Aikaterini Mitrokotsa

Visar 103 publikationer
Unbounded Predicate Inner Product Functional Encryption from Pairings
Homomorphic signcryption with public plaintext-result checkability
DEVA : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Towards Stronger Functional Signatures
Turn-Based Communication Channels
Sum it Up: Verifiable Additive Homomorphic Secret Sharing
Statically Aggregate Verifiable Random Functions and Application to E-Lottery
A Delegated Proof of Proximity Scheme for Industrial Internet of Things Consensus
Decentralised Functional Signatures
Robust Distributed Pseudorandom Functions for mNP Access Structures
Code-Based Zero Knowledge PRF Arguments
Anonymous Single-Round Server-Aided Verification
Multi-key homomorphic authenticators
Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees
Revisiting two-hop distance-bounding protocols: Are you really close enough?
Distributed pseudorandom functions for general access structures in NP
Lattice-Based Simulatable VRFs: Challenges and Future Directions
VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things
Verifiable homomorphic secret sharing
Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close
HB+DB: Distance bounding meets human based authentication
Preface - Lecture Notes in Computer Science
A Differentially Private Encryption Scheme
Privacy-Preserving Biometric Authentication: Challenges and Directions
Differential privacy for Bayesian inference through posterior sampling
Multi-Key Homomorphic Authenticators
Chairs' introduction and welcome to AISec 2016
Special issue on recent advances in physical-layer security
Efficient Verifiable Computation of XOR for Biometric Authentication
Proceedings of the 2016 Workshop on Artificial Intelligence and Security Workshop (AISec 2016)
9th international workshop on artificial intelligence and security (AISec 2016)
Synergistic user ↔ context analytics
Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE
Authentication in Constrained Settings
Foreword - Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security
Expected loss analysis for authentication in constrained channels
Practical & Provably Secure Distance-Bounding
Practical and provably secure distance-bounding
Distance-Bounding Protocols: Are You Close Enough?
HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding.
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours
Attacks on Privacy-Preserving Biometric Authentication
On the Leakage of Information in Biometric Authentication
A Privacy-preserving Biometric Authentication Protocol Revisited
Location leakage in distance bounding: Why location privacy does not work
Robust and private Bayesian inference
Differential Privacy and Private Bayesian Inference.
Foreword - Proceedings of the ACM Conference on Computer and Communications Security
Workshop Summary of AiSec'14-2014 Workshop on Artificial Intelligent and Security
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
The Bussard-Bagga and other distance-bounding protocols under attacks
Practical & Provably Secure Distance Bounding
On the Need for Secure Distance Bounding
Towards Secure Distance Bounding
On selecting the nonce length in distance bounding protocols
Secure and lightweight distance-bounding
Weaknesses in another Gen2-based RFID authentication protocol
On the traceability of tags in SUAP RFID authentication protocols
Near-optimal Node Blacklisting in Adversarial Networks
Guest editors' introduction: Special section on learning, games, and security
Evaluation of classification algorithms for intrusion detection in MANETs
User-driven RFID applications and challenges
Expected loss bounds for authentication in constrained channels
Mafia fraud attack against the RČ Distance-Bounding Protocol
A note on a privacy-preserving distance-bounding protocol
A comprehensive RFID solution to enhance inpatient medication safety
Security Primitive Classification of RFID Attacks
RFID technology, systems, and applications
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
Classifying RFID attacks and defenses
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
Integrated RFID and Sensor Networks: Architectures and Applications.
Detecting intrusions within RFID systems through non-monotonic reasoning cleaning
Intrusion detection using cost-sensitive classification
Statistical decision making for authentication and intrusion detection
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
Classification of RFID Attacks
Intrusion Detection Techniques in Sensor Networks
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
Intrusion Detection and Response in Ad hoc Networks
Intrusion Detection with Neural Networks and Watermarking Techniques for MANET
Intrusion Detection Using Cost-Sensitive Classification
Intrusion detection using emergent self-organizing maps
Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks
Detecting denial of service attacks using emergent self-organizing maps
DDoS attacks and defense mechanisms: Classification and state-of-the-art
DDoS Attacks and Defense Mechanisms: a classification
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.
Visar 8 forskningsprojekt
Mekanismer för säkert och privat maskininlärning
CryptoQuaC: Cryptography meets Verifiable Quantum Computation
Secure, Private and Efficient Healthcare with Wearable Computing
PRECIS: Integritet och säkerhet i bärbara datorprylar
Support of Learning, Security and Privacy
Cross-layer Authentication Protocols for Wireless Networks
Biometrics Evaluation and Testing (BEAT)