Follow
Nikos Triandopoulos
Nikos Triandopoulos
Verified email at cs.bu.edu - Homepage
Title
Cited by
Cited by
Year
Anonysense: privacy-aware people-centric sensing
C Cornelius, A Kapadia, D Kotz, D Peebles, M Shin, N Triandopoulos
Proceedings of the 6th international conference on Mobile systems …, 2008
5472008
Delegatable pseudorandom functions and applications
A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4162013
AnonySense: A system for anonymous opportunistic sensing
M Shin, C Cornelius, D Peebles, A Kapadia, D Kotz, N Triandopoulos
Pervasive and Mobile Computing 7 (1), 16-30, 2011
2332011
Rationality and adversarial behavior in multi-party computation
A Lysyanskaya, N Triandopoulos
Annual International Cryptology Conference, 180-197, 2006
1992006
Optimal verification of operations on dynamic sets
C Papamanthou, R Tamassia, N Triandopoulos
Annual Cryptology Conference, 91-110, 2011
1962011
Opportunistic sensing: Security challenges for the new paradigm
A Kapadia, D Kotz, N Triandopoulos
2009 First International Communication Systems and Networks and Workshops, 1-10, 2009
1702009
Authenticated hash tables
C Papamanthou, R Tamassia, N Triandopoulos
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1602008
AnonySense: Opportunistic and privacy-preserving context collection
A Kapadia, N Triandopoulos, C Cornelius, D Peebles, D Kotz
Pervasive Computing: 6th International Conference, Pervasive 2008 Sydney …, 2008
1582008
Supporting non-membership proofs with bilinear-map accumulators
I Damgård, N Triandopoulos
Cryptology ePrint Archive, 2008
1272008
Authenticated data structures for graph and geometric searching
MT Goodrich, R Tamassia, N Triandopoulos, R Cohen
Cryptographers’ Track at the RSA Conference, 295-313, 2003
1132003
Hourglass schemes: how to prove that cloud files are encrypted
M Van Dijk, A Juels, A Oprea, RL Rivest, E Stefanov, N Triandopoulos
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1092012
Multicast authentication in fully adversarial networks
A Lysyanskaya, R Tamassia, N Triandopoulos
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 241-253, 2004
972004
Defending against the Unknown Enemy: Applying FlipIt to System Security
KD Bowers, M Van Dijk, R Griffin, A Juels, A Oprea, RL Rivest, ...
International Conference on Decision and Game Theory for Security, 248-263, 2012
862012
{TRUESET}: Faster {Verifiable} Set Computations
AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
23rd USENIX Security Symposium (USENIX Security 14), 765-780, 2014
852014
Verifiable set operations over outsourced databases
R Canetti, O Paneth, D Papadopoulos, N Triandopoulos
International Workshop on Public Key Cryptography, 113-130, 2014
772014
Transparency logs via append-only authenticated dictionaries
A Tomescu, V Bhupatiraju, D Papadopoulos, C Papamanthou, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
762019
Super-efficient verification of dynamic outsourced databases
MT Goodrich, R Tamassia, N Triandopoulos
Cryptographers’ Track at the RSA Conference, 407-424, 2008
742008
Athos: Efficient authentication of outsourced file systems
MT Goodrich, C Papamanthou, R Tamassia, N Triandopoulos
International Conference on Information Security, 80-96, 2008
712008
Efficient authenticated data structures for graph connectivity and geometric search problems
MT Goodrich, R Tamassia, N Triandopoulos
Algorithmica 60, 505-552, 2011
702011
Providing anonymity in wireless sensor networks
Y Ouyang, Z Le, Y Xu, N Triandopoulos, S Zhang, J Ford, F Makedon
IEEE international conference on pervasive services, 145-148, 2007
692007
The system can't perform the operation now. Try again later.
Articles 1–20