Aikaterini Mitrokotsa
Orcid: 0000-0002-7073-0258Affiliations:
- Chalmers University of Technology, Department of Computer Science and Engineering
According to our database1,
Aikaterini Mitrokotsa
authored at least 93 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., January, 2024
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
J. Cryptol., July, 2023
IACR Cryptol. ePrint Arch., 2023
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
2022
WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
2021
IET Inf. Secur., 2021
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning.
IACR Cryptol. ePrint Arch., 2021
sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning.
Proceedings of the Information Security - 24th International Conference, 2021
2020
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing.
Cryptogr., 2020
Cryptogr., 2020
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020
2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
IEEE Trans. Mob. Comput., 2018
VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things.
Pervasive Mob. Comput., 2018
J. Internet Serv. Inf. Secur., 2018
Future Gener. Comput. Syst., 2018
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context.
Comput. Secur., 2018
2017
Secur. Commun. Networks, 2017
J. Mach. Learn. Res., 2017
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough?
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
IEEE Commun. Lett., 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
J. Comput. Secur., 2015
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours.
IEEE Commun. Lett., 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Comput. Secur., 2014
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
Proceedings of the Algorithmic Learning Theory - 25th International Conference, 2014
2013
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection.
Ad Hoc Networks, 2013
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Knowl. Based Syst., 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds!
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
Int. J. Medical Informatics, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Int. J. Netw. Secur., 2010
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.
IEEE Commun. Lett., 2010
CoRR, 2010
2009
Proceedings of the International Conference on Machine Learning and Applications, 2009
2008
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
CoRR, 2008
Proceedings of the Advances in Ad Hoc Networking, 2008
Classification of RFID Attacks.
Proceedings of the RFID Technology - Concepts, Applications, Challenges, Proceedings of the 2nd International Workshop on RFID Technology, 2008
2007
Proceedings of the IEEE International Conference on Pervasive Services, 2007
2006
Proceedings of the Advances in Artificial Intelligence, 4th Helenic Conference on AI, 2006
2004
Comput. Networks, 2004