Nikos Triandopoulos
Nikos Triandopoulos
Verified email at cs.bu.edu - Homepage
Title
Cited by
Cited by
Year
Anonysense: privacy-aware people-centric sensing
C Cornelius, A Kapadia, D Kotz, D Peebles, M Shin, N Triandopoulos
Proceedings of the 6th international conference on Mobile systems …, 2008
4762008
Delegatable pseudorandom functions and applications
A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2442013
Authenticated data structures
R Tamassia
European symposium on algorithms, 2-5, 2003
2092003
AnonySense: A system for anonymous opportunistic sensing
M Shin, C Cornelius, D Peebles, A Kapadia, D Kotz, N Triandopoulos
Pervasive and Mobile Computing 7 (1), 16-30, 2011
1932011
Rationality and adversarial behavior in multi-party computation
A Lysyanskaya, N Triandopoulos
Annual International Cryptology Conference, 180-197, 2006
1632006
Opportunistic sensing: Security challenges for the new paradigm
A Kapadia, D Kotz, N Triandopoulos
2009 First International Communication Systems and Networks and Workshops, 1-10, 2009
1552009
Optimal verification of operations on dynamic sets
C Papamanthou, R Tamassia, N Triandopoulos
Annual Cryptology Conference, 91-110, 2011
1462011
Authenticated hash tables
C Papamanthou, R Tamassia, N Triandopoulos
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1442008
AnonySense: Opportunistic and privacy-preserving context collection
A Kapadia, N Triandopoulos, C Cornelius, D Peebles, D Kotz
International Conference on Pervasive Computing, 280-297, 2008
1382008
Multicast authentication in fully adversarial networks
A Lysyanskaya, R Tamassia, N Triandopoulos
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 241-253, 2004
912004
Authenticated data structures for graph and geometric searching
MT Goodrich, R Tamassia, N Triandopoulos, R Cohen
Cryptographers’ Track at the RSA Conference, 295-313, 2003
912003
Hourglass schemes: how to prove that cloud files are encrypted
M Van Dijk, A Juels, A Oprea, RL Rivest, E Stefanov, N Triandopoulos
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
782012
Super-efficient verification of dynamic outsourced databases
MT Goodrich, R Tamassia, N Triandopoulos
Cryptographers’ Track at the RSA Conference, 407-424, 2008
672008
Providing anonymity in wireless sensor networks
Y Ouyang, Z Le, Y Xu, N Triandopoulos, S Zhang, J Ford, F Makedon
IEEE international conference on pervasive services, 145-148, 2007
662007
Supporting Non-membership Proofs with Bilinear-map Accumulators.
I Damgård, N Triandopoulos
IACR Cryptol. ePrint Arch. 2008, 538, 2008
642008
Defending against the Unknown Enemy: Applying FlipIt to System Security
KD Bowers, M Van Dijk, R Griffin, A Juels, A Oprea, RL Rivest, ...
International Conference on Decision and Game Theory for Security, 248-263, 2012
622012
Athos: Efficient authentication of outsourced file systems
MT Goodrich, C Papamanthou, R Tamassia, N Triandopoulos
International Conference on Information Security, 80-96, 2008
602008
{TRUESET}: Faster Verifiable Set Computations
AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 765-780, 2014
592014
Halo: High-Assurance Locate for Distributed Hash Tables.
A Kapadia, N Triandopoulos
NDSS 8, 142, 2008
562008
Efficient authenticated data structures for graph connectivity and geometric search problems
MT Goodrich, R Tamassia, N Triandopoulos
Algorithmica 60 (3), 505-552, 2011
542011
The system can't perform the operation now. Try again later.
Articles 1–20