Follow
Nikos Triandopoulos
Nikos Triandopoulos
Verified email at cs.bu.edu - Homepage
Title
Cited by
Cited by
Year
Anonysense: privacy-aware people-centric sensing
C Cornelius, A Kapadia, D Kotz, D Peebles, M Shin, N Triandopoulos
Proceedings of the 6th international conference on Mobile systems …, 2008
5432008
Delegatable pseudorandom functions and applications
A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3842013
AnonySense: A system for anonymous opportunistic sensing
M Shin, C Cornelius, D Peebles, A Kapadia, D Kotz, N Triandopoulos
Pervasive and Mobile Computing 7 (1), 16-30, 2011
2292011
Rationality and adversarial behavior in multi-party computation
A Lysyanskaya, N Triandopoulos
Annual International Cryptology Conference, 180-197, 2006
1972006
Optimal verification of operations on dynamic sets
C Papamanthou, R Tamassia, N Triandopoulos
Annual Cryptology Conference, 91-110, 2011
1872011
Opportunistic sensing: Security challenges for the new paradigm
A Kapadia, D Kotz, N Triandopoulos
2009 First International Communication Systems and Networks and Workshops, 1-10, 2009
1692009
Authenticated hash tables
C Papamanthou, R Tamassia, N Triandopoulos
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1552008
AnonySense: Opportunistic and privacy-preserving context collection
A Kapadia, N Triandopoulos, C Cornelius, D Peebles, D Kotz
Pervasive Computing: 6th International Conference, Pervasive 2008 Sydney …, 2008
1552008
Supporting non-membership proofs with bilinear-map accumulators
I Damgård, N Triandopoulos
Cryptology ePrint Archive, 2008
1132008
Authenticated data structures for graph and geometric searching
MT Goodrich, R Tamassia, N Triandopoulos, R Cohen
Cryptographers’ Track at the RSA Conference, 295-313, 2003
1092003
Hourglass schemes: how to prove that cloud files are encrypted
M Van Dijk, A Juels, A Oprea, RL Rivest, E Stefanov, N Triandopoulos
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1062012
Multicast authentication in fully adversarial networks
A Lysyanskaya, R Tamassia, N Triandopoulos
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 241-253, 2004
962004
Defending against the Unknown Enemy: Applying FlipIt to System Security
KD Bowers, M Van Dijk, R Griffin, A Juels, A Oprea, RL Rivest, ...
International Conference on Decision and Game Theory for Security, 248-263, 2012
842012
{TRUESET}: Faster {Verifiable} Set Computations
AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
23rd USENIX Security Symposium (USENIX Security 14), 765-780, 2014
792014
Verifiable set operations over outsourced databases
R Canetti, O Paneth, D Papadopoulos, N Triandopoulos
International Workshop on Public Key Cryptography, 113-130, 2014
732014
Super-efficient verification of dynamic outsourced databases
MT Goodrich, R Tamassia, N Triandopoulos
Cryptographers’ Track at the RSA Conference, 407-424, 2008
722008
Athos: Efficient authentication of outsourced file systems
MT Goodrich, C Papamanthou, R Tamassia, N Triandopoulos
International Conference on Information Security, 80-96, 2008
682008
Efficient authenticated data structures for graph connectivity and geometric search problems
MT Goodrich, R Tamassia, N Triandopoulos
Algorithmica 60, 505-552, 2011
672011
Providing anonymity in wireless sensor networks
Y Ouyang, Z Le, Y Xu, N Triandopoulos, S Zhang, J Ford, F Makedon
IEEE international conference on pervasive services, 145-148, 2007
672007
Halo: High-Assurance Locate for Distributed Hash Tables.
A Kapadia, N Triandopoulos
NDSS 8, 142, 2008
622008
The system can't perform the operation now. Try again later.
Articles 1–20