What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nikos Triandopoulos
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/uss
Debloating Address Sanitizer.
Yuchen Zhang
Chengbin Pang
Georgios Portokalidis
Nikos Triandopoulos
Jun Xu
2021
conf/ccsw-ws
Private Hierarchical Clustering and Efficient Approximation.
Xianrui Meng
Dimitrios Papadopoulos
Alina Oprea
Nikos Triandopoulos
2019
conf/ccs
Transparency Logs via Append-Only Authenticated Dictionaries.
Alin Tomescu
Vivek Bhupatiraju
Dimitrios Papadopoulos
Charalampos Papamanthou
Nikos Triandopoulos
Srinivas Devadas
2017
conf/esorics
Server-Aided Secure Computation with Off-line Parties.
Foteini Baldimtsi
Dimitrios Papadopoulos
Stavros Papadopoulos
Alessandra Scafuro
Nikos Triandopoulos
2016
conf/asiacrypt
Zero-Knowledge Accumulators and Set Algebra.
Esha Ghosh
Olga Ohrimenko
Dimitrios Papadopoulos
Roberto Tamassia
Nikos Triandopoulos
2015
conf/ccs
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable).
Ari Juels
James Kelley
Roberto Tamassia
Nikos Triandopoulos
2014
conf/ccs
Taking Authenticated Range Queries to Arbitrary Dimensions.
Dimitrios Papadopoulos
Stavros Papadopoulos
Nikos Triandopoulos
2014
conf/uss
TRUESET: Faster Verifiable Set Computations.
Ahmed E. Kosba
Dimitrios Papadopoulos
Charalampos Papamanthou
Mahmoud F. Sayed
Elaine Shi
Nikos Triandopoulos
2014
conf/pkc
Verifiable Set Operations over Outsourced Databases.
Ran Canetti
Omer Paneth
Dimitrios Papadopoulos
Nikos Triandopoulos
2013
conf/ccs
Delegatable pseudorandom functions and applications.
Aggelos Kiayias
Stavros Papadopoulos
Nikos Triandopoulos
Thomas Zacharias
2012
conf/ccs
Hourglass schemes: how to prove that cloud files are encrypted.
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
Emil Stefanov
Nikos Triandopoulos
2012
conf/esorics
Hardening Access Control and Data Protection in GFS-like File Systems.
James Kelley
Roberto Tamassia
Nikos Triandopoulos
2011
conf/crypto
Optimal Verification of Operations on Dynamic Sets.
Charalampos Papamanthou
Roberto Tamassia
Nikos Triandopoulos
2009
conf/crypto
Privacy-Enhancing Auctions Using Rational Cryptography.
Peter Bro Miltersen
Jesper Buus Nielsen
Nikos Triandopoulos
2008
conf/ccs
Authenticated hash tables.
Charalampos Papamanthou
Roberto Tamassia
Nikos Triandopoulos
2008
conf/ndss
Halo: High-Assurance Locate for Distributed Hash Tables.
Apu Kapadia
Nikos Triandopoulos
2008
conf/ctrsa
Super-Efficient Verification of Dynamic Outsourced Databases.
Michael T. Goodrich
Roberto Tamassia
Nikos Triandopoulos
2007
conf/acns
Efficient Content Authentication in Peer-to-Peer Networks.
Roberto Tamassia
Nikos Triandopoulos
2006
conf/crypto
Rationality and Adversarial Behavior in Multi-party Computation.
Anna Lysyanskaya
Nikos Triandopoulos
2004
conf/sp
Multicast Authentication in Fully Adversarial Networks.
Anna Lysyanskaya
Roberto Tamassia
Nikos Triandopoulos
2003
conf/ctrsa
Authenticated Data Structures for Graph and Geometric Searching.
Michael T. Goodrich
Roberto Tamassia
Nikos Triandopoulos
Robert F. Cohen
Coauthors
Aggelos Kiayias
(1)
Ahmed E. Kosba
(1)
Alessandra Scafuro
(1)
Alin Tomescu
(1)
Alina Oprea
(2)
Anna Lysyanskaya
(2)
Apu Kapadia
(1)
Ari Juels
(2)
Charalampos Papamanthou
(4)
Chengbin Pang
(1)
Dimitrios Papadopoulos
(7)
Elaine Shi
(1)
Emil Stefanov
(1)
Esha Ghosh
(1)
Foteini Baldimtsi
(1)
Georgios Portokalidis
(1)
James Kelley
(2)
Jesper Buus Nielsen
(1)
Jun Xu
(1)
Mahmoud F. Sayed
(1)
Marten van Dijk
(1)
Michael T. Goodrich
(2)
Nikos Triandopoulos
(21)
Olga Ohrimenko
(1)
Omer Paneth
(1)
Peter Bro Miltersen
(1)
Ran Canetti
(1)
Robert F. Cohen
(1)
Roberto Tamassia
(9)
Ronald L. Rivest
(1)
Srinivas Devadas
(1)
Stavros Papadopoulos
(3)
Thomas Zacharias
(1)
Vivek Bhupatiraju
(1)
Xianrui Meng
(1)
Yuchen Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to