Tassos Dimitriou

Orcid: 0000-0001-6535-4983

According to our database1, Tassos Dimitriou authored at least 81 papers between 1996 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas.
IACR Cryptol. ePrint Arch., 2022

Extended Berkeley Packet Filter: An Application Perspective.
IEEE Access, 2022

Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards.
IEEE Access, 2022

Private Lives Matter: A Differential Private Functional Encryption Scheme.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version).
IACR Cryptol. ePrint Arch., 2021

Blockchain-Based Fair and Secure Certified Electronic Mail Without a TTP.
IEEE Access, 2021

2020
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data.
IEEE Internet Things J., 2020

Decentralized reputation.
IACR Cryptol. ePrint Arch., 2020

From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards.
IACR Cryptol. ePrint Arch., 2020

Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting.
Comput. Networks, 2020

Fair and private Bitcoin rewards: Incentivizing participation in Crowd-sensing applications.
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020

2019
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems.
Comput. Commun., 2019

Container Security: Issues, Challenges, and the Road Ahead.
IEEE Access, 2019

Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Privacy-respecting reward generation and accumulation for participatory sensing applications.
Pervasive Mob. Comput., 2018

"I wasn't there" - Deniable, privacy-aware scheme for decentralized Location-based Services.
Future Gener. Comput. Syst., 2018

Secure localization using hypothesis testing in wireless networks.
Ad Hoc Networks, 2018

Privacy-respecting rewards for participatory sensing applications.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

2017
Enabling Anonymous Authorization and Rewarding in the Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2017

Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications.
J. Netw. Comput. Appl., 2017

Power-efficient routing for SDN with discrete link rates and size-limited flow tables: A tree-based particle swarm optimization approach.
Int. J. Netw. Manag., 2017

2016
Imposter detection for replication attacks in mobile sensor networks.
Comput. Networks, 2016

Secure and scalable aggregation in the smart grid resilient against malicious entities.
Ad Hoc Networks, 2016

Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags.
Ad Hoc Networks, 2016

Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
A platform for privacy protection of data requesters and data providers in mobile sensing.
Comput. Commun., 2015

Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing.
Proceedings of the Information Security Theory and Practice, 2015

2014
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks.
J. Comput. Syst. Sci., 2014

Multi-party trust computation in decentralized environments in the presence of malicious adversaries.
Ad Hoc Networks, 2014

Secure and Scalable Aggregation in the Smart Grid.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Privacy-Friendly Planning of Energy Distribution in Smart Grids.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

2013
Privacy-friendly tasking and trading of energy in smart grids.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

2012
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012

Multi-Party Trust Computation in Decentralized Environments.
Proceedings of the 5th International Conference on New Technologies, 2012

PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

Moving Advanced Safety to the Cloud: Some Outcomes of SafeCity Project.
Proceedings of the Future Security - 7th Security Research Conference, 2012

2011
People-centric sensing in assistive healthcare: Privacy challenges and directions.
Secur. Commun. Networks, 2011

Scatter - secure code authentication for efficient reprogramming in wireless sensor networks.
Int. J. Sens. Networks, 2011

Detecting fraud in online games of chance and lotteries.
Expert Syst. Appl., 2011

Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Privacy preservation schemes for querying wireless sensor networks.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
Location privacy in urban sensing networks: research challenges and directions.
IEEE Wirel. Commun., 2010

Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
Comput. J., 2010

Inexpensive Email Addresses <i>An Email Spam-Combating System</i>.
Proceedings of the Security and Privacy in Communication Networks, 2010

Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources.
Proceedings of the Security and Privacy in Communication Networks, 2009

Cooperative Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009

Self-propagating worms in wireless sensor networks.
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009

2008
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

LIDeA: a distributed lightweight intrusion detection architecture for sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

rfidDOT: RFID delegation and ownership transfer made simple.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

SuperTrust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

A Secure Hybrid Reputation Management System for Super-Peer Networks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

Proxy Framework for Enhanced RFID Security and Privacy.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Sensenet: a wireless sensor network testbed.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007

Providing Transparent Security Services to Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Protecting Biometric Templates with Image Watermarking Techniques.
Proceedings of the Advances in Biometrics, International Conference, 2007

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007

2006
GRAViTy: Geographic Routing around Voids in Sensor Networks.
Int. J. Pervasive Comput. Commun., 2006

The infection time of graphs.
Discret. Appl. Math., 2006

A probabilistic algorithm for efficient and robust data propagation in wireless sensor networks.
Ad Hoc Networks, 2006

A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

Securing Communication Trees in Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2006

Authenticated In-Network Programming for Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
SAT distributions with planted assignments and phase transitions between decision and optimization problems.
Discret. Appl. Math., 2005

Autonomic Communication Security in Sensor Networks.
Proceedings of the Autonomic Communication, Second International IFIP Workshop, 2005

A Zero Knowledge Proof for Subset Selection from a Family of Sets with Applications to Multiparty/Multicandidate Electronic Elections.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005

A Lightweight RFID Protocol to protect against Traceability and Cloning attacks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Efficient Mechanisms for Secure Inter-node and Aggregation Processing in Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005

2004
How to Tell a Good Neighborhood from a Bad One: Satisfiability of Boolean Formulas.
Proceedings of the Experimental and Efficient Algorithms, Third International Workshop, 2004

SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks.
Proceedings of the NETWORKING 2004, 2004

Efficient Delivery of Information in Sensor Networks Using Smart Antennas.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks: First International Workshop, 2004

Analysis of the Information Propagation Time Among Mobile Hosts.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

2003
A Comparative Study Of Protocols For Efficient Data Propagation In Smart Dust Networks.
Parallel Process. Lett., 2003

SAT Distributions with Phase Transitions between Decision and Optimization Problems.
Electron. Notes Discret. Math., 2003

A Wealth of SAT Distributions with Planted Assignments.
Proceedings of the Principles and Practice of Constraint Programming, 2003

2002
Characterizing the Space of all Cliques in Random Graphs using "Go with the Winners".
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2002

1998
Go with the Winners for Graph Bisection.
Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 1998

1996
Towards an Analysis of Local Optimization Algorithms.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996


  Loading...