Elli Androulaki

According to our database1, Elli Androulaki authored at least 27 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies.
IACR Cryptol. ePrint Arch., 2023

2021
Multi-Issuer Anonymous Credentials Without a Root Authority.
IACR Cryptol. ePrint Arch., 2021

IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status.
IACR Cryptol. ePrint Arch., 2021

2020
Multi-Shard Private Transactions for Permissioned Blockchains.
CoRR, 2020

2019
Privacy-preserving auditable token payments in a permissioned blockchain system.
IACR Cryptol. ePrint Arch., 2019

Endorsement in Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018

Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.
Proceedings of the Computer Security, 2018

2017
Permissioned Blockchains and Hyperledger Fabric.
ERCIM News, 2017

Introduction to the Special Theme Blockchain Engineering.
ERCIM News, 2017

2016
CCSW'16: 8th ACM Cloud Computing Security Workshop.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability.
ACM Trans. Inf. Syst. Secur., 2015

2014
Hiding Transaction Amounts and Balances in Bitcoin.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Erasure-Coded Byzantine Storage with Separate Metadata.
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014

Enforcing Location and Time-Based Access Control on Cloud-Stored Data.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

A Secure Data Deduplication Scheme for Cloud Storage.
Proceedings of the Financial Cryptography and Data Security, 2014

Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2012
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.
IACR Cryptol. ePrint Arch., 2012

Evaluating User Privacy in Bitcoin.
IACR Cryptol. ePrint Arch., 2012

Double-spending fast payments in bitcoin.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2010
A Secure and Privacy-Preserving Targeted Ad-System.
Proceedings of the Financial Cryptography and Data Security, 2010

Privacy-Preserving, Taxable Bank Accounts.
Proceedings of the Computer Security, 2010

2009
An Anonymous Credit Card System.
Proceedings of the Trust, 2009

APOD: Anonymous Physical Object Delivery.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

2008
PAR: Payment for Anonymous Routing.
Proceedings of the Privacy Enhancing Technologies, 2008

Reputation Systems for Anonymous Networks.
Proceedings of the Privacy Enhancing Technologies, 2008

2007
A Study of Malcode-Bearing Documents.
Proceedings of the Detection of Intrusions and Malware, 2007


  Loading...