Aikaterini Mitrokotsa

According to our database1, Aikaterini Mitrokotsa
  • authored at least 63 papers between 2004 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
HB+DB: Distance bounding meets human based authentication.
Future Generation Comp. Syst., 2018

2017
Privacy-Preserving Biometric Authentication: Challenges and Directions.
Security and Communication Networks, 2017

Differential Privacy for Bayesian Inference through Posterior Sampling.
Journal of Machine Learning Research, 2017

Privacy-preserving biometric authentication: challenges and directions.
IACR Cryptology ePrint Archive, 2017

Multi-Hop Distance Estimation: How Far are You?
IACR Cryptology ePrint Archive, 2017

Near-optimal blacklisting.
Computers & Security, 2017

A Differentially Private Encryption Scheme.
Proceedings of the Information Security - 20th International Conference, 2017

Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

2016
Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close.
IEEE Communications Letters, 2016

Multi-Key Homomorphic Authenticators.
IACR Cryptology ePrint Archive, 2016

Special issue on recent advances in physical-layer security.
Computer Networks, 2016

9th International Workshop on Artificial Intelligence and Security: AISec 2016.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Efficient Verifiable Computation of XOR for Biometric Authentication.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Multi-key Homomorphic Authenticators.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Expected loss analysis for authentication in constrained channels.
Journal of Computer Security, 2015

Practical and provably secure distance-bounding.
Journal of Computer Security, 2015

Distance-Bounding Protocols: Are You Close Enough?
IEEE Security & Privacy, 2015

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours.
IEEE Communications Letters, 2015

Towards Secure Distance Bounding.
IACR Cryptology ePrint Archive, 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Location leakage in distance bounding: Why location privacy does not work.
Computers & Security, 2014

Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

On the Leakage of Information in Biometric Authentication.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Security of a Privacy-Preserving Biometric Authentication Protocol Revisited.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Authentication in Constrained Settings.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

Robust and Private Bayesian Inference.
Proceedings of the Algorithmic Learning Theory - 25th International Conference, 2014

2013
Location Leakage in Distance Bounding: Why Location Privacy does not Work.
IACR Cryptology ePrint Archive, 2013

Practical & Provably Secure Distance-Bounding.
IACR Cryptology ePrint Archive, 2013

Robust, Secure and Private Bayesian Inference.
CoRR, 2013

On Selecting the Nonce Length in Distance-Bounding Protocols.
Comput. J., 2013

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection.
Ad Hoc Networks, 2013

Secure and Lightweight Distance-Bounding.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

Practical and Provably Secure Distance-Bounding.
Proceedings of the Information Security, 16th International Conference, 2013

Towards Secure Distance Bounding.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Guest Editors' Introduction: Special Section on Learning, Games, and Security.
IEEE Trans. Dependable Sec. Comput., 2012

User-driven RFID applications and challenges.
Personal and Ubiquitous Computing, 2012

Evaluation of classification algorithms for intrusion detection in MANETs.
Knowl.-Based Syst., 2012

Near-Optimal Node Blacklisting in Adversarial Networks
CoRR, 2012

Weaknesses in another Gen2-based RFID authentication protocol.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

On the traceability of tags in SUAP RFID authentication protocols.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

Mafia fraud attack against the RČ Distance-Bounding Protocol.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds!
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Expected loss bounds for authentication in constrained channels.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
RFID technology, systems, and applications.
J. Network and Computer Applications, 2011

A comprehensive RFID solution to enhance inpatient medication safety.
I. J. Medical Informatics, 2011

A Note on a Privacy-Preserving Distance-Bounding Protocol.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Classifying RFID attacks and defenses.
Information Systems Frontiers, 2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks.
I. J. Network Security, 2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.
IEEE Communications Letters, 2010

Expected loss analysis of thresholded authentication protocols in noisy conditions
CoRR, 2010

2009
Statistical Decision Making for Authentication and Intrusion Detection.
CoRR, 2009

Statistical Decision Making for Authentication and Intrusion Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2009

2008
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
CoRR, 2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
CoRR, 2008

Intrusion Detection Using Cost-Sensitive Classification
CoRR, 2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms.
Proceedings of the Advances in Ad Hoc Networking, 2008

Classification of RFID Attacks.
Proceedings of the RFID Technology - Concepts, Applications, Challenges, Proceedings of the 2nd International Workshop on RFID Technology, 2008

2007
Intrusion Detection with Neural Networks and Watermarking Techniques for MANET.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

2006
Intrusion Detection Using Emergent Self-organizing Maps.
Proceedings of the Advances in Artificial Intelligence, 4th Helenic Conference on AI, 2006

2004
DDoS attacks and defense mechanisms: classification and state-of-the-art.
Computer Networks, 2004


  Loading...