Evangelos Kranakis
Evangelos Kranakis
Chancellor's Professor, School of Computer Science, Carleton University
Verified email at - Homepage
Cited by
Cited by
Compass routing on geometric networks
E Kranakis
Proc. 11th CCCG, 1999, 1999
Power consumption in packet radio networks
LM Kirousis, E Kranakis, D Krizanc, A Pelc
Theoretical Computer Science 243 (1-2), 289-305, 2000
Primality and cryptography
E Kranakis
Springer-Verlag, 2013
Detection of transient in radio frequency fingerprinting using signal phase
J Hall, M Barbeau, E Kranakis
Wireless and optical communications 9, 13, 2003
Approximating the unsatisfiability threshold of random formulas
LM Kirousis, E Kranakis, D Krizanc, YC Stamatiou
Random Structures & Algorithms 12 (3), 253-269, 1998
On the false-positive rate of Bloom filters
P Bose, H Guo, E Kranakis, A Maheshwari, P Morin, J Morrison, M Smid, ...
Information Processing Letters 108 (4), 210-213, 2008
Structural RNA has lower folding energy than random RNA of the same dinucleotide frequency
P Clote, F Ferré, E Kranakis, D Krizanc
Rna 11 (5), 578-591, 2005
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting.
J Hall, M Barbeau, E Kranakis
Communications, internet, and information technology 1, 2004
DNS-based Detection of Scanning Worms in an Enterprise Network.
D Whyte, E Kranakis, PC Van Oorschot
NDSS, 2005
Tree exploration with little memory
K Diks, P Fraigniaud, E Kranakis, A Pelc
Journal of Algorithms 51 (1), 38-63, 2004
On interdomain routing security and pretty secure BGP (psBGP)
PC Oorschot, T Wan, E Kranakis
ACM Transactions on Information and System Security (TISSEC) 10 (3), 11-es, 2007
Detection of rogue devices in bluetooth networks using radio frequency fingerprinting
M Barbeau, J Hall, E Kranakis
proceedings of the 3rd IASTED International Conference on Communications and …, 2006
Pretty Secure BGP, psBGP.
T Wan, E Kranakis, PC van Oorschot
NDSS, 2005
Asynchronous deterministic rendezvous in graphs
G De Marco, L Gargano, E Kranakis, D Krizanc, A Pelc, U Vaccaro
Theoretical Computer Science 355 (3), 315-326, 2006
Random constraint satisfaction: A more accurate picture
D Achlioptas, LM Kirousis, E Kranakis, D Krizanc, MSO Molloy, ...
Principles and Practice of Constraint Programming-CP97: Third International …, 1997
Efficient routing in networks with long range contacts
L Barriere, P Fraigniaud, E Kranakis, D Krizanc
Distributed Computing: 15th International Conference, DISC 2001 Lisbon …, 2001
Boolean functions and computation models
P Clote, E Kranakis
Springer Science & Business Media, 2013
Mobile agent rendezvous in a ring
E Kranakis, N Santoro, C Sawchuk, D Krizanc
23rd International Conference on Distributed Computing Systems, 2003 …, 2003
Principles of ad-hoc networking
M Barbeau, E Kranakis
John Wiley & Sons, 2007
Detecting impersonation attacks in future wireless and mobile networks
M Barbeau, J Hall, E Kranakis
International Workshop on Secure Mobile Ad-hoc Networks and Sensors, 80-95, 2005
The system can't perform the operation now. Try again later.
Articles 1–20