Follow
Charalampos Papamanthou
Charalampos Papamanthou
Verified email at yale.edu - Homepage
Title
Cited by
Year
{BalanceProofs}: Maintainable vector commitments with fast aggregation
W Wang, A Ulichney, C Papamanthou
32nd USENIX Security Symposium (USENIX Security 23), 4409-4426, 2023
152023
{MIRAGE}: Succinct arguments for randomized algorithms with applications to universal {zk-SNARKs}
A Kosba, D Papadopoulos, C Papamanthou, D Song
29th USENIX Security Symposium (USENIX Security 20), 2129-2146, 2020
442020
{MOMMIE} Knows Best: Systematic Optimizations for Verifiable Distributed Algorithms
M Dietz, C Papamanthou
13th Workshop on Hot Topics in Operating Systems (HotOS XIII), 2011
2011
{SEAL}: Attack mitigation for encrypted databases via adjustable leakage
I Demertzis, D Papadopoulos, C Papamanthou, S Shintre
29th USENIX security symposium (USENIX Security 20), 2433-2450, 2020
942020
{TRUESET}: Faster {Verifiable} Set Computations
AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
23rd USENIX Security Symposium (USENIX Security 14), 765-780, 2014
822014
3D visualization of semantic metadata models and ontologies
C Papamanthou, IG Tollis, M Doerr
International Symposium on Graph Drawing, 377-388, 2004
112004
A parametric visualization software for the assignment problem
C Papamanthou
Yugoslav Journal of Operations Research 15 (1), 2016
82016
A visualization of the primal simplex algorithm for the assignment problem
C Papamanthou, K Paparrizos
ACM SIGCSE Bulletin 35 (3), 267-267, 2003
12003
A zero-knowledge version of vSQL
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Cryptology ePrint Archive, 2017
722017
Accountable storage
G Ateniese, MT Goodrich, V Lekakis, C Papamanthou, E Paraskevas, ...
Applied Cryptography and Network Security: 15th International Conference …, 2017
582017
Algorithms for computing a parameterized st-orientation
C Papamanthou, IG Tollis
Theoretical Computer Science 408 (2-3), 224-240, 2008
182008
Algorithms for location estimation based on rssi sampling
C Papamanthou, FP Preparata, R Tamassia
International Symposium on Algorithms and Experiments for Sensor Systems …, 2008
1142008
Alitheia: Towards practical verifiable graph processing
Y Zhang, C Papamanthou, J Katz
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
382014
All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption
Y Zhang, J Katz, C Papamanthou
25th USENIX Security Symposium (USENIX Security 16), 707-720, 2016
5682016
An expressive (zero-knowledge) set accumulator
Y Zhang, J Katz, C Papamanthou
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 158-173, 2017
342017
Apparatus, methods, and computer program products providing dynamic provable data possession
CC Erway, C Papamanthou, R Tamassia
US Patent 8,978,155, 2015
502015
Applications of parameterized st-orientations
C Papamanthou, IG Tollis
Graph Drawing: 13 Th International Symposium, GD 2005, Limerick, Ireland …, 2006
72006
Applications of Parameterized st-Orientations in Graph Drawing Algorithms
C Papamanthou, IG Tollis
Graph Drawing: 13th International Symposium, GD 2005, Limerick, Ireland …, 2006
192006
Athos: Efficient authentication of outsourced file systems
MT Goodrich, C Papamanthou, R Tamassia, N Triandopoulos
International Conference on Information Security, 80-96, 2008
692008
Athos: Efficient Authentication of Outsourced File Systems: Information Security
N Triandopoulos, MT Goodrich, C Papamanthou, R Tamassia
Lecture Notes in Computer Science, 80-96, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–20