Aikaterini Mitrokotsa

Docent vid Chalmers, Data- och informationsteknik, Nätverk och system

My research focuses on security and privacy issues in communication technologies and especially wireless communication systems and the internet of things (IoT) as well as efficient intrusion detection and response systems. Current projects include authentication in constrained environments, privacy-preservation, and intrusion detection and response. Funded by the European Commission, the Swedish Research Council (VR), STINT, Västra Götaland and Chalmers Area of Advance ICT.Link to personal page.

Källa: chalmers.se

Visar 79 publikationer

2018

Distributed pseudorandom functions for general access structures in NP

Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science. Vol. 10631, p. 81-87
Paper i proceeding
2018

Two-Hop Distance-Bounding Protocols: Keep Your Friends Close

Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa et al
IEEE Transactions on Mobile Computing. Vol. 17 (7), p. 1723-1736
Artikel i vetenskaplig tidskrift
2018

HB+DB: Distance bounding meets human based authentication

Elena Pagnin, Anjia Yang, Qiao Hu et al
Future Generation Computer Systems. Vol. 80, p. 627-639
Artikel i vetenskaplig tidskrift
2017

A Differentially Private Encryption Scheme

Carlo Brunetta, Christos Dimitrakakis, Bei Liang et al
Lecture Notes in Computer Science. Vol. 10599 LNCS, p. 309-326
Paper i proceeding
2017

Anonymous Single-Round Server-Aided Verification

Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka
Paper i proceeding
2017

Near-Optimal Blacklisting

Christos Dimitrakakis, Aikaterini Mitrokotsa
Computers and Security. Vol. 64 (1), p. 110-121
Artikel i vetenskaplig tidskrift
2017

Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?

Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa
Paper i proceeding
2017

Privacy-Preserving Biometric Authentication: Challenges and Directions

Elena Pagnin, Aikaterini Mitrokotsa
Security and Communication Networks
Artikel i vetenskaplig tidskrift
2017

Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation (short paper)

Bei Liang, Aikaterini Mitrokotsa
Lecture Notes in Computer Science. Vol. 10701 LNCS, p. 422-431
Paper i proceeding
2017

Differential privacy for Bayesian inference through posterior sampling

Christos Dimitrakakis, B.E.N. Nelson, Zuhe Zhang et al
Journal of Machine Learning Research. Vol. 18 (1 March 2017)
Artikel i vetenskaplig tidskrift
2016

Multi-Key Homomorphic Authenticators

Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo et al
Lecture Notes in Computer Science. Vol. 10032 (2), p. 499-530
Paper i proceeding
2016

Chairs' introduction and welcome to AISec 2016

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016, p. iii-
Konferensbidrag (offentliggjort, men ej förlagsutgivet)
2016

Efficient Verifiable Computation of XOR for Biometric Authentication

Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rua et al
Lecture Notes in Computer Science. Vol. 10052, p. 284-298
Paper i proceeding
2016

Proceedings of the 2016 Workshop on Artificial Intelligence and Security Workshop (AISec 2016)

David Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
Bok
2016

Synergistic user ↔ context analytics

A. Hossmann-Picu, Z. Li, Z. Zhao et al
Advances in Intelligent Systems and Computing, p. 163-172
Kapitel i bok
2016

9th international workshop on artificial intelligence and security (AISec 2016)

David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha
Proceedings of the ACM Conference on Computer and Communications Security, p. 1881-
Konferensbidrag (offentliggjort, men ej förlagsutgivet)
2016

Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close

Christoffer Karlsson, Aikaterini Mitrokotsa
IEEE Communications Letters. Vol. 20 (7), p. 1365-1368
Artikel i vetenskaplig tidskrift
2015

Authentication in Constrained Settings

Aikaterini Mitrokotsa
Lecture Notes in Computer Science. Vol. 9024, p. 3-12
Paper i proceeding
2015

Foreword - Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha et al
8th ACM Workshop on Artificial Intelligence and Security, AISec 2015 - co-located with CCS 2015; Denver; United States, p. iii-
Konferensbidrag (offentliggjort, men ej förlagsutgivet)
2015

Expected loss analysis for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay
Journal of Computer Security. Vol. 23 (2), p. 309-329
Artikel i vetenskaplig tidskrift
2015

Practical & Provably Secure Distance-Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Journal of Computer Security. Vol. 23 (2), p. 229-257
Artikel i vetenskaplig tidskrift
2015

Practical and provably secure distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Lecture Notes in Computer Science. Vol. 7807, p. 248-258
Paper i proceeding
2015

Distance-Bounding Protocols: Are You Close Enough?

Christos Dimitrakakis, Aikaterini Mitrokotsa
IEEE Security and Privacy. Vol. 13 (4), p. 47-51
Artikel i vetenskaplig tidskrift
2015

HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding.

Elena Pagnin, Anjia Yang, G. Hancke et al
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2015), New York, United States, 22-26 June, p. 1-6
Paper i proceeding
2015

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours

Elena Pagnin, G. Hancke, Aikaterini Mitrokotsa
IEEE Communications Letters. Vol. 19 (7), p. 1173-1176
Artikel i vetenskaplig tidskrift
2014

Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE

Aysajan Abidin, Aikaterini Mitrokotsa
IEEE International Workshop on Information Forensics and Security, WIFS 2014; Atlanta; United States; 3 December 2014 through 5 December 2014, p. 60-65
Paper i proceeding
2014

Attacks on Privacy-Preserving Biometric Authentication

Aysajan Abidin, Elena Pagnin, Aikaterini Mitrokotsa
In Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Tromso, Norway, October 2014., p. 293-294
Poster (konferens)
2014

A Privacy-preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Aikaterini Mitrokotsa
In Proceedings of YACC 2014, Porquerolles island, France, June 2014
Paper i proceeding
2014

On the Leakage of Information in Biometric Authentication

Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin et al
In Proceedings of Indocrypt - 15th International Conference on Cryptology in India 2014, New Delhi, December 2014., p. 265-280
Paper i proceeding
2014

Location leakage in distance bounding: Why location privacy does not work

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay
Computers and Security. Vol. 45, p. 199-209
Artikel i vetenskaplig tidskrift
2014

Differential Privacy and Private Bayesian Inference.

Christos Dimitrakakis, Blaine Nelson, Ben Rubinstein et al
n Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), Poster, Tromso, Norway, October 2014., p. 289-290
Poster (konferens)
2014

Robust and private Bayesian inference

Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa et al
Lecture Notes in Computer Science. Vol. 8776, p. 291-305
Paper i proceeding
2014

Foreword - Proceedings of the ACM Conference on Computer and Communications Security

Christos Dimitrakakis, Aikaterini Mitrokotsa, B. Rubinstein et al
7th ACM Workshop Artificial Intelligence and Security, AISec 2014, Co-located with the ACM Conference on Computer and Communication Security, CCS 2014, Scottsdale, United States, 7 November 2014. Vol. 2014-November (November), p. ii-
Konferensbidrag (offentliggjort, men ej förlagsutgivet)
2014

Security of a Privacy-Preserving Biometric Authentication Protocol Revisited

Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa
Lecture Notes in Computer Science. Vol. 8813, p. 290-304
Paper i proceeding
2013

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection

Aikaterini Mitrokotsa, Christos Dimitrakakis
Ad Hoc Networks. Vol. 11 (1), p. 226-237
Artikel i vetenskaplig tidskrift
2013

The Bussard-Bagga and other distance-bounding protocols under attacks

A. Bay, I. Boureanu, Aikaterini Mitrokotsa et al
Proceedings of the 8th International Conference on Information Security and Cryptology (Inscrypt 2012)
Paper i proceeding
2013

Practical & Provably Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Proceedings of the 16th Information Security Conference (ISC 2013)
Paper i proceeding
2013

On the Need for Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Early Symmetric Crypto (ESC) seminar
Paper i proceeding
2013

Towards Secure Distance Bounding

Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
Proceedings of the 20th International Workshop on Fast Software Encryption (FSE 2013)
Paper i proceeding
2013

On selecting the nonce length in distance bounding protocols

Aikaterini Mitrokotsa, Pedro Periz-Lopez, Christos Dimitrakakis et al
Computer Journal
Artikel i vetenskaplig tidskrift
2013

Secure and lightweight distance-bounding

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Lecture Notes in Computer Science. Vol. 8162
Paper i proceeding
2012

Weaknesses in another Gen2-based RFID authentication protocol

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 80-84
Paper i proceeding
2012

On the traceability of tags in SUAP RFID authentication protocols

M. Safkhani, N. Bagheri, P. Peris-Lopez et al
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 292-296
Paper i proceeding
2012

Near-optimal Node Blacklisting in Adversarial Networks

Christos Dimitrakakis, Aikaterini Mitrokotsa
Conference on Decision and Game Theory for Security, GameSec 2012
Poster (konferens)
2012

Evaluation of classification algorithms for intrusion detection in MANETs

S. Pastrana, Aikaterini Mitrokotsa, A. Orfila et al
Knowledge-Based Systems. Vol. 36, p. 217-225
Artikel i vetenskaplig tidskrift
2012

Guest editors' introduction: Special section on learning, games, and security

Christos Dimitrakakis, T. Karygiannis, Aikaterini Mitrokotsa
IEEE Transactions on Dependable and Secure Computing. Vol. 9 (4), p. 449-450
Artikel i övriga tidskrifter
2012

On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!

I. Boureanu, Aikaterini Mitrokotsa, S. Vaudenay
Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America ( LATINCRYPT 2012)
Paper i proceeding
2012

User-driven RFID applications and challenges

Aikaterini Mitrokotsa, Q.Z. Sheng, Z. Maamar
Personal and Ubiquitous Computing. Vol. 16 (3), p. 223-224
Artikel i övriga tidskrifter
2012

Expected loss bounds for authentication in constrained channels

Christos Dimitrakakis, Aikaterini Mitrokotsa, S. Vaudenay
Proceedings - IEEE INFOCOM 2012, p. 478-485
Paper i proceeding
2012

Mafia fraud attack against the RČ Distance-Bounding Protocol

Aikaterini Mitrokotsa, C. Onete, S. Vaudenay
2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, p. 74-79
Paper i proceeding
2011

A note on a privacy-preserving distance-bounding protocol

J.P. Aumasson, Aikaterini Mitrokotsa, P. Peris-Lopez
Proceedings of the13th International Conference on Information and Communications Security (ICICS 2011)
Paper i proceeding
2011

A comprehensive RFID solution to enhance inpatient medication safety

P. Peris-Lopez, A. Orfila, Aikaterini Mitrokotsa et al
International Journal of Medical Informatics. Vol. 80 (1), p. 13-24
Artikel i vetenskaplig tidskrift
2011

Security Primitive Classification of RFID Attacks

Aikaterini Mitrokotsa, Michael Beye, Pedro Peris-Lopez
Kapitel i bok
2011

RFID technology, systems, and applications

Q.Z. Sheng, S. Zeadally, Aikaterini Mitrokotsa et al
Journal of Network and Computer Applications. Vol. 34 (3), p. 797-798
Artikel i övriga tidskrifter
2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels

Aikaterini Mitrokotsa, Christos Dimitrakakis, P. Peris-Lopez et al
IEEE Communications Letters. Vol. 14 (2), p. 121-123
Artikel i vetenskaplig tidskrift
2010

Proceedings of the 1st International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning (PSDML 2010)

Christos Dimitrakakis, Aris Gkoulalas-Divanis, Aikaterini Mitrokotsa et al
Samlingsverk (redaktörskap)
2010

Classifying RFID attacks and defenses

Aikaterini Mitrokotsa, M.R. Rieback, A.S. Tanenbaum
Information Systems Frontiers. Vol. 12 (5), p. 491-505
Artikel i vetenskaplig tidskrift
2010

Proceedings of the 4th International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2010

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Samlingsverk (redaktörskap)
2010

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris
International Journal of Network Security. Vol. 10 (2), p. 93-106
Artikel i vetenskaplig tidskrift
2010

Integrated RFID and Sensor Networks: Architectures and Applications.

Aikaterini Mitrokotsa, Christos Douligeris
Kapitel i bok
2010

Detecting intrusions within RFID systems through non-monotonic reasoning cleaning

Peter Darcy, Bela Stantic, Aikaterini Mitrokotsa et al
6th International Conference on Intelligent Sensors, Sensor Networks & Information Processing (ISSNIP 2010), p. 257-262
Paper i proceeding
2009

Proceedings of the 3rd International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2009

Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally et al
Samlingsverk (redaktörskap)
2009

Intrusion detection using cost-sensitive classification

Aikaterini Mitrokotsa, Christos Dimitrakakis, C. Douligeris
Proceedings of the 3rd European Conference on Computer Network Defense, EC2ND 2007
Paper i proceeding
2009

Statistical decision making for authentication and intrusion detection

Christos Dimitrakakis, Aikaterini Mitrokotsa
8th International Conference on Machine Learning and Applications, ICMLA 2009, p. 409-414
Paper i proceeding
2008

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris
Proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008), p. 133-144
Paper i proceeding
2008

Classification of RFID Attacks

Aikaterini Mitrokotsa, Melanie Rieback, Andrew Tanenbaum
2nd International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT 2008), p. 73-86
Paper i proceeding
2008

Intrusion Detection Techniques in Sensor Networks

Aikaterini Mitrokotsa, Tom Karygiannis
Wireless Sensor Network Security, p. 251-272
Kapitel i bok
2007

Denial of Service Attacks

Aikaterini Mitrokotsa, Christos Douligeris
Network Security: Current Status and Future Directions, p. 117-134
Kapitel i bok
2007

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks

Aikaterini Mitrokotsa, Christos Douligeris
Proceedings of the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007), p. 137-144
Paper i proceeding
2007

Intrusion Detection and Response in Ad hoc Networks

Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris
Frontiers in Artificial Intelligence and Applications. Vol. 15 (1), p. 643-666
Artikel i vetenskaplig tidskrift
2007

Intrusion Detection Using Cost-Sensitive Classification

Aikaterini Mitrokotsa, Christos Douligeris
Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND 2007). Vol. 30, p. 35-47
Paper i proceeding
2007

Intrusion Detection with Neural Networks and Watermarking Techniques for MANET

Aikaterini Mitrokotsa, Christos Douligeris
IEEE International Conference on Pervasive Services (ICPS 2007), p. 118 - 127
Paper i proceeding
2007

DoS Attacks and E-Government

Aikaterini Mitrokotsa, Christos Douligeris
Secure E-Government Web Services, p. 124-142
Kapitel i bok
2006

Intrusion detection using emergent self-organizing maps

Aikaterini Mitrokotsa, C. Douligeris
Proceedings of the 4th Helenic Conference on AI (SETN 2006). Vol. 3955
Paper i proceeding
2006

Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks

Aikaterini Mitrokotsa, Rosa Mavropodi, Christos Douligeris
Proceedings of International Conference on Intelligent Systems and Computing: Theory and Applications, p. 111-118
Paper i proceeding
2005

Detecting denial of service attacks using emergent self-organizing maps

Aikaterini Mitrokotsa, Christos Douligeris
5th IEEE International Symposium on Signal Processing & Information Technology, p. 375 - 380
Paper i proceeding
2004

DDoS attacks and defense mechanisms: Classification and state-of-the-art

C. Douligeris, Aikaterini Mitrokotsa
Computer Networks. Vol. 44 (5), p. 643-666
Artikel i vetenskaplig tidskrift
2003

DDoS Attacks and Defense Mechanisms: a classification

Aikaterini Mitrokotsa, Christos Douligeris
3rd IEEE International Symposium on Signal Processing & Information Technology (ISSPIT 2003), p. 190 - 193
Paper i proceeding

Spara referenser

Om du har installerat Zotero eller Mendeley på din dator kan du direkt ta ut referenser från de publikationer du ser i listan.

Du laddar ner dessa pluginer här:
Zotero
Mendeley

Visar 6 forskningsprojekt

2014–2015

Cross-layer Authentication Protocols for Wireless Networks

Aikaterini Mitrokotsa Nätverk och system
STINT

2015–2016

Secure, Private and Efficient Healthcare with Wearable Computing

Aikaterini Mitrokotsa Nätverk och system
STINT

2015–2018

PRECIS: Integritet och säkerhet i bärbara datorprylar

Aikaterini Mitrokotsa Nätverk och system
Vetenskapsrådet (VR)

2015–2017

SwissSenseSynergia (SNSF)

Christos Dimitrakakis Datavetenskap
Aristide Tossou Datavetenskap
Aikaterini Mitrokotsa Nätverk och system
Eidgenössische Materialprüfungs- und Forschungsanstalt (Empa)

2015–2016

Support of Learning, Security and Privacy

Aikaterini Mitrokotsa Nätverk och system
Intel Corporation

2013–2016

Biometrics Evaluation and Testing (BEAT)

Aikaterini Mitrokotsa Nätverk och system
Europeiska kommissionen (FP7)

Det kan finnas fler projekt där Aikaterini Mitrokotsa medverkar, men du måste vara inloggad som anställd på Chalmers för att kunna se dem.