Alexandros Bakas

Orcid: 0000-0002-0731-1851

According to our database1, Alexandros Bakas authored at least 33 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hidden in the Cloud: Advanced Cryptographic Techniques for Untrusted Cloud Environments.
PhD thesis, 2024

Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2024

2023
A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation.
IACR Cryptol. ePrint Arch., 2023

It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2023

Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

2022
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)?
IACR Cryptol. ePrint Arch., 2022

Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version).
IACR Cryptol. ePrint Arch., 2022

Heal the Privacy: Functional Encryption and Privacy-Preserving Analytics.
CoRR, 2022

MetaPriv: Acting in Favor of Privacy on Social Media Platforms.
Proceedings of the Security and Privacy in Communication Networks, 2022

Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives.
Proceedings of the Security and Privacy in Communication Networks, 2022

Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Private Lives Matter: A Differential Private Functional Encryption Scheme.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version).
IACR Cryptol. ePrint Arch., 2021

Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version).
IACR Cryptol. ePrint Arch., 2021

Blind Faith: Privacy-Preserving Machine Learning using Function Approximation.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Attestation Waves: Platform Trust via Remote Power Analysis.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version).
IACR Cryptol. ePrint Arch., 2020

Attribute-Based Symmetric Searchable Encryption.
IACR Cryptol. ePrint Arch., 2020

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version).
IACR Cryptol. ePrint Arch., 2020

Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version).
IACR Cryptol. ePrint Arch., 2020

A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud.
Ann. des Télécommunications, 2020

The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds.
IEEE Access, 2020

Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives.
Proceedings of the 19th IEEE International Conference on Trust, 2020

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices.
Proceedings of the 5th International Conference on Internet of Things, 2020

2019
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version).
IACR Cryptol. ePrint Arch., 2019

Multi-Client Symmetric Searchable Encryption with Forward Privacy.
IACR Cryptol. ePrint Arch., 2019

Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX.
IACR Cryptol. ePrint Arch., 2019

MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX.
Proceedings of the Secure IT Systems, 2019

ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019


  Loading...