Aikaterini Mitrokotsa

Showing 104 publications

2024

Decentralized Private Stream Aggregation from Lattices

Uddipana Dowerah, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 14584 LNCS, p. 189-214
Paper in proceeding
2023

Unbounded Predicate Inner Product Functional Encryption from Pairings

Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa et al
Journal of Cryptology. Vol. 36 (3)
Journal article
2021

Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning

Carlo Brunetta, Georgia Tsaloli, Bei Liang et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 13083 LNCS, p. 510-5128
Paper in proceeding
2021

Turn Based Communication Channel

Carlo Brunetta, Mario Larangeira, Bei Liang et al
Preprint
2021

Turn-Based Communication Channels

Carlo Brunetta, Mario Larangeira, Bei Liang et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 13059 LNCS, p. 376-392
Paper in proceeding
2021

DEVA : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning

Georgia Tsaloli, Bei Liang, Carlo Brunetta et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 13118 LNCS, p. 296-319
Paper in proceeding
2021

Homomorphic signcryption with public plaintext-result checkability

Shimin Li, Bei Liang, Aikaterini Mitrokotsa et al
IET Information Security. Vol. 15 (5), p. 333-350
Journal article
2021

Towards Stronger Functional Signatures

Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa
Preprint
2020

A Delegated Proof of Proximity Scheme for Industrial Internet of Things Consensus

Lehlogonolo P.I. Ledwaba, G. Hancke, Aikaterini Mitrokotsa et al
IECON Proceedings (Industrial Electronics Conference). Vol. 2020-October, p. 4441-4446
Paper in proceeding
2020

Statically Aggregate Verifiable Random Functions and Application to E-Lottery

Bei Liang, Gustavo Souza Banegas, Aikaterini Mitrokotsa
Cryptography. Vol. 4 (4)
Journal article
2020

Sum it Up: Verifiable Additive Homomorphic Secret Sharing

Georgia Tsaloli, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11975 LNCS (2020), p. 115-132
Paper in proceeding
2020

Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing

Georgia Tsaloli, Gustavo Souza Banegas, Aikaterini Mitrokotsa
Cryptography. Vol. 4 (3)
Journal article
2019

Decentralised Functional Signatures

Bei Liang, Aikaterini Mitrokotsa
Mobile Networks and Applications. Vol. 24 (3), p. 934-946
Journal article
2019

Multi-key homomorphic authenticators

Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo et al
IET Information Security. Vol. 13 (6), p. 618-638
Journal article
2019

Anonymous Single-Round Server-Aided Verification

Aikaterini Mitrokotsa, Elena Pagnin, Keisuke Tanaka
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11368 LNCS, p. 23-43
Paper in proceeding
2019

Code-Based Zero Knowledge PRF Arguments

Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11723 LNCS, p. 171-189
Paper in proceeding
2019

Robust Distributed Pseudorandom Functions for mNP Access Structures

Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11723 LNCS, p. 107-126
Paper in proceeding
2019

Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees

Georgia Tsaloli, Aikaterini Mitrokotsa
ICETE 2019 - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. Vol. 2, p. 425-430
Paper in proceeding
2018

Revisiting two-hop distance-bounding protocols: Are you really close enough?

Nektaria Kaloudi, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10741 LNCS, p. 177-188
Paper in proceeding
2018

Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?

Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11261 LNCS, p. 161-178
Paper in proceeding
2018

Verifiable homomorphic secret sharing

Georgia Tsaloli, Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11192 LNCS, p. 40-55
Paper in proceeding
2018

Lattice-Based Simulatable VRFs: Challenges and Future Directions

Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa
Journal of Internet Services and Information Security. Vol. 8 (4), p. 57-69
Journal article
2018

VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things

Luca Luceri, Felipe Cardoso, Michela Papandrea et al
Pervasive and Mobile Computing. Vol. 49, p. 126-138
Journal article
2018

HB+DB: Distance bounding meets human based authentication

Elena Pagnin, Anjia Yang, Qiao Hu et al
Future Generation Computer Systems. Vol. 80, p. 627-639
Journal article
2018

Distributed pseudorandom functions for general access structures in NP

Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10631 LNCS, p. 81-87
Paper in proceeding
2018

Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context

Qiao Hu, Jingyi Zhang, Aikaterini Mitrokotsa et al
Computers and Security. Vol. 78, p. 281-300
Journal article
2018

Two-Hop Distance-Bounding Protocols: Keep Your Friends Close

Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa et al
IEEE Transactions on Mobile Computing. Vol. 17 (7), p. 1723-1736
Journal article
2017

Differential privacy for Bayesian inference through posterior sampling

Christos Dimitrakakis, B.E.N. Nelson, Zuhe Zhang et al
Journal of Machine Learning Research. Vol. 18 (1 March 2017)
Journal article
2017

Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation (short paper)

Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10701 LNCS, p. 422-431
Paper in proceeding
2017

Near-Optimal Blacklisting

Christos Dimitrakakis, Aikaterini Mitrokotsa
Computers and Security. Vol. 64 (1), p. 110-121
Journal article
2017

A Differentially Private Encryption Scheme

Carlo Brunetta, Christos Dimitrakakis, Bei Liang et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10599 LNCS, p. 309-326
Paper in proceeding
2017

Preface - Lecture Notes in Computer Science

Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevicius
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10674 LNCS, p. VI-VI
Other text in scientific journal
2017

Privacy-Preserving Biometric Authentication: Challenges and Directions

Elena Pagnin, Aikaterini Mitrokotsa
Security and Communication Networks. Vol. 2017
Review article
2016

Multi-Key Homomorphic Authenticators

Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10032 LNCS (2), p. 499-530
Paper in proceeding
2016

9th international workshop on artificial intelligence and security (AISec 2016)

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
Proceedings of the ACM Conference on Computer and Communications Security. Vol. 24-28-October-2016, p. 1881-1881
Paper in proceeding
2016

Special issue on recent advances in physical-layer security

G. Hancke, Aikaterini Mitrokotsa, Safieddin Safavi-Naeini et al
Computer Networks. Vol. 109, p. 1-3
Other text in scientific journal
2016

Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close

Christoffer Karlsson, Aikaterini Mitrokotsa
IEEE Communications Letters. Vol. 20 (7), p. 1365-1368
Journal article
2016

Proceedings of the 2016 Workshop on Artificial Intelligence and Security Workshop (AISec 2016)

David Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
Book
2016

Synergistic user ↔ context analytics

A. Hossmann-Picu, Z. Li, Z. Zhao et al
Advances in Intelligent Systems and Computing. Vol. 399, p. 163-172
Paper in proceeding
2016

Chairs' introduction and welcome to AISec 2016

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016, p. iii-
Other conference contribution
2016

Efficient Verifiable Computation of XOR for Biometric Authentication

Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rua et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10052 LNCS, p. 284-298
Paper in proceeding
2015

Distance-Bounding Protocols: Are You Close Enough?

Christos Dimitrakakis, Aikaterini Mitrokotsa
IEEE Security and Privacy. Vol. 13 (4), p. 47-51
Other text in scientific journal
2015

HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding.

Elena Pagnin, Anjia Yang, G. Hancke et al
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2015), New York, United States, 22-26 June, p. 1-6
Paper in proceeding
2015

Practical & Provably Secure Distance-Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Journal of Computer Security. Vol. 23 (2), p. 229-257
Journal article
2015

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours

Elena Pagnin, G. Hancke, Aikaterini Mitrokotsa
IEEE Communications Letters. Vol. 19 (7), p. 1173-1176
Journal article
2015

Authentication in Constrained Settings

Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 9024, p. 3-12
Paper in proceeding
2015

Practical and provably secure distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7807, p. 248-258
Paper in proceeding
2015

Expected loss analysis for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay
Journal of Computer Security. Vol. 23 (2), p. 309-329
Journal article
2015

Foreword - Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha et al
8th ACM Workshop on Artificial Intelligence and Security, AISec 2015 - co-located with CCS 2015; Denver; United States, p. iii-
Other conference contribution
2014

Attacks on Privacy-Preserving Biometric Authentication

Aysajan Abidin, Elena Pagnin, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8788 (2014), p. 293-294
Paper in proceeding
2014

On the Leakage of Information in Biometric Authentication

Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8885, p. 265-280
Paper in proceeding
2014

A Privacy-preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Aikaterini Mitrokotsa
In Proceedings of YACC 2014, Porquerolles island, France, June 2014
Paper in proceeding
2014

Security of a Privacy-Preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8813, p. 290-304
Paper in proceeding
2014

Robust and private Bayesian inference

Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8776, p. 291-305
Paper in proceeding
2014

Workshop Summary of AiSec'14-2014 Workshop on Artificial Intelligent and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, B. Rubinstein
Proceedings of the ACM Conference on Computer and Communications Security. Vol. 2014-January, p. 1555-
Other conference contribution
2014

Differential Privacy and Private Bayesian Inference.

Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8788, p. 289-290
Paper in proceeding
2014

Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE

Aysajan Abidin, Aikaterini Mitrokotsa
2014 IEEE International Conference on Communications Workshops, ICC 2014, p. 60-65
Paper in proceeding
2014

Location leakage in distance bounding: Why location privacy does not work

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay
Computers and Security. Vol. 45, p. 199-209
Journal article
2014

Foreword - Proceedings of the ACM Conference on Computer and Communications Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, B. Rubinstein et al
Proceedings of the ACM Conference on Computer and Communications Security. Vol. 2014-November (November), p. ii-
Other conference contribution
2013

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection

Aikaterini Mitrokotsa, Christos Dimitrakakis
Ad Hoc Networks. Vol. 11 (1), p. 226-237
Journal article
2013

On the Need for Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Early Symmetric Crypto (ESC) seminar
Paper in proceeding
2013

On selecting the nonce length in distance bounding protocols

Aikaterini Mitrokotsa, Pedro Periz-Lopez, Christos Dimitrakakis et al
Computer Journal
Journal article
2013

Towards Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Proceedings of the 20th International Workshop on Fast Software Encryption (FSE 2013)
Paper in proceeding
2013

The Bussard-Bagga and other distance-bounding protocols under attacks

A. Bay, I. Boureanu, Aikaterini Mitrokotsa et al
Proceedings of the 8th International Conference on Information Security and Cryptology (Inscrypt 2012)
Paper in proceeding
2013

Secure and lightweight distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8162
Paper in proceeding
2013

Practical & Provably Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Proceedings of the 16th Information Security Conference (ISC 2013)
Paper in proceeding
2012

Weaknesses in another Gen2-based RFID authentication protocol

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 80-84
Paper in proceeding
2012

Guest editors' introduction: Special section on learning, games, and security

Christos Dimitrakakis, T. Karygiannis, Aikaterini Mitrokotsa
IEEE Transactions on Dependable and Secure Computing. Vol. 9 (4), p. 449-450
Magazine article
2012

Evaluation of classification algorithms for intrusion detection in MANETs

S. Pastrana, Aikaterini Mitrokotsa, A. Orfila et al
Knowledge-Based Systems. Vol. 36, p. 217-225
Journal article
2012

Near-optimal Node Blacklisting in Adversarial Networks

Christos Dimitrakakis, Aikaterini Mitrokotsa
Conference on Decision and Game Theory for Security, GameSec 2012
Conference poster
2012

Mafia fraud attack against the RČ Distance-Bounding Protocol

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 74-79
Paper in proceeding
2012

On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America ( LATINCRYPT 2012)
Paper in proceeding
2012

User-driven RFID applications and challenges

Aikaterini Mitrokotsa, Q.Z. Sheng, Z. Maamar
Personal and Ubiquitous Computing. Vol. 16 (3), p. 223-224
Magazine article
2012

On the traceability of tags in SUAP RFID authentication protocols

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 292-296
Paper in proceeding
2012

Expected loss bounds for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, S. Vaudenay
Proceedings - IEEE INFOCOM 2012, p. 478-485
Paper in proceeding
2011

A comprehensive RFID solution to enhance inpatient medication safety

P. Peris-Lopez, A. Orfila, Aikaterini Mitrokotsa et al
International Journal of Medical Informatics. Vol. 80 (1), p. 13-24
Journal article
2011

Security Primitive Classification of RFID Attacks

Aikaterini Mitrokotsa, Michael Beye, Pedro Peris-Lopez
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks
Book chapter
2011

A note on a privacy-preserving distance-bounding protocol

J.P. Aumasson, Aikaterini Mitrokotsa, P. Peris-Lopez
Proceedings of the13th International Conference on Information and Communications Security (ICICS 2011)
Paper in proceeding
2011

RFID technology, systems, and applications

Q.Z. Sheng, S. Zeadally, Aikaterini Mitrokotsa et al
Journal of Network and Computer Applications. Vol. 34 (3), p. 797-798
Magazine article
2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels

Aikaterini Mitrokotsa, Christos Dimitrakakis, P. Peris-Lopez et al
IEEE Communications Letters. Vol. 14 (2), p. 121-123
Journal article
2010

Proceedings of the 4th International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2010

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Edited book
2010

Integrated RFID and Sensor Networks: Architectures and Applications.

Aikaterini Mitrokotsa, Christos Douligeris
RFID and Sensor Networks: Architectures, Protocols, Security & Integrations
Book chapter
2010

Classifying RFID attacks and defenses

Aikaterini Mitrokotsa, M.R. Rieback, A.S. Tanenbaum
Information Systems Frontiers. Vol. 12 (5), p. 491-505
Journal article
2010

Proceedings of the 1st International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning (PSDML 2010)

Christos Dimitrakakis, Aris Gkoulalas-Divanis, Aikaterini Mitrokotsa et al
Edited book
2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris
International Journal of Network Security. Vol. 10 (2), p. 93-106
Journal article
2010

Detecting intrusions within RFID systems through non-monotonic reasoning cleaning

Peter Darcy, Bela Stantic, Aikaterini Mitrokotsa et al
6th International Conference on Intelligent Sensors, Sensor Networks & Information Processing (ISSNIP 2010), p. 257-262
Paper in proceeding
2009

Statistical decision making for authentication and intrusion detection

Christos Dimitrakakis, Aikaterini Mitrokotsa
8th International Conference on Machine Learning and Applications, ICMLA 2009, p. 409-414
Paper in proceeding
2009

Intrusion detection using cost-sensitive classification

Aikaterini Mitrokotsa, Christos Dimitrakakis, C. Douligeris
Proceedings of the 3rd European Conference on Computer Network Defense, EC2ND 2007
Paper in proceeding
2009

Proceedings of the 3rd International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2009

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Edited book
2008

Intrusion Detection Techniques in Sensor Networks

Aikaterini Mitrokotsa, Tom Karygiannis
Wireless Sensor Network Security, p. 251-272
Book chapter
2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris
Proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008), p. 133-144
Paper in proceeding
2008

Classification of RFID Attacks

Aikaterini Mitrokotsa, Melanie Rieback, Andrew Tanenbaum
2nd International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT 2008), p. 73-86
Paper in proceeding
2007

Denial of Service Attacks

Aikaterini Mitrokotsa, Christos Douligeris
Network Security: Current Status and Future Directions, p. 117-134
Book chapter
2007

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks

Aikaterini Mitrokotsa, Christos Douligeris
Proceedings of the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), p. 137-144
Paper in proceeding
2007

DoS Attacks and E-Government

Aikaterini Mitrokotsa, Christos Douligeris
Secure E-Government Web Services, p. 124-142
Book chapter
2007

Intrusion Detection with Neural Networks and Watermarking Techniques for MANET

Aikaterini Mitrokotsa, Christos Douligeris
IEEE International Conference on Pervasive Services (ICPS 2007), p. 118 - 127
Paper in proceeding
2007

Intrusion Detection Using Cost-Sensitive Classification

Aikaterini Mitrokotsa, Christos Douligeris
Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND 2007). Vol. 30, p. 35-47
Paper in proceeding
2007

Intrusion Detection and Response in Ad hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris
Frontiers in Artificial Intelligence and Applications. Vol. 15 (1), p. 643-666
Journal article
2006

Intrusion detection using emergent self-organizing maps

Aikaterini Mitrokotsa, C. Douligeris
Proceedings of the 4th Helenic Conference on AI (SETN 2006). Vol. 3955
Paper in proceeding
2006

Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks

Aikaterini Mitrokotsa, Rosa Mavropodi, Christos Douligeris
Proceedings of International Conference on Intelligent Systems and Computing: Theory and Applications, p. 111-118
Paper in proceeding
2005

Detecting denial of service attacks using emergent self-organizing maps

Aikaterini Mitrokotsa, Christos Douligeris
5th IEEE International Symposium on Signal Processing & Information Technology, p. 375 - 380
Paper in proceeding
2004

DDoS attacks and defense mechanisms: Classification and state-of-the-art

C. Douligeris, Aikaterini Mitrokotsa
Computer Networks. Vol. 44 (5), p. 643-666
Journal article
2003

DDoS Attacks and Defense Mechanisms: a classification

Aikaterini Mitrokotsa, Christos Douligeris
3rd IEEE International Symposium on Signal Processing & Information Technology (ISSPIT 2003), p. 190 - 193
Paper in proceeding

Download publication list

You can download this list to your computer.

Filter and download publication list

As logged in user (Chalmers employee) you find more export functions in MyResearch.

You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:

Zotero Connector
Mendeley Web Importer

The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.

Showing 8 research projects

2020–

Mechanisms for secure and private machine learning

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Christos Dimitrakakis Data Science
Chalmers AI Research Centre (CHAIR)

2020–

CryptoQuaC: Cryptography meets Verifiable Quantum Computation

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Giulia Ferrini Applied Quantum Physics
Elham Kashefi Unknown organization
Bei Liang Networks and Systems (Chalmers)
The Chalmers University Foundation
GENIE, Chalmers Gender Initiative for Excellence

1 publication exists
2015–2016

Secure, Private and Efficient Healthcare with Wearable Computing

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
The Swedish Foundation for International Cooperation in Research and Higher Education (STINT)

2015–2018

PRECIS: Privacy and security in wearable computing devices

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Swedish Research Council (VR)

9 publications exist
2015–2017

SwissSenseSynergia (SNSF)

Christos Dimitrakakis Computing Science (Chalmers)
Aristide Tossou Computing Science (Chalmers)
Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Swiss Federal Laboratories for Materials Science and Technology (Empa)

1 publication exists
2015–2016

Support of Learning, Security and Privacy (Intel)

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
Intel Corporation

2014–2015

Cross-layer Authentication Protocols for Wireless Networks

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
The Swedish Foundation for International Cooperation in Research and Higher Education (STINT)

2013–2016

Biometrics Evaluation and Testing (BEAT)

Aikaterini Mitrokotsa Networks and Systems (Chalmers)
European Commission (EC)

There might be more projects where Aikaterini Mitrokotsa participates, but you have to be logged in as a Chalmers employee to see them.