Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kiayias, Aggelos
add a person with the name Kiayias, Aggelos
 

Other publications of authors with the same name

Key Generation Using Physical Properties of Wireless Communication., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake., , , and . IEEE Symposium on Security and Privacy, page 157-174. IEEE, (2019)Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol., , , and . CRYPTO (1), volume 10401 of Lecture Notes in Computer Science, page 357-388. Springer, (2017)Efficient Steganography with Provable Security Guarantees., , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 118-130. Springer, (2005)Resource Access Control in the Facebook Model., , and . CANS, volume 8257 of Lecture Notes in Computer Science, page 179-198. Springer, (2013)Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system., , , , , and . ACSAC, page 386-395. ACM, (2014)Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content., and . ACM Conference on Computer and Communications Security, page 231-242. ACM, (2015)Graded Signatures., , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 61-80. Springer, (2015)On Trees, Chains and Fast Transactions in the Blockchain., and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 327-351. Springer, (2017)On the Practicality of a Smart Contract PKI., , , and . DAPPCON, page 109-118. IEEE, (2019)