Nikos Triandopoulos

According to our database1, Nikos Triandopoulos authored at least 52 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation.
Cryptogr., September, 2023

VaultBox: Enhancing the Security and Effectiveness of Security Analytics.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

SigML: Supervised Log Anomaly with Fully Homomorphic Encryption.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
Debloating Address Sanitizer.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Private Hierarchical Clustering and Efficient Approximation.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

2019
Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation.
CoRR, 2019

2018
Transparency Logs via Append-only Authenticated Dictionaries.
IACR Cryptol. ePrint Arch., 2018

2017
Server-Aided Secure Computation with Off-line Parties.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Secure Computation in Online Social Networks.
IACR Cryptol. ePrint Arch., 2016

Authenticated Hash Tables Based on Cryptographic Accumulators.
Algorithmica, 2016

Zero-Knowledge Accumulators and Set Algebra.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Location Privacy for Mobile Crowd Sensing through Population Mapping.
Sensors, 2015

Practical Authenticated Pattern Matching with Optimal Proof Size.
Proc. VLDB Endow., 2015

Zero-Knowledge Accumulators and Set Operations.
IACR Cryptol. ePrint Arch., 2015

Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable).
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
TRUESET: Nearly Practical Verifiable Set Computations.
IACR Cryptol. ePrint Arch., 2014

Falcon Codes: Fast, Authenticated LT Codes.
IACR Cryptol. ePrint Arch., 2014

TRUESET: Faster Verifiable Set Computations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Taking Authenticated Range Queries to Arbitrary Dimensions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Delegatable Pseudorandom Functions and Applications.
IACR Cryptol. ePrint Arch., 2013

Verifiable Set Operations over Outsourced Databases.
IACR Cryptol. ePrint Arch., 2013

Securing the Data in Big Data Security Analytics.
IACR Cryptol. ePrint Arch., 2013

2012
Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers.
Proc. VLDB Endow., 2012

Defending Against the Unknown Enemy: Applying FlipIt to System Security.
IACR Cryptol. ePrint Arch., 2012

Verifying Search Results Over Web Collections
CoRR, 2012

Hardening Access Control and Data Protection in GFS-like File Systems.
Proceedings of the Computer Security - ESORICS 2012, 2012

Hourglass schemes: how to prove that cloud files are encrypted.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
AnonySense: A system for anonymous opportunistic sensing.
Pervasive Mob. Comput., 2011

Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems.
Algorithmica, 2011

2010
Authenticated error-correcting codes with applications to multicast authentication.
ACM Trans. Inf. Syst. Secur., 2010

Optimal Verification of Operations on Dynamic Sets.
IACR Cryptol. ePrint Arch., 2010

Optimal Authenticated Data Structures with Multilinear Forms.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Certification and Authentication of Data Structures.
Proceedings of the 4th Alberto Mendelzon International Workshop on Foundations of Data Management, 2010

2009
Cryptographic Accumulators for Authenticated Hash Tables.
IACR Cryptol. ePrint Arch., 2009

Reliable Resource Searching in P2P Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

Privacy-Enhancing Auctions Using Rational Cryptography.
Proceedings of the Advances in Cryptology, 2009

2008
Privacy-Enhancing First-Price Auctions Using Rational Cryptography.
IACR Cryptol. ePrint Arch., 2008

Supporting Non-membership Proofs with Bilinear-map Accumulators.
IACR Cryptol. ePrint Arch., 2008

AnonySense: Opportunistic and Privacy-Preserving Context Collection.
Proceedings of the Pervasive Computing, 2008

Halo: High-Assurance Locate for Distributed Hash Tables.
Proceedings of the Network and Distributed System Security Symposium, 2008

Anonysense: privacy-aware people-centric sensing.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Athos: Efficient Authentication of Outsourced File Systems.
Proceedings of the Information Security, 11th International Conference, 2008

Super-Efficient Verification of Dynamic Outsourced Databases.
Proceedings of the Topics in Cryptology, 2008

Authenticated hash tables.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Efficient Data Authentication.
PhD thesis, 2007

Providing Anonymity in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Efficient Content Authentication in Peer-to-Peer Networks.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Rationality and Adversarial Behavior in Multi-party Computation.
Proceedings of the Advances in Cryptology, 2006

2005
Computational Bounds on Hierarchical Data Processing with Applications to Information Security.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

2004
Multicast Authentication in Fully Adversarial Networks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

2003
Authenticated Data Structures for Graph and Geometric Searching.
Proceedings of the Topics in Cryptology, 2003


  Loading...