2008 |
10 | EE | Charalampos Papamanthou,
Roberto Tamassia,
Nikos Triandopoulos:
Authenticated hash tables.
ACM Conference on Computer and Communications Security 2008: 437-448 |
9 | EE | Michael T. Goodrich,
Roberto Tamassia,
Nikos Triandopoulos:
Super-Efficient Verification of Dynamic Outsourced Databases.
CT-RSA 2008: 407-424 |
8 | EE | Michael T. Goodrich,
Charalampos Papamanthou,
Roberto Tamassia,
Nikos Triandopoulos:
Athos: Efficient Authentication of Outsourced File Systems.
ISC 2008: 80-96 |
7 | EE | Cory Cornelius,
Apu Kapadia,
David Kotz,
Daniel Peebles,
Minho Shin,
Nikos Triandopoulos:
Anonysense: privacy-aware people-centric sensing.
MobiSys 2008: 211-224 |
6 | EE | Apu Kapadia,
Nikos Triandopoulos,
Cory Cornelius,
Daniel Peebles,
David Kotz:
AnonySense: Opportunistic and Privacy-Preserving Context Collection.
Pervasive 2008: 280-297 |
2007 |
5 | EE | Roberto Tamassia,
Nikos Triandopoulos:
Efficient Content Authentication in Peer-to-Peer Networks.
ACNS 2007: 354-372 |
2006 |
4 | EE | Anna Lysyanskaya,
Nikos Triandopoulos:
Rationality and Adversarial Behavior in Multi-party Computation.
CRYPTO 2006: 180-197 |
2005 |
3 | EE | Roberto Tamassia,
Nikos Triandopoulos:
Computational Bounds on Hierarchical Data Processing with Applications to Information Security.
ICALP 2005: 153-165 |
2004 |
2 | EE | Anna Lysyanskaya,
Roberto Tamassia,
Nikos Triandopoulos:
Multicast Authentication in Fully Adversarial Networks.
IEEE Symposium on Security and Privacy 2004: 241- |
2003 |
1 | EE | Michael T. Goodrich,
Roberto Tamassia,
Nikos Triandopoulos,
Robert F. Cohen:
Authenticated Data Structures for Graph and Geometric Searching.
CT-RSA 2003: 295-313 |