| Issue Date | Title | Author(s) |
| 29-Dec-2008 | Application of novel technique in RIPEMD-160 aiming at high-throughput | Michail, Harris ; Thnanasoulis, V. N. ; Schinianakis, D. M. ; Panagiotakopoulos, G. A. ; Goutis, C. E. |
| 1-Apr-2016 | Area-throughput trade-offs for SHA-1 and SHA-256 hash functions' pipelined designs | Michail, Harris ; Athanasiou, George S. ; Kelefouras, Vasilios I. ; Theodoridis, George ; Stouraitis, Thanos ; Goutis, Costas E. |
| 2009 | Assessing Students’ Learning in MIS using Concept Mapping | Gregoriades, Andreas ; Pampaka, Maria ; Michail, Harris |
| Jul-2005 | Case study and application of pre-computation technique for hashing cores aiming at high-throughput implementations | Michail, Harris ; Kakarountas, Athanasios P. ; Goutis, Costas E. |
| Apr-2011 | Cipher block based authentication module: A hardware design perspective | Kakarountas, Athanasios P.; Selimis, Georgios ; Michail, Harris ; Schinianakis, Dimitrios ; Goutis, Costas E. |
| 2012 | Combining traffic simulation with bayesian networks for improved quantification of accident risk index | Michail, Harris ; Mouskos, Kyriacos C. ; Gregoriades, Andreas |
| 7-Sep-2010 | A Data Locality Methodology for Matrix-matrix Multiplication Algorithm | Athanasiou, George S. ; Kritikakou, Angeliki S. ; Goutis, Costas E. ; Kelefouras, Vasileios I. ; Alachiotis, Nikolaos ; Michail, Harris |
| Apr-2007 | A decoupled architecture of processors with scratch-pad memory hierarchy | Michail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos |
| Jun-2010 | Decoupled processors architecture for accelerating data intensive applications using scratch-pad memory hierarchy | Michail, Harris ; Milidonis, Athanasios S. ; Alachiotis, Nikolaos |
| Mar-2012 | Design and implementation of a SHA-3 candidate Skein-512 hash/MAC hardware architecture | Michail, Harris ; Athanasiou, George S. ; Tsingkas, Elias N. ; Chalkou, Chara I. ; Theodoridis, G. ; Goutis, Costas E. |
| Sep-2016 | Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures | Michail, Harris ; Athanasiou, George S. ; Theodoridis, George ; Gregoriades, Andreas ; Goutis, Costas E. |
| Jul-2018 | Design and validation of an agent-based driving simulator | Gregoriades, Andreas ; Pampaka, Maria ; Michail, Harris ; Viugova, Maria |
| Dec-2010 | Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor | Michail, Harris ; Athanasiou, George S. ; Makridakis, George |
| Nov-2014 | Distribution of cultural content through exploitation of cryptographic algorithms and hardware identification | Michail, Harris ; Louca, Constantinos ; Gavrilis, Dimitris ; Gregoriades, Andreas ; Anastasiou, Lazaros ; Ioannides, Marinos |
| 2015 | A driving simulator for discovering requirements in complex systems | Michail, Harris ; Gregoriades, Andreas ; Pampaka, Maria ; Hadjicosti, Jack ; Florides, Christos |
| Aug-2005 | Efficient design of high-level mechanisms for hard safety-critical low-power devices | Kakarountas, A. P. ; Michail, Harris ; Goutis, C. A. ; Spiliotopoulos, V. ; Nikolaidis, S. ; Kokkinos, V. |
| Dec-2004 | Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function | Michail, Harris ; Kakarountas, Athanasios P. ; Milidonis, Athanasios S. |
| Nov-2005 | Efficient small-sized implementation of the keyed-hash message authentication cod | Michail, Harris ; Yiakoumis, Ioannis I. ; Papadonikolakis, Markos E. |
| 1-Dec-2005 | Efficient small-sized implementation of the keyed-hash message authentication code | Yiakoumis, Ioannis ; Michail, Harris ; Papadonikolakis, Markos ; Goutis, Costas E.; Kakarountas, Athanasios P. |
| Oct-2012 | Evolution of the e-Museum concept through exploitation of cryptographic algorithms | Ioannides, Marinos ; Michail, Harris ; Athanasiou, George S. ; Gregoriades, Andreas |