2024
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2024
Visor: Privacy-Preserving Reputation for Decentralized Marketplaces.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2022
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas.
IACR Cryptol. ePrint Arch., 2022
Extended Berkeley Packet Filter: An Application Perspective.
IEEE Access, 2022
Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards.
IEEE Access, 2022
Private Lives Matter: A Differential Private Functional Encryption Scheme.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version).
IACR Cryptol. ePrint Arch., 2021
Blockchain-Based Fair and Secure Certified Electronic Mail Without a TTP.
IEEE Access, 2021
2020
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data.
IEEE Internet Things J., 2020
Decentralized reputation.
IACR Cryptol. ePrint Arch., 2020
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards.
IACR Cryptol. ePrint Arch., 2020
Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting.
Comput. Networks, 2020
Fair and private Bitcoin rewards: Incentivizing participation in Crowd-sensing applications.
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020
2019
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems.
Comput. Commun., 2019
Container Security: Issues, Challenges, and the Road Ahead.
IEEE Access, 2019
Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Privacy-respecting reward generation and accumulation for participatory sensing applications.
Pervasive Mob. Comput., 2018
"I wasn't there" - Deniable, privacy-aware scheme for decentralized Location-based Services.
Future Gener. Comput. Syst., 2018
Secure localization using hypothesis testing in wireless networks.
Ad Hoc Networks, 2018
Privacy-respecting rewards for participatory sensing applications.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
2017
Enabling Anonymous Authorization and Rewarding in the Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2017
Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications.
J. Netw. Comput. Appl., 2017
Power-efficient routing for SDN with discrete link rates and size-limited flow tables: A tree-based particle swarm optimization approach.
Int. J. Netw. Manag., 2017
2016
Imposter detection for replication attacks in mobile sensor networks.
Comput. Networks, 2016
Secure and scalable aggregation in the smart grid resilient against malicious entities.
Ad Hoc Networks, 2016
Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags.
Ad Hoc Networks, 2016
Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
A platform for privacy protection of data requesters and data providers in mobile sensing.
Comput. Commun., 2015
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing.
Proceedings of the Information Security Theory and Practice, 2015
2014
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks.
J. Comput. Syst. Sci., 2014
Multi-party trust computation in decentralized environments in the presence of malicious adversaries.
Ad Hoc Networks, 2014
Secure and Scalable Aggregation in the Smart Grid.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Privacy-Friendly Planning of Energy Distribution in Smart Grids.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
2013
Privacy-friendly tasking and trading of energy in smart grids.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013
2012
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012
Multi-Party Trust Computation in Decentralized Environments.
Proceedings of the 5th International Conference on New Technologies, 2012
PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
Moving Advanced Safety to the Cloud: Some Outcomes of SafeCity Project.
Proceedings of the Future Security - 7th Security Research Conference, 2012
2011
People-centric sensing in assistive healthcare: Privacy challenges and directions.
Secur. Commun. Networks, 2011
Scatter - secure code authentication for efficient reprogramming in wireless sensor networks.
Int. J. Sens. Networks, 2011
Detecting fraud in online games of chance and lotteries.
Expert Syst. Appl., 2011
Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Privacy preservation schemes for querying wireless sensor networks.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
2010
Location privacy in urban sensing networks: research challenges and directions.
IEEE Wirel. Commun., 2010
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
Comput. J., 2010
Inexpensive Email Addresses <i>An Email Spam-Combating System</i>.
Proceedings of the Security and Privacy in Communication Networks, 2010
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010
2009
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources.
Proceedings of the Security and Privacy in Communication Networks, 2009
Cooperative Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009
Self-propagating worms in wireless sensor networks.
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009
2008
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
rfidDOT: RFID delegation and ownership transfer made simple.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
SuperTrust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
A Secure Hybrid Reputation Management System for Super-Peer Networks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
Proxy Framework for Enhanced RFID Security and Privacy.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Sensenet: a wireless sensor network testbed.
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007
Providing Transparent Security Services to Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007
Protecting Biometric Templates with Image Watermarking Techniques.
Proceedings of the Advances in Biometrics, International Conference, 2007
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007
2006
GRAViTy: Geographic Routing around Voids in Sensor Networks.
Int. J. Pervasive Comput. Commun., 2006
The infection time of graphs.
Discret. Appl. Math., 2006
A probabilistic algorithm for efficient and robust data propagation in wireless sensor networks.
Ad Hoc Networks, 2006
A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006
Securing Communication Trees in Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2006
Authenticated In-Network Programming for Wireless Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
2005
SAT distributions with planted assignments and phase transitions between decision and optimization problems.
Discret. Appl. Math., 2005
Autonomic Communication Security in Sensor Networks.
Proceedings of the Autonomic Communication, Second International IFIP Workshop, 2005
A Zero Knowledge Proof for Subset Selection from a Family of Sets with Applications to Multiparty/Multicandidate Electronic Elections.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Efficient Mechanisms for Secure Inter-node and Aggregation Processing in Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005
2004
How to Tell a Good Neighborhood from a Bad One: Satisfiability of Boolean Formulas.
Proceedings of the Experimental and Efficient Algorithms, Third International Workshop, 2004
SPEED: Scalable Protocols for Efficient Event Delivery in Sensor Networks.
Proceedings of the NETWORKING 2004, 2004
Efficient Delivery of Information in Sensor Networks Using Smart Antennas.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks: First International Workshop, 2004
Analysis of the Information Propagation Time Among Mobile Hosts.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004
2003
A Comparative Study Of Protocols For Efficient Data Propagation In Smart Dust Networks.
Parallel Process. Lett., 2003
SAT Distributions with Phase Transitions between Decision and Optimization Problems.
Electron. Notes Discret. Math., 2003
A Wealth of SAT Distributions with Planted Assignments.
Proceedings of the Principles and Practice of Constraint Programming, 2003
2002
Characterizing the Space of all Cliques in Random Graphs using "Go with the Winners".
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2002
1998
Go with the Winners for Graph Bisection.
Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 1998
1996
Towards an Analysis of Local Optimization Algorithms.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996