Seguir
Nikos Triandopoulos
Nikos Triandopoulos
Dirección de correo verificada de cs.bu.edu - Página principal
Título
Citado por
Citado por
Año
Anonysense: privacy-aware people-centric sensing
C Cornelius, A Kapadia, D Kotz, D Peebles, M Shin, N Triandopoulos
Proceedings of the 6th international conference on Mobile systems …, 2008
5452008
Delegatable pseudorandom functions and applications
A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3852013
AnonySense: A system for anonymous opportunistic sensing
M Shin, C Cornelius, D Peebles, A Kapadia, D Kotz, N Triandopoulos
Pervasive and Mobile Computing 7 (1), 16-30, 2011
2302011
Rationality and adversarial behavior in multi-party computation
A Lysyanskaya, N Triandopoulos
Annual International Cryptology Conference, 180-197, 2006
1982006
Optimal verification of operations on dynamic sets
C Papamanthou, R Tamassia, N Triandopoulos
Annual Cryptology Conference, 91-110, 2011
1872011
Opportunistic sensing: Security challenges for the new paradigm
A Kapadia, D Kotz, N Triandopoulos
2009 First International Communication Systems and Networks and Workshops, 1-10, 2009
1712009
Authenticated hash tables
C Papamanthou, R Tamassia, N Triandopoulos
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1552008
AnonySense: Opportunistic and privacy-preserving context collection
A Kapadia, N Triandopoulos, C Cornelius, D Peebles, D Kotz
Pervasive Computing: 6th International Conference, Pervasive 2008 Sydney …, 2008
1552008
Supporting non-membership proofs with bilinear-map accumulators
I Damgård, N Triandopoulos
Cryptology ePrint Archive, 2008
1142008
Authenticated data structures for graph and geometric searching
MT Goodrich, R Tamassia, N Triandopoulos, R Cohen
Cryptographers’ Track at the RSA Conference, 295-313, 2003
1102003
Hourglass schemes: how to prove that cloud files are encrypted
M Van Dijk, A Juels, A Oprea, RL Rivest, E Stefanov, N Triandopoulos
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1062012
Multicast authentication in fully adversarial networks
A Lysyanskaya, R Tamassia, N Triandopoulos
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 241-253, 2004
962004
Defending against the Unknown Enemy: Applying FlipIt to System Security
KD Bowers, M Van Dijk, R Griffin, A Juels, A Oprea, RL Rivest, ...
International Conference on Decision and Game Theory for Security, 248-263, 2012
842012
{TRUESET}: Faster {Verifiable} Set Computations
AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
23rd USENIX Security Symposium (USENIX Security 14), 765-780, 2014
792014
Verifiable set operations over outsourced databases
R Canetti, O Paneth, D Papadopoulos, N Triandopoulos
International Workshop on Public Key Cryptography, 113-130, 2014
732014
Super-efficient verification of dynamic outsourced databases
MT Goodrich, R Tamassia, N Triandopoulos
Cryptographers’ Track at the RSA Conference, 407-424, 2008
722008
Athos: Efficient authentication of outsourced file systems
MT Goodrich, C Papamanthou, R Tamassia, N Triandopoulos
International Conference on Information Security, 80-96, 2008
682008
Efficient authenticated data structures for graph connectivity and geometric search problems
MT Goodrich, R Tamassia, N Triandopoulos
Algorithmica 60, 505-552, 2011
672011
Providing anonymity in wireless sensor networks
Y Ouyang, Z Le, Y Xu, N Triandopoulos, S Zhang, J Ford, F Makedon
IEEE international conference on pervasive services, 145-148, 2007
672007
Transparency logs via append-only authenticated dictionaries
A Tomescu, V Bhupatiraju, D Papadopoulos, C Papamanthou, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
632019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20