Aikaterini Mitrokotsa

Visar 104 publikationer

2024

Decentralized Private Stream Aggregation from Lattices

Uddipana Dowerah, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 14584 LNCS, p. 189-214
Paper i proceeding
2023

Unbounded Predicate Inner Product Functional Encryption from Pairings

Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa et al
Journal of Cryptology. Vol. 36 (3)
Artikel i vetenskaplig tidskrift
2021

Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning

Carlo Brunetta, Georgia Tsaloli, Bei Liang et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 13083 LNCS, p. 510-5128
Paper i proceeding
2021

Turn Based Communication Channel

Carlo Brunetta, Mario Larangeira, Bei Liang et al
Preprint
2021

Homomorphic signcryption with public plaintext-result checkability

Shimin Li, Bei Liang, Aikaterini Mitrokotsa et al
IET Information Security. Vol. 15 (5), p. 333-350
Artikel i vetenskaplig tidskrift
2021

Turn-Based Communication Channels

Carlo Brunetta, Mario Larangeira, Bei Liang et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 13059 LNCS, p. 376-392
Paper i proceeding
2021

DEVA : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning

Georgia Tsaloli, Bei Liang, Carlo Brunetta et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 13118 LNCS, p. 296-319
Paper i proceeding
2021

Towards Stronger Functional Signatures

Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa
Preprint
2020

Statically Aggregate Verifiable Random Functions and Application to E-Lottery

Bei Liang, Gustavo Souza Banegas, Aikaterini Mitrokotsa
Cryptography. Vol. 4 (4)
Artikel i vetenskaplig tidskrift
2020

A Delegated Proof of Proximity Scheme for Industrial Internet of Things Consensus

Lehlogonolo P.I. Ledwaba, G. Hancke, Aikaterini Mitrokotsa et al
IECON Proceedings (Industrial Electronics Conference). Vol. 2020-October, p. 4441-4446
Paper i proceeding
2020

Sum it Up: Verifiable Additive Homomorphic Secret Sharing

Georgia Tsaloli, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11975 LNCS (2020), p. 115-132
Paper i proceeding
2020

Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing

Georgia Tsaloli, Gustavo Souza Banegas, Aikaterini Mitrokotsa
Cryptography. Vol. 4 (3)
Artikel i vetenskaplig tidskrift
2019

Decentralised Functional Signatures

Bei Liang, Aikaterini Mitrokotsa
Mobile Networks and Applications. Vol. 24 (3), p. 934-946
Artikel i vetenskaplig tidskrift
2019

Anonymous Single-Round Server-Aided Verification

Aikaterini Mitrokotsa, Elena Pagnin, Keisuke Tanaka
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11368, p. 23-43
Paper i proceeding
2019

Multi-key homomorphic authenticators

Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo et al
IET Information Security. Vol. 13 (6), p. 618-638
Artikel i vetenskaplig tidskrift
2019

Robust Distributed Pseudorandom Functions for mNP Access Structures

Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11723 LNCS, p. 107-126
Paper i proceeding
2019

Code-Based Zero Knowledge PRF Arguments

Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11723, p. 171-189
Paper i proceeding
2019

Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees

Georgia Tsaloli, Aikaterini Mitrokotsa
ICETE 2019 - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. Vol. Volume 2: SECRYPT, p. 425-430
Paper i proceeding
2018

Revisiting two-hop distance-bounding protocols: Are you really close enough?

Nektaria Kaloudi, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10741, p. 177-188
Paper i proceeding
2018

Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?

Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11261, p. 161-178
Paper i proceeding
2018

Lattice-Based Simulatable VRFs: Challenges and Future Directions

Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa
Journal of Internet Services and Information Security. Vol. 8 (4), p. 57-69
Artikel i vetenskaplig tidskrift
2018

VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things

Luca Luceri, Felipe Cardoso, Michela Papandrea et al
Pervasive and Mobile Computing. Vol. 49, p. 126-138
Artikel i vetenskaplig tidskrift
2018

HB+DB: Distance bounding meets human based authentication

Elena Pagnin, Anjia Yang, Qiao Hu et al
Future Generation Computer Systems. Vol. 80, p. 627-639
Artikel i vetenskaplig tidskrift
2018

Distributed pseudorandom functions for general access structures in NP

Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10631, p. 81-87
Paper i proceeding
2018

Verifiable homomorphic secret sharing

Georgia Tsaloli, Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11192 LNCS, p. 40-55
Paper i proceeding
2018

Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context

Qiao Hu, Jingyi Zhang, Aikaterini Mitrokotsa et al
Computers and Security. Vol. 78, p. 281-300
Artikel i vetenskaplig tidskrift
2018

Two-Hop Distance-Bounding Protocols: Keep Your Friends Close

Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa et al
IEEE Transactions on Mobile Computing. Vol. 17 (7), p. 1723-1736
Artikel i vetenskaplig tidskrift
2017

Differential privacy for Bayesian inference through posterior sampling

Christos Dimitrakakis, B.E.N. Nelson, Zuhe Zhang et al
Journal of Machine Learning Research. Vol. 18 (1 March 2017)
Artikel i vetenskaplig tidskrift
2017

Near-Optimal Blacklisting

Christos Dimitrakakis, Aikaterini Mitrokotsa
Computers and Security. Vol. 64 (1), p. 110-121
Artikel i vetenskaplig tidskrift
2017

A Differentially Private Encryption Scheme

Carlo Brunetta, Christos Dimitrakakis, Bei Liang et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10599 LNCS, p. 309-326
Paper i proceeding
2017

Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation (short paper)

Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10701 LNCS, p. 422-431
Paper i proceeding
2017

Privacy-Preserving Biometric Authentication: Challenges and Directions

Elena Pagnin, Aikaterini Mitrokotsa
Security and Communication Networks. Vol. 2017
Reviewartikel
2017

Preface - Lecture Notes in Computer Science

Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevicius
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10674 LNCS, p. VI-VI
Övrig text i vetenskaplig tidskrift
2016

Multi-Key Homomorphic Authenticators

Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10032 (2), p. 499-530
Paper i proceeding
2016

Special issue on recent advances in physical-layer security

G. Hancke, Aikaterini Mitrokotsa, Safieddin Safavi-Naeini et al
Computer Networks. Vol. 109, p. 1-3
Övrig text i vetenskaplig tidskrift
2016

9th international workshop on artificial intelligence and security (AISec 2016)

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
Proceedings of the ACM Conference on Computer and Communications Security. Vol. 24-28-October-2016, p. 1881-1881
Paper i proceeding
2016

Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close

Christoffer Karlsson, Aikaterini Mitrokotsa
IEEE Communications Letters. Vol. 20 (7), p. 1365-1368
Artikel i vetenskaplig tidskrift
2016

Efficient Verifiable Computation of XOR for Biometric Authentication

Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rua et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10052, p. 284-298
Paper i proceeding
2016

Chairs' introduction and welcome to AISec 2016

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016, p. iii-
Övrigt konferensbidrag
2016

Proceedings of the 2016 Workshop on Artificial Intelligence and Security Workshop (AISec 2016)

David Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
Bok
2016

Synergistic user ↔ context analytics

A. Hossmann-Picu, Z. Li, Z. Zhao et al
Advances in Intelligent Systems and Computing. Vol. 399, p. 163-172
Paper i proceeding
2015

Distance-Bounding Protocols: Are You Close Enough?

Christos Dimitrakakis, Aikaterini Mitrokotsa
IEEE Security and Privacy. Vol. 13 (4), p. 47-51
Övrig text i vetenskaplig tidskrift
2015

Practical & Provably Secure Distance-Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Journal of Computer Security. Vol. 23 (2), p. 229-257
Artikel i vetenskaplig tidskrift
2015

HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding.

Elena Pagnin, Anjia Yang, G. Hancke et al
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2015), New York, United States, 22-26 June, p. 1-6
Paper i proceeding
2015

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours

Elena Pagnin, G. Hancke, Aikaterini Mitrokotsa
IEEE Communications Letters. Vol. 19 (7), p. 1173-1176
Artikel i vetenskaplig tidskrift
2015

Authentication in Constrained Settings

Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 9024, p. 3-12
Paper i proceeding
2015

Practical and provably secure distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7807, p. 248-258
Paper i proceeding
2015

Expected loss analysis for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay
Journal of Computer Security. Vol. 23 (2), p. 309-329
Artikel i vetenskaplig tidskrift
2015

Foreword - Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha et al
8th ACM Workshop on Artificial Intelligence and Security, AISec 2015 - co-located with CCS 2015; Denver; United States, p. iii-
Övrigt konferensbidrag
2014

Attacks on Privacy-Preserving Biometric Authentication

Aysajan Abidin, Elena Pagnin, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8788 (2014), p. 293-294
Paper i proceeding
2014

On the Leakage of Information in Biometric Authentication

Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), p. 265-280
Paper i proceeding
2014

A Privacy-preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Aikaterini Mitrokotsa
In Proceedings of YACC 2014, Porquerolles island, France, June 2014
Paper i proceeding
2014

Security of a Privacy-Preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8813, p. 290-304
Paper i proceeding
2014

Location leakage in distance bounding: Why location privacy does not work

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay
Computers and Security. Vol. 45, p. 199-209
Artikel i vetenskaplig tidskrift
2014

Robust and private Bayesian inference

Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8776, p. 291-305
Paper i proceeding
2014

Foreword - Proceedings of the ACM Conference on Computer and Communications Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, B. Rubinstein et al
Proceedings of the ACM Conference on Computer and Communications Security. Vol. 2014-November (November), p. ii-
Övrigt konferensbidrag
2014

Workshop Summary of AiSec'14-2014 Workshop on Artificial Intelligent and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, B. Rubinstein
Proceedings of the ACM Conference on Computer and Communications Security. Vol. 2014-January, p. 1555-
Övrigt konferensbidrag
2014

Differential Privacy and Private Bayesian Inference.

Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8788, p. 289-290
Paper i proceeding
2014

Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE

Aysajan Abidin, Aikaterini Mitrokotsa
2014 IEEE International Conference on Communications Workshops, ICC 2014, p. 60-65
Paper i proceeding
2013

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection

Aikaterini Mitrokotsa, Christos Dimitrakakis
Ad Hoc Networks. Vol. 11 (1), p. 226-237
Artikel i vetenskaplig tidskrift
2013

On the Need for Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Early Symmetric Crypto (ESC) seminar
Paper i proceeding
2013

On selecting the nonce length in distance bounding protocols

Aikaterini Mitrokotsa, Pedro Periz-Lopez, Christos Dimitrakakis et al
Computer Journal
Artikel i vetenskaplig tidskrift
2013

The Bussard-Bagga and other distance-bounding protocols under attacks

A. Bay, I. Boureanu, Aikaterini Mitrokotsa et al
Proceedings of the 8th International Conference on Information Security and Cryptology (Inscrypt 2012)
Paper i proceeding
2013

Secure and lightweight distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8162
Paper i proceeding
2013

Towards Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Proceedings of the 20th International Workshop on Fast Software Encryption (FSE 2013)
Paper i proceeding
2013

Practical & Provably Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Proceedings of the 16th Information Security Conference (ISC 2013)
Paper i proceeding
2012

Weaknesses in another Gen2-based RFID authentication protocol

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 80-84
Paper i proceeding
2012

Mafia fraud attack against the RČ Distance-Bounding Protocol

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 74-79
Paper i proceeding
2012

On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America ( LATINCRYPT 2012)
Paper i proceeding
2012

User-driven RFID applications and challenges

Aikaterini Mitrokotsa, Q.Z. Sheng, Z. Maamar
Personal and Ubiquitous Computing. Vol. 16 (3), p. 223-224
Artikel i övrig tidskrift
2012

Near-optimal Node Blacklisting in Adversarial Networks

Christos Dimitrakakis, Aikaterini Mitrokotsa
Conference on Decision and Game Theory for Security, GameSec 2012
Poster (konferens)
2012

Guest editors' introduction: Special section on learning, games, and security

Christos Dimitrakakis, T. Karygiannis, Aikaterini Mitrokotsa
IEEE Transactions on Dependable and Secure Computing. Vol. 9 (4), p. 449-450
Artikel i övrig tidskrift
2012

Evaluation of classification algorithms for intrusion detection in MANETs

S. Pastrana, Aikaterini Mitrokotsa, A. Orfila et al
Knowledge-Based Systems. Vol. 36, p. 217-225
Artikel i vetenskaplig tidskrift
2012

On the traceability of tags in SUAP RFID authentication protocols

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 292-296
Paper i proceeding
2012

Expected loss bounds for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, S. Vaudenay
Proceedings - IEEE INFOCOM 2012, p. 478-485
Paper i proceeding
2011

A comprehensive RFID solution to enhance inpatient medication safety

P. Peris-Lopez, A. Orfila, Aikaterini Mitrokotsa et al
International Journal of Medical Informatics. Vol. 80 (1), p. 13-24
Artikel i vetenskaplig tidskrift
2011

Security Primitive Classification of RFID Attacks

Aikaterini Mitrokotsa, Michael Beye, Pedro Peris-Lopez
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks
Kapitel i bok
2011

RFID technology, systems, and applications

Q.Z. Sheng, S. Zeadally, Aikaterini Mitrokotsa et al
Journal of Network and Computer Applications. Vol. 34 (3), p. 797-798
Artikel i övrig tidskrift
2011

A note on a privacy-preserving distance-bounding protocol

J.P. Aumasson, Aikaterini Mitrokotsa, P. Peris-Lopez
Proceedings of the13th International Conference on Information and Communications Security (ICICS 2011)
Paper i proceeding
2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels

Aikaterini Mitrokotsa, Christos Dimitrakakis, P. Peris-Lopez et al
IEEE Communications Letters. Vol. 14 (2), p. 121-123
Artikel i vetenskaplig tidskrift
2010

Proceedings of the 4th International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2010

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Samlingsverk (redaktörskap)
2010

Integrated RFID and Sensor Networks: Architectures and Applications.

Aikaterini Mitrokotsa, Christos Douligeris
RFID and Sensor Networks: Architectures, Protocols, Security & Integrations
Kapitel i bok
2010

Classifying RFID attacks and defenses

Aikaterini Mitrokotsa, M.R. Rieback, A.S. Tanenbaum
Information Systems Frontiers. Vol. 12 (5), p. 491-505
Artikel i vetenskaplig tidskrift
2010

Proceedings of the 1st International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning (PSDML 2010)

Christos Dimitrakakis, Aris Gkoulalas-Divanis, Aikaterini Mitrokotsa et al
Samlingsverk (redaktörskap)
2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris
International Journal of Network Security. Vol. 10 (2), p. 93-106
Artikel i vetenskaplig tidskrift
2010

Detecting intrusions within RFID systems through non-monotonic reasoning cleaning

Peter Darcy, Bela Stantic, Aikaterini Mitrokotsa et al
6th International Conference on Intelligent Sensors, Sensor Networks & Information Processing (ISSNIP 2010), p. 257-262
Paper i proceeding
2009

Statistical decision making for authentication and intrusion detection

Christos Dimitrakakis, Aikaterini Mitrokotsa
8th International Conference on Machine Learning and Applications, ICMLA 2009, p. 409-414
Paper i proceeding
2009

Proceedings of the 3rd International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2009

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Samlingsverk (redaktörskap)
2009

Intrusion detection using cost-sensitive classification

Aikaterini Mitrokotsa, Christos Dimitrakakis, C. Douligeris
Proceedings of the 3rd European Conference on Computer Network Defense, EC2ND 2007
Paper i proceeding
2008

Intrusion Detection Techniques in Sensor Networks

Aikaterini Mitrokotsa, Tom Karygiannis
Wireless Sensor Network Security, p. 251-272
Kapitel i bok
2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris
Proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008), p. 133-144
Paper i proceeding
2008

Classification of RFID Attacks

Aikaterini Mitrokotsa, Melanie Rieback, Andrew Tanenbaum
2nd International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT 2008), p. 73-86
Paper i proceeding
2007

Intrusion Detection with Neural Networks and Watermarking Techniques for MANET

Aikaterini Mitrokotsa, Christos Douligeris
IEEE International Conference on Pervasive Services (ICPS 2007), p. 118 - 127
Paper i proceeding
2007

Intrusion Detection Using Cost-Sensitive Classification

Aikaterini Mitrokotsa, Christos Douligeris
Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND 2007). Vol. 30, p. 35-47
Paper i proceeding
2007

Denial of Service Attacks

Aikaterini Mitrokotsa, Christos Douligeris
Network Security: Current Status and Future Directions, p. 117-134
Kapitel i bok
2007

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks

Aikaterini Mitrokotsa, Christos Douligeris
Proceedings of the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), p. 137-144
Paper i proceeding
2007

DoS Attacks and E-Government

Aikaterini Mitrokotsa, Christos Douligeris
Secure E-Government Web Services, p. 124-142
Kapitel i bok
2007

Intrusion Detection and Response in Ad hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris
Frontiers in Artificial Intelligence and Applications. Vol. 15 (1), p. 643-666
Artikel i vetenskaplig tidskrift
2006

Intrusion detection using emergent self-organizing maps

Aikaterini Mitrokotsa, C. Douligeris
Proceedings of the 4th Helenic Conference on AI (SETN 2006). Vol. 3955
Paper i proceeding
2006

Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks

Aikaterini Mitrokotsa, Rosa Mavropodi, Christos Douligeris
Proceedings of International Conference on Intelligent Systems and Computing: Theory and Applications, p. 111-118
Paper i proceeding
2005

Detecting denial of service attacks using emergent self-organizing maps

Aikaterini Mitrokotsa, Christos Douligeris
5th IEEE International Symposium on Signal Processing & Information Technology, p. 375 - 380
Paper i proceeding
2004

DDoS attacks and defense mechanisms: Classification and state-of-the-art

C. Douligeris, Aikaterini Mitrokotsa
Computer Networks. Vol. 44 (5), p. 643-666
Artikel i vetenskaplig tidskrift
2003

DDoS Attacks and Defense Mechanisms: a classification

Aikaterini Mitrokotsa, Christos Douligeris
3rd IEEE International Symposium on Signal Processing & Information Technology (ISSPIT 2003), p. 190 - 193
Paper i proceeding

Ladda ner publikationslistor

Du kan ladda ner denna lista till din dator.

Filtrera och ladda ner publikationslista

Som inloggad användare hittar du ytterligare funktioner i MyResearch.

Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:

Zotero Connector
Mendeley Web Importer

Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.

Visar 8 forskningsprojekt

2020–

Mekanismer för säkert och privat maskininlärning

Aikaterini Mitrokotsa Nätverk och system
Christos Dimitrakakis Data Science
Chalmers AI Research Centre

2020–

CryptoQuaC: Cryptography meets Verifiable Quantum Computation

Aikaterini Mitrokotsa Nätverk och system
Giulia Ferrini Tillämpad kvantfysik
Elham Kashefi Unknown organization
Bei Liang Nätverk och system
GENIE, Chalmers jämställdhet för excellens
Stiftelsen Chalmers tekniska högskola

1 publikation finns
2015–2016

Secure, Private and Efficient Healthcare with Wearable Computing

Aikaterini Mitrokotsa Nätverk och system
STINT

2015–2018

PRECIS: Integritet och säkerhet i bärbara datorprylar

Aikaterini Mitrokotsa Nätverk och system
Vetenskapsrådet (VR)

9 publikationer finns
2015–2017

SwissSenseSynergia (SNSF)

Christos Dimitrakakis Datavetenskap
Aristide Tossou Datavetenskap
Aikaterini Mitrokotsa Nätverk och system
Eidgenössische Materialprüfungs- und Forschungsanstalt (Empa)

1 publikation finns
2015–2016

Support of Learning, Security and Privacy

Aikaterini Mitrokotsa Nätverk och system
Intel Corporation

2014–2015

Cross-layer Authentication Protocols for Wireless Networks

Aikaterini Mitrokotsa Nätverk och system
STINT

2013–2016

Biometrics Evaluation and Testing (BEAT)

Aikaterini Mitrokotsa Nätverk och system
Europeiska kommissionen (EU)

Det kan finnas fler projekt där Aikaterini Mitrokotsa medverkar, men du måste vara inloggad som anställd på Chalmers för att kunna se dem.