Anonysense: privacy-aware people-centric sensing C Cornelius, A Kapadia, D Kotz, D Peebles, M Shin, N Triandopoulos Proceedings of the 6th international conference on Mobile systems …, 2008 | 545 | 2008 |
Delegatable pseudorandom functions and applications A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 405 | 2013 |
AnonySense: A system for anonymous opportunistic sensing M Shin, C Cornelius, D Peebles, A Kapadia, D Kotz, N Triandopoulos Pervasive and Mobile Computing 7 (1), 16-30, 2011 | 232 | 2011 |
Rationality and adversarial behavior in multi-party computation A Lysyanskaya, N Triandopoulos Annual International Cryptology Conference, 180-197, 2006 | 198 | 2006 |
Optimal verification of operations on dynamic sets C Papamanthou, R Tamassia, N Triandopoulos Annual Cryptology Conference, 91-110, 2011 | 194 | 2011 |
Opportunistic sensing: Security challenges for the new paradigm A Kapadia, D Kotz, N Triandopoulos 2009 First International Communication Systems and Networks and Workshops, 1-10, 2009 | 169 | 2009 |
Authenticated hash tables C Papamanthou, R Tamassia, N Triandopoulos Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 158 | 2008 |
AnonySense: Opportunistic and privacy-preserving context collection A Kapadia, N Triandopoulos, C Cornelius, D Peebles, D Kotz Pervasive Computing: 6th International Conference, Pervasive 2008 Sydney …, 2008 | 158 | 2008 |
Supporting non-membership proofs with bilinear-map accumulators I Damgård, N Triandopoulos Cryptology ePrint Archive, 2008 | 120 | 2008 |
Authenticated data structures for graph and geometric searching MT Goodrich, R Tamassia, N Triandopoulos, R Cohen Cryptographers’ Track at the RSA Conference, 295-313, 2003 | 111 | 2003 |
Hourglass schemes: how to prove that cloud files are encrypted M Van Dijk, A Juels, A Oprea, RL Rivest, E Stefanov, N Triandopoulos Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 109 | 2012 |
Multicast authentication in fully adversarial networks A Lysyanskaya, R Tamassia, N Triandopoulos IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 241-253, 2004 | 97 | 2004 |
Defending against the Unknown Enemy: Applying FlipIt to System Security KD Bowers, M Van Dijk, R Griffin, A Juels, A Oprea, RL Rivest, ... International Conference on Decision and Game Theory for Security, 248-263, 2012 | 84 | 2012 |
{TRUESET}: Faster {Verifiable} Set Computations AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ... 23rd USENIX Security Symposium (USENIX Security 14), 765-780, 2014 | 83 | 2014 |
Verifiable set operations over outsourced databases R Canetti, O Paneth, D Papadopoulos, N Triandopoulos International Workshop on Public Key Cryptography, 113-130, 2014 | 77 | 2014 |
Super-efficient verification of dynamic outsourced databases MT Goodrich, R Tamassia, N Triandopoulos Cryptographers’ Track at the RSA Conference, 407-424, 2008 | 73 | 2008 |
Transparency logs via append-only authenticated dictionaries A Tomescu, V Bhupatiraju, D Papadopoulos, C Papamanthou, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 72 | 2019 |
Athos: Efficient authentication of outsourced file systems MT Goodrich, C Papamanthou, R Tamassia, N Triandopoulos International Conference on Information Security, 80-96, 2008 | 70 | 2008 |
Efficient authenticated data structures for graph connectivity and geometric search problems MT Goodrich, R Tamassia, N Triandopoulos Algorithmica 60, 505-552, 2011 | 69 | 2011 |
Providing anonymity in wireless sensor networks Y Ouyang, Z Le, Y Xu, N Triandopoulos, S Zhang, J Ford, F Makedon IEEE international conference on pervasive services, 145-148, 2007 | 69 | 2007 |