Dimitrios Papadopoulos

According to our database1, Dimitrios Papadopoulos authored at least 28 papers between 2011 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
BitExTract: Interactive Visualization for Extracting Bitcoin Exchange Intelligence.
IEEE Trans. Vis. Comput. Graph., 2019

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing.
ISeCure, 2019

SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.
IACR Cryptology ePrint Archive, 2019

Dynamic Searchable Encryption with Small Client Storage.
IACR Cryptology ePrint Archive, 2019

Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation.
CoRR, 2019

2018
Transparency Logs via Append-only Authenticated Dictionaries.
IACR Cryptology ePrint Archive, 2018

Privacy in decentralized cryptocurrencies.
Commun. ACM, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Efficient urban transportation(s) with IoT devices and robust workers allocation.
Proceedings of the 2018 South-Eastern European Design Automation, 2018

New Constructions for Forward and Backward Private Symmetric Searchable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Zero-Knowledge Version of vSQL.
IACR Cryptology ePrint Archive, 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
IACR Cryptology ePrint Archive, 2017

Can NSEC5 be practical for DNSSEC deployments?
IACR Cryptology ePrint Archive, 2017

Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency.
IACR Cryptology ePrint Archive, 2017

Stateful Multi-Client Verifiable Computation.
IACR Cryptology ePrint Archive, 2017

Server-Aided Secure Computation with Off-line Parties.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses.
IACR Cryptology ePrint Archive, 2016

Secure Computation in Online Social Networks.
IACR Cryptology ePrint Archive, 2016

Zero-Knowledge Accumulators and Set Algebra.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Practical Authenticated Pattern Matching with Optimal Proof Size.
PVLDB, 2015

Zero-Knowledge Accumulators and Set Operations.
IACR Cryptology ePrint Archive, 2015

2014
TRUESET: Nearly Practical Verifiable Set Computations.
IACR Cryptology ePrint Archive, 2014

NSEC5: Provably Preventing DNSSEC Zone Enumeration.
IACR Cryptology ePrint Archive, 2014

TRUESET: Faster Verifiable Set Computations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Taking Authenticated Range Queries to Arbitrary Dimensions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Verifiable Set Operations over Outsourced Databases.
IACR Cryptology ePrint Archive, 2013

Positioning Information Security Roles, Processes and Interactions.
Proceedings of the ISSE 2013, 2013

2011
Combining Traditional Map Labeling with Boundary Labeling.
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011


  Loading...