏÕÔÏÐÉÁ: ¸íá õðïëïãéóôéêü ðåñéâÜëëïí áíÜðôõîçò êáé ìåëÝôçò ôå÷íçôÞò æùÞò, õðü Ýêäïóç CTI Press−ÍÝá ÃñÜììáôá, áíáìåíüìåíï ôï 2009. 2. Ã.Ê. Óôáìáôßïõ, Áñ÷Ýò ÓõíäõáóôéêÞò, Åêäüóåéò Åëëçíéêïý Áíïéêôïý Ðáíåðéóôçìßïõ, 2005. 3. Ð. ÍÜóôïõ, Ð. ÓðõñÜêçò, êáé Ã.Ê. Óôáìáôßïõ, Óýã÷ñïíç êñõðôïãñáößá: Ìéá îÝãíïéáóôç äéáäñïìÞ óôá ìïíïðÜôéá ôçò, CTI Press−ÍÝá ÃñÜììáôá, 2004. 4. ×. Ìðïýñáò, Ë.Ì. Êõñïýóçò, Ð. ÓðõñÜêçò, êáé Ã.Ê. Óôáìáôßïõ, ÅéóáãùãÞ óôïõò ÃñÜöïõò: Èåùñßá, ÐñïâëÞìáôá êáé Ëýóåéò, Åêäüóåéò GUTENBERG, ISBN 960−01−0815−3, 1999. ÓõããñáöÞ óçìåéþóåùí ãéá äéåèíÞ åðéóôçìïíéêÜ ó÷ïëåßá Yannis Stamatiou, Threshold Phenomena: The Computer Scientist's Point of View, óçìåéþóåéò 50 óåëßäùí ãéá ôç äéäáóêáëßá ôçò åíüôçôáò ÊáôùöëéêÜ Öáéíüìåíá óôçí ÅðéóôÞìç ôùí Õðïëïãéóôþí óôï The LOGIC AND INTERACTION Programme, 28 Éáíïõáñßïõ−1 Ìáñôßïõ 2002, ðïõ Ýëáâå ÷þñá óôç Ìáóáëëßá, Ãáëëßá, êáé óõíäéïñãáíþèçêå áðü ôï Institut de Mathematiques de Luminy (IML) êáé ôï Laboratoire d' Informatique Fondamentale de Marseille (LIF). ÁíÜðôõîç ëïãéóìéêïý áíïéêôïý êþäéêá 1. ÂéâëéïèÞêç õëïðïßçóçò êñõðôïãñáöéêþí óõóôçìÜôùí ìå âÜóç ôéò ÅëëåéðôéêÝò Êáìðýëåò. Ç âéâëéïèÞêç ðåñéëáâÜíåé êþäéêá ãéá ôç äçìéïõñãßá åëëåéðôéêþí êáìðõëþí ìå âÜóç ôç ìÝèïäï ôïõ Ìéãáäéêïý Ðïëëáðëáóéáóìïý (Complex Multiplication Method), ãéá ôçí åýñåóç óçìåßùí åðÜíù óå áõôÝò, ãéá ôçí åêôÝëåóç âáóéêþí áëãåâñéêþí ðñÜîåùí ìåôáîý óçìåßùí ôçò êáìðýëçò êáèþò êáé ãéá ôïí Ýëåã÷ï ôçò êñõðôïãñáöéêÞò áóöÜëåéáò ôùí êáìðõëþí áõôþí. Ç âéâëéïèÞêç áíáðôý÷èçêå áðü êïéíïý áðü ôïí ê. ÆáñïëéÜãêç, ôçí ê. Êùíóôáíôßíïõ êáé ôïí ê. Óôáìáôßïõ. Åßíáé ãñáììÝíç óå ANSI C êáé åßíáé åýêïëá ìåôáöÝñóéìç óå ïðïéïäÞðïôå õðïëïãéóôéêü óýóôçìá. Ç âéâëéïèÞêç, ìáæß ìå åã÷åéñßäéï åãêáôÜóôáóçò êáé ðáñáäåßãìáôá ÷ñÞóçò ôçò, åßíáé äéáèÝóéìç óôçí éóôïóåëßäá http://www.ceid.upatras.gr/faculty/zaro/software/ecc-lib/ 11 2. ÂéâëéïèÞêç áõôüìáôçò ðáñáãùãÞò S-box (substitution box) âáóéóìÝíùí óå ëïãéêÝò óõíáñôÞóåéò bent. Ç âéâëéïèÞêç ðåñéëáìâÜíåé êþäéêá ãéá ôçí êáôáóêåõÞ S-box ãéá åíóùìÜôùóÞ ôïõò óå êñõðôáëãüñéèìïõò block ìå óôÞëåò ðïõ áðïôåëïýíôáé áðü ëïãéêÝò óõíáñôÞóåéò ìÝãéóôçò ìç ãñáììéêüôçôáò, ïé ïðïßåò êáëïýíôáé bent. Ï êþäéêáò ðåñéëáìâÜíåé êáé äéáäéêáóßåò ãéá ôïí õðïëïãéóìü ãñáììéêïý óõíäõáóìïý ëïãéêþí óõíáñôÞóåùí, ãéá ôï ãñÞãïñï õðïëïãéóìü ôïõ Walsh-Hadamard ìåôáó÷çìáôéóìïý, ãéá ôïí Ýëåã÷ï ìç ãñáììéêüôçôáò ëïãéêþí óõíáñôÞóåùí êáé s-box êáèþò êáé ãéá ôïí õðïëïãéóìü åíüò áñéèìïý ðáñáìÝôñùí ÷ñÞóéìùí ãéá ôçí ôçí åêôßìçóç ôçò áóöÜëåéáò ôùí ðáñáãüìåíùí S-box. Ç âéâëéïèÞêç Ý÷åé áíáðôõ÷èåß áðü ôïí ê. Óôáìáôßïõ óôç ãëþóóá ðñïãñáììáôéóìïý C êáé óå ðåñéâÜëëïí Borland C/C++ 5.0 êáé åßíáé äéáèÝóéìç óå êÜèå åíäéáöåñüìåíï. Äéáêñßóåéò • • Ðñþôï âñáâåßï ãéá ôï ðëçñïöïñéáêü óýóôçìá ýðïóôÞñéîçò çëåêôñïíéêþí øçöïöïñéþí ìåãÜëçò êëßìáêáò ÐÍÕÊÁ óôïí ðáíåõñùðáúêü äéáãùíéóìü óõóôçìÜôùí eVoting ðïõ Ýëáâå ÷þñá óôï Bregenz ôçò Áõóôñßáò ôïí Áýãïõóôï ôïõ 2008. Ï ê. Óôáìáôßïõ Þôáí êýñéïò åñåõíçôÞò óôçí ïìÜäá Ýñãïõ ìå óçìáíôéêÞ óõììåôï÷Þ óôç ó÷åäßáóç êáé õëïðïéÞóç ôïõ óõóôÞìáôïò. Âñáâåßï ERICSSON ãéá ôï 2006 ãéá ôçí ðñïðôõ÷éáêÞ åñãáóßá ìå ôßôëï Õëïðïßçóç ÅîïìïéùôÞ ÊÜñôáò SIM Êéíçôþí Ôçëåöþíùí êáé Ðåéñáìáôéóìïß ìå ÊñõðôïãñáöéêÝò ÅöáñìïãÝò, ðïõ åêðïíÞèçêå áðü ôïí ê. ÄçìÞôñç Ìåíäñéíü óôï Åëëçíéêü Áíïéêôü ÐáíåðéóôÞìéï õðü ôçí åðßâëåøç ôïõ ê. Óôáìáôßïõ. ÅñåõíçôéêÝò äçìïóéåýóåéò óå äéåèíÞ ðåñéïäéêÜ ìå êñéôÝò 1 1. C. Manolopoulos, D. Sofotassios, P. Spirakis, and Y.C. Stamatiou. A Framework for Protecting Voters' Privacy in Electronic Voting Procedures. To appear at Journal of Cases on Information Technology (JCIT), 2013. 2. P.E. Nastou, P. Spirakis, Y.C. Stamatiou and A. Tsiakalos, ``On the Derivation of a ClosedForm Expression for the Solutions of Generalized Abel Differential Equations'', International Journal of Differential Equations, Hindawi Press, June 2013. 3. P. Nastou, Y.C. Stamatiou, and A. Tsiakalos. Solving a Class of ODEs Arising in the Analysis of a Computer Security Process using Generalized Hyper-Lambert Functions. International Journal of Applied Mathematics and Computation, Vol 4 No. 3, pp 67-76, 2012. 4. P. Kammas, C. Manolopoulos, and Y.C. Stamatiou, Modelling of Long Term Viability of Financial Agents Based on their 159 Short Range Economic Behaviour. Global Business & Economics Anthology Volume II, Issue 1, pp. 159-171, December 2011. 5. D. Kalles, A. Papagelis, Y.C. Stamatiou: Consolidating a Heuristic for Incremental Decision Tree Learning through asymptotic Analysis. International Journal on Artificial Intelligence Tools 20(1): 29-52 (2011). 1 Åêôüò áðü ôç äçìïóßåõóç ìå ôïõò ê. ÂïõôóéíÜ êáé ê. áëöáâçôéêÞ áíáãñáöÞ ôùí ïíïìÜôùí. 12 Ðáõëßäç, Ý÷åé óõììåôÜó÷åé ìüíï óå åñãáóßåò ìå 6. P. Kammas, T. Komninos, and Y.C. Stamatiou, Queuing theory based models for studying intrusion evolution and elimination in computer networks, Journal of Information Assurance and Security (JIAS), Special Issue on Intrusion and Malware Detection, Volume 4, Issue 3, pp. 200-208, June 2009. (Óýìðôõîç ôùí åñãáóéþí Ó[16] êáé Ó[12].) 7. Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis: On the Efficient Generation of Prime-Order Elliptic Curves. Journal of Cryptology 23(3): 477-503 (2010). 8. E. Makri and Y.C. Stamatiou, An Interactive, Similarity Increasing Algorithm for Random Strings with Applications to Key Agreement in ad hoc Networks, Studies in Applied Mathematics Vol. 121, No. 2, pp. 141−155, 2008. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[25].) 9. C. Manolopoulos, A. Panagiotaki, D. Sofotasios, P. Spirakis, and Y. Stamatiou. The Design, Implementation and Evaluation of an Internet-based eVoting System. 12th Pan-Hellenic Conference on Informatics (PCI 2008), 2008. 10. N. Glinos and Y.C. Stamatiou, On the equivalence between random graph models, accepted for publication at Journal of Discrete Mathematical Science & Cryptography, TARU publications, 2008. 11. A.C. Kaporis, L.M. Kirousis, Y.C. Stamatiou, M. Vamvakari, and M. Zito, The unsatisfiability threshold revisited, Discrete Applied Mathematics 155, 1525−1538, Elsevier, 2007. 12. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, Efficient generation of secure elliptic curves, International Journal of Information Security, 6(1): 47−63, 2007. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[29].) 13. E.C. Laskari, G.C. Meletiou, Y.C. Stamatiou, D.K. Tasoulis, and M.N. Vrahatis, Assessing the Effectiveness of Artificial Neural Networks on Problems Related to Elliptic Curve Cryptography, Mathematical and Computer Modelling, Volume 46, Issues 1−2, 174−179, Elsevier, 2007. 14. E.C. Laskari, G.C. Meletiou, Y.C. Stamatiou, and M.N. Vrahatis, Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers, Applied Mathematics and Computation 184(1): 63−72, Elsevier, 2007. 15. T. Komninos, P. Spirakis, Y.C. Stamatiou, G. Vavitsas, A worm propagation model based on scale free network structures and people's email acquaintance profiles, IJCSNS − International Journal of Computer Science and Network Security, No. 2, Vol. 7 February 2007. 16. S. Antonopoulou, Y.C. Stamatiou, and M. Vamvakari, An asymptotic expansion for the q -binomial series using singularity analysis for generating functions, Journal of Discrete Mathematical Sciences & Cryptography, No. 3, Vol. 10, 313−328, 2007. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[53].) 13 17. L.M. Kirousis, Y.C. Stamatiou, and M. Zito, The unsatisfiability threshold conjecture: the techniques behind upper bound improvements, Computational Complexity and Statistical Physics, Oxford University, pages 159−178, 2006. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[36].) 18. A. Kaporis, L. Kirousis, and Y.C. Stamatiou, How to prove conditional randomness using the Principle of Deferred Decisions, Computational Complexity and Statistical Physics, Oxford University Press, New York, 179−194, 2006. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[37].) 19. E.C. Laskari, G.C. Meletiou, Y.C. Stamatiou and M.N. Vrahatis, Evolutionary computation based cryptanalysis: A first study, Journal of Nonlinear Analysis: Theory, Methods & Applications, Volume 63, Issues 5−7, e823−e830, Elsevier, 2005. 20. D. Koukopoulos and Y.C. Stamatiou, A Watermarking Scheme for MP3 Audio Files, International Journal of Signal Processing (IJSP), Vol. 2, No. 3, pp. 206−213, 2005. 21. P.E. Nastou and Y.C. Stamatiou, An on chip, CAST-128 based block cipher with dynamically reconfigurable s-boxes generated in parallel. Volume on Embedded Cryptographic Hardware: Methodologies & Architectures, Nova Publishers, 135−152, 2004. (Óýìðôõîç êáé åðÝêôáóç ôùí åñãáóéþí Ó[38] êáé Ó[40].) 22. L.M. Kirousis, E. Kranakis, D. Krizanc, and Y.C. Stamatiou, Locating Information with Uncertainty in Fully Interconnected Networks: The Case of Non-Distributed Memory, NETWORKS , Issue 3, 169−180, 2003. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[50].) 23. Y.C. Stamatiou, Threshold Phenomena: The Computer Scientist's Viewpoint, EATCS (European Association of Theoretical Computer Science) Bulletin , 199−234, June 2003. 24. S. Armeni, D. Christodoulakis, I. Kostopoulos, Y.C. Stamatiou, and M. Xenos, Secure information hiding based on computationally intractable problems. Journal of Discrete Mathematical Sciences & Cryptography Vol. 6, No. 1, 21−33, April 2003. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[41].) 25. D. Achlioptas, L.M. Kirousis, E. Kranakis, D. Krizanc, M. S.O. Molloy, and Y.C. Stamatiou, Random Constraint Satisfaction: A More Accurate Picture, Constraints , 329−344, 2001. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[55].) 26. L.M. Kirousis, Y.C. Stamatiou, and M. Vamvakari, Upper Bounds and Asymptotics for the q -binomial Coefficients, Studies in Applied Mathematics , 43−62, 2001. 27. A.C. Kaporis, L.M. Kirousis, E. Kranakis, D. Krizanc, Y.C. Stamatiou and E.C. Stavropoulos, Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval, Computer Journal , 221−229, 2001. 28. N.D. Dendris, L.M. Kirousis, Y.C. Stamatiou, and D.M. Thilikos, On Parallel Partial Solutions and Approximation Schemes for Local Consistency in Networks of Constraints, Constraints , 251−273, 2000. (ÅêôåôáìÝíç Ýêäïóç ôçò åñãáóßáò Ó[56].) 42 80 6 107 44 5 14 29. S. Janson, Y.C. Stamatiou, and M. Vamvakari, Bounding the Unsatisfiability Threshold of Random 3-SAT, Random Structures and Algorithms , 103−116, 2000. 30. A.C. Kaporis, L.M. Kirousis, and Y.C. Stamatiou, A note on the non-colorability threshold of a random graph, Electronic Journal of Combinatorics , #R29, 2000. 31. Y.C. Stamatiou, Phase Transitions in Mathematics and in Physics: Two Faces of the same coin?, Carleton Journal of Computer Science , 57−69, 1999. 32. L.M. Kirousis, E. Kranakis, D. Krizanc, and Y.C. Stamatiou, Approximating the Unsatisfiability Threshold of Random Formulas, Random Structures and Algorithms , 253−269, 1998. 17 7 3 12 ÅñåõíçôéêÝò äçìïóéåýóåéò óå äéåèíÞ óõíÝäñéá ìå êñéôÝò 1. Z. Benenson, I. Krontiris, V. Liagkou, K. Rannenberg, A. Schopf, D. Schro der, and Y. Stamatiou. Understanding and Using Anonymous Credentials. 9th Symposium on Usable Privacy and Security (SOUPS 2013). 2. P. Spirakis and Y, Stamatiou. Attribute Based Credentials towards refined public consultation results and effective eGovernance. In Proc. Cyber Security Privacy EU FORUM and Trust in the Digital World 2013 collection of research papers, Brussels, LNCS, Springer Verlag, expected in 2013. 3. Panayotis E. Nastou, Paul Spirakis, Yannis Stamatiou and Christina Vichou. Agent Agreement Protocols based on Golay Error-Correcting Code. In Proc. 4th IEEE International Conference on Information, Intelligence, Systems and Applications (IISA2013), 2013. 4. Vasiliki Liagkou, George Metakides, Apostolis Pyrgelis, Christoforos Raptopoulos, P. Spirakis, and Yannis Stamatiou. Privacy preserving course evaluations in Greek higher education institutes: an e-Participation case study with the empowerment of Attribute Based Credentials. Annual Privacy Forum 2012 (Electronic proceedings). 5. P. Kotsopoulos and Y. Stamatiou. Proc. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 927--933, 2012. 6. P. E. Nastou, Y. C. Stamatiou and A. Tsiakalos, ``The Solution of a Differential Equation Describing the Evolution of a Key Agreement Protocol'', EUROSIAM 2011, 29--30 of December 2011, Montreux, Switzerland. 7. Panayotis E. Nastou, Yannis C. Stamatiou: A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs. In Proc. Security Technology - International Conference FGIT-SecTech, 2011: 155--166. 8. G. C. Meletiou, Y.C. Stamatiou, and A. Tsiakalos. Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm. 5th International Conference on Information Security and Assurance (ISA 2011), LNCS, Springer Verlag, 177--187, 2011. 9. Ioannis Chatzigiannakis, Apostolos Pyrgelis, Paul G. Spirakis, Yannis C. Stamatiou: Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices. In Proc. EEE 8th International Conference on Mobile Adhoc and Sensor Systems, MASS 2011, Workshop: Wireless and Sensor Network Security Workshop (WSNS 2011): 715-720, 2011. 15 10. P. Spirakis and Y.C. Stamatiou, Kolmogorov complexity arguments in propositional logic, in Proc. 7th Panhellenic Logic Symposium (PLS7) (with international participation), 2009. 11. V. Liagkou, P. Spirakis, and Y.C. Stamatiou, Can formalism alone provide an answer to the quest of a viable definition of trust in the WWW society?, in Proc. 3rd International Conference on e-Democracy (e-Democracy 2009), 2009. 12. P. Kammas, T. Komninos, and Y.C. Stamatiou, Modeling the co-evololution DNS worms and anti-worms in IPv6 networks, in Proc. The Fifth International Conference on Information Assurance and Security (IAS09), 2009. 13. P. Papaioannou, P. Nastou, Y.C. Stamatiou, and Christos Zaroliagis, Secure Elliptic Curve Generation and Key Establishment on a 802.11 WLAN Embedded Device, accepted at the 9th International Symposium on Autonomous Decentralized Systems (ISADS 2009). 14. V. Papadinas and Y.C. Stamatiou, Geometric approaches for creating low power, low interference connectivity patterns in static, structureless sensor networks, accepted at the First International Workshop on Autonomous Embedded Systems and Networking (AESN 2009), a workshop of ISADS 2009. 15. C. Manolopoulos, P. Nakou, A. Panagiotaki, D. Sofotasios, P. Spirakis, and Y.C. Stamatiou, A step-wise refinement approach for enhancing eVoting acceptance, accepted at 2nd Int. Conf. on Theory and Practice of Electronic Governance (ICEGOV 2008), 2008. 16. P. Kammas, T. Komninos, and Y.C. Stamatiou, A queuing theory based model for studying intrusion evolution and elimination in computer network, accepted for presentation at 4th International Conference on Information Assurance and Security (IAS 2008). 17. C. Manolopoulos, A. Panagiotaki, D. Sofotasios, and Y.C. Stamatiou, Experience and Benefits from the application of a Formal Risk Assessment Framework in the Evoting domain, accepted for presentation at the 7th International Conference on eGovernment (EGOV 2008). 18. Y.C. Stamatiou, The theoretical analysis of an agreement protocol using Lambert functions, presented at the 2008 International Workshop on Applied Probability, Invited Session with title Discrete distributions and asymptotic behaviour. 19. N. Glinos, Y.C. Stamatiou, and M. Vavakari, A statistical/algorithmic framework for modeling fixed odds games, accepted for presentation at the 17th IASTED International Conference on Applied Simulation and Modelling (ASM 2008). 20. A. Antoniou, C. Korakas, C. Manolopoulos, A. Panagiotaki, D. Sofotassios, . G. Spirakis, Y. C. Stamatiou, A Trust-Centered Approach for Building E-Voting Systems, in Proc. 6th International Conference on eGovernment (EGOV 2007), 366−377, Lecture Notes in Computer Science, Springer-Verlag, 2007. 21. V. Liagkou, E. Makri, P. Spirakis, and Y.C. Stamatiou, The Digital Territory as a complex system of interacting agents, emergent properties and technologies, presented as a short paper at the European Conference on Complex Systems ECCS 2007. 22. V. Liagkou, E. Makri, P. Spirakis, and Y.C. Stamatiou, Trust in global computing systems as a limit property emerging from short range random interactions, in Proc. Second International Conference on Availability, Reliability and Security (ARES 2007, The International Dependability Conference), 741−748, IEEE, 2007. 16 23. T. Komninos, Y. C. Stamatiou, and G. Vavitsas, A Worm Propagation Model Based on People's Email Acquaintance Profiles, in Proc. 2nd international Workshop on Internet & Network Economics (WINE 2006), 343−352, Lecture Notes in Computer Science, Springer Verlag, 2006. 24. E. Makri and Y.C. Stamatiou, Deterministic Key Pre-distribution Schemes for Mobile AdHoc Networks based on Set Systems with Limited Intersection Sizes, in Proc. 2nd IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'06), 2006. 25. E. Makri and Y.C. Stamatiou, Distributively Increasing the Percentage of Similarities Between Strings with Applications to Key Agreement, in Proc. 5th International Conference on AD-HOC Networks & Wireless (ADHOC-NOW 2006), pp. 211−223, Springer Verlag, 2006. 26. V. Liagkou, E. Makri, P. Spirakis, and Y.C. Stamatiou The threshold behaviour of the fixed radius random graph model and applications to the key management problem of sensor networks, in Proc. ALGOSENSORS 2006, pp. 130−139, Springer Verlag, 2006. 27. E. Konstantinou, V. Liagkou, P.G. Spirakis, Y.C. Stamatiou, M. Yung, Trust Engineering: From Requirements to System Design and Maintenance - A Working National Lottery System Experience, in Proc. 8th International Security Conference (ISC 2005), pp. 44-58, Springer-Verlag, 2005. 28. Dimitrios Koukopoulos and Yannis C. Stamatiou, An Efficient Watermarking Method for MP3 Audio Files, in Proc. International Enformatica Conference (IEC 2005), pp. 154-159, 2005. 29. E. Konstantinou, A. Kontogeorgis, Y.C. Stamatiou, and C. Zaroliagis, Generating Prime Order Elliptic Curves Difficulties and Efficiency Considerations, 7th International Conference on Information Security & Cryptography (ICISC 2004), pp. 261-278, Springer-Verlag, 2005. 30. T. Komninos, P. Spirakis, Y.C. Stamatiou, E. Valeontis, H. Yannakopoulos, A Software Tool for Distributed Intrusion Detection in Computer Networks, best poster award at Twenty-Third Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing PODC 2004. 31. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the Use of Weber Polynomials in Elliptic Curve Cryptography, in Proc. Public Key Infrastructure: First European PKI Workshop, Research and Applications (EURO-PKI 2004), pp. 335-349, Springer Verlag, 2005. 32. E. Konstantinou, V. Liagkou, P. Spirakis, Y.C. Stamatiou, and M. Yung, Electronic National Lotteries, in Proc. 8th International Conference on Financial Cryptography (FC 2004), pp. 147-163, Springer Verlag, 2004. 33. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the construction of prime order Elliptic Curves, in Proc. 4th International Conference on Cryptology in India (INDOCRYPT 2003), pp. 309-322, 2003. 34. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the efficient generation of Elliptic Curves over Prime Fields. In Proc. 4th International Workshop on Cryptographic Hardware 17 and Embedded Systems (CHES 2002), B.S. Kaliski Jr., C.K. Koc, C. Paar (eds.), 333 −348, 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. Springer Verlag, 2002. E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, A software library for Elliptic Curve cryptography. In Proc. 10th European Symposium on Algorithms (ESA 2002), Engineering and Applications track, 625−636, Springer Verlag, 2002. L.M. Kirousis, Y.C. Stamatiou, and M. Zito, The unsatisfiability threshold conjecture: the techniques behind upper bound improvements. Presented at the Phase Transitions and Algorithmic Complexity Workshop that was organized from June 3 to June 5 2002 by the Institute for Pure and Applied Mathematics, University of California, Los Angeles. A.C. Kaporis, L.M. Kirousis, and Y.C. Stamatiou, How to prove conditional randomness using the Principle of Deferred Decisions. Presented at the Phase Transitions and Algorithmic Complexity Workshop that was organized from June 3 to June 5 2002 by the Institute for Pure and Applied Mathematics, University of California, Los Angeles. P. Nastou and Y.C. Stamatiou, Enhancing the security of block ciphers with the aid of parallel substitution box construction. Accepted at First International Workshop on Assurance in Distributed Systems and Networks (ADSN), pp. 29-34, IEEE Computer Society, 2002. D. Koukopoulos and Y.C. Stamatiou, A Real-Time Compressed-Domain Watermarking Scheme for Mpeg Audio Layer 3. Watermarking 2002, March 2002. P. Nastou and Y.C. Stamatiou, Dynamically modifiable ciphers using a reconfigurable CAST-128 based algorithm on ATMEL's FPSLIC reconfigurable FPGA architecture. Presented at the 9th Reconfigurable Architectures Workshop (RAW 2002), April 2002. The proceedings will be published by IEEE Computer Society Press. Also, Technical Report TR-01100901, ATMEL HELLAS SA. S. Armeni, D. Christodoulakis, I. Kostopoulos, Y.C. Stamatiou, and M. Xenos, Proving copyright ownership using hard instances of combinatorial intractable problems. In Proc. 8th Panhellenic Conference in Informatics (Nicosia, 2002), Y. Manolopoulos and S. Evripidou (eds.), 137−145, Livanis Publications, 2002. Also in Proc. Advances in Informatics, Vol. 2563, pp. 262--278, Springer Verlag, 2003. P. Spirakis and Y.C. Stamatiou, How to prove the possession of a secret without revealing it with applications to person identification, in Proc. 1st e-Democracy conference with international participation − Electronic Democracy: Information Society and Citizen's rights, 2003. Y.C. Stamatiou, E. Henriksen, M.S. Lund, E. Mantzouranis, M. Psarros, E. Skipenes, N. Stathiakis, and K. Stølen, Experiences from using model-based risk assessment to evaluate the security of a telemedicine application, presented at Telemedicine in Care Delivery (TICD), Pisa, Italy, 2002. Y.C. Stamatiou, E. Henriksen, E. Mantzouranis, E.-M. Knudsen, K. Papadaki, M. Psarros, E. Skipenes, N. Stathiakis, K. Stølen, and G. Valvis, Experience and results from applying a model-based risk assessment methodology, in the security analysis of a Tele-cardiology application, presented at the 7th European conference on Electronic Health Records (TEHRE 2002), London, UK, 2002. 18 45. Y.C. Stamatiou, E. Skipenes, E. Henriksen, N. Stathiakis, A. Sikianakis, E. Charalambous, N. Antonakis, K. Stølen, F. den Braber, M.S. Lundf, K. Papadaki , G. Valvis, The CORAS approach for model-based risk management applied to a telemedicine service, accepted at the 18th Medical Informatics Europe (MIE 2003), St. Malo, France, 2003. 46. D. Koukopoulos and Y.C. Stamatiou, A compressed domain watermarking algorithm for Mpeg Layer 3. In Proc. Multimedia and Security Workshop at ACM Multimedia 2001 (Ottawa, 2001), 7−10, ACM Press, 2001. 47. L.M. Kirousis, Y.C. Stamatiou, and M. Zito, Upper bounds on the satisfiability threshold: A review of the rigorous results. Presented at the Workshop on Computational Complexity and Statistical Physics, Santa Fe Institute, 4−6, September 2001. It will be included in a special volume dedicated to threshold phenomena in combinatorics and physics, to be published by the Sante Fe Institute (SFI) publications. The title was changed to The unsatisfiability threshold conjecture: the techniques behind upper bound improvements. 48. A.C. Kaporis, L.M. Kirousis, Y.C. Stamatiou, M. Vamvakari, and M. Zito, Coupon Collectors, q-Binomial Coefficients and the Unsatisfiability Threshold. In Proc. 7th Italian Conference on Theoretical Computer Science (ICTCS 2001) (Torino 2001), A. Restivo, S. Ronchi della Rocca, and L. Roversi (eds.), 328−338, Springer-Verlag, 2001. Åßíáé ìßá áíáíåùìÝíç Ýêäïóç ôçò åñãáóßáò ìå ôßôëï The unsatisfiability threshold revisited, ôùí ßäéùí óõããñáöÝùí, ðïõ ðáñïõóéÜóôçêå óôï SAT 2001. 49. A.C. Kaporis, L.M. Kirousis, Y.C. Stamatiou, M. Vamvakari, and M. Zito, The unsatisfiability threshold revisited. It appeared in: Working Notes of Workshop on Theory and Applications of Satisfiability Testing (SAT 2001), Boston, Massachusetts, H. Kautz and B. Selman (eds.), 185−194, 2001. Also, in Electronic Notes in Discrete Mathematics H. Kautz and B. Selman (eds.), Vol. 9, Elsevier Science Publishers, 2001. Also to appear in Journal of Discrete Mathematics. 50. L.M. Kirousis, E. Kranakis, D. Krizanc, and Y.C. Stamatiou, Locating Information with Uncertainty in Fully Interconnected Networks. In Proc. 14th International Symposium on Distributed Computing (DISC 2000), Vol. 1914 of Lecture Notes in Computer Science (Toledo, 2000), M. Herlihy (ed.), 183−296, Springer-Verlag, 2000. 51. S. Armeni, D. Christodoulakis, I. Kostopoulos, Y.C. Stamatiou, and M. Xenos, A Transparent Watermarking Method for Color Images, Proceedings of the IEEE first Balkan Conference on Signal Processing, Communications, Circuits and Systems, Istanbul, Turkey, 2000. 52. P. Bose, R. Dagher, E. Kranakis, D. Krizanc, and Y. C. Stamatiou, Experimental comparison between Location Update and Caching protocols for user tracking in Wireless Networks. In Proc. 1st International Conference on Software Engineering Applied to Networking & Parallel/Distributed Computing (SNPD 2000) (Reims, 2000), Hacene Fouchal and Roger Y. Lee (eds.), 189−196, Published by the International Association for Computer and Information Science (ACIS), 2000. 53. Y.C. Stamatiou and M. Vamvakari, An asymptotic expansion for the q-hypergeometric series using singularity analysis for generating functions. Presented at the Fifth International Symposium on Orthogonal Polynomials, Special Functions and their Applications (OPSFA 19 1999) (Patras, 1999), Book of abstracts, 84−85, Department of Mathematics, University of 54. 55. 56. 57. 58. Patras, 1999. Y.C. Stamatiou and D.M. Thilikos, Monotonicity and Inert Fugitive Search Games. Presented at the 6th Twente Workshop on Graphs and Combinatorial Optimization and it appears in Electronic Notes in Discrete Mathematics, H.J. Broersma, U. Faigle, C. Hoede and J.L. Hurink (eds.), Vol. 3, Elsevier Science Publishers, 2000. D. Achlioptas, L.M. Kirousis, E. Kranakis, D. Krizanc, M. S.O. Molloy, and Y.C. Stamatiou, Random Constraint Satisfaction: A More Accurate Picture, In Proc. Third International Conference on Principles and Practice of Constraint Programming (CP 97) (Schloss Hagenberg, 1997), Vol. 1330 of Lecture Notes in Computer Science, 107−120, Springer-Verlag, 1997. Also, in the Constraints journal. N.D. Dendris, L.M. Kirousis, Y.C. Stamatiou, and D.M. Thilikos, Partiality and Approximation Schemes for Local Consistency in Networks of Constraints, also in the Constraints journal. Åðßóçò Proc. of the 15th Conference on the Foundations of Software Technology and Theoretical Computer Science (FST & TCS) (Bangalore, 1995), P.S. Thiagarajan (ed.), Vol. 1026 of Lecture Notes in Computer Science, Springer-Verlag, 210−224, 1995. Ìßá óõíôïìåõìÝíç Ýêäïóç ôçò åñãáóßáò áõôÞò ìå ôßôëï Partial Arc Consistency åìöáíßóôçêå óôï óõíÝäñéï Over-Constrained Systems (Cassis, 1995), Michael Jampel (ed.), Vol. 1106 of Lecture Notes in Computer Science, Springer-Verlag, 229−236, 1996. B.B. Boutsinas, Y.C. Stamatiou, and G. Pavlides, Parallel Reasoning using Weighted Inheritance Networks, Working Notes, Third International Workshop on Parallel Processing for Artificial Intelligence (Montreal, 1995), 29−39, 1995. An expanded version of this work with title Massively Parallel Support for Nonmonotonic Reasoning, also appeared in a book dedicated to the application of parallel processing techniques in Artificial Intelligence: Parallel Processing for AI 3, James Geller, Hiroaki Kitano and Christian Suttner (eds.), 41−66, Elsevier Publishers, 1997. B.B. Boutsinas and Y.C. Stamatiou, A knowledge-based approach for recognizing polyhedral scenes. In Proc. 13th IASTED International Conference on Applied Informatics (Austria 1995), M.H. Hamza (ed.), IASTED publications, 160−163, 1995. Åñãáóßåò åðéóêüðçóçò êáé ðáñïõóéÜóåéò 1. Ð. ÓðõñÜêçò êáé Ã.Ê. Óôáìáôßïõ, ÍÝåò êáôåõèýíóåéò óôçí Êñõðôïãñáößá, ðáñïõóßáóç óôï Ðñþôï Óõìðüóéï ÐëçñïöïñéêÞò êáé Åðé÷åéñçóéáêÞò ¸ñåõíáò ôùí Åëëçíéêþí Åíüðëùí ÄõíÜìåùí, Ðïëåìéêü Ìïõóåßï, ÁèÞíá, 2−3 Íïåìâñßïõ, 1999. 2. Ð. ÓðõñÜêçò êáé Ã.Ê. Óôáìáôßïõ, ÁðïäïôéêÜ ðñùôüêïëëá ãéá ôçí áíß÷íåõóç êéíïýìåíùí ùôáêïõóôþí óå äßêôõá õðïëïãéóôþí, ðáñïõóßáóç óôï Ðñþôï Óõìðüóéï ÐëçñïöïñéêÞò êáé Åðé÷åéñçóéáêÞò ¸ñåõíáò ôùí Åëëçíéêþí Åíüðëùí ÄõíÜìåùí, Ðïëåìéêü Ìïõóåßï, ÁèÞíá, 2−3 Íïåìâñßïõ, 1999. (Ïìéëßá óôçñéãìÝíç óå åñåõíçôéêÞ åñãáóßá ôùí Ç. Áíôùíïðïýëïõ, Ð. ÓðõñÜêç, êáé Â. ÔáìðáêÜ.) ¢ëëåò óõããñáöéêÝò äñáóôçñéüôçôåò ÊñáôÜ ìå ôïí ÊáèçãçôÞ ê. ÓðõñÜêç êáé ôïí Äñ. Ðáíáãéþôç ÍÜóôïõ ìßá ìüíéìç óôÞëç óôï ðåñéïäéêü <<¢ìõíá êáé Äéðëùìáôßá>> áöéåñùìÝíç óå èÝìáôá êñõðôïãñáößáò êáé êñõðôáíÜëõóçò. 20
© Copyright 2024 Paperzz