default search action
Aikaterini Mitrokotsa
Person information
- affiliation: Chalmers University of Technology, Department of Computer Science and Engineering
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa:
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. Proc. Priv. Enhancing Technol. 2024(1): 397-412 (2024) - [c50]Uddipana Dowerah, Aikaterini Mitrokotsa:
Decentralized Private Stream Aggregation from Lattices. ACNS (2) 2024: 189-214 - [c49]Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo:
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication. AsiaCCS 2024 - [c48]Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, Frank Hartmann:
Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function. EuroS&P 2024: 810-827 - [c47]Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal:
SACfe: Secure Access Control in Functional Encryption with Unbounded Data. EuroS&P 2024: 860-882 - [c46]Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy:
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. Public Key Cryptography (1) 2024: 163-195 - [i27]Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy:
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions. IACR Cryptol. ePrint Arch. 2024: 445 (2024) - [i26]Novak Kaluderovic, Nan Cheng, Katerina Mitrokotsa:
A post-quantum Distributed OPRF from the Legendre PRF. IACR Cryptol. ePrint Arch. 2024: 544 (2024) - [i25]Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal:
SACfe: Secure Access Control in Functional Encryption with Unbounded Data. IACR Cryptol. ePrint Arch. 2024: 1031 (2024) - [i24]Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, Frank Hartmann:
Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function. IACR Cryptol. ePrint Arch. 2024: 1190 (2024) - 2023
- [j32]Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal:
Unbounded Predicate Inner Product Functional Encryption from Pairings. J. Cryptol. 36(3): 29 (2023) - [c45]Johannes Ernst, Aikaterini Mitrokotsa:
A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional Encryption. ACNS 2023: 167-196 - [c44]Nan Cheng, Feng Zhang, Aikaterini Mitrokotsa:
Efficient Three-party Boolean-to-Arithmetic Share Conversion. PST 2023: 1-6 - [i23]Johannes Ernst, Aikaterini Mitrokotsa:
A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption. IACR Cryptol. ePrint Arch. 2023: 481 (2023) - [i22]Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal:
Unbounded Predicate Inner Product Functional Encryption from Pairings. IACR Cryptol. ePrint Arch. 2023: 483 (2023) - [i21]Katerina Mitrokotsa, Sayantan Mukherjee, Jenit Tomy:
Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC). IACR Cryptol. ePrint Arch. 2023: 825 (2023) - [i20]Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa:
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. IACR Cryptol. ePrint Arch. 2023: 1307 (2023) - [i19]Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo:
Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication. IACR Cryptol. ePrint Arch. 2023: 1684 (2023) - [i18]Uddipana Dowerah, Aikaterini Mitrokotsa:
Decentralized Private Steam Aggregation from Lattices. IACR Cryptol. ePrint Arch. 2023: 1774 (2023) - 2022
- [c43]Georgia Tsaloli, Alejandro Lancho, Katerina Mitrokotsa, Giuseppe Durisi:
WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks. SACMAT 2022: 61-66 - 2021
- [j31]Shimin Li, Bei Liang, Aikaterini Mitrokotsa, Rui Xue:
Homomorphic signcryption with public plaintext-result checkability. IET Inf. Secur. 15(5): 333-350 (2021) - [c42]Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. ACISP 2021: 510-528 - [c41]Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa:
sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning. ISC 2021: 296-319 - [c40]Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka:
Turn-Based Communication Channels. ProvSec 2021: 376-392 - [i17]Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. IACR Cryptol. ePrint Arch. 2021: 654 (2021) - [i16]Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka:
Turn-Based Communication Channels. IACR Cryptol. ePrint Arch. 2021: 1126 (2021) - 2020
- [j30]Georgia Tsaloli, Gustavo Banegas, Aikaterini Mitrokotsa:
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing. Cryptogr. 4(3): 25 (2020) - [j29]Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Statically Aggregate Verifiable Random Functions and Application to E-Lottery. Cryptogr. 4(4): 37 (2020) - [c39]Lehlogonolo Ledwaba, Gerhard P. Hancke, Aikaterini Mitrokotsa, Sherrin John Isaac:
A Delegated Proof of Proximity Scheme for Industrial Internet of Things Consensus. IECON 2020: 4441-4446
2010 – 2019
- 2019
- [j28]Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin:
Multi-key homomorphic authenticators. IET Inf. Secur. 13(6): 618-638 (2019) - [j27]Bei Liang, Aikaterini Mitrokotsa:
Decentralised Functional Signatures. Mob. Networks Appl. 24(3): 934-946 (2019) - [c38]Georgia Tsaloli, Aikaterini Mitrokotsa:
Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees. ICETE (2) 2019: 425-430 - [c37]Georgia Tsaloli, Aikaterini Mitrokotsa:
Sum It Up: Verifiable Additive Homomorphic Secret Sharing. ICISC 2019: 115-132 - [c36]Bei Liang, Aikaterini Mitrokotsa:
Robust Distributed Pseudorandom Functions for mNP Access Structures. ISC 2019: 107-126 - [c35]Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa:
Code-Based Zero Knowledge PRF Arguments. ISC 2019: 171-189 - 2018
- [j26]Qiao Hu, Jingyi Zhang, Aikaterini Mitrokotsa, Gerhard P. Hancke:
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context. Comput. Secur. 78: 281-300 (2018) - [j25]Elena Pagnin, Anjia Yang, Qiao Hu, Gerhard P. Hancke, Aikaterini Mitrokotsa:
HB+DB: Distance bounding meets human based authentication. Future Gener. Comput. Syst. 80: 627-639 (2018) - [j24]Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa:
Lattice-Based Simulatable VRFs: Challenges and Future Directions. J. Internet Serv. Inf. Secur. 8(4): 57-69 (2018) - [j23]Luca Luceri, Felipe Cardoso, Michela Papandrea, Silvia Giordano, Julia Buwaya, Stéphane Kuendig, Constantinos Marios Angelopoulos, José D. P. Rolim, Zhongliang Zhao, Jose Luis Carrera, Torsten Braun, Aristide C. Y. Tossou, Christos Dimitrakakis, Aikaterini Mitrokotsa:
VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things. Pervasive Mob. Comput. 49: 126-138 (2018) - [j22]Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong:
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close. IEEE Trans. Mob. Comput. 17(7): 1723-1736 (2018) - [c34]Georgia Tsaloli, Bei Liang, Aikaterini Mitrokotsa:
Verifiable Homomorphic Secret Sharing. ProvSec 2018: 40-55 - 2017
- [j21]Christos Dimitrakakis, Aikaterini Mitrokotsa:
Near-optimal blacklisting. Comput. Secur. 64: 110-121 (2017) - [j20]Christos Dimitrakakis, Blaine Nelson, Zuhe Zhang, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein:
Differential Privacy for Bayesian Inference through Posterior Sampling. J. Mach. Learn. Res. 18: 11:1-11:39 (2017) - [j19]Elena Pagnin, Aikaterini Mitrokotsa:
Privacy-Preserving Biometric Authentication: Challenges and Directions. Secur. Commun. Networks 2017: 7129505:1-7129505:9 (2017) - [c33]Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa:
Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough? CANS 2017: 161-178 - [c32]Bei Liang, Aikaterini Mitrokotsa:
Distributed Pseudorandom Functions for General Access Structures in NP. ICICS 2017: 81-87 - [c31]Bei Liang, Aikaterini Mitrokotsa:
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper). ISPEC 2017: 422-431 - [c30]Carlo Brunetta, Christos Dimitrakakis, Bei Liang, Aikaterini Mitrokotsa:
A Differentially Private Encryption Scheme. ISC 2017: 309-326 - [c29]Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka:
Anonymous Single-Round Server-Aided Verification. LATINCRYPT 2017: 23-43 - [c28]Nektaria Kaloudi, Aikaterini Mitrokotsa:
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough? WISTP 2017: 177-188 - [e8]Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevicius:
Secure IT Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings. Lecture Notes in Computer Science 10674, Springer 2017, ISBN 978-3-319-70289-6 [contents] - [i15]Elena Pagnin, Aikaterini Mitrokotsa:
Privacy-preserving biometric authentication: challenges and directions. IACR Cryptol. ePrint Arch. 2017: 450 (2017) - [i14]Aikaterini Mitrokotsa, Cristina Onete, Elena Pagnin, Mahesh Perera:
Multi-Hop Distance Estimation: How Far are You? IACR Cryptol. ePrint Arch. 2017: 705 (2017) - [i13]Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka:
Anonymous Single-Round Server-Aided Verification. IACR Cryptol. ePrint Arch. 2017: 794 (2017) - [i12]Bei Liang, Aikaterini Mitrokotsa:
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2017: 969 (2017) - 2016
- [j18]Gerhard P. Hancke, Aikaterini Mitrokotsa, Reihaneh Safavi-Naini, Damien Sauveron:
Special issue on recent advances in physical-layer security. Comput. Networks 109: 1-3 (2016) - [j17]Christoffer Karlsson, Aikaterini Mitrokotsa:
Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close. IEEE Commun. Lett. 20(7): 1365-1368 (2016) - [c27]Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin:
Multi-key Homomorphic Authenticators. ASIACRYPT (2) 2016: 499-530 - [c26]Aysajan Abidin, Abdelrahaman Aly, Enrique Argones-Rúa, Aikaterini Mitrokotsa:
Efficient Verifiable Computation of XOR for Biometric Authentication. CANS 2016: 284-298 - [c25]David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha:
9th International Workshop on Artificial Intelligence and Security: AISec 2016. CCS 2016: 1881 - [e7]David Mandell Freeman, Aikaterini Mitrokotsa, Arunesh Sinha:
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4573-6 [contents] - [i11]Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin:
Multi-Key Homomorphic Authenticators. IACR Cryptol. ePrint Arch. 2016: 804 (2016) - 2015
- [j16]Elena Pagnin, Gerhard P. Hancke, Aikaterini Mitrokotsa:
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours. IEEE Commun. Lett. 19(7): 1173-1176 (2015) - [j15]Christos Dimitrakakis, Aikaterini Mitrokotsa:
Distance-Bounding Protocols: Are You Close Enough? IEEE Secur. Priv. 13(4): 47-51 (2015) - [j14]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical and provably secure distance-bounding. J. Comput. Secur. 23(2): 229-257 (2015) - [j13]Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:
Expected loss analysis for authentication in constrained channels. J. Comput. Secur. 23(3): 309-329 (2015) - [c24]Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha:
Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security. CCS 2015: 1702 - [c23]Andreea Hossmann-Picu, Zan Li, Zhongliang Zhao, Torsten Braun, Constantinos Marios Angelopoulos, Orestis Evangelatos, José D. P. Rolim, Michela Papandrea, Kamini Garg, Silvia Giordano, Aristide C. Y. Tossou, Christos Dimitrakakis, Aikaterini Mitrokotsa:
Synergistic User ⟷ Context Analytics. ICT Innovations 2015: 163-172 - [c22]Elena Pagnin, Anjia Yang, Gerhard P. Hancke, Aikaterini Mitrokotsa:
HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding. WISEC 2015: 3:1-3:6 - [e6]Indrajit Ray, Xiaofeng Wang, Kui Ren, Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha:
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3826-4 [contents] - [i10]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. IACR Cryptol. ePrint Arch. 2015: 208 (2015) - 2014
- [j12]Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay:
Location leakage in distance bounding: Why location privacy does not work. Comput. Secur. 45: 199-209 (2014) - [c21]Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein:
Robust and Private Bayesian Inference. ALT 2014: 291-305 - [c20]Aikaterini Mitrokotsa:
Authentication in Constrained Settings. BalkanCryptSec 2014: 3-12 - [c19]Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa:
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited. CANS 2014: 290-304 - [c18]Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein:
Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security. CCS 2014: 1555 - [c17]Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa:
On the Leakage of Information in Biometric Authentication. INDOCRYPT 2014: 265-280 - [c16]Aysajan Abidin, Aikaterini Mitrokotsa:
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE. WIFS 2014: 60-65 - [e5]Christos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein, Gail-Joon Ahn:
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3153-1 [contents] - 2013
- [j11]Aikaterini Mitrokotsa, Christos Dimitrakakis:
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection. Ad Hoc Networks 11(1): 226-237 (2013) - [j10]Aikaterini Mitrokotsa, Pedro Peris-Lopez, Christos Dimitrakakis, Serge Vaudenay:
On Selecting the Nonce Length in Distance-Bounding Protocols. Comput. J. 56(10): 1216-1227 (2013) - [c15]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. FSE 2013: 55-67 - [c14]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical and Provably Secure Distance-Bounding. ISC 2013: 248-258 - [c13]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Secure and Lightweight Distance-Bounding. LightSec 2013: 97-113 - [i9]Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein:
Robust, Secure and Private Bayesian Inference. CoRR abs/1306.1066 (2013) - [i8]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical & Provably Secure Distance-Bounding. IACR Cryptol. ePrint Arch. 2013: 465 (2013) - [i7]Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay:
Location Leakage in Distance Bounding: Why Location Privacy does not Work. IACR Cryptol. ePrint Arch. 2013: 776 (2013) - 2012
- [j9]Sergio Pastrana, Aikaterini Mitrokotsa, Agustín Orfila, Pedro Peris-Lopez:
Evaluation of classification algorithms for intrusion detection in MANETs. Knowl. Based Syst. 36: 217-225 (2012) - [j8]Aikaterini Mitrokotsa, Quan Z. Sheng, Zakaria Maamar:
User-driven RFID applications and challenges. Pers. Ubiquitous Comput. 16(3): 223-224 (2012) - [j7]Christos Dimitrakakis, Tom Karygiannis, Aikaterini Mitrokotsa:
Guest Editors' Introduction: Special Section on Learning, Games, and Security. IEEE Trans. Dependable Secur. Comput. 9(4): 449-450 (2012) - [c12]Aslí Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, Serge Vaudenay:
The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks. Inscrypt 2012: 371-391 - [c11]Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:
Expected loss bounds for authentication in constrained channels. INFOCOM 2012: 478-485 - [c10]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds! LATINCRYPT 2012: 100-120 - [c9]Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay:
Mafia fraud attack against the RČ Distance-Bounding Protocol. RFID-TA 2012: 74-79 - [c8]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa, Julio C. Hernandez-Castro:
Weaknesses in another Gen2-based RFID authentication protocol. RFID-TA 2012: 80-84 - [c7]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa:
On the traceability of tags in SUAP RFID authentication protocols. RFID-TA 2012: 292-296 - [e4]Aikaterini Mitrokotsa, Serge Vaudenay:
Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings. Lecture Notes in Computer Science 7374, Springer 2012, ISBN 978-3-642-31409-4 [contents] - [i6]Christos Dimitrakakis, Aikaterini Mitrokotsa:
Near-Optimal Node Blacklisting in Adversarial Networks. CoRR abs/1208.5641 (2012) - 2011
- [j6]Pedro Peris-Lopez, Agustín Orfila, Aikaterini Mitrokotsa, Jan C. A. van der Lubbe:
A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Medical Informatics 80(1): 13-24 (2011) - [j5]Quan Z. Sheng, Sherali Zeadally, Aikaterini Mitrokotsa, Zakaria Maamar:
RFID technology, systems, and applications. J. Netw. Comput. Appl. 34(3): 797-798 (2011) - [c6]Jean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez:
A Note on a Privacy-Preserving Distance-Bounding Protocol. ICICS 2011: 78-92 - [e3]Christos Dimitrakakis, Aris Gkoulalas-Divanis, Aikaterini Mitrokotsa, Vassilios S. Verykios, Yücel Saygin:
Privacy and Security Issues in Data Mining and Machine Learning - International ECML/PKDD Workshop, PSDML 2010, Barcelona, Spain, September 24, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6549, Springer 2011, ISBN 978-3-642-19895-3 [contents] - 2010
- [j4]Aikaterini Mitrokotsa, Christos Dimitrakakis, Pedro Peris-Lopez, Julio César Hernández Castro:
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett. 14(2): 121-123 (2010) - [j3]Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks. Int. J. Netw. Secur. 10(2): 93-106 (2010) - [j2]Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum:
Classifying RFID attacks and defenses. Inf. Syst. Frontiers 12(5): 491-505 (2010) - [e2]Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally, Zakaria Maamar:
RFID Technology-Concepts, Applications, Challenges, Proceedings of the 4th International Workshop, IWRT 2010, In conjunction with ICEIS 2010, Funchal, Madeira, Portugal, June 2010. SciTePress 2010, ISBN 978-989-8425-11-9 [contents] - [i5]Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:
Expected loss analysis of thresholded authentication protocols in noisy conditions. CoRR abs/1009.0278 (2010)
2000 – 2009
- 2009
- [c5]Christos Dimitrakakis, Aikaterini Mitrokotsa:
Statistical Decision Making for Authentication and Intrusion Detection. ICMLA 2009: 409-414 - [e1]Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally, Zakaria Maamar:
RFID Technology-Concepts, Applications, Challenges, Proceedings of the 3rd International Workshop, IWRT 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009. INSTICC PRESS 2009, ISBN 978-989-8111-94-4 [contents] - [i4]Christos Dimitrakakis, Aikaterini Mitrokotsa:
Statistical Decision Making for Authentication and Intrusion Detection. CoRR abs/0910.0483 (2009) - 2008
- [c4]Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum:
Classification of RFID Attacks. IWRT 2008: 73-86 - [c3]Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris:
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms. Med-Hoc-Net 2008: 133-144 - [i3]Aikaterini Mitrokotsa, Christos Dimitrakakis, Christos Douligeris:
Intrusion Detection Using Cost-Sensitive Classification. CoRR abs/0807.2043 (2008) - [i2]Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris:
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms. CoRR abs/0807.2049 (2008) - [i1]Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks. CoRR abs/0807.2053 (2008) - 2007
- [c2]Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:
Intrusion Detection with Neural Networks and Watermarking Techniques for MANET. ICPS 2007: 118-127 - 2006
- [c1]Aikaterini Mitrokotsa, Christos Douligeris:
Intrusion Detection Using Emergent Self-organizing Maps. SETN 2006: 559-562 - 2004
- [j1]Christos Douligeris, Aikaterini Mitrokotsa:
DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Networks 44(5): 643-666 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint