Antonis Michalas

Orcid: 0000-0002-0189-3520

According to our database1, Antonis Michalas authored at least 84 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training.
Proc. Priv. Enhancing Technol., 2024

Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.
IACR Cryptol. ePrint Arch., 2024

FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2024

SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption.
IACR Cryptol. ePrint Arch., 2024

Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2024

A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption.
CoRR, 2024

Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing.
CoRR, 2024

Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training.
CoRR, 2024

Trustworthiness of X Users: A One-Class Classification Approach.
CoRR, 2024

Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum.
Proceedings of the Advanced Information Networking and Applications, 2024

Trustworthiness of $\mathbb {X}$ Users: A One-Class Classification Approach.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation.
IACR Cryptol. ePrint Arch., 2023

stoRNA: Stateless Transparent Proofs of Storage-time.
IACR Cryptol. ePrint Arch., 2023

It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2023

Split Without a Leak: Reducing Privacy Leakage in Split Learning.
CoRR, 2023

Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning.
Proceedings of the Workshops of the EDBT/ICDT 2023 Joint Conference, 2023

2022
PoRt: Non-Interactive Continuous Availability Proof of Replicated Storage.
IACR Cryptol. ePrint Arch., 2022

Cryptographic Role-Based Access Control, Reconsidered.
IACR Cryptol. ePrint Arch., 2022

Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)?
IACR Cryptol. ePrint Arch., 2022

Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version).
IACR Cryptol. ePrint Arch., 2022

Heal the Privacy: Functional Encryption and Privacy-Preserving Analytics.
CoRR, 2022

Footsteps in the fog: Certificateless fog-based access control.
Comput. Secur., 2022

Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards.
IEEE Access, 2022

MetaPriv: Acting in Favor of Privacy on Social Media Platforms.
Proceedings of the Security and Privacy in Communication Networks, 2022

Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives.
Proceedings of the Security and Privacy in Communication Networks, 2022

Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Private Lives Matter: A Differential Private Functional Encryption Scheme.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Fake news outbreak 2021: Can we stop the viral spread?
J. Netw. Comput. Appl., 2021

Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones.
IACR Cryptol. ePrint Arch., 2021

Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version).
IACR Cryptol. ePrint Arch., 2021

Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version).
IACR Cryptol. ePrint Arch., 2021

SOK: Fake News Outbreak 2021: Can We Stop the Viral Spread?
CoRR, 2021

Seeing and Believing: Evaluating the Trustworthiness of Twitter Users.
IEEE Access, 2021

Blind Faith: Privacy-Preserving Machine Learning using Function Approximation.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Attestation Waves: Platform Trust via Remote Power Analysis.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version).
IACR Cryptol. ePrint Arch., 2020

Attribute-Based Symmetric Searchable Encryption.
IACR Cryptol. ePrint Arch., 2020

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version).
IACR Cryptol. ePrint Arch., 2020

Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version).
IACR Cryptol. ePrint Arch., 2020

A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud.
Ann. des Télécommunications, 2020

The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds.
IEEE Access, 2020

Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives.
Proceedings of the 19th IEEE International Conference on Trust, 2020

SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NG.
Proceedings of the 5th International Conference on Internet of Things, 2020

Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices.
Proceedings of the 5th International Conference on Internet of Things, 2020

2019
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version).
IACR Cryptol. ePrint Arch., 2019

Multi-Client Symmetric Searchable Encryption with Forward Privacy.
IACR Cryptol. ePrint Arch., 2019

Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX.
IACR Cryptol. ePrint Arch., 2019

MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX.
Proceedings of the Secure IT Systems, 2019

Red Alert: Break-Glass Protocol to Access Encrypted Medical Records in the Cloud.
Proceedings of the 2019 IEEE International Conference on E-health Networking, 2019

ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing.
IACR Cryptol. ePrint Arch., 2018

Towards Secure Cloud Orchestration for Multi-Cloud Deployments.
Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms, 2018

2017
Providing User Security Guarantees in Public Infrastructure Clouds.
IEEE Trans. Cloud Comput., 2017

Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation.
BMC Medical Informatics Decis. Mak., 2017

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services.
J. Grid Comput., 2017

A survey on design and implementation of protected searchable data in the cloud.
Comput. Sci. Rev., 2017

MemTri: A Memory Forensics Triage Tool Using Bayesian Network and Volatility.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Keep Pies Away from Kids: A Raspberry Pi Attacking Tool.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

HealthShare: Using Attribute-Based Encryption for Secure Data Sharing between Multiple Clouds.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

2016
Secure and Scalable Statistical Computation of Questionnaire Data in R.
IEEE Access, 2016

Sharing in the rain: Secure and efficient data sharing for the Cloud.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

LocLess: Do you Really Care Where Your Cloud Files Are?
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Towards Trusted eHealth Services in the Cloud.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

2014
Multi-party trust computation in decentralized environments in the presence of malicious adversaries.
Ad Hoc Networks, 2014

"One of our hosts in another country": Challenges of data geolocation in cloud storage.
Proceedings of the 4th International Conference on Wireless Communications, 2014

The lord of the sense: A privacy preserving reputation system for participatory sensing applications.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Security aspects of e-Health systems migration to the cloud.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

Domain based storage protection with secure access control for the cloud.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2012
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012

Secure & trusted communication in emergency situations.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

Multi-Party Trust Computation in Decentralized Environments.
Proceedings of the 5th International Conference on New Technologies, 2012

SecGOD Google Docs: Now i feel safer!
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks.
Int. J. Digit. Crime Forensics, 2011

Privacy-preserving scheme for mobile ad hoc networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011


  Loading...