Alexandros Bakas
Orcid: 0000-0002-0731-1851
According to our database1,
Alexandros Bakas
authored at least 33 papers
between 2019 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Hidden in the Cloud: Advanced Cryptographic Techniques for Untrusted Cloud Environments.
PhD thesis, 2024
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2024
2023
A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation.
IACR Cryptol. ePrint Arch., 2023
It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2023
Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
2022
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)?
IACR Cryptol. ePrint Arch., 2022
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version).
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives.
Proceedings of the Security and Privacy in Communication Networks, 2022
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version).
IACR Cryptol. ePrint Arch., 2021
Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version).
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version).
IACR Cryptol. ePrint Arch., 2020
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version).
IACR Cryptol. ePrint Arch., 2020
Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version).
IACR Cryptol. ePrint Arch., 2020
A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud.
Ann. des Télécommunications, 2020
The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices.
Proceedings of the 5th International Conference on Internet of Things, 2020
2019
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version).
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX.
IACR Cryptol. ePrint Arch., 2019
MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX.
Proceedings of the Secure IT Systems, 2019
ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019