Skip to main content

Ιωάννης Σταματίου

Τμήμα Διοίκησης Επιχειρήσεων, Πανεπιστήμιο Πάτρας

Επαγγελματική Εμπειρία

Από τον Ιανουάριο του 2011 έως και τον Ιούνιο του 2017 υπηρέτησε στο Πανεπιστήμιο Πάτρας, στο Τμήμα Διοίκησης Επιχειρήσεων, ως Αναπληρωτής Καθηγητής ενώ από τον Ιούλιο του 2017 υπηρετεί στο ίδιο τμήμα ως Καθηγητής (γνωστικό αντικείμενο ΦΕΚ: «Ασφάλεια στο Ηλεκτρονικό Επιχειρείν». Πριν τη θέση αυτή, υπηρέτησε από το 2005 έως και τέλος του 2011 στο Πανεπιστήμιο Ιωαννίνων, Τμήμα Μαθηματικών, ως Επίκουρος Καθηγητής ενώ από 2003 έως και τέλος του 2004 είχε υπηρετήσει στο Πανεπιστήμιο Αιγαίου, Τμήμα Μαθηματικών, ως Επίκουρος Καθηγητής. Από αρχές Μαρτίου του 2015 έως και τέλος Ιουλίου του 2015 ήταν, επίσης, προσκεκλημένος, με εκπαιδευτική άδεια από το Πανεπιστήμιο Πάτρας, στο Department of Business Informatics, Faculty of Economics and Business Administration, Goethe University, Frankfurt, Germany. Η συνεργασία του με την εκεί ερευνητική ομάδα του Καθηγητή Kai Rannenberg επικεντρώθηκε σε θέματα προστασίας της ιδιωτικότητας με χρήση τεχνολογιών PETs (Privacy Enhancing Technologies) και, ειδικότερα, της τεχνολογίας Privacy-ABCs.

Επαγγελματική δραστηριότητα

Από το 1999, ο κ. Σταματίου συνεργάζεται με το Ινστιτούτο Τεχνολογίας Υπολογιστών και Εκδόσεων (ΙΤΥΕ) – «ΔΙΟΦΑΝΤΟΣ» ως εξωτερικός συνεργάτης σε εγχώρια και ευρωπαϊκά έργα αποκομίζοντας μεγάλη εργασιακή αλλά και ερευνητική εμπειρία. Ειδικότερα, ο κ. Σταματίου έχει συμμετάσχει ή θα συμμετάσχει ως ένας εκ των κυρίων ερευνητών στα εξής ανταγωνιστικά ευρωπαϊκά ερευνητικά έργα του ΙΤΥΕ – «ΔΙΟΦΑΝΤΟΣ»: SAINTS (νέο έργο, HORIZON 2020) Μάιος 2017 – Μάιος 2020), Privacy Flag (HORIZON 2020) Απρίλιος 2015 – Απρίλιος 2018, IoT Lab (FP7) Οκτώβριος 2013 – Σεπτέμβριος 2016, ABC4Trust (IP project, FP7), Νοέμβριος 2010 – Φεβρουάριος 2015, ASPIS (IST) 2000 – 2002, CORAS (IST) 2000 – 2003. Όλα αυτά τα έργα είχαν ως κύριο θέμα τους την ασφάλεια και την προστασία της ιδιωτικότητας είτε άμεσα είτε ως συστατικά στοιχεία των αντικειμένων τους. Επιπρόσθετα, ο κ. Σταματίου συμμετείχε ως ένας εκ των κύριων ερευνητών-συνεργατών του ΙΤΥΕ-ΔΙΟΦΑΝΤΟΣ στα εξής εθνικά έργα: Πιστοποίηση ορθότητας και ασφάλειας ηλεκτρονικών παιχνιδιών της εταιρείας ΙΝΤΡΑΛΟΤ (Απρίλιος 2012 – Μάρτιος 2014), Περιφερειακός πόλος καινοτομίας Δυτικής Ελλάδος (2007 – 2008), Έρευνα και ανάπτυξη συστημάτων Ηλεκτρονικής Ψηφοφορίας βασισμένων σε τυπικές μεθόδους σχεδίασης και διαχείρισης κινδύνων με εστίαση στην προσέλκυση της εμπιστοσύνης του πολίτη (έργο ΠΝΥΚΑ, 2006 – 2008), Σχεδίαση-υλοποίηση- έλεγχος κρυπτογραφικά ασφαλών παιχνιδιών πρόβλεψης του ΟΠΑΠ EXTRA 5 και SUPER 3 (2001 – 2002), Έργο διαχείρισης κινδύνων παιχνιδιών πρόγνωσης αποτελέσματος αθλητικών αγώνων (έργο ΣΤΟΙΧΗΜΑ) για την ΙΝΤΡΑΛΟΤ και ΟΠΑΠ (2000 – 2002), Σχεδίαση-υλοποίηση-έλεγχος κρυπτογραφικά ασφαλών γεννητριών ψευδοτυχαίων αριθμών για παιχνίδια πρόβλεψης αποτελέσματος κλήρωσης του ΟΠΑΠ (έργο KENO) 1997 – 1998.

 

Επιστημονικές δημοσιεύσεις σε διεθνή περιοδικά με το σύστημα των κριτών

  1. C. Stamatiou and C. Tatakis. An algorithm for computing the universal Gröbner Basis of graph ideals. International Journal of Computer Mathematics: Computer Systems Theory (TCOM), 2019.
  2. N. Giovanopoulos, P.E. Nastou, P.M. Pardalos, and Y.C. Stamatiou. A Secret Key Information Hiding in Digital Images Protocol based on Steganographic Methods in Image Frequency Domain. International Journal of Applied & Experimental Mathematics, Graphy Publications, 2017.
  3. D. Avgerou, P. Nastou, D. Nastouli, P. Pardalos and Y.C. Stamatiou. On the Deployment of Citizens’ Privacy Preserving Collective Intelligent eBusiness Models in Smart Cities. International Journal of Security and Its Applications (IJSIA), Vol. 10, No 2, pp. 171-184, February 2016.
  4. D. Avgerou and Y.C. Stamatiou. Privacy Awareness Diffusion in Social Networks. IEEE Security & Privacy Journal, vol.13, no. 6, pp. 44-50, Nov.- Dec. 2015. Also posted at http://stc-social-networking.ieee.net/featured- articles, at the site of the Special Technical Community (STC) on Social Networking, as a featured article for December 2015, selected by the editorial board as \interesting and promising” (as stated at the site) article.
  5. E. Nastou, V. Papadinas, P. Pardalos, and Y.C. Stamatiou. On a new edge function on complete weighted graphs and its application for locating Hamiltonian cycles of small weight. Optimization Letters, pp. 1-18, Springer, 2015.
  6. Manolopoulos, D. Sofotassios, P. Spirakis, and Y.C. Stamatiou. A Framework for Protecting Voters’ Privacy in Electronic Voting Procedures. Journal of Cases on Information Technology (JCIT), Vol. 15, No. 2, pp. 1-33, 2013.
  7. E. Nastou, P. Spirakis, Y.C. Stamatiou and A. Tsiakalos. On the Derivation of a Closed-Form Expression for the Solutions of Generalized Abel Differential Equations. International Journal of Di erential Equations, Hindawi Press, Volume 2013, June 2013.
  8. E. Nastou and Y.C. Stamatiou. Distributed Computation of SBoxes with Strong Security Properties. International Journal of Security and Its Applications, Vol. 6, No. 2, 2012.
  9. Nastou, Y.C. Stamatiou, and A. Tsiakalos. Solving a Class of ODEs Arising in the Analysis of a Computer Security Process using Generalized Hyper- Lambert Functions. International Journal of Applied Mathematics and Computation, Vol 4 No. 3, pp. 67-76, 2012.
  10. Kalles, A. Papagelis, Y.C. Stamatiou: Consolidating a Heuristic for Incremental Decision Tree Learning through asymptotic Analysis. International Journal on Artificial Intelligence Tools 20(1): 29-52 (2011).
  11. Konstantinou, A. Kontogeorgis, Y.C. Stamatiou, C.D. Zaroliagis: On the Efficient Generation of Prime-Order Elliptic Curves. J. Cryptology 23(3): 477-503 (2010)
  12. Makri and Y.C. Stamatiou, An interactive, similarity increasing algorithm for random strings with applications to key agreement in ad-hoc networks, Studies in Applied Mathematics, Vol. 121, No. 2, pp 141-155, 2008.
  13. C. Kaporis, L.M. Kirousis, Y.C. Stamatiou, M. Vamvakari, and M. Zito, The unsatisfiability threshold revisited. Discrete Applied Mathematics 155, 1525-1538, 2007.
  14. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, Efficient generation of secure elliptic curves, International Journal of Information Security, 6(1): 47-63, 2007.
  15. C. Laskari, G.C. Meletiou, Y.C. Stamatiou, D.K. Tasoulis, M.N. Vrahatis, Assessing the Effectiveness of Artificial Neural Networks on Problems Related to Elliptic Curve Cryptography, Mathematical and Computer Modelling, Volume 46, Issues 1-2, July 2007, pp. 174-179 (Elsevier).
  1. Komninos, P. Spirakis, Y.C. Stamatiou, G. Vavitsas, A worm propagation model based on scale free network structures and people’s email acquaintance profiles, IJCSNS-International Journal of Computer Science and Network Security, No. 2, Vol. 7 February 2007.
  2. C. Laskari, G.C. Meletiou, Y.C. Stamatiou, M.N. Vrahatis, Applying Evolutionary Computation Methods for the Cryptanalysis of Feistel Ciphers, Applied Mathematics and Computation, 2006 (Elsevier).
  3. C. Laskari, G.C. Meletiou, Y.C. Stamatiou and M.N. Vrahatis, Computational intelligence based cryptanalysis. Journal of Nonlinear Analysis, Theory, Methods & Applications, Elsevier, 2006.
  4. E. Nastou and Y.C. Stamatiou, An on chip, CAST-128 based block cipher with dynamically reconfigurable s-boxes generated in parallel. Θα εμφανιστεί το 2004 στην ειδική έκδοση του International Journal of Computer Research με θέμα Cryptographic Hardware and Embedded Systems.
  5. C. Kaporis, L.M. Kirousis, and Y.C. Stamatiou, How to prove conditional randomness using the Principle of Deferred Decisions. Θα εμφανιστεί το 2004 σε ένα τόμο με τίτλο Computational Complexity and Statistical Physics που θα εκδοθεί από το Santa Fe Institute.
  6. M. Kirousis, Y.C. Stamatiou, and M. Zito, The unsatisfiability threshold conjecture: the techniques behind upper bound improvements. Θα εμφανιστεί το 2004 σε ένα τόμο με τίτλο Computational Complexity and Statistical Physics που θα εκδοθεί από το Santa Fe Institute.
  7. M. Kirousis, E. Kranakis, D. Krizanc, and Y.C. Stamatiou, Locating Information with Uncertainty in Fully Interconnected Networks: The Case of Non-Distributed Memory, NETWORKS 42:3, 169-180, 2003.
  8. Achlioptas, L.M. Kirousis, E. Kranakis, D. Krizanc, M. S.O. Molloy, and Y.C. Stamatiou, Random Constraint Satisfaction: A More Accurate Picture, Constraints 6, 329-344, 2001.
  9. M. Kirousis, Y.C. Stamatiou, and M. Vamvakari, Upper Bounds and Asymptotics for the q-binomial Coefficients, Studies in Applied Mathematics 107, 43—62, 2001.
  10. C. Kaporis, L.M. Kirousis, E. Kranakis, D. Krizanc, Y.C. Stamatiou and E.C. Stavropoulos, Locating Information with Uncertainty in Fully Interconnected Networks with Applications to World Wide Web Information Retrieval, Computer Journal 44, 221-229, 2001.
  11. Janson, Y.C. Stamatiou, and M. Vamvakari, Bounding the unsatisfiability threshold of random 3-SAT. Random Struct. Algorithms 17(2): 103-116 (2000).
  12. M. Kirousis, E. Kranakis, D. Krizanc, and Y.C. Stamatiou: Approximating the unsatisfiability threshold of random formulas. Random Struct. Algorithms 12(3): 253-269 (1998).

 

Επιστημονικές δημοσιεύσεις σε πρακτικά διεθνών συνεδρίων με το σύστημα των κριτών

  1. Welderufael Tesfay, Dimitra Nastouli, Yannis C. Stamatiou, Jetzabel
  2. Serna: pQUANT: A User-Centered Privacy Risk Analysis Framework. CRiSIS 2019: 3-16
  3. Bothos. A. Zalonis, V. Vlachos, Y. Stamatiou, A. Madhja, S. Thomopoulos, and S. Nikoletseas. Probing Digital Black Markets: A New Approach to Cybersecurity. In Proc. 4th International Confer- ence on Operation Planning, Technological Innovations and Mathematical Applications (OPTIMA), 2017.
  4. Vasileios Vlachos, Yannis C. Stamatiou, Adelina Madhja, Sotiris E. Nikoletseas: Privacy Flag: A crowdsourcing platform for reporting and managing privacy and security PCI 2017: 27:1-27:4
  5. Madhja, E. Nikoletseas, Y.C. Stamatiou, D. Tsolovos and V. Vlachos, Crowd Sourcing Based Privacy Threat Analysis and Alerting, In 3rd International Conference on Cryptography, Cyber Security and Information Warface (CryCybIW), Hellenic Military Academy, 26-27 May 2016
  6. D. Avgerou, P. Nastou, and Y.C. Stamatiou. Innovative Applications and Services Based on Pri- vacy Enhanced Distributed Computations on IoT Devices. Accepted for presentation at 18th IEEE Conference on Business Informatics (CBI 2016), 2016.
  7. Makris, K. Patikas, and Y.C. Stamatiou. Increasing trust towards eCommerce: Privacy Enhancing Technologies against Price Discrimination. In Proc. 13th International Conference on Web Informa- tion Systems and Technologies (WEBIST 2016), 2016.
  8. D. Avgerou, P. Nastou, D. Nastouli, P. Pardalos and Y.C. Stamatiou. Adopting an ABCs Au- thentication Framework for Collective Intelligent eBusiness Models in Smart Cities. In Proc. 8th International Conference on Security Technology (SecTech 2015), 2015.
  9. Ispoglou, C. Makris, Y.C. Stamatiou, E.C. Stavropoulos, A.K. Tsakalidis, V. Iosifidis. Partial Order Preserving Encryption Search Trees. In Proc. 26th International Conference on Database and Expert Systems Applications (DEXA 2015), pp. 49-56, Lecture Notes in Computer Science, Springer, 2015.
  10. Makris, Y. Plegas, Y.C. Stamatiou, E.C. Stavropoulos, and A.K. Tsakalidis. Reducing Redundant Information in Search Results Employing Approximation Algorithms. In Proc. 26th International Conference on Database and Expert Systems Applications (DEXA 2014), pp. 240-247, Lecture Note in Computer Science, Springer, 2014.
  11. Benenson, A. Girard, I. Krontiris, V. Liagkou, K. Rannenberg, and
  12. Stamatiou. User Acceptance of Privacy-ABCs: An Exploratory Study. In Proc. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 375-386, Springer, 2014.
  13. Spirakis and Y.C. Stamatiou. A user-centric, privacy respecting perspective for studying and managing the “Digital-Self”. In Proc. 9th International IFIP Summer School on Privacy and Identity Management for the Future Internet in the Age of Globalisation. Springer, 2014.
  14. C. Stamatiou. Privacy Attribute Based Credentials (Privacy-ABCs): advancing privacy-preserving e-participation in the education sector. Proceedings of the 8th International IFIP Summer School on Privacy and Identity Management for Emerging Services and Technologies, pp. 64-76, Springer Verlag, 2014,
  15. Benenson, I. Krontiris, V. Liagkou, K. Rannenberg, A. Schopf,
  16. Schr¨oder, and Y. Stamatiou. Understanding and Using Anonymous Credentials. 9th Symposium on Usable Privacy and Security (SOUPS 2013). Electronic proceedings.
  17. Spirakis and Y, Stamatiou. Attribute Based Credentials towards refined public consultation results and effective eGovernance. In Proc. Cyber Security Privacy EU FORUM and Trust in the Digital World 2013 collection of research papers, pp. 115 – 126, LNCS, Springer Verlag, 2013.
  18. Panayotis E. Nastou, Paul Spirakis, Yannis Stamatiou and Christina On the Design of Agent Agreement Protocol using Linear Error-Correcting Codes. In Proc. 4th IEEE International Conference on Information, Intelligence, Systems and Applications (IISA 2013). IEEE, pp. 1-6, 2013.
  19. Liagkou, G. Metakides, A. Pyrgelis, C. Raptopoulos, P. Spirakis, and
  20. Stamatiou. Privacy preserving course evaluations in Greek higher education institutes: an e-Participation case study with the empowerment of Attribute Based Credentials. Annual Privacy Forum 2012. Electronic proceedings.
  21. Kotsopoulos and Y.C. Stamatiou, Uncovering Mobile Phone Users’ Malicious Activities using Open Source Tools, accepted at the International Symposium on Foundation of Open Source Intelligence and Security Informatics (FOSINT 2012).
  22. Ioannis Chatzigiannakis, Apostolos Pyrgelis, Paul Spirakis, Yannis
  23. Stamatiou: Elliptic Curve Based Zero Knowledge Proofs and Their Applicability on Resource Constrained Devices, Accepted at Wireless Sensor Network Security (WSNS) 2011.
  24. C. Stamatiou, E. Makri, P. Spirakis and V. Liagkou. A probabilistic key agreement scheme for sensor networks without key predistribution. Accepted at the 7th International Conference on Global Security, Safety & Sustainability (ICGS3 2011).
  25. Papaioannou, P. Nastou, Y.C. Stamatiou, and Christos Zaroliagis, Secure Elliptic Curve Generation and Key Establishment on a 802.11 WLAN Embedded Device, accepted at the 9th International Symposium on Autonomous Decentralized Systems (ISADS 2009).
  26. Papadinas and Y.C. Stamatiou, Geometric approaches for creating low power, low interference connectivity patterns in static, structureless sensor networks, accepted at the First International Workshop on Autonomous Embedded Systems and Networking (AESN 2009), ISADS 2009.
  27. Manolopoulos, P. Nakou, A. Panagiotaki, D. Sofotasios, P. Spirakis, and Y.C. Stamatiou, A step-wise refinement approach for enhancing eVoting acceptance, accepted at {\em 2nd Int. Conf. on Theory and Practice of Electronic Governance (ICEGOV 2008)}, 2008.
  28. Kammas, T. Komninos, and Y.C. Stamatiou, A queuing theory based model for studying intrusion evolution and elimination in computer network, accepted for presentation at 4th International Conference on Information Assurance and Security (IAS 2008).
  29. Manolopoulos, A. Panagiotaki, D. Sofotasios, and Y.C. Stamatiou, Experience and Benefits from the application of a Formal Risk Assessment Framework in the Evoting domain, accepted for presentation at the 7th International Conference on eGovernment (EGOV 2008).
  30. C. Stamatiou, The theoretical analysis of an agreement protocol using Lambert functions, presented at the 2008 International Workshop on Applied Probability, Invited Session with title Discrete distributions and asymptotic behaviour.
  1. Antoniou, Korakas, C. Manolopoulos, A. Panagiotaki, D. Sofotassios, . G. Spirakis, Y. C. Stamatiou, A Trust-Centered Approach for Building E-Voting Systems, in Proc. 6th International Conference on eGovernment (EGOV 2007), 366-377, Lecture Notes in Computer Science, Springer-Verlag, 2007.
  2. Liagkou, E. Makri, P. Spirakis, and Y.C. Stamatiou, Trust in global computing systems as a limit property emerging from short range random interactions, accepted at the Second International Conference on Availability, Reliability and Security (ARES 2007 – The International Dependability Conference).
  3. Komninos, Y. C. Stamatiou, and G. Vavitsas, A Worm Propagation Model Based on People’s Email Acquaintance Profiles, in Proc. 2nd international Workshop on Internet & Network Economics (WINE 2006), pp. 343-352, Springer Verlag, 2006.
  4. Makri and Y.C. Stamatiou, Deterministic Key Pre-distribution schemes for Mobile Ad-Hoc Networks based on Set Systems with Limited Intersection Sizes, in Proc. 2nd IEEE International Workshop on Wireless and Sensor Networks Security (WSNS’06), 2006.
  5. Makri and Y.C. Stamatiou, Distributively Increasing the Percentage of Similarities Between Strings with Applications to Key Agreement, in Proc. 5th International Conference on AD-HOC Networks & Wireless (ADHOC-NOW 2006), pp. 211-223, Springer Verlag, 2006.
  6. Liagkou, E. Makri, P. Spirakis, and Y.C. Stamatiou The threshold behaviour of the fixed radius random graph model and applications to the key management problem of sensor networks, in Proc. ALGOSENSORS 2006, Springer Verlag, 2006.
  7. Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung, Trust Engineering: From Requirements to System Design and Maintenance – A Working National Lottery System Experience, in Proc. ISC 2005, pp. 44-58, 2005.
  8. Komninos, P. Spirakis, Y.C. Stamatiou, E. Valeontis, H. Yannakopoulos, A Software Tool for Distributed Intrusion Detection in Computer Networks, best poster award at the Twenty-Third Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2004).
  9. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the Use of Weber Polynomials in Elliptic Curve Cryptography. Accepted at EURO-PKI 2004.
  10. Konstantinou, V. Liagkou, P. Spirakis, Y.C. Stamatiou, and M. Yung, Electronic National Lotteries. Έγινε αποδεκτό στο Financial Cryptography 2004.
  11. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the construction of prime order Ellipcic Curves. Έγινε αποδεκτό στο INDOCRYPT 2003.
  12. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, On the efficient generation of Elliptic Curves over Prime Fields. Παρουσιάστηκε στο Fourth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).
  13. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis, A software library for Elliptic Curve cryptography. Παρουσιάστηκε στο 10th European Symposium on Algorithms (ESA 2002), Engineering and Applications track.
  14. Nastou and Y.C. Stamatiou, Enhancing the security of block ciphers with the aid of parallel substitution box construction. Accepted at First International Workshop on Assurance in Distributed Systems and Networks (ADSN), 2002.