Nikos Triandopoulos
According to our database1,
Nikos Triandopoulos
authored at least 53 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
Cryptogr., September, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
2019
Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation.
CoRR, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proc. VLDB Endow., 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Proc. VLDB Endow., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Pervasive Mob. Comput., 2011
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems.
Algorithmica, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the 4th Alberto Mendelzon International Workshop on Foundations of Data Management, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Advances in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Pervasive Computing, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 6th International Conference on Mobile Systems, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the IEEE International Conference on Pervasive Services, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Proceedings of the Advances in Cryptology, 2006
2005
Computational Bounds on Hierarchical Data Processing with Applications to Information Security.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
2003
Proceedings of the Topics in Cryptology, 2003