default search action
Tassos Dimitriou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c53]Tassos Dimitriou:
Visor: Privacy-Preserving Reputation for Decentralized Marketplaces. DBSec 2024: 131-150 - [c52]Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas:
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. SACMAT 2024 - [i7]Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas:
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2024: 660 (2024) - 2023
- [c51]Tassos Dimitriou, Khazam Alhamdan:
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. TrustCom 2023: 1060-1067 - 2022
- [j31]Husain Sharaf, Imtiaz Ahmad, Tassos Dimitriou:
Extended Berkeley Packet Filter: An Application Perspective. IEEE Access 10: 126370-126393 (2022) - [j30]Tassos Dimitriou, Antonis Michalas:
Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards. IEEE Access 10: 129004-129018 (2022) - [c50]Alexandros Bakas, Antonis Michalas, Tassos Dimitriou:
Private Lives Matter: A Differential Private Functional Encryption Scheme. CODASPY 2022: 300-311 - [i6]Tassos Dimitriou, Khazam Alhamdan:
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. IACR Cryptol. ePrint Arch. 2022: 672 (2022) - 2021
- [j29]Karim Elmaghraby, Tassos Dimitriou:
Blockchain-Based Fair and Secure Certified Electronic Mail Without a TTP. IEEE Access 9: 100708-100724 (2021) - [c49]Tassos Dimitriou:
Decentralized Reputation. CODASPY 2021: 119-130 - [i5]Alexandros Bakas, Antonis Michalas, Tassos Dimitriou:
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version). IACR Cryptol. ePrint Arch. 2021: 1692 (2021) - 2020
- [j28]Tassos Dimitriou:
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting. Comput. Networks 174: 107234 (2020) - [j27]Tassos Dimitriou, Ameer Mohammed:
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data. IEEE Internet Things J. 7(10): 10401-10417 (2020) - [c48]Tassos Dimitriou:
Fair and private Bitcoin rewards: Incentivizing participation in Crowd-sensing applications. DAPPS 2020: 120-125 - [i4]Tassos Dimitriou:
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards. IACR Cryptol. ePrint Arch. 2020: 404 (2020) - [i3]Tassos Dimitriou:
Decentralized reputation. IACR Cryptol. ePrint Arch. 2020: 761 (2020)
2010 – 2019
- 2019
- [j26]Sari Sultan, Imtiaz Ahmad, Tassos Dimitriou:
Container Security: Issues, Challenges, and the Road Ahead. IEEE Access 7: 52976-52996 (2019) - [j25]Tassos Dimitriou, Thanassis Giannetsos, Liqun Chen:
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems. Comput. Commun. 137: 1-14 (2019) - [c47]Khazam Alhamdan, Tassos Dimitriou, Imtiaz Ahmad:
Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud. ICETE (2) 2019: 356-362 - [i2]Tassos Dimitriou:
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting. IACR Cryptol. ePrint Arch. 2019: 1406 (2019) - 2018
- [j24]Suood Abdulaziz Al-Roomi, Imtiaz Ahmad, Tassos Dimitriou:
Secure localization using hypothesis testing in wireless networks. Ad Hoc Networks 74: 47-56 (2018) - [j23]Tassos Dimitriou, Naser Al-Ibrahim:
"I wasn't there" - Deniable, privacy-aware scheme for decentralized Location-based Services. Future Gener. Comput. Syst. 86: 253-265 (2018) - [j22]Tassos Dimitriou:
Privacy-respecting reward generation and accumulation for participatory sensing applications. Pervasive Mob. Comput. 49: 139-152 (2018) - [c46]Tassos Dimitriou:
Privacy-respecting rewards for participatory sensing applications. WCNC 2018: 1-6 - 2017
- [j21]Mohamad Khattar Awad, Mohammed El-Shafei, Tassos Dimitriou, Yousef Rafique, Mohammed W. Baidas, Ammar Alhusaini:
Power-efficient routing for SDN with discrete link rates and size-limited flow tables: A tree-based particle swarm optimization approach. Int. J. Netw. Manag. 27(5) (2017) - [j20]Tassos Dimitriou, Ioannis Krontiris:
Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications. J. Netw. Comput. Appl. 100: 24-34 (2017) - [j19]Tassos Dimitriou, Ghassan O. Karame:
Enabling Anonymous Authorization and Rewarding in the Smart Grid. IEEE Trans. Dependable Secur. Comput. 14(5): 565-572 (2017) - [i1]Tassos Dimitriou:
Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications. IACR Cryptol. ePrint Arch. 2017: 1035 (2017) - 2016
- [j18]Tassos Dimitriou:
Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Networks 37: 195-208 (2016) - [j17]Tassos Dimitriou, Mohamad Khattar Awad:
Secure and scalable aggregation in the smart grid resilient against malicious entities. Ad Hoc Networks 50: 58-67 (2016) - [j16]Tassos Dimitriou, Ebrahim A. Alrashed, Mehmet Hakan Karaata, Ali Hamdan:
Imposter detection for replication attacks in mobile sensor networks. Comput. Networks 108: 210-222 (2016) - [c45]Tassos Dimitriou, Naser Al-Ibrahim:
Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services. CANS 2016: 713-718 - 2015
- [j15]Ioannis Krontiris, Tassos Dimitriou:
A platform for privacy protection of data requesters and data providers in mobile sensing. Comput. Commun. 65: 43-54 (2015) - [c44]Tassos Dimitriou, Ebrahim A. Alrashed, Mehmet Hakan Karaata, Ali Hamdan:
Imposter detection for replication attacks in mobile sensor networks. NTMS 2015: 1-5 - [c43]Tassos Dimitriou, Ioannis Krontiris:
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing. WISTP 2015: 20-35 - 2014
- [j14]Tassos Dimitriou, Antonis Michalas:
Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Networks 15: 53-66 (2014) - [j13]Thanassis Giannetsos, Tassos Dimitriou:
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. J. Comput. Syst. Sci. 80(3): 618-643 (2014) - [c42]Tassos Dimitriou, Ghassan Karame:
Privacy-Friendly Planning of Energy Distribution in Smart Grids. SEGS@CCS 2014: 1-6 - [c41]Tassos Dimitriou:
Secure and Scalable Aggregation in the Smart Grid. NTMS 2014: 1-5 - 2013
- [c40]Ioannis Krontiris, Tassos Dimitriou:
Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications. DCOSS 2013: 249-257 - [c39]Tassos Dimitriou, Ghassan Karame:
Privacy-friendly tasking and trading of energy in smart grids. SAC 2013: 652-659 - 2012
- [j12]Antonis Michalas, Tassos Dimitriou, Thanassis Giannetsos, Nikos Komninos, Neeli R. Prasad:
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wirel. Pers. Commun. 66(3): 559-575 (2012) - [c38]Roberto Gimenez, Diego Fuentes, Daniel Oancea, Diego Gimenez, Judith Pertejo, Tassos Dimitriou, Sakis Giannetsos, Sofia Tsekeridou, Mario Carabaño, Sofia Virgos:
Moving Advanced Safety to the Cloud: Some Outcomes of SafeCity Project. Future Security 2012: 85-88 - [c37]Tassos Dimitriou, Ioannis Krontiris, Ahmad Sabouri:
PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing. MobiSec 2012: 93-106 - [c36]Tassos Dimitriou, Antonis Michalas:
Multi-Party Trust Computation in Decentralized Environments. NTMS 2012: 1-5 - 2011
- [j11]Ioannis T. Christou, Menelaos Bakopoulos, Tassos Dimitriou, Emmanouil Amolochitis, Sofia Tsekeridou, C. Dimitriadis:
Detecting fraud in online games of chance and lotteries. Expert Syst. Appl. 38(10): 13158-13169 (2011) - [j10]Ioannis Krontiris, Tassos Dimitriou:
Scatter - secure code authentication for efficient reprogramming in wireless sensor networks. Int. J. Sens. Networks 10(1/2): 14-24 (2011) - [j9]Thanassis Giannetsos, Tassos Dimitriou, Neeli R. Prasad:
People-centric sensing in assistive healthcare: Privacy challenges and directions. Secur. Commun. Networks 4(11): 1295-1307 (2011) - [c35]Tassos Dimitriou, Ahmad Sabouri:
Privacy preservation schemes for querying wireless sensor networks. PerCom Workshops 2011: 178-183 - [c34]Tassos Dimitriou, Ahmad Sabouri:
Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks. TrustCom 2011: 409-416 - 2010
- [j8]Thanassis Giannetsos, Tassos Dimitriou, Ioannis Krontiris, Neeli R. Prasad:
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices. Comput. J. 53(10): 1576-1593 (2010) - [j7]Ioannis Krontiris, Felix C. Freiling, Tassos Dimitriou:
Location privacy in urban sensing networks: research challenges and directions. IEEE Wirel. Commun. 17(5): 30-35 (2010) - [c33]Tassos Dimitriou, Thanassis Giannetsos:
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks. DCOSS 2010: 334-347 - [c32]Aram Yegenian, Tassos Dimitriou:
Inexpensive Email Addresses An Email Spam-Combating System. SecureComm 2010: 35-52
2000 – 2009
- 2009
- [c31]Thanassis Giannetsos, Tassos Dimitriou, Neeli R. Prasad:
Self-propagating worms in wireless sensor networks. StudentWorkshop@CoNEXT 2009: 31-32 - [c30]Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks. EWSN 2009: 263-278 - [c29]Thanassis Tiropanis, Tassos Dimitriou:
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources. SecureComm 2009: 340-349 - [e1]Yan Chen, Tassos Dimitriou, Jianying Zhou:
Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 19, Springer 2009, ISBN 978-3-642-05283-5 [contents] - 2008
- [c28]Ghassan Karame, Ioannis T. Christou, Tassos Dimitriou:
A Secure Hybrid Reputation Management System for Super-Peer Networks. CCNC 2008: 495-499 - [c27]Tassos Dimitriou:
Proxy Framework for Enhanced RFID Security and Privacy. CCNC 2008: 843-847 - [c26]Tassos Dimitriou, Ghassan Karame, Ioannis T. Christou:
SuperTrust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks. ICDCN 2008: 350-362 - [c25]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. SecureComm 2008: 20 - [c24]Tassos Dimitriou:
rfidDOT: RFID delegation and ownership transfer made simple. SecureComm 2008: 34 - [c23]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. WiMob 2008: 526-531 - 2007
- [c22]Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, Marios Mpasoukos:
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. ALGOSENSORS 2007: 150-161 - [c21]Nikos Komninos, Tassos Dimitriou:
Protecting Biometric Templates with Image Watermarking Techniques. ICB 2007: 114-123 - [c20]Hamed Soroush, Mastooreh Salajegheh, Tassos Dimitriou:
Providing Transparent Security Services to Sensor Networks. ICC 2007: 3431-3436 - [c19]Tassos Dimitriou, John Kolokouris, Nikos Zarokostas:
Sensenet: a wireless sensor network testbed. MSWiM 2007: 143-150 - [c18]Tassos Dimitriou, Ghassan Karame, Ioannis T. Christou:
SuperTrust: a secure and efficient framework for handling trust in super-peer networks. PODC 2007: 374-375 - 2006
- [j6]Ioannis Chatzigiannakis, Tassos Dimitriou, Sotiris E. Nikoletseas, Paul G. Spirakis:
A probabilistic algorithm for efficient and robust data propagation in wireless sensor networks. Ad Hoc Networks 4(5): 621-635 (2006) - [j5]Tassos Dimitriou, Sotiris E. Nikoletseas, Paul G. Spirakis:
The infection time of graphs. Discret. Appl. Math. 154(18): 2577-2589 (2006) - [j4]Tassos Dimitriou, Ioannis Krontiris:
GRAViTy: Geographic Routing around Voids in Sensor Networks. Int. J. Pervasive Comput. Commun. 2(4): 351-361 (2006) - [c17]Ioannis Krontiris, Tassos Dimitriou:
Authenticated In-Network Programming for Wireless Sensor Networks. ADHOC-NOW 2006: 390-403 - [c16]Tassos Dimitriou:
Securing Communication Trees in Sensor Networks. ALGOSENSORS 2006: 47-58 - [c15]Tassos Dimitriou:
A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete. PerCom 2006: 269-275 - 2005
- [j3]Tassos Dimitriou:
SAT distributions with planted assignments and phase transitions between decision and optimization problems. Discret. Appl. Math. 153(1-3): 58-72 (2005) - [c14]Tassos Dimitriou:
Efficient Mechanisms for Secure Inter-node and Aggregation Processing in Sensor Networks. ADHOC-NOW 2005: 18-31 - [c13]Tassos Dimitriou, Ioannis Krontiris:
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks. IPDPS 2005 - [c12]Tassos Dimitriou:
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. SecureComm 2005: 59-66 - [c11]Tassos Dimitriou, Dimitris Foteinakis:
A Zero Knowledge Proof for Subset Selection from a Family of Sets with Applications to Multiparty/Multicandidate Electronic Elections. TCGOV 2005: 100-111 - [c10]Tassos Dimitriou, Ioannis Krontiris:
Autonomic Communication Security in Sensor Networks. WAC 2005: 141-152 - 2004
- [c9]Tassos Dimitriou, Sotiris E. Nikoletseas, Paul G. Spirakis:
Analysis of the Information Propagation Time Among Mobile Hosts. ADHOC-NOW 2004: 122-134 - [c8]Tassos Dimitriou, Antonis Kalis:
Efficient Delivery of Information in Sensor Networks Using Smart Antennas. ALGOSENSORS 2004: 109-122 - [c7]Tassos Dimitriou, Ioannis Krontiris, Fotios Nikakis, Paul G. Spirakis:
SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks. NETWORKING 2004: 1300-1305 - [c6]Tassos Dimitriou, Paul G. Spirakis:
How to Tell a Good Neighborhood from a Bad One: Satisfiability of Boolean Formulas. WEA 2004: 199-212 - 2003
- [j2]Tassos Dimitriou:
SAT Distributions with Phase Transitions between Decision and Optimization Problems. Electron. Notes Discret. Math. 16: 1-14 (2003) - [j1]Ioannis Chatzigiannakis, Tassos Dimitriou, Marios Mavronicolas, Sotiris E. Nikoletseas, Paul G. Spirakis:
A Comparative Study Of Protocols For Efficient Data Propagation In Smart Dust Networks. Parallel Process. Lett. 13(4): 615-627 (2003) - [c5]Tassos Dimitriou:
A Wealth of SAT Distributions with Planted Assignments. CP 2003: 274-287 - [c4]Ioannis Chatzigiannakis, Tassos Dimitriou, Marios Mavronicolas, Sotiris E. Nikoletseas, Paul G. Spirakis:
A Comparative Study of Protocols for Efficient Data Propagation in Smart Dust Networks. Euro-Par 2003: 1003-1016 - 2002
- [c3]Tassos Dimitriou:
Characterizing the Space of all Cliques in Random Graphs using "Go with the Winners". AI&M 2002
1990 – 1999
- 1998
- [c2]Tassos Dimitriou, Russell Impagliazzo:
Go with the Winners for Graph Bisection. SODA 1998: 510-520 - 1996
- [c1]Tassos Dimitriou, Russell Impagliazzo:
Towards an Analysis of Local Optimization Algorithms. STOC 1996: 304-313
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint