| A survey on cluster-based group key agreement protocols for WSNs E Klaoudatou, E Konstantinou, G Kambourakis, S Gritzalis IEEE Communications surveys & tutorials 13 (3), 429-442, 2010 | 101 | 2010 |
| A framework for identity privacy in SIP G Karopoulos, G Kambourakis, S Gritzalis, E Konstantinou Journal of Network and Computer Applications 33 (1), 16-28, 2010 | 46 | 2010 |
| Efficient cluster-based group key agreement protocols for wireless ad hoc networks E Konstantinou Journal of Network and Computer Applications 34 (1), 384-393, 2011 | 37 | 2011 |
| Cluster-based group key agreement for wireless ad hoc networks E Konstantinou 2008 Third International Conference on Availability, Reliability and …, 2008 | 32 | 2008 |
| A software library for elliptic curve cryptography E Konstantinou, Y Stamatiou, C Zaroliagis European Symposium on Algorithms, 625-637, 2002 | 29 | 2002 |
| DNSSEC vs. DNSCurve: A side-by-side comparison M Anagnostopoulos, G Kambourakis, E Konstantinou, S Gritzalis Situational awareness in computer network defense: Principles, methods and …, 2012 | 28 | 2012 |
| Design, analysis and performance evaluation of group key establishment in wireless sensor networks I Chatzigiannakis, E Konstantinou, V Liagkou, P Spirakis Electronic Notes in Theoretical Computer Science 171 (1), 17-31, 2007 | 28 | 2007 |
| TNFS resistant families of pairing-friendly elliptic curves G Fotiadis, E Konstantinou Theoretical Computer Science 800, 73-89, 2019 | 25 | 2019 |
| Constant round group key agreement protocols: A comparative study E Makri, E Konstantinou computers & security 30 (8), 643-678, 2011 | 24 | 2011 |
| Electronic national lotteries E Konstantinou, V Liagkou, P Spirakis, YC Stamatiou, M Yung International Conference on Financial Cryptography, 147-163, 2004 | 23 | 2004 |
| On the construction of prime order elliptic curves E Konstantinou, YC Stamatiou, C Zaroliagis International Conference on Cryptology in India, 309-322, 2003 | 23 | 2003 |
| On the efficient generation of elliptic curves over prime fields E Konstantinou, YC Stamatiou, C Zaroliagis International Workshop on Cryptographic Hardware and Embedded Systems, 333-348, 2002 | 23 | 2002 |
| Efficient certification path discovery for MANET G Kambourakis, E Konstantinou, A Douma, M Anagnostopoulos, ... EURASIP Journal on Wireless Communications and Networking 2010 (1), 243985, 2010 | 22 | 2010 |
| An efficient constant round id-based group key agreement protocol for ad hoc networks E Konstantinou International Conference on Network and System Security, 563-574, 2013 | 19 | 2013 |
| Revisiting WiMAX MBS security G Kambourakis, E Konstantinou, S Gritzalis Computers & Mathematics with Applications 60 (2), 217-223, 2010 | 19 | 2010 |
| On the efficient generation of prime-order elliptic curves E Konstantinou, A Kontogeorgis, YC Stamatiou, C Zaroliagis Journal of cryptology 23 (3), 477-503, 2010 | 12 | 2010 |
| Clustering oriented architectures in medical sensor environments E Klaoudatou, E Konstantinou, G Kambourakis, S Gritzalis 2008 Third International Conference on Availability, Reliability and …, 2008 | 12 | 2008 |
| Efficient generation of secure elliptic curves E Konstantinou, YC Stamatiou, C Zaroliagis International Journal of Information Security 6 (1), 47-63, 2007 | 12 | 2007 |
| “Trust Engineering:” From Requirements to System Design and Maintenance–A Working National Lottery System Experience E Konstantinou, V Liagkou, P Spirakis, YC Stamatiou, M Yung International Conference on Information Security, 44-58, 2005 | 11 | 2005 |
| Computing polynomials of the Ramanujan tn class invariants E Konstantinou, A Kontogeorgis Canadian Mathematical Bulletin 52 (4), 583-597, 2009 | 10 | 2009 |