Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Konstantinos Chatzikokolakis
2010 – today
- 2013
[c20]Konstantinos Chatzikokolakis, Miguel E. Andrés, Nicolás Emilio Bordenabe, Catuscia Palamidessi: Broadening the Scope of Differential Privacy Using Metrics. Privacy Enhancing Technologies 2013: 82-102
[c19]Ehab ElSalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi: A Differentially Private Mechanism of Optimal Utility for a Region of Priors. POST 2013: 41-62- 2012
[j8]Konstantinos Chatzikokolakis, Sophia Knight, Catuscia Palamidessi, Prakash Panangaden: Epistemic Strategies and Games on Concurrent Processes. ACM Trans. Comput. Log. 13(4): 28 (2012)
[c18]Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Geoffrey Smith: Measuring Information Leakage Using Generalized Gain Functions. CSF 2012: 265-279
[c17]Mayla Brusò, Konstantinos Chatzikokolakis, Sandro Etalle, Jerry den Hartog: Linking Unlinkability. TGC 2012: 129-144
[i5]Miguel E. Andrés, Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi: Geo-Indistinguishability: Differential Privacy for Location-Based Systems. CoRR abs/1212.1984 (2012)- 2011
[c16]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Catuscia Palamidessi: Quantitative Information Flow and Applications to Differential Privacy. FOSAD 2011: 211-230
[c15]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Catuscia Palamidessi: On the Relation between Differential Privacy and Quantitative Information Flow. ICALP (2) 2011: 60-76
[c14]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi: Differential Privacy: On the Trade-Off between Utility and Information Leakage. Formal Aspects in Security and Trust 2011: 39-54
[i4]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi: Differential Privacy: on the trade-off between Utility and Information Leakage. CoRR abs/1103.5188 (2011)
[i3]Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Catuscia Palamidessi: On the relation between Differential Privacy and Quantitative Information Flow. CoRR abs/1109.6761 (2011)- 2010
[j7]Konstantinos Chatzikokolakis, Catuscia Palamidessi: Making random choices invisible to the scheduler. Inf. Comput. 208(6): 694-715 (2010)
[c13]Mayla Brusò, Konstantinos Chatzikokolakis, Jerry den Hartog: Formal Verification of Privacy for RFID Systems. CSF 2010: 75-88
[c12]Konstantinos Chatzikokolakis, Tom Chothia, Apratim Guha: Statistical Measurement of Information Leakage. TACAS 2010: 390-404
[e1]Konstantinos Chatzikokolakis, Véronique Cortier (Eds.): Proceedings 8th International Workshop on Security Issues in Concurrency. EPTCS 51, 2010
[i2]Mário S. Alvim, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi: Differential Privacy versus Quantitative Information Flow. CoRR abs/1012.4250 (2010)
2000 – 2009
- 2009
[j6]Christelle Braun, Konstantinos Chatzikokolakis, Catuscia Palamidessi: Quantitative Notions of Leakage for One-try Attacks. Electr. Notes Theor. Comput. Sci. 249: 75-91 (2009)
[c11]Konstantinos Chatzikokolakis, Gethin Norman, David Parker: Bisimulation for Demonic Schedulers. FOSSACS 2009: 318-332
[c10]Konstantinos Chatzikokolakis, Sophia Knight, Prakash Panangaden: Epistemic Strategies and Games on Concurrent Processes. SOFSEM 2009: 153-166- 2008
[j5]Konstantinos Chatzikokolakis, Keye Martin: A Monotonicity Principle for Information Theory. Electr. Notes Theor. Comput. Sci. 218: 111-129 (2008)
[j4]Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden: Anonymity protocols as noisy channels. Inf. Comput. 206(2-4): 378-401 (2008)
[j3]Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden: On the Bayes risk in information-hiding protocols. Journal of Computer Security 16(5): 531-571 (2008)
[c9]Christelle Braun, Konstantinos Chatzikokolakis, Catuscia Palamidessi: Compositional Methods for Information-Hiding. FoSSaCS 2008: 443-457- 2007
[j2]Konstantinos Chatzikokolakis, Catuscia Palamidessi: A framework for analyzing probabilistic protocols and its application to the Partial Secrets Exchange. Theor. Comput. Sci. 389(3): 512-527 (2007)
[c8]Konstantinos Chatzikokolakis, Catuscia Palamidessi: Making Random Choices Invisible to the Scheduler. CONCUR 2007: 42-58
[c7]Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden: Probability of Error in Information-Hiding Protocols. CSF 2007: 341-354
[c6]Romain Beauxis, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden: Formal Approaches to Information-Hiding (Tutorial). TGC 2007: 347-362
[i1]Konstantinos Chatzikokolakis, Catuscia Palamidessi: Making Random Choices Invisible to the Scheduler. CoRR abs/0705.3503 (2007)- 2006
[j1]Konstantinos Chatzikokolakis, Catuscia Palamidessi: Probable innocence revisited. Theor. Comput. Sci. 367(1-2): 123-138 (2006)
[c5]Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden: Anonymity Protocols as Noisy Channels. TGC 2006: 281-300- 2005
[c4]Tom Chothia, Konstantinos Chatzikokolakis: A Survey of Anonymous Peer-to-Peer File-Sharing. EUC Workshops 2005: 744-755
[c3]Konstantinos Chatzikokolakis, Catuscia Palamidessi: Probable Innocence Revisited. Formal Aspects in Security and Trust 2005: 142-157
[c2]Konstantinos Chatzikokolakis, Catuscia Palamidessi: A Framework for Analyzing Probabilistic Protocols and Its Application to the Partial Secrets Exchange. TGC 2005: 146-162- 2004
[c1]Konstantinos Chatzikokolakis, George Boukeas, Panagiotis Stamatopoulos: Construction and Repair: A Hybrid Approach to Search in CSPs. SETN 2004: 342-351
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:01 CEST by the dblp team



