Nikolaos P. Karvelas

According to our database1, Nikolaos P. Karvelas authored at least 15 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Secure Two-Party Computation in a Quantum World.
IACR Cryptol. ePrint Arch., 2020

2018
Architectures based on Oblivious RAM for Enhancing User Privacy and their Applications to Genome Processing.
PhD thesis, 2018

Examining Leakage of Access Counts in ORAM Constructions.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Examining Leakage from Access Counts in ORAM Constructions.
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018

PROPYLA: Privacy Preserving Long-Term Secure Storage.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

2017
ORAMs in a Quantum World.
IACR Cryptol. ePrint Arch., 2017

A lightweight protocol for privacy preserving division.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Using Oblivious RAM in Genomic Studies.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Microblogging in a Privacy-Preserving way.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture.
IACR Cryptol. ePrint Arch., 2016

2014
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptol. ePrint Arch., 2014

Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Efficient Proofs of Secure Erasure.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

2013
Challenges in compiler construction for secure two-party computation.
Proceedings of the PETShop'13, 2013


  Loading...