%===================================================================% %--E.C. Laskari - Bibliography File - Last Update: September 2006 --% %===================================================================% %--bib items are alphabetically to author names and year------------% %===================================================================% @article{MathCompMod_LaskariMSTV06, author = {E. C. Laskari and G. C. Meletiou and Y. C. Stamatiou and D. K. Tasoulis and M. N. Vrahatis}, title = {Assessing the Effectiveness of Artificial Neural Networks on Problems Related to Elliptic Curve Cryptography}, journal = {Mathematical and Computer Modelling}, year = {2006}, note = {to appear}, } @article{NonlAnalTMA_LaskariMSV05, author = {E. C. Laskari and G. C. Meletiou and Y. C. Stamatiou and M. N. Vrahatis}, title = {Evolutionary computation based cryptanalysis: A first study}, journal = {Nonlinear Analysis: Theory, Methods and Applications}, volume = {63}, year = {2005}, pages = {e823--e830}, } @article{AppMathComp_LaskariMSV06, author = {E. C. Laskari and G. C. Meletiou and Y. C. Stamatiou and M. N. Vrahatis}, title = {Applying Evolutionary Computation Methods for the Cryptanalysis of Feistel Ciphers}, journal = {Applied Mathematics and Computation}, year = {2006}, note = {to appear}, } @article{ANACM_LaskariMV05, author = {E. C. Laskari and G. C. Meletiou and D. K. Tasoulis and M. N. Vrahatis}, title = {Aitken and Neville Inverse Interpolation Methods over Finite Fields}, journal = {Applied Numerical Analysis and Computational Mathematics (ANACM)}, volume = {2}, number = {1}, year = {2005}, pages = {100--107}, } @article{MathCompMod_LaskariMTV05, author = {E. C. Laskari and G. C. Meletiou and D. K. Tasoulis and M. N. Vrahatis}, title = {Privacy preserving electronic data gathering}, journal = {Mathematical and Computer Modelling}, volume = {42}, year = {2005}, pages = {739--746}, } @article{SIGSAMBull_LaskariMTV05, author = {E. C. Laskari and G. C. Meletiou and D. K. Tasoulis and M. N. Vrahatis}, title = {Transformations of two cryptographic problems in terms of matrices}, journal = {{SIGSAM} Bulletin: Communications in Computer Algebra, ACM Press}, volume = {39}, number = {4}, year = {2005}, pages = {127--130}, } @article{NonlAnalRWA_LaskariMTV06, author = {E. C. Laskari and G. C. Meletiou and D. K. Tasoulis and M. N. Vrahatis}, title = {Studying the performance of artificial neural networks on problems related to cryptography}, journal = {Nonlinear Analysis Series B: Real World Applications}, volume = {7}, number = {5}, year = {2006}, pages = {937--942}, } @InProceedings{LaskariMV04_IASTED, author = {E. C. Laskari and G. C. Meletiou and M. N. Vrahatis}, title = {The Discrete Logarithm Problem as an Optimization Task: A First Study}, booktitle = {Proceedings of the IASTED International Conference on Artificial Intelligence and Applications (AIA 2004)}, pages = {1--6}, year = {2004}, publisher = {ACTA Press}, } @article{NonlAnalTMA_LaskariMV05, author = {E. C. Laskari and G. C. Meletiou and M. N. Vrahatis}, title = {Problems of Cryptography as Discrete Optimization Tasks}, journal = {Nonlinear Analysis: Theory, Methods and Applications}, volume = {63}, year = {2005}, pages = {e831--e837}, } @InProceedings{LaskariMV06_CIS, author = {E. C. Laskari and G. C. Meletiou and M. N. Vrahatis}, title = {Utilizing Evolutionary Computation Methods for the Design of S-boxes}, booktitle = {Proceedings of the International Conference on Computational Intelligence and Security 2006 (CIS 2006)}, address = {China}, year = {2006}, note = {in press}, } @InProceedings{LaskariPV02b_CEC, author = {E. C. Laskari and K. E. Parsopoulos and M. N. Vrahatis}, title = {Particle Swarm Optimization for Integer Programming}, booktitle = {Proceedings of the IEEE 2002 Congress on Evolutionary Computation}, address = {Hawaii, HI}, pages = {1576--1581}, year = {2002}, publisher = {IEEE Press}, } @InProceedings{LaskariPV02a_CEC, author = {E. C. Laskari and K. E. Parsopoulos and M. N. Vrahatis}, title = {Particle Swarm Optimization for Minimax Problems}, booktitle = {Proceedings of the IEEE 2002 Congress on Evolutionary Computation}, address = {Hawaii, HI}, pages = {1582--1587}, year = {2002}, publisher = {IEEE Press}, } @article{NumAlg_LaskariPV03, author = {E. C. Laskari and K. E. Parsopoulos and M. N. Vrahatis}, title = {Utilizing Evolutionary Operators in Global Optimization with Dynamic Search Trajectories}, journal = {Numerical Algorithms}, volume = {34}, number = {2--4}, year = {2003}, pages = {393--403}, } @InProceedings{LNCS_TasoulisLMV06, author = {D. K. Tasoulis and E. C. Laskari and G. C. Meletiou and M. N. Vrahatis}, title = {Privacy preserving unsupervised clustering over vertically partitioned data}, booktitle = {Lecture Notes in Computer Science}, year = {2006}, note = {in press}, } @InCollection{ParsopoulosLV01_IASTED, author = {K. E. Parsopoulos and E. C. Laskari and M. N. Vrahatis}, title = {Solving $\ell_1$ Norm Errors-In-Variables Problems Using Particle Swarm Optimizer}, booktitle = {Artificial Intelligence and Applications}, editor = {Hamza, M.H.}, publisher = {IASTED/ACTA Press}, pages = {185--190}, year = {2001}, } @InProceedings{ParsopoulosLV03_MII, author = {K. E. Parsopoulos and E. C. Laskari and M. N. Vrahatis}, title = {Particle Identification by Light Scattering Through Evolutionary Algorithms}, booktitle = {Proceedings of the First International Conference for Mathematics \& Informatics for Industry (MII 2003)}, pages = {97--108}, address = {Thessaloniki, Greece}, year = {2003}, }