Antonis Michalas
Orcid: 0000-0002-0189-3520
According to our database1,
Antonis Michalas
authored at least 84 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training.
Proc. Priv. Enhancing Technol., 2024
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.
IACR Cryptol. ePrint Arch., 2024
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Need for Speed: Leveraging the Power of Functional Encryption for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2024
A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption.
CoRR, 2024
Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing.
CoRR, 2024
CoRR, 2024
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum.
Proceedings of the Advanced Information Networking and Applications, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
A Secure Bandwidth-Efficient Treatment for Dropout-Resistant Time-Series Data Aggregation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
It Runs and it Hides: A Function-Hiding Construction for Private-Key Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2023
Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Proceedings of the Workshops of the EDBT/ICDT 2023 Joint Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors (extended version)?
IACR Cryptol. ePrint Arch., 2022
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives (extended version).
IACR Cryptol. ePrint Arch., 2022
Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards.
IEEE Access, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives.
Proceedings of the Security and Privacy in Communication Networks, 2022
Feel the Quantum Functioning: Instantiating Generic Multi-Input Functional Encryption from Learning with Errors.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones.
IACR Cryptol. ePrint Arch., 2021
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version).
IACR Cryptol. ePrint Arch., 2021
Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version).
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version).
IACR Cryptol. ePrint Arch., 2020
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version).
IACR Cryptol. ePrint Arch., 2020
Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version).
IACR Cryptol. ePrint Arch., 2020
A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud.
Ann. des Télécommunications, 2020
The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NG.
Proceedings of the 5th International Conference on Internet of Things, 2020
Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices.
Proceedings of the 5th International Conference on Internet of Things, 2020
2019
MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version).
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX.
IACR Cryptol. ePrint Arch., 2019
MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX.
Proceedings of the Secure IT Systems, 2019
Proceedings of the 2019 IEEE International Conference on E-health Networking, 2019
ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 5th Workshop on CrossCloud Infrastructures & Platforms, 2018
2017
IEEE Trans. Cloud Comput., 2017
Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation.
BMC Medical Informatics Decis. Mak., 2017
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services.
J. Grid Comput., 2017
Comput. Sci. Rev., 2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
HealthShare: Using Attribute-Based Encryption for Secure Data Sharing between Multiple Clouds.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017
2016
IEEE Access, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
2015
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
2014
Multi-party trust computation in decentralized environments in the presence of malicious adversaries.
Ad Hoc Networks, 2014
"One of our hosts in another country": Challenges of data geolocation in cloud storage.
Proceedings of the 4th International Conference on Wireless Communications, 2014
The lord of the sense: A privacy preserving reputation system for participatory sensing applications.
Proceedings of the IEEE Symposium on Computers and Communications, 2014
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
2012
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
Int. J. Digit. Crime Forensics, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011