Konstantinos Chatzikokolakis

Affiliations:
  • University of Athens, Greece
  • CNRS, Paris, France
  • École Polytechnique, Palaiseau, France


According to our database1, Konstantinos Chatzikokolakis authored at least 71 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Bayes Security: A Not So Average Metric.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Information Leakage Games: Exploring Information as a Utility Function.
ACM Trans. Priv. Secur., 2022

2021
PCP: Preemptive Circuit Padding against Tor circuit fingerprinting.
CoRR, 2021

Exact Optimization of Conformal Predictors via Incremental and Decremental Learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
Refinement Orders for Quantitative Information Flow and Differential Privacy.
J. Cybersecur. Priv., December, 2020

The Science of Quantitative Information Flow.
Information Security and Cryptography, Springer, ISBN: 978-3-319-96131-6, 2020

Catuscia Palamidessi: a journey from logic and concurrency to security and privacy.
ACM SIGLOG News, 2020

A logical characterization of differential privacy.
Sci. Comput. Program., 2020

Editors' Introduction.
Proc. Priv. Enhancing Technol., 2020

The Bayes Security Measure.
CoRR, 2020

Optimal Obfuscation Mechanisms via Machine Learning.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Estimating g-Leakage via Machine Learning.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
An axiomatization of information flow measures.
Theor. Comput. Sci., 2019

Editors' Introduction.
Proc. Priv. Enhancing Technol., 2019

Generating Optimal Privacy-Protection Mechanisms via Machine Learning.
CoRR, 2019

F-BLEAU: Fast Black-Box Leakage Estimation.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Catch me if you can: how geo-indistinguishability affects utility in mobility-based geographic datasets.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-based Recommendations, 2019

Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

Refinement Metrics for Quantitative Information Flow.
Proceedings of the Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 2019

2018
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
Entropy, 2018

Metric-based local differential privacy for statistical applications.
CoRR, 2018

On the Additive Capacity Problem for Quantitative Information Flow.
Proceedings of the Quantitative Evaluation of Systems - 15th International Conference, 2018

Leakage and Protocol Composition in a Game-Theoretic Perspective.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

A Logical Characterization of Differential Privacy via Behavioral Metrics.
Proceedings of the Formal Aspects of Component Software - 15th International Conference, 2018

Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
Efficient Utility Improvement for Location Privacy.
Proc. Priv. Enhancing Technol., 2017

On the Compositionality of Quantitative Information Flow.
Log. Methods Comput. Sci., 2017

Methods for Location Privacy: A comparative overview.
Found. Trends Priv. Secur., 2017

Trading Optimality for Performance in Location Privacy.
Proceedings of the 11th EAI International Conference on Performance Evaluation Methodologies and Tools, 2017

Information Leakage Games.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Compositional methods for information-hiding.
Math. Struct. Comput. Sci., 2016

Axioms for Information Leakage.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Up-To Techniques for Generalized Bisimulation Metrics.
Proceedings of the 27th International Conference on Concurrency Theory, 2016

2015
Location privacy via geo-indistinguishability.
ACM SIGLOG News, 2015

Constructing elastic distinguishability metrics for location privacy.
Proc. Priv. Enhancing Technol., 2015

On the information leakage of differentially-private mechanisms.
J. Comput. Secur., 2015

Geo-indistinguishability: A Principled Approach to Location Privacy.
Proceedings of the Distributed Computing and Internet Technology, 2015

2014
Compositionality Results for Quantitative Information Flow.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

A Predictive Differentially-Private Mechanism for Mobility Traces.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Metrics for Differential Privacy in Concurrent Systems.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

Additive and Multiplicative Notions of Leakage, and Their Capacities.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Generalized Bisimulation Metrics.
Proceedings of the CONCUR 2014 - Concurrency Theory - 25th International Conference, 2014

Optimal Geo-Indistinguishable Mechanisms for Location Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms.
Proceedings of the Horizons of the Mind. A Tribute to Prakash Panangaden, 2014

2013
A Predictive Differentially-Private Mechanism for Location Privacy.
CoRR, 2013

A Differentially Private Mechanism of Optimal Utility for a Region of Priors.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Broadening the Scope of Differential Privacy Using Metrics.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Geo-indistinguishability: differential privacy for location-based systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Epistemic Strategies and Games on Concurrent Processes.
ACM Trans. Comput. Log., 2012

Linking Unlinkability.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

Measuring Information Leakage Using Generalized Gain Functions.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Differential Privacy: On the Trade-Off between Utility and Information Leakage.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

On the Relation between Differential Privacy and Quantitative Information Flow.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Quantitative Information Flow and Applications to Differential Privacy.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

2010
Making random choices invisible to the scheduler.
Inf. Comput., 2010

Differential Privacy versus Quantitative Information Flow
CoRR, 2010

Statistical Measurement of Information Leakage.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

Formal Verification of Privacy for RFID Systems.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Quantitative Notions of Leakage for One-try Attacks.
Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics, 2009

Epistemic Strategies and Games on Concurrent Processes.
Proceedings of the SOFSEM 2009: Theory and Practice of Computer Science, 2009

Bisimulation for Demonic Schedulers.
Proceedings of the Foundations of Software Science and Computational Structures, 2009

2008
On the Bayes risk in information-hiding protocols.
J. Comput. Secur., 2008

Anonymity protocols as noisy channels.
Inf. Comput., 2008

A Monotonicity Principle for Information Theory.
Proceedings of the 24th Conference on the Mathematical Foundations of Programming Semantics, 2008

2007
Spécification et vérification des protocoles de sécurité probabilistes. (Probabilistic and Information-Theoretic Approaches to Anonymity).
PhD thesis, 2007

A framework for analyzing probabilistic protocols and its application to the Partial Secrets Exchange.
Theor. Comput. Sci., 2007

Formal Approaches to Information-Hiding (Tutorial).
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Probability of Error in Information-Hiding Protocols.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Probable innocence revisited.
Theor. Comput. Sci., 2006

2005
A Survey of Anonymous Peer-to-Peer File-Sharing.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Construction and Repair: A Hybrid Approach to Search in CSPs.
Proceedings of the Methods and Applications of Artificial Intelligence, 2004


  Loading...