Aikaterini Mitrokotsa
Showing 104 publications
Decentralized Private Stream Aggregation from Lattices
Unbounded Predicate Inner Product Functional Encryption from Pairings
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Homomorphic signcryption with public plaintext-result checkability
Turn-Based Communication Channels
DEVA : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
Towards Stronger Functional Signatures
Statically Aggregate Verifiable Random Functions and Application to E-Lottery
A Delegated Proof of Proximity Scheme for Industrial Internet of Things Consensus
Sum it Up: Verifiable Additive Homomorphic Secret Sharing
Decentralised Functional Signatures
Anonymous Single-Round Server-Aided Verification
Multi-key homomorphic authenticators
Robust Distributed Pseudorandom Functions for mNP Access Structures
Code-Based Zero Knowledge PRF Arguments
Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees
Revisiting two-hop distance-bounding protocols: Are you really close enough?
Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?
Lattice-Based Simulatable VRFs: Challenges and Future Directions
VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things
HB+DB: Distance bounding meets human based authentication
Distributed pseudorandom functions for general access structures in NP
Verifiable homomorphic secret sharing
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close
Differential privacy for Bayesian inference through posterior sampling
A Differentially Private Encryption Scheme
Privacy-Preserving Biometric Authentication: Challenges and Directions
Preface - Lecture Notes in Computer Science
Multi-Key Homomorphic Authenticators
Special issue on recent advances in physical-layer security
9th international workshop on artificial intelligence and security (AISec 2016)
Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close
Efficient Verifiable Computation of XOR for Biometric Authentication
Chairs' introduction and welcome to AISec 2016
Proceedings of the 2016 Workshop on Artificial Intelligence and Security Workshop (AISec 2016)
Synergistic user ↔ context analytics
Distance-Bounding Protocols: Are You Close Enough?
Practical & Provably Secure Distance-Bounding
HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding.
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours
Authentication in Constrained Settings
Practical and provably secure distance-bounding
Expected loss analysis for authentication in constrained channels
Foreword - Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security
Attacks on Privacy-Preserving Biometric Authentication
On the Leakage of Information in Biometric Authentication
A Privacy-preserving Biometric Authentication Protocol Revisited
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
Location leakage in distance bounding: Why location privacy does not work
Robust and private Bayesian inference
Foreword - Proceedings of the ACM Conference on Computer and Communications Security
Workshop Summary of AiSec'14-2014 Workshop on Artificial Intelligent and Security
Differential Privacy and Private Bayesian Inference.
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE
On the Need for Secure Distance Bounding
On selecting the nonce length in distance bounding protocols
The Bussard-Bagga and other distance-bounding protocols under attacks
Secure and lightweight distance-bounding
Towards Secure Distance Bounding
Practical & Provably Secure Distance Bounding
Weaknesses in another Gen2-based RFID authentication protocol
Mafia fraud attack against the RČ Distance-Bounding Protocol
User-driven RFID applications and challenges
Near-optimal Node Blacklisting in Adversarial Networks
Guest editors' introduction: Special section on learning, games, and security
Evaluation of classification algorithms for intrusion detection in MANETs
On the traceability of tags in SUAP RFID authentication protocols
Expected loss bounds for authentication in constrained channels
A comprehensive RFID solution to enhance inpatient medication safety
Security Primitive Classification of RFID Attacks
RFID technology, systems, and applications
A note on a privacy-preserving distance-bounding protocol
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
Integrated RFID and Sensor Networks: Architectures and Applications.
Classifying RFID attacks and defenses
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
Detecting intrusions within RFID systems through non-monotonic reasoning cleaning
Statistical decision making for authentication and intrusion detection
Intrusion detection using cost-sensitive classification
Intrusion Detection Techniques in Sensor Networks
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
Classification of RFID Attacks
Intrusion Detection with Neural Networks and Watermarking Techniques for MANET
Intrusion Detection Using Cost-Sensitive Classification
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
Intrusion Detection and Response in Ad hoc Networks
Intrusion detection using emergent self-organizing maps
Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks
Detecting denial of service attacks using emergent self-organizing maps
DDoS attacks and defense mechanisms: Classification and state-of-the-art
DDoS Attacks and Defense Mechanisms: a classification
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.
Showing 4 research projects
PRECIS: Privacy and security in wearable computing devices
Support of Learning, Security and Privacy (Intel)
Cross-layer Authentication Protocols for Wireless Networks