Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Triandopoulos, Nikos
add a person with the name Triandopoulos, Nikos
 

Other publications of authors with the same name

Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems., , and . Algorithmica, 60 (3): 505-552 (2011)AnonySense: A system for anonymous opportunistic sensing., , , , , and . Pervasive and Mobile Computing, 7 (1): 16-30 (2011)Optimal Verification of Operations on Dynamic Sets., , and . IACR Cryptology ePrint Archive, (2010)Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)., , , and . ACM Conference on Computer and Communications Security, page 1032-1047. ACM, (2015)Zero-Knowledge Accumulators and Set Operations., , , , and . IACR Cryptol. ePrint Arch., (2015)Transparency Logs via Append-Only Authenticated Dictionaries., , , , , and . CCS, page 1299-1316. ACM, (2019)Securing the Data in Big Data Security Analytics., , , and . IACR Cryptology ePrint Archive, (2013)Super-Efficient Verification of Dynamic Outsourced Databases., , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 407-424. Springer, (2008)Hourglass schemes: how to prove that cloud files are encrypted., , , , , and . ACM Conference on Computer and Communications Security, page 265-280. ACM, (2012)Delegatable pseudorandom functions and applications., , , and . ACM Conference on Computer and Communications Security, page 669-684. ACM, (2013)