Myrto Arapinis

According to our database1, Myrto Arapinis authored at least 36 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Quantum Lock: A Provable Quantum Communication Advantage.
Quantum, May, 2023

Universally Composable Simultaneous Broadcast against a Dishonest Majority and Applications.
Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing, 2023

2021
Quantum Physical Unclonable Functions: Possibilities and Impossibilities.
Quantum, 2021

Astrolabous: A Universally Composable Time-Lock Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

Hybrid PUF: A Novel Way to Enhance the Security of Classical PUFs.
CoRR, 2021

QEnclave - A practical solution for secure quantum cloud computing.
CoRR, 2021

A Unified Framework For Quantum Unforgeability.
CoRR, 2021

2020
E-cclesia: Universally Composable Self-Tallying Elections.
IACR Cryptol. ePrint Arch., 2020

2019
A Formal Treatment of Hardware Wallets.
IACR Cryptol. ePrint Arch., 2019

2018
A Comprehensive Analysis of Quantum E-voting Protocols.
CoRR, 2018

On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Stateful applied pi calculus: Observational equivalence and labelled bisimilarity.
J. Log. Algebraic Methods Program., 2017

Analysis of privacy in mobile telephony systems.
Int. J. Inf. Sec., 2017

Low-Level Attacks in Bitcoin Wallets.
Proceedings of the Information Security - 20th International Conference, 2017

2016
When Are Three Voters Enough for Privacy Properties?
IACR Cryptol. ePrint Arch., 2016

Sensitivity of Counting Queries.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

2015
Composing Security Protocols: From Confidentiality to Privacy.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

2014
StatVerif: Verification of stateful processes.
J. Comput. Secur., 2014

Bounding messages for free in security protocols - extension to various security properties.
Inf. Comput., 2014

Dynamic Tags for Security Protocols.
Log. Methods Comput. Sci., 2014

Stateful Applied Pi Calculus.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Privacy through Pseudonymity in Mobile Telephony Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Privacy-supporting cloud computing by in-browser key translation.
J. Comput. Secur., 2013

Practical Everlasting Privacy.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

2012
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Privacy Supporting Cloud Computing: ConfiChair, a Case Study.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Verifying Privacy-Type Properties in a Modular Way.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

New privacy issues in mobile telephony: fix and verification.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Formal Analysis of UMTS Privacy
CoRR, 2011

StatVerif: Verification of Stateful Processes.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Towards the Verification of Pervasive Systems.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009

Untraceability in the applied pi-calculus.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
From One Session to Many: Dynamic Tags for Security Protocols.
Proceedings of the Logic for Programming, 2008

2007
Bounding Messages for Free in Security Protocols.
Proceedings of the FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 2007

2003
Semantics of Minimally Synchronous Parallel ML.
Proceedings of the ACIS Fourth International Conference on Software Engineering, 2003


  Loading...