Tassos Dimitriou
Orcid: 0000-0001-6535-4983
According to our database1,
Tassos Dimitriou
authored at least 83 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2022
IACR Cryptol. ePrint Arch., 2022
Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards.
IEEE Access, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Private Lives Matter: A Differential Private Functional Encryption Scheme (extended version).
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
2020
IEEE Internet Things J., 2020
From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards.
IACR Cryptol. ePrint Arch., 2020
Comput. Networks, 2020
Fair and private Bitcoin rewards: Incentivizing participation in Crowd-sensing applications.
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020
2019
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems.
Comput. Commun., 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Privacy-respecting reward generation and accumulation for participatory sensing applications.
Pervasive Mob. Comput., 2018
"I wasn't there" - Deniable, privacy-aware scheme for decentralized Location-based Services.
Future Gener. Comput. Syst., 2018
Ad Hoc Networks, 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications.
J. Netw. Comput. Appl., 2017
Power-efficient routing for SDN with discrete link rates and size-limited flow tables: A tree-based particle swarm optimization approach.
Int. J. Netw. Manag., 2017
2016
Comput. Networks, 2016
Secure and scalable aggregation in the smart grid resilient against malicious entities.
Ad Hoc Networks, 2016
Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags.
Ad Hoc Networks, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
A platform for privacy protection of data requesters and data providers in mobile sensing.
Comput. Commun., 2015
Proceedings of the Information Security Theory and Practice, 2015
2014
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks.
J. Comput. Syst. Sci., 2014
Multi-party trust computation in decentralized environments in the presence of malicious adversaries.
Ad Hoc Networks, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013
2012
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
Proceedings of the Future Security - 7th Security Research Conference, 2012
2011
Secur. Commun. Networks, 2011
Scatter - secure code authentication for efficient reprogramming in wireless sensor networks.
Int. J. Sens. Networks, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
2010
IEEE Wirel. Commun., 2010
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
Comput. J., 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Distributed Computing in Sensor Systems, 2010
2009
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009
2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
SuperTrust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007
2006
Int. J. Pervasive Comput. Commun., 2006
A probabilistic algorithm for efficient and robust data propagation in wireless sensor networks.
Ad Hoc Networks, 2006
A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2006
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
2005
SAT distributions with planted assignments and phase transitions between decision and optimization problems.
Discret. Appl. Math., 2005
Proceedings of the Autonomic Communication, Second International IFIP Workshop, 2005
A Zero Knowledge Proof for Subset Selection from a Family of Sets with Applications to Multiparty/Multicandidate Electronic Elections.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Efficient Mechanisms for Secure Inter-node and Aggregation Processing in Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005
2004
Proceedings of the Experimental and Efficient Algorithms, Third International Workshop, 2004
Proceedings of the NETWORKING 2004, 2004
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks: First International Workshop, 2004
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004
2003
A Comparative Study Of Protocols For Efficient Data Propagation In Smart Dust Networks.
Parallel Process. Lett., 2003
Electron. Notes Discret. Math., 2003
Proceedings of the Principles and Practice of Constraint Programming, 2003
2002
Characterizing the Space of all Cliques in Random Graphs using "Go with the Winners".
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2002
1998
Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 1998
1996
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996