Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Ioannis Askoxylakis

    Research Interests:
    Research Interests:
    Fatty acid composition of adipose tissue is a most reliable biomarker of long-term dietary fatty acid intake. Few studies have implemented biomarkers of fatty acid intake in relation to breast cancer. In this study the relation between... more
    Fatty acid composition of adipose tissue is a most reliable biomarker of long-term dietary fatty acid intake. Few studies have implemented biomarkers of fatty acid intake in relation to breast cancer. In this study the relation between adipose tissue composition and breast cancer was investigated. Fatty acid composition in breast and buttock adipose tissue from 94 Greek women with breast cancer and 57 with benign breast tumors was determined. Multivariate analysis was performed to determine the association between fatty acid groups and breast cancer risk. In pre-menopausal women, elevated total polyunsaturated fatty acids (PUFA) in breast adipose tissue and N-3 PUFA in buttock adipose tissue were associated with reduced odds of breast cancer (odds ratio, OR=0.19; 95% confidence interval, CI=0.05-0.76, p<0.02 and OR=0.02; 95% CI=0.0009-0.36, p<0.009). Adipose total PUFA and N-3 PUFA were inversely-related to breast cancer risk in Greek pre-menopausal women. These results may ha...
    Rhabdomyolysis is a rare complication of serious surgical procedures, and constitutes a clinical and biochemical syndrome, caused by injury and destruction of skeletal muscles. It is accompanied by pain in the region of the referred... more
    Rhabdomyolysis is a rare complication of serious surgical procedures, and constitutes a clinical and biochemical syndrome, caused by injury and destruction of skeletal muscles. It is accompanied by pain in the region of the referred muscle group, increase in creatine phosphokinase levels, myoglobinuria, often with severe renal failure, and finally multi-organ system failure and death, if not treated in time. The main risk factor in the development of postoperative rhabdomyolysis is prolonged intraoperative immobilization of the patient. Morbidly obese patients who undergo laparoscopic bariatric operations should be considered high-risk for rhabdomyolysis, from extended immobilization and pressure phenomena in the lumbar region and gluteal muscles. We report a 20-year-old woman with BMI 51, who underwent a prolonged laparoscopic Roux-en-Y gastric bypass. Postoperatively, she presented severe myalgia in the gluteal muscles and lumbar region, oliguria and creatine phosphokinase levels that reached 38,700 U/L. She was treated with intensive hydration and analgesics, and did not develop acute renal failure because diagnosis and treatment were attained immediately.
    ABSTRACT Wireless handheld devices are increasingly popular. The authenticity of the information or a program to be downloaded is important, especially for business uses. In server-aided verification (SAV), a substantial part of the... more
    ABSTRACT Wireless handheld devices are increasingly popular. The authenticity of the information or a program to be downloaded is important, especially for business uses. In server-aided verification (SAV), a substantial part of the verification computation can ...
    Advisory Committee Tulin Atmaca, IT/Telecom & Management SudParis, France Eugen Borcoci, University "Politehnica" of Bucharest (UPB), Romania José Neuman de Souza, UFC, Brazil Petre Dini, Cisco Systems, Inc., USA / Concordia... more
    Advisory Committee Tulin Atmaca, IT/Telecom & Management SudParis, France Eugen Borcoci, University "Politehnica" of Bucharest (UPB), Romania José Neuman de Souza, UFC, Brazil Petre Dini, Cisco Systems, Inc., USA / Concordia University, Canada [Chair] Manish Jain, Microsoft Research - Redmond, USA Pierre Rolin, Telecom SudParis, France Francis Rousseaux, IRCAM - Paris, France Sergei Semenov, Nokia Corporation, Finland ... General Chair Paul J. Geraci, Technology Survey Group, USA ... Technical Program Committee ...
    Imad Abbadi, A&N Media, United Kingdom Sheikh Iqbal Ahamed, Marquette University - Milwaukee USA Hasan Ibne Akram, Technische Universität München, Germany Nuno Amálio, University of Luxembourg, Luxembourg Stamatios Arkoulis, National... more
    Imad Abbadi, A&N Media, United Kingdom Sheikh Iqbal Ahamed, Marquette University - Milwaukee USA Hasan Ibne Akram, Technische Universität München, Germany Nuno Amálio, University of Luxembourg, Luxembourg Stamatios Arkoulis, National Technical University of Athens, Greece Ioannis Askoxylakis, FORTH-ICS/Heraklion, Greece Benjamin Aziz, e-Science Centre / Rutherford Appleton Laboratory, United Kingdom Catalin V. Birjoveanu, "Al.I.Cuza" University of Iasi, Romania Wolfgang Boehmer, Darmstadt University of Technology (TUD), Germany Jeremy Briffaut, ...
    Research Interests:
    Research Interests:
    Research Interests:
    ABSTRACT The recent advances in micro-sensor hardware technologies, along with the invention of energy-efficient protocols, have enabled a world-wide spread in wireless sensor networks deployment. These networks are used for a large... more
    ABSTRACT The recent advances in micro-sensor hardware technologies, along with the invention of energy-efficient protocols, have enabled a world-wide spread in wireless sensor networks deployment. These networks are used for a large number of purposes, while having small maintenance and deployment costs. However, as these are usually unattended networks, several security threats have emerged. In this work, we show how an adversary can overhear the encrypted wireless transmissions, and detect the periodic components of the wireless traffic that can further reveal the application used in the sensor network. Traffic analysis is performed in a very energy-efficient way using the compressed sensing principles. Furthermore, the periodic components are detected using the Lomb-Scargle periodogram technique.
    ABSTRACT Wireless sensor networks have gained considerable interest in the last few years, serving a large number of applications. Data collection efficiency is of paramount importance as sensors are severe resource-constrained devices,... more
    ABSTRACT Wireless sensor networks have gained considerable interest in the last few years, serving a large number of applications. Data collection efficiency is of paramount importance as sensors are severe resource-constrained devices, and current protocol inefficiencies lead to significant packet loss. In this work, we minimize the necessary information sensors transmit by applying the compressed sensing principles. Moreover, missing information due to packet loss is efficiently recovered using the matrix completion theory. The performance evaluation shows that when these advanced signal processing techniques are jointly used, the reconstruction error is small for high compression ratios, and fairly high packet loss. At the same time, the total energy consumption of the network substantially decreases.
    ABSTRACT Wireless networks have been among the main trends during the last few years. Their low-cost deployment and ubiquitous coverage have enabled the provision of numerous services to the end-users. Wireless local area networks (WLANs)... more
    ABSTRACT Wireless networks have been among the main trends during the last few years. Their low-cost deployment and ubiquitous coverage have enabled the provision of numerous services to the end-users. Wireless local area networks (WLANs) are capable of providing many services with high quality of service (QoS), including not only email and web browsing, but also multimedia services. As the demand for more ubiquitous communications increases, mainly because of the rapid proliferation of the Wi-Fi enabled smart phones, wireless networks will play a crucial role in the future networks domain. Nevertheless, due to their open nature, these networks have several vulnerabilities that adversaries can exploit. In this paper, we use an adversary that violates several rules of the IEEE 802.11 protocol. We show, by collecting cross-layer measurements, how it can severely degrade the performance of an MPEG-4 encoded video streaming application. We also show that the traditional PSNR evaluation metric is not sufficient to characterize the video performance when an adversary is present.
    ABSTRACT Mobile ad hoc networks are expected to play an important role in demanding communications such as military and emergency response. In Mobile ad hoc networking each node relies on adjacent nodes in order to achieve and maintain... more
    ABSTRACT Mobile ad hoc networks are expected to play an important role in demanding communications such as military and emergency response. In Mobile ad hoc networking each node relies on adjacent nodes in order to achieve and maintain connectivity and functionality. While offering many advantages, such as flexibility, easy of deployment and low cost, mobile ad hoc networking faces important security threats that could be proven vital in future telecommunication applications. This paper introduces a key dynamic agreement method based on a weak to strong authentication mechanism associated with a multiparty contributory key establishment method. It is designed for dynamic changing topologies, it employs elliptic curve cryptography to best serve thin clients with energy constrains, and reduces significantly key re-establishment due to network formation changes.
    ... Ioannis G. Askoxylakis1, Konstantinos Markantonakis2, Theo Tryfonas3, John May3, and Apostolos Traganitis1 1 Foundation for Reserach and Technology-Hellas – Institute of Computer Science, N. Plastira 100, 70013 Heraklion, Greece... more
    ... Ioannis G. Askoxylakis1, Konstantinos Markantonakis2, Theo Tryfonas3, John May3, and Apostolos Traganitis1 1 Foundation for Reserach and Technology-Hellas – Institute of Computer Science, N. Plastira 100, 70013 Heraklion, Greece {asko,tragani}@ics.forth.gr 2 Royal ...
    Smart card technology has evolved over the last few years following notable improvements in the underlying hardware and software platforms. Advanced smart card microprocessors, along with robust smart card operating systems and platforms,... more
    Smart card technology has evolved over the last few years following notable improvements in the underlying hardware and software platforms. Advanced smart card microprocessors, along with robust smart card operating systems and platforms, contribute towards a broader acceptance of the technology. These improvements have eliminated some of the traditional smart card security concerns. However, researchers and hackers are constantly looking
    Page 1. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION 1 A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks Alexandros G. Fragkiadakis, Elias Z. Tragos, Ioannis G. Askoxylakis ...

    And 6 more