Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nikos Triandopoulos
@article{DBLP:journals/cryptography/TrivediBKT23, author = {Devharsh Trivedi and Aymen Boudguiga and Nesrine Kaaniche and Nikos Triandopoulos}, title = {SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {52}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040052}, doi = {10.3390/CRYPTOGRAPHY7040052}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/TrivediBKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/TrivediBT23, author = {Devharsh Trivedi and Aymen Boudguiga and Nikos Triandopoulos}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {SigML: Supervised Log Anomaly with Fully Homomorphic Encryption}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {372--388}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_26}, doi = {10.1007/978-3-031-34671-2\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/TrivediBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/TrivediT23, author = {Devharsh Trivedi and Nikos Triandopoulos}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {VaultBox: Enhancing the Security and Effectiveness of Security Analytics}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {401--422}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_24}, doi = {10.1007/978-3-031-45933-7\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/TrivediT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangPPT022, author = {Yuchen Zhang and Chengbin Pang and Georgios Portokalidis and Nikos Triandopoulos and Jun Xu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Debloating Address Sanitizer}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4345--4363}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-yuchen}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhangPPT022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccsw-ws/MengPOT21, author = {Xianrui Meng and Dimitrios Papadopoulos and Alina Oprea and Nikos Triandopoulos}, editor = {Yinqian Zhang and Marten van Dijk}, title = {Private Hierarchical Clustering and Efficient Approximation}, booktitle = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021}, pages = {3--20}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474123.3486760}, doi = {10.1145/3474123.3486760}, timestamp = {Thu, 12 Oct 2023 12:32:07 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/MengPOT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TomescuBPPTD19, author = {Alin Tomescu and Vivek Bhupatiraju and Dimitrios Papadopoulos and Charalampos Papamanthou and Nikos Triandopoulos and Srinivas Devadas}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Transparency Logs via Append-Only Authenticated Dictionaries}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1299--1316}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345652}, doi = {10.1145/3319535.3345652}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TomescuBPPTD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-04475, author = {Xianrui Meng and Dimitrios Papadopoulos and Alina Oprea and Nikos Triandopoulos}, title = {Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation}, journal = {CoRR}, volume = {abs/1904.04475}, year = {2019}, url = {http://arxiv.org/abs/1904.04475}, eprinttype = {arXiv}, eprint = {1904.04475}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-04475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TomescuBPPTD18, author = {Alin Tomescu and Vivek Bhupatiraju and Dimitrios Papadopoulos and Charalampos Papamanthou and Nikos Triandopoulos and Srinivas Devadas}, title = {Transparency Logs via Append-only Authenticated Dictionaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {721}, year = {2018}, url = {https://eprint.iacr.org/2018/721}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TomescuBPPTD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BaldimtsiPPST17, author = {Foteini Baldimtsi and Dimitrios Papadopoulos and Stavros Papadopoulos and Alessandra Scafuro and Nikos Triandopoulos}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Server-Aided Secure Computation with Off-line Parties}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {103--123}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_8}, doi = {10.1007/978-3-319-66402-6\_8}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BaldimtsiPPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/PapamanthouTT16, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, title = {Authenticated Hash Tables Based on Cryptographic Accumulators}, journal = {Algorithmica}, volume = {74}, number = {2}, pages = {664--712}, year = {2016}, url = {https://doi.org/10.1007/s00453-014-9968-3}, doi = {10.1007/S00453-014-9968-3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/PapamanthouTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GhoshOPTT16, author = {Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Zero-Knowledge Accumulators and Set Algebra}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {67--100}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_3}, doi = {10.1007/978-3-662-53890-6\_3}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GhoshOPTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiPPST16, author = {Foteini Baldimtsi and Dimitrios Papadopoulos and Stavros Papadopoulos and Alessandra Scafuro and Nikos Triandopoulos}, title = {Secure Computation in Online Social Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {948}, year = {2016}, url = {http://eprint.iacr.org/2016/948}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiPPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/PapadopoulosPTT15, author = {Dimitrios Papadopoulos and Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, title = {Practical Authenticated Pattern Matching with Optimal Proof Size}, journal = {Proc. {VLDB} Endow.}, volume = {8}, number = {7}, pages = {750--761}, year = {2015}, url = {http://www.vldb.org/pvldb/vol8/p750-papadopoulos.pdf}, doi = {10.14778/2752939.2752944}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pvldb/PapadopoulosPTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ShinCKTK15, author = {Minho Shin and Cory Cornelius and Apu Kapadia and Nikos Triandopoulos and David Kotz}, title = {Location Privacy for Mobile Crowd Sensing through Population Mapping}, journal = {Sensors}, volume = {15}, number = {7}, pages = {15285--15310}, year = {2015}, url = {https://doi.org/10.3390/s150715285}, doi = {10.3390/S150715285}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ShinCKTK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsKTT15, author = {Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Falcon Codes: Fast, Authenticated {LT} Codes (Or: Making Rapid Tornadoes Unstoppable)}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1032--1047}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813728}, doi = {10.1145/2810103.2813728}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsKTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshOPTT15, author = {Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos}, title = {Zero-Knowledge Accumulators and Set Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2015}, url = {http://eprint.iacr.org/2015/404}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhoshOPTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PapadopoulosPT14, author = {Dimitrios Papadopoulos and Stavros Papadopoulos and Nikos Triandopoulos}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Taking Authenticated Range Queries to Arbitrary Dimensions}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {819--830}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660373}, doi = {10.1145/2660267.2660373}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PapadopoulosPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiPPT14, author = {Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos}, editor = {Hugo Krawczyk}, title = {Verifiable Set Operations over Outsourced Databases}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {113--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_7}, doi = {10.1007/978-3-642-54631-0\_7}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CanettiPPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BowersHJT14, author = {Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {46--67}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_3}, doi = {10.1007/978-3-319-11379-1\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BowersHJT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KosbaPPSST14, author = {Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikos Triandopoulos}, editor = {Kevin Fu and Jaeyeon Jung}, title = {{TRUESET:} Faster Verifiable Set Computations}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {765--780}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kosba}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KosbaPPSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KosbaPPSST14, author = {Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikos Triandopoulos}, title = {{TRUESET:} Nearly Practical Verifiable Set Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2014}, url = {http://eprint.iacr.org/2014/160}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KosbaPPSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsKTT14, author = {Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos}, title = {Falcon Codes: Fast, Authenticated {LT} Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {903}, year = {2014}, url = {http://eprint.iacr.org/2014/903}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsKTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasPTZ13, author = {Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Delegatable pseudorandom functions and applications}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {669--684}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516668}, doi = {10.1145/2508859.2516668}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasPTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasPTZ13, author = {Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias}, title = {Delegatable Pseudorandom Functions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2013}, url = {http://eprint.iacr.org/2013/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasPTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersHJT13, author = {Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos}, title = {Securing the Data in Big Data Security Analytics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2013}, url = {http://eprint.iacr.org/2013/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersHJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiPPT13, author = {Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos}, title = {Verifiable Set Operations over Outsourced Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {724}, year = {2013}, url = {http://eprint.iacr.org/2013/724}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CanettiPPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/GoodrichNOPTTL12, author = {Michael T. Goodrich and Duy Nguyen and Olga Ohrimenko and Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos and Cristina Videira Lopes}, title = {Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers}, journal = {Proc. {VLDB} Endow.}, volume = {5}, number = {10}, pages = {920--931}, year = {2012}, url = {http://vldb.org/pvldb/vol5/p920\_michaeltgoodrich\_vldb2012.pdf}, doi = {10.14778/2336664.2336666}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/GoodrichNOPTTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DijkJORST12, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest and Emil Stefanov and Nikos Triandopoulos}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Hourglass schemes: how to prove that cloud files are encrypted}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {265--280}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382227}, doi = {10.1145/2382196.2382227}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DijkJORST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KelleyTT12, author = {James Kelley and Roberto Tamassia and Nikos Triandopoulos}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Hardening Access Control and Data Protection in GFS-like File Systems}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {19--36}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_2}, doi = {10.1007/978-3-642-33167-1\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KelleyTT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BowersDGJORT12, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Defending against the Unknown Enemy: Applying FlipIt to System Security}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {248--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_15}, doi = {10.1007/978-3-642-34266-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BowersDGJORT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1204-5446, author = {Michael T. Goodrich and Duy Nguyen and Olga Ohrimenko and Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos and Cristina Videira Lopes}, title = {Verifying Search Results Over Web Collections}, journal = {CoRR}, volume = {abs/1204.5446}, year = {2012}, url = {http://arxiv.org/abs/1204.5446}, eprinttype = {arXiv}, eprint = {1204.5446}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1204-5446.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersDGJORT12, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, title = {Defending Against the Unknown Enemy: Applying FlipIt to System Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2012}, url = {http://eprint.iacr.org/2012/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersDGJORT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/GoodrichTT11, author = {Michael T. Goodrich and Roberto Tamassia and Nikos Triandopoulos}, title = {Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems}, journal = {Algorithmica}, volume = {60}, number = {3}, pages = {505--552}, year = {2011}, url = {https://doi.org/10.1007/s00453-009-9355-7}, doi = {10.1007/S00453-009-9355-7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/GoodrichTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/ShinCPKKT11, author = {Minho Shin and Cory Cornelius and Daniel Peebles and Apu Kapadia and David Kotz and Nikos Triandopoulos}, title = {AnonySense: {A} system for anonymous opportunistic sensing}, journal = {Pervasive Mob. Comput.}, volume = {7}, number = {1}, pages = {16--30}, year = {2011}, url = {https://doi.org/10.1016/j.pmcj.2010.04.001}, doi = {10.1016/J.PMCJ.2010.04.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/ShinCPKKT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PapamanthouTT11, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, editor = {Phillip Rogaway}, title = {Optimal Verification of Operations on Dynamic Sets}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {91--110}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_6}, doi = {10.1007/978-3-642-22792-9\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PapamanthouTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LysyanskayaTT10, author = {Anna Lysyanskaya and Roberto Tamassia and Nikos Triandopoulos}, title = {Authenticated error-correcting codes with applications to multicast authentication}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {17:1--17:34}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698757}, doi = {10.1145/1698750.1698757}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LysyanskayaTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amw/TamassiaT10, author = {Roberto Tamassia and Nikos Triandopoulos}, editor = {Alberto H. F. Laender and Laks V. S. Lakshmanan}, title = {Certification and Authentication of Data Structures}, booktitle = {Proceedings of the 4th Alberto Mendelzon International Workshop on Foundations of Data Management, Buenos Aires, Argentina, May 17-20, 2010}, series = {{CEUR} Workshop Proceedings}, volume = {619}, publisher = {CEUR-WS.org}, year = {2010}, url = {https://ceur-ws.org/Vol-619/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:19 +0100}, biburl = {https://dblp.org/rec/conf/amw/TamassiaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bqgt/MiltersenNT10, author = {Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos}, editor = {Moshe Dror and Greys Sosic}, title = {Privacy-enhancing auctions using rational cryptography}, booktitle = {Proceedings of the Behavioral and Quantitative Game Theory - Conference on Future Directions, {BQGT} '10, Newport Beach, California, USA, May 14-16, 2010}, pages = {90:1}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1807406.1807496}, doi = {10.1145/1807406.1807496}, timestamp = {Tue, 06 Nov 2018 16:57:10 +0100}, biburl = {https://dblp.org/rec/conf/bqgt/MiltersenNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/PapamanthouTT10, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Optimal Authenticated Data Structures with Multilinear Forms}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {246--264}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_16}, doi = {10.1007/978-3-642-17455-1\_16}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/PapamanthouTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapamanthouTT10, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, title = {Optimal Verification of Operations on Dynamic Sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2010}, url = {http://eprint.iacr.org/2010/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PapamanthouTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MiltersenNT09, author = {Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos}, editor = {Shai Halevi}, title = {Privacy-Enhancing Auctions Using Rational Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {541--558}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_32}, doi = {10.1007/978-3-642-03356-8\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MiltersenNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GoodrichSTT09, author = {Michael T. Goodrich and Jonathan Z. Sun and Roberto Tamassia and Nikos Triandopoulos}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Reliable Resource Searching in {P2P} Networks}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {437--447}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_25}, doi = {10.1007/978-3-642-05284-2\_25}, timestamp = {Sun, 07 Jan 2018 16:56:18 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/GoodrichSTT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0908-4116, author = {Michael T. Goodrich and Roberto Tamassia and Nikos Triandopoulos}, title = {Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems}, journal = {CoRR}, volume = {abs/0908.4116}, year = {2009}, url = {http://arxiv.org/abs/0908.4116}, eprinttype = {arXiv}, eprint = {0908.4116}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0908-4116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapamanthouTT09, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, title = {Cryptographic Accumulators for Authenticated Hash Tables}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2009}, url = {http://eprint.iacr.org/2009/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PapamanthouTT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PapamanthouTT08, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Authenticated hash tables}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {437--448}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455826}, doi = {10.1145/1455770.1455826}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PapamanthouTT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GoodrichTT08, author = {Michael T. Goodrich and Roberto Tamassia and Nikos Triandopoulos}, editor = {Tal Malkin}, title = {Super-Efficient Verification of Dynamic Outsourced Databases}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {407--424}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_26}, doi = {10.1007/978-3-540-79263-5\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GoodrichTT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GoodrichPTT08, author = {Michael T. Goodrich and Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Athos: Efficient Authentication of Outsourced File Systems}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {80--96}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_6}, doi = {10.1007/978-3-540-85886-7\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GoodrichPTT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/CorneliusKKPST08, author = {Cory Cornelius and Apu Kapadia and David Kotz and Daniel Peebles and Minho Shin and Nikos Triandopoulos}, editor = {Dirk Grunwald and Richard Han and Eyal de Lara and Carla Schlatter Ellis}, title = {Anonysense: privacy-aware people-centric sensing}, booktitle = {Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008}, pages = {211--224}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1378600.1378624}, doi = {10.1145/1378600.1378624}, timestamp = {Fri, 17 Feb 2023 15:44:59 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/CorneliusKKPST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KapadiaT08, author = {Apu Kapadia and Nikos Triandopoulos}, title = {Halo: High-Assurance Locate for Distributed Hash Tables}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/halo-high-assurance-locate-distributed-hash-tables/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KapadiaT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pervasive/KapadiaTCPK08, author = {Apu Kapadia and Nikos Triandopoulos and Cory Cornelius and Daniel Peebles and David Kotz}, editor = {Jadwiga Indulska and Donald J. Patterson and Tom Rodden and Max Ott}, title = {AnonySense: Opportunistic and Privacy-Preserving Context Collection}, booktitle = {Pervasive Computing, 6th International Conference, Pervasive 2008, Sydney, Australia, May 19-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5013}, pages = {280--297}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79576-6\_17}, doi = {10.1007/978-3-540-79576-6\_17}, timestamp = {Thu, 14 Oct 2021 10:19:36 +0200}, biburl = {https://dblp.org/rec/conf/pervasive/KapadiaTCPK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MiltersenNT08, author = {Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos}, title = {Privacy-Enhancing First-Price Auctions Using Rational Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2008}, url = {http://eprint.iacr.org/2008/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MiltersenNT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardT08a, author = {Ivan Damg{\aa}rd and Nikos Triandopoulos}, title = {Supporting Non-membership Proofs with Bilinear-map Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2008}, url = {http://eprint.iacr.org/2008/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Triandopoulos07, author = {Nikos Triandopoulos}, title = {Efficient Data Authentication}, school = {Brown University, {USA}}, year = {2007}, url = {https://cs.brown.edu/research/pubs/theses/phd/2007/triandopoulos.pdf}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Triandopoulos07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TamassiaT07, author = {Roberto Tamassia and Nikos Triandopoulos}, editor = {Jonathan Katz and Moti Yung}, title = {Efficient Content Authentication in Peer-to-Peer Networks}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {354--372}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_23}, doi = {10.1007/978-3-540-72738-5\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TamassiaT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icps/OuyangLXTZFM07, author = {Yi Ouyang and Zhengyi Le and Yurong Xu and Nikos Triandopoulos and Sheng Zhang and James Ford and Fillia Makedon}, title = {Providing Anonymity in Wireless Sensor Networks}, booktitle = {Proceedings of the {IEEE} International Conference on Pervasive Services, {ICPS} 2007, 15-20 July, 2007, Istanbul, Turkey}, pages = {145--148}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERSER.2007.4283904}, doi = {10.1109/PERSER.2007.4283904}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icps/OuyangLXTZFM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LysyanskayaT06, author = {Anna Lysyanskaya and Nikos Triandopoulos}, editor = {Cynthia Dwork}, title = {Rationality and Adversarial Behavior in Multi-party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {180--197}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_11}, doi = {10.1007/11818175\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LysyanskayaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/TamassiaT05, author = {Roberto Tamassia and Nikos Triandopoulos}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Computational Bounds on Hierarchical Data Processing with Applications to Information Security}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {153--165}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_13}, doi = {10.1007/11523468\_13}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/TamassiaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LysyanskayaTT04, author = {Anna Lysyanskaya and Roberto Tamassia and Nikos Triandopoulos}, title = {Multicast Authentication in Fully Adversarial Networks}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {241}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301327}, doi = {10.1109/SECPRI.2004.1301327}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/LysyanskayaTT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GoodrichTTC03, author = {Michael T. Goodrich and Roberto Tamassia and Nikos Triandopoulos and Robert F. Cohen}, editor = {Marc Joye}, title = {Authenticated Data Structures for Graph and Geometric Searching}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {295--313}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_20}, doi = {10.1007/3-540-36563-X\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GoodrichTTC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.