Остановите войну!
for scientists:
default search action
Nikos Triandopoulos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos:
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation. Cryptogr. 7(4): 52 (2023) - [c34]Devharsh Trivedi, Aymen Boudguiga, Nikos Triandopoulos:
SigML: Supervised Log Anomaly with Fully Homomorphic Encryption. CSCML 2023: 372-388 - [c33]Devharsh Trivedi, Nikos Triandopoulos:
VaultBox: Enhancing the Security and Effectiveness of Security Analytics. SciSec 2023: 401-422 - 2022
- [c32]Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, Jun Xu:
Debloating Address Sanitizer. USENIX Security Symposium 2022: 4345-4363 - 2021
- [c31]Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos:
Private Hierarchical Clustering and Efficient Approximation. CCSW 2021: 3-20
2010 – 2019
- 2019
- [c30]Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas:
Transparency Logs via Append-Only Authenticated Dictionaries. CCS 2019: 1299-1316 - [i16]Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos:
Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation. CoRR abs/1904.04475 (2019) - 2018
- [i15]Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas:
Transparency Logs via Append-only Authenticated Dictionaries. IACR Cryptol. ePrint Arch. 2018: 721 (2018) - 2017
- [c29]Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos:
Server-Aided Secure Computation with Off-line Parties. ESORICS (1) 2017: 103-123 - 2016
- [j7]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Authenticated Hash Tables Based on Cryptographic Accumulators. Algorithmica 74(2): 664-712 (2016) - [c28]Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Algebra. ASIACRYPT (2) 2016: 67-100 - [i14]Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos:
Secure Computation in Online Social Networks. IACR Cryptol. ePrint Arch. 2016: 948 (2016) - 2015
- [j6]Dimitrios Papadopoulos, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Practical Authenticated Pattern Matching with Optimal Proof Size. Proc. VLDB Endow. 8(7): 750-761 (2015) - [j5]Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz:
Location Privacy for Mobile Crowd Sensing through Population Mapping. Sensors 15(7): 15285-15310 (2015) - [c27]Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable). CCS 2015: 1032-1047 - [i13]Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Operations. IACR Cryptol. ePrint Arch. 2015: 404 (2015) - 2014
- [c26]Dimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos:
Taking Authenticated Range Queries to Arbitrary Dimensions. CCS 2014: 819-830 - [c25]Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos:
Verifiable Set Operations over Outsourced Databases. Public Key Cryptography 2014: 113-130 - [c24]Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. RAID 2014: 46-67 - [c23]Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos:
TRUESET: Faster Verifiable Set Computations. USENIX Security Symposium 2014: 765-780 - [i12]Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos:
TRUESET: Nearly Practical Verifiable Set Computations. IACR Cryptol. ePrint Arch. 2014: 160 (2014) - [i11]Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Falcon Codes: Fast, Authenticated LT Codes. IACR Cryptol. ePrint Arch. 2014: 903 (2014) - 2013
- [c22]Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias:
Delegatable pseudorandom functions and applications. CCS 2013: 669-684 - [i10]Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias:
Delegatable Pseudorandom Functions and Applications. IACR Cryptol. ePrint Arch. 2013: 379 (2013) - [i9]Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:
Securing the Data in Big Data Security Analytics. IACR Cryptol. ePrint Arch. 2013: 625 (2013) - [i8]Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos:
Verifiable Set Operations over Outsourced Databases. IACR Cryptol. ePrint Arch. 2013: 724 (2013) - 2012
- [j4]Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Cristina Videira Lopes:
Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers. Proc. VLDB Endow. 5(10): 920-931 (2012) - [c21]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, Nikos Triandopoulos:
Hourglass schemes: how to prove that cloud files are encrypted. CCS 2012: 265-280 - [c20]James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Hardening Access Control and Data Protection in GFS-like File Systems. ESORICS 2012: 19-36 - [c19]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending against the Unknown Enemy: Applying FlipIt to System Security. GameSec 2012: 248-263 - [i7]Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Cristina Videira Lopes:
Verifying Search Results Over Web Collections. CoRR abs/1204.5446 (2012) - [i6]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending Against the Unknown Enemy: Applying FlipIt to System Security. IACR Cryptol. ePrint Arch. 2012: 579 (2012) - 2011
- [j3]Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos:
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems. Algorithmica 60(3): 505-552 (2011) - [j2]Minho Shin, Cory Cornelius, Daniel Peebles, Apu Kapadia, David Kotz, Nikos Triandopoulos:
AnonySense: A system for anonymous opportunistic sensing. Pervasive Mob. Comput. 7(1): 16-30 (2011) - [c18]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Optimal Verification of Operations on Dynamic Sets. CRYPTO 2011: 91-110 - 2010
- [j1]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Authenticated error-correcting codes with applications to multicast authentication. ACM Trans. Inf. Syst. Secur. 13(2): 17:1-17:34 (2010) - [c17]Roberto Tamassia, Nikos Triandopoulos:
Certification and Authentication of Data Structures. AMW 2010 - [c16]Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos:
Privacy-enhancing auctions using rational cryptography. BQGT 2010: 90:1 - [c15]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Optimal Authenticated Data Structures with Multilinear Forms. Pairing 2010: 246-264 - [i5]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Optimal Verification of Operations on Dynamic Sets. IACR Cryptol. ePrint Arch. 2010: 455 (2010)
2000 – 2009
- 2009
- [c14]Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos:
Privacy-Enhancing Auctions Using Rational Cryptography. CRYPTO 2009: 541-558 - [c13]Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos:
Reliable Resource Searching in P2P Networks. SecureComm 2009: 437-447 - [i4]Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos:
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems. CoRR abs/0908.4116 (2009) - [i3]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Cryptographic Accumulators for Authenticated Hash Tables. IACR Cryptol. ePrint Arch. 2009: 625 (2009) - 2008
- [c12]Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Authenticated hash tables. CCS 2008: 437-448 - [c11]Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos:
Super-Efficient Verification of Dynamic Outsourced Databases. CT-RSA 2008: 407-424 - [c10]Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Athos: Efficient Authentication of Outsourced File Systems. ISC 2008: 80-96 - [c9]Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin, Nikos Triandopoulos:
Anonysense: privacy-aware people-centric sensing. MobiSys 2008: 211-224 - [c8]Apu Kapadia, Nikos Triandopoulos:
Halo: High-Assurance Locate for Distributed Hash Tables. NDSS 2008 - [c7]Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Daniel Peebles, David Kotz:
AnonySense: Opportunistic and Privacy-Preserving Context Collection. Pervasive 2008: 280-297 - [i2]Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos:
Privacy-Enhancing First-Price Auctions Using Rational Cryptography. IACR Cryptol. ePrint Arch. 2008: 418 (2008) - [i1]Ivan Damgård, Nikos Triandopoulos:
Supporting Non-membership Proofs with Bilinear-map Accumulators. IACR Cryptol. ePrint Arch. 2008: 538 (2008) - 2007
- [b1]Nikos Triandopoulos:
Efficient Data Authentication. Brown University, USA, 2007 - [c6]Roberto Tamassia, Nikos Triandopoulos:
Efficient Content Authentication in Peer-to-Peer Networks. ACNS 2007: 354-372 - [c5]Yi Ouyang, Zhengyi Le, Yurong Xu, Nikos Triandopoulos, Sheng Zhang, James Ford, Fillia Makedon:
Providing Anonymity in Wireless Sensor Networks. ICPS 2007: 145-148 - 2006
- [c4]Anna Lysyanskaya, Nikos Triandopoulos:
Rationality and Adversarial Behavior in Multi-party Computation. CRYPTO 2006: 180-197 - 2005
- [c3]Roberto Tamassia, Nikos Triandopoulos:
Computational Bounds on Hierarchical Data Processing with Applications to Information Security. ICALP 2005: 153-165 - 2004
- [c2]Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Multicast Authentication in Fully Adversarial Networks. S&P 2004: 241- - 2003
- [c1]Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert F. Cohen:
Authenticated Data Structures for Graph and Geometric Searching. CT-RSA 2003: 295-313
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 04:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint