BibTeX records: Nikos Triandopoulos

download as .bib file

@article{DBLP:journals/cryptography/TrivediBKT23,
  author       = {Devharsh Trivedi and
                  Aymen Boudguiga and
                  Nesrine Kaaniche and
                  Nikos Triandopoulos},
  title        = {SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {52},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040052},
  doi          = {10.3390/CRYPTOGRAPHY7040052},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/TrivediBKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/TrivediBT23,
  author       = {Devharsh Trivedi and
                  Aymen Boudguiga and
                  Nikos Triandopoulos},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {SigML: Supervised Log Anomaly with Fully Homomorphic Encryption},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {372--388},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_26},
  doi          = {10.1007/978-3-031-34671-2\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/TrivediBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/TrivediT23,
  author       = {Devharsh Trivedi and
                  Nikos Triandopoulos},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {VaultBox: Enhancing the Security and Effectiveness of Security Analytics},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {401--422},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_24},
  doi          = {10.1007/978-3-031-45933-7\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/TrivediT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangPPT022,
  author       = {Yuchen Zhang and
                  Chengbin Pang and
                  Georgios Portokalidis and
                  Nikos Triandopoulos and
                  Jun Xu},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Debloating Address Sanitizer},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4345--4363},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-yuchen},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangPPT022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/MengPOT21,
  author       = {Xianrui Meng and
                  Dimitrios Papadopoulos and
                  Alina Oprea and
                  Nikos Triandopoulos},
  editor       = {Yinqian Zhang and
                  Marten van Dijk},
  title        = {Private Hierarchical Clustering and Efficient Approximation},
  booktitle    = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security
                  Workshop, Virtual Event, Republic of Korea, 15 November 2021},
  pages        = {3--20},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474123.3486760},
  doi          = {10.1145/3474123.3486760},
  timestamp    = {Thu, 12 Oct 2023 12:32:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/MengPOT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TomescuBPPTD19,
  author       = {Alin Tomescu and
                  Vivek Bhupatiraju and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou and
                  Nikos Triandopoulos and
                  Srinivas Devadas},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Transparency Logs via Append-Only Authenticated Dictionaries},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1299--1316},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345652},
  doi          = {10.1145/3319535.3345652},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TomescuBPPTD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-04475,
  author       = {Xianrui Meng and
                  Dimitrios Papadopoulos and
                  Alina Oprea and
                  Nikos Triandopoulos},
  title        = {Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient
                  Approximation},
  journal      = {CoRR},
  volume       = {abs/1904.04475},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.04475},
  eprinttype    = {arXiv},
  eprint       = {1904.04475},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-04475.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TomescuBPPTD18,
  author       = {Alin Tomescu and
                  Vivek Bhupatiraju and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou and
                  Nikos Triandopoulos and
                  Srinivas Devadas},
  title        = {Transparency Logs via Append-only Authenticated Dictionaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {721},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/721},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TomescuBPPTD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BaldimtsiPPST17,
  author       = {Foteini Baldimtsi and
                  Dimitrios Papadopoulos and
                  Stavros Papadopoulos and
                  Alessandra Scafuro and
                  Nikos Triandopoulos},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Server-Aided Secure Computation with Off-line Parties},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {103--123},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_8},
  doi          = {10.1007/978-3-319-66402-6\_8},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BaldimtsiPPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/PapamanthouTT16,
  author       = {Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Authenticated Hash Tables Based on Cryptographic Accumulators},
  journal      = {Algorithmica},
  volume       = {74},
  number       = {2},
  pages        = {664--712},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00453-014-9968-3},
  doi          = {10.1007/S00453-014-9968-3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/PapamanthouTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GhoshOPTT16,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Dimitrios Papadopoulos and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Zero-Knowledge Accumulators and Set Algebra},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {67--100},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_3},
  doi          = {10.1007/978-3-662-53890-6\_3},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GhoshOPTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiPPST16,
  author       = {Foteini Baldimtsi and
                  Dimitrios Papadopoulos and
                  Stavros Papadopoulos and
                  Alessandra Scafuro and
                  Nikos Triandopoulos},
  title        = {Secure Computation in Online Social Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {948},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/948},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiPPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/PapadopoulosPTT15,
  author       = {Dimitrios Papadopoulos and
                  Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Practical Authenticated Pattern Matching with Optimal Proof Size},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {8},
  number       = {7},
  pages        = {750--761},
  year         = {2015},
  url          = {http://www.vldb.org/pvldb/vol8/p750-papadopoulos.pdf},
  doi          = {10.14778/2752939.2752944},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pvldb/PapadopoulosPTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ShinCKTK15,
  author       = {Minho Shin and
                  Cory Cornelius and
                  Apu Kapadia and
                  Nikos Triandopoulos and
                  David Kotz},
  title        = {Location Privacy for Mobile Crowd Sensing through Population Mapping},
  journal      = {Sensors},
  volume       = {15},
  number       = {7},
  pages        = {15285--15310},
  year         = {2015},
  url          = {https://doi.org/10.3390/s150715285},
  doi          = {10.3390/S150715285},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ShinCKTK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsKTT15,
  author       = {Ari Juels and
                  James Kelley and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Falcon Codes: Fast, Authenticated {LT} Codes (Or: Making Rapid Tornadoes
                  Unstoppable)},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1032--1047},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813728},
  doi          = {10.1145/2810103.2813728},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsKTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshOPTT15,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Dimitrios Papadopoulos and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Zero-Knowledge Accumulators and Set Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/404},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshOPTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PapadopoulosPT14,
  author       = {Dimitrios Papadopoulos and
                  Stavros Papadopoulos and
                  Nikos Triandopoulos},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Taking Authenticated Range Queries to Arbitrary Dimensions},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {819--830},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660373},
  doi          = {10.1145/2660267.2660373},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PapadopoulosPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiPPT14,
  author       = {Ran Canetti and
                  Omer Paneth and
                  Dimitrios Papadopoulos and
                  Nikos Triandopoulos},
  editor       = {Hugo Krawczyk},
  title        = {Verifiable Set Operations over Outsourced Databases},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {113--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_7},
  doi          = {10.1007/978-3-642-54631-0\_7},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiPPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BowersHJT14,
  author       = {Kevin D. Bowers and
                  Catherine Hart and
                  Ari Juels and
                  Nikos Triandopoulos},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {PillarBox: Combating Next-Generation Malware with Fast Forward-Secure
                  Logging},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {46--67},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_3},
  doi          = {10.1007/978-3-319-11379-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BowersHJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KosbaPPSST14,
  author       = {Ahmed E. Kosba and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou and
                  Mahmoud F. Sayed and
                  Elaine Shi and
                  Nikos Triandopoulos},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {{TRUESET:} Faster Verifiable Set Computations},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {765--780},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kosba},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KosbaPPSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KosbaPPSST14,
  author       = {Ahmed E. Kosba and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou and
                  Mahmoud F. Sayed and
                  Elaine Shi and
                  Nikos Triandopoulos},
  title        = {{TRUESET:} Nearly Practical Verifiable Set Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/160},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KosbaPPSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsKTT14,
  author       = {Ari Juels and
                  James Kelley and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Falcon Codes: Fast, Authenticated {LT} Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {903},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/903},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsKTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KiayiasPTZ13,
  author       = {Aggelos Kiayias and
                  Stavros Papadopoulos and
                  Nikos Triandopoulos and
                  Thomas Zacharias},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Delegatable pseudorandom functions and applications},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {669--684},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516668},
  doi          = {10.1145/2508859.2516668},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KiayiasPTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasPTZ13,
  author       = {Aggelos Kiayias and
                  Stavros Papadopoulos and
                  Nikos Triandopoulos and
                  Thomas Zacharias},
  title        = {Delegatable Pseudorandom Functions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasPTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersHJT13,
  author       = {Kevin D. Bowers and
                  Catherine Hart and
                  Ari Juels and
                  Nikos Triandopoulos},
  title        = {Securing the Data in Big Data Security Analytics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersHJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiPPT13,
  author       = {Ran Canetti and
                  Omer Paneth and
                  Dimitrios Papadopoulos and
                  Nikos Triandopoulos},
  title        = {Verifiable Set Operations over Outsourced Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {724},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/724},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiPPT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/GoodrichNOPTTL12,
  author       = {Michael T. Goodrich and
                  Duy Nguyen and
                  Olga Ohrimenko and
                  Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos and
                  Cristina Videira Lopes},
  title        = {Efficient Verification of Web-Content Searching Through Authenticated
                  Web Crawlers},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {5},
  number       = {10},
  pages        = {920--931},
  year         = {2012},
  url          = {http://vldb.org/pvldb/vol5/p920\_michaeltgoodrich\_vldb2012.pdf},
  doi          = {10.14778/2336664.2336666},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/GoodrichNOPTTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DijkJORST12,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Emil Stefanov and
                  Nikos Triandopoulos},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Hourglass schemes: how to prove that cloud files are encrypted},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {265--280},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382227},
  doi          = {10.1145/2382196.2382227},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DijkJORST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KelleyTT12,
  author       = {James Kelley and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Hardening Access Control and Data Protection in GFS-like File Systems},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_2},
  doi          = {10.1007/978-3-642-33167-1\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KelleyTT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BowersDGJORT12,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Robert Griffin and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Nikos Triandopoulos},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Defending against the Unknown Enemy: Applying FlipIt to System Security},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {248--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_15},
  doi          = {10.1007/978-3-642-34266-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BowersDGJORT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1204-5446,
  author       = {Michael T. Goodrich and
                  Duy Nguyen and
                  Olga Ohrimenko and
                  Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos and
                  Cristina Videira Lopes},
  title        = {Verifying Search Results Over Web Collections},
  journal      = {CoRR},
  volume       = {abs/1204.5446},
  year         = {2012},
  url          = {http://arxiv.org/abs/1204.5446},
  eprinttype    = {arXiv},
  eprint       = {1204.5446},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1204-5446.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersDGJORT12,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Robert Griffin and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Nikos Triandopoulos},
  title        = {Defending Against the Unknown Enemy: Applying FlipIt to System Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersDGJORT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/GoodrichTT11,
  author       = {Michael T. Goodrich and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Efficient Authenticated Data Structures for Graph Connectivity and
                  Geometric Search Problems},
  journal      = {Algorithmica},
  volume       = {60},
  number       = {3},
  pages        = {505--552},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00453-009-9355-7},
  doi          = {10.1007/S00453-009-9355-7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/GoodrichTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/ShinCPKKT11,
  author       = {Minho Shin and
                  Cory Cornelius and
                  Daniel Peebles and
                  Apu Kapadia and
                  David Kotz and
                  Nikos Triandopoulos},
  title        = {AnonySense: {A} system for anonymous opportunistic sensing},
  journal      = {Pervasive Mob. Comput.},
  volume       = {7},
  number       = {1},
  pages        = {16--30},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.pmcj.2010.04.001},
  doi          = {10.1016/J.PMCJ.2010.04.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/ShinCPKKT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PapamanthouTT11,
  author       = {Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Phillip Rogaway},
  title        = {Optimal Verification of Operations on Dynamic Sets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {91--110},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_6},
  doi          = {10.1007/978-3-642-22792-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PapamanthouTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LysyanskayaTT10,
  author       = {Anna Lysyanskaya and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Authenticated error-correcting codes with applications to multicast
                  authentication},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {17:1--17:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698757},
  doi          = {10.1145/1698750.1698757},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LysyanskayaTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amw/TamassiaT10,
  author       = {Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Alberto H. F. Laender and
                  Laks V. S. Lakshmanan},
  title        = {Certification and Authentication of Data Structures},
  booktitle    = {Proceedings of the 4th Alberto Mendelzon International Workshop on
                  Foundations of Data Management, Buenos Aires, Argentina, May 17-20,
                  2010},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {619},
  publisher    = {CEUR-WS.org},
  year         = {2010},
  url          = {https://ceur-ws.org/Vol-619/paper14.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:19 +0100},
  biburl       = {https://dblp.org/rec/conf/amw/TamassiaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bqgt/MiltersenNT10,
  author       = {Peter Bro Miltersen and
                  Jesper Buus Nielsen and
                  Nikos Triandopoulos},
  editor       = {Moshe Dror and
                  Greys Sosic},
  title        = {Privacy-enhancing auctions using rational cryptography},
  booktitle    = {Proceedings of the Behavioral and Quantitative Game Theory - Conference
                  on Future Directions, {BQGT} '10, Newport Beach, California, USA,
                  May 14-16, 2010},
  pages        = {90:1},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1807406.1807496},
  doi          = {10.1145/1807406.1807496},
  timestamp    = {Tue, 06 Nov 2018 16:57:10 +0100},
  biburl       = {https://dblp.org/rec/conf/bqgt/MiltersenNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/PapamanthouTT10,
  author       = {Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Optimal Authenticated Data Structures with Multilinear Forms},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {246--264},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_16},
  doi          = {10.1007/978-3-642-17455-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/PapamanthouTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapamanthouTT10,
  author       = {Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Optimal Verification of Operations on Dynamic Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PapamanthouTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MiltersenNT09,
  author       = {Peter Bro Miltersen and
                  Jesper Buus Nielsen and
                  Nikos Triandopoulos},
  editor       = {Shai Halevi},
  title        = {Privacy-Enhancing Auctions Using Rational Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {541--558},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_32},
  doi          = {10.1007/978-3-642-03356-8\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MiltersenNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GoodrichSTT09,
  author       = {Michael T. Goodrich and
                  Jonathan Z. Sun and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {Reliable Resource Searching in {P2P} Networks},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {437--447},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_25},
  doi          = {10.1007/978-3-642-05284-2\_25},
  timestamp    = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GoodrichSTT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0908-4116,
  author       = {Michael T. Goodrich and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Efficient Authenticated Data Structures for Graph Connectivity and
                  Geometric Search Problems},
  journal      = {CoRR},
  volume       = {abs/0908.4116},
  year         = {2009},
  url          = {http://arxiv.org/abs/0908.4116},
  eprinttype    = {arXiv},
  eprint       = {0908.4116},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0908-4116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapamanthouTT09,
  author       = {Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Cryptographic Accumulators for Authenticated Hash Tables},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PapamanthouTT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PapamanthouTT08,
  author       = {Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Authenticated hash tables},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {437--448},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455826},
  doi          = {10.1145/1455770.1455826},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PapamanthouTT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GoodrichTT08,
  author       = {Michael T. Goodrich and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Tal Malkin},
  title        = {Super-Efficient Verification of Dynamic Outsourced Databases},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {407--424},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_26},
  doi          = {10.1007/978-3-540-79263-5\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GoodrichTT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GoodrichPTT08,
  author       = {Michael T. Goodrich and
                  Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Athos: Efficient Authentication of Outsourced File Systems},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {80--96},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_6},
  doi          = {10.1007/978-3-540-85886-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GoodrichPTT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/CorneliusKKPST08,
  author       = {Cory Cornelius and
                  Apu Kapadia and
                  David Kotz and
                  Daniel Peebles and
                  Minho Shin and
                  Nikos Triandopoulos},
  editor       = {Dirk Grunwald and
                  Richard Han and
                  Eyal de Lara and
                  Carla Schlatter Ellis},
  title        = {Anonysense: privacy-aware people-centric sensing},
  booktitle    = {Proceedings of the 6th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2008), Breckenridge, CO, USA,
                  June 17-20, 2008},
  pages        = {211--224},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1378600.1378624},
  doi          = {10.1145/1378600.1378624},
  timestamp    = {Fri, 17 Feb 2023 15:44:59 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/CorneliusKKPST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KapadiaT08,
  author       = {Apu Kapadia and
                  Nikos Triandopoulos},
  title        = {Halo: High-Assurance Locate for Distributed Hash Tables},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/halo-high-assurance-locate-distributed-hash-tables/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KapadiaT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pervasive/KapadiaTCPK08,
  author       = {Apu Kapadia and
                  Nikos Triandopoulos and
                  Cory Cornelius and
                  Daniel Peebles and
                  David Kotz},
  editor       = {Jadwiga Indulska and
                  Donald J. Patterson and
                  Tom Rodden and
                  Max Ott},
  title        = {AnonySense: Opportunistic and Privacy-Preserving Context Collection},
  booktitle    = {Pervasive Computing, 6th International Conference, Pervasive 2008,
                  Sydney, Australia, May 19-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5013},
  pages        = {280--297},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79576-6\_17},
  doi          = {10.1007/978-3-540-79576-6\_17},
  timestamp    = {Thu, 14 Oct 2021 10:19:36 +0200},
  biburl       = {https://dblp.org/rec/conf/pervasive/KapadiaTCPK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MiltersenNT08,
  author       = {Peter Bro Miltersen and
                  Jesper Buus Nielsen and
                  Nikos Triandopoulos},
  title        = {Privacy-Enhancing First-Price Auctions Using Rational Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MiltersenNT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT08a,
  author       = {Ivan Damg{\aa}rd and
                  Nikos Triandopoulos},
  title        = {Supporting Non-membership Proofs with Bilinear-map Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Triandopoulos07,
  author       = {Nikos Triandopoulos},
  title        = {Efficient Data Authentication},
  school       = {Brown University, {USA}},
  year         = {2007},
  url          = {https://cs.brown.edu/research/pubs/theses/phd/2007/triandopoulos.pdf},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Triandopoulos07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TamassiaT07,
  author       = {Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Efficient Content Authentication in Peer-to-Peer Networks},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {354--372},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_23},
  doi          = {10.1007/978-3-540-72738-5\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TamassiaT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icps/OuyangLXTZFM07,
  author       = {Yi Ouyang and
                  Zhengyi Le and
                  Yurong Xu and
                  Nikos Triandopoulos and
                  Sheng Zhang and
                  James Ford and
                  Fillia Makedon},
  title        = {Providing Anonymity in Wireless Sensor Networks},
  booktitle    = {Proceedings of the {IEEE} International Conference on Pervasive Services,
                  {ICPS} 2007, 15-20 July, 2007, Istanbul, Turkey},
  pages        = {145--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERSER.2007.4283904},
  doi          = {10.1109/PERSER.2007.4283904},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icps/OuyangLXTZFM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LysyanskayaT06,
  author       = {Anna Lysyanskaya and
                  Nikos Triandopoulos},
  editor       = {Cynthia Dwork},
  title        = {Rationality and Adversarial Behavior in Multi-party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {180--197},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_11},
  doi          = {10.1007/11818175\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LysyanskayaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/TamassiaT05,
  author       = {Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Computational Bounds on Hierarchical Data Processing with Applications
                  to Information Security},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {153--165},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_13},
  doi          = {10.1007/11523468\_13},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/TamassiaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LysyanskayaTT04,
  author       = {Anna Lysyanskaya and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Multicast Authentication in Fully Adversarial Networks},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {241},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301327},
  doi          = {10.1109/SECPRI.2004.1301327},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LysyanskayaTT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GoodrichTTC03,
  author       = {Michael T. Goodrich and
                  Roberto Tamassia and
                  Nikos Triandopoulos and
                  Robert F. Cohen},
  editor       = {Marc Joye},
  title        = {Authenticated Data Structures for Graph and Geometric Searching},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {295--313},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_20},
  doi          = {10.1007/3-540-36563-X\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GoodrichTTC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics