Nikos Triandopoulos (home page)


Nikolaos (Nikos) Triandopoulos

Adjunct Assistant Professor
Department of Computer Science
Boston University

Contact Information

nikos at cs dot bu dot edu

Department of Computer Science
111 Cummington St
Boston University
Boston, MA 02215, USA

Current Affiliation

Adjunct Assistant Professor, Department of Computer Science, Boston University
Member, BUSec group

Bio Sketch

Dr. Nikos Triandopoulos is a researcher with interests and experience that broadly span security, privacy and cryptography. From 2010 to 2016, he was a Principal Research Scientist at RSA Labs, carrying out research to discover and transfer to practice new innovative technologies in cloud security, identity management and enterprise security. Prior to RSA Labs, he held postdoc and research faculty positions at Dartmouth College, Aarhus University (Denmark), Boston University and Brown University. He has co-authored more than 30 journal or peer-review conference papers, and he has been awarded several US Patents and NSF Research Awards. He obtained his ScM and PhD in Computer Science from Brown, and his diploma in Computer Engineering & Informatics from University of Patras (Greece).

Current CVDBLP EntryGoogle ScholarPatents

Advised Students

Recent Academic Activities

Program Committee Member for:

Recent Publications – (Full Publication List

  1. Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, and David Kotz.
    Location privacy for mobile crowd sensing through population mapping
    . [pdf]
    Sensors
    2015.
  2. Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Authenticated hash tables based on cryptographic accumulators
    .
    Algorithmica
    2015.
  3. Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, and Nikos Triandopoulos.
    Zero-knowledge accumulators and set operations. [pdf]
    ePrint 404 2015.
  4. Ari Juels, James Kelley, Roberto Tamassia, and Nikos Triandopoulos.
    Falcon codes: Fast, authenticated LT codes (Or: Making Rapid Tornadoes unstoppable). [pdf]
    ACM CCS
    2015.
  5. Dimitrios Papadopoulos, Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Practical authenticated pattern matching with optimal proof size. [pdf]
    PVLDB
    2015.
  6. Dimitrios Papadopoulos, Stavros Papadopoulos, and Nikos Triandopoulos.
    Taking authenticated range queries to arbitrary dimensions. [pdf]
    ACM CCS 2014.
  7. Kevin D. Bowers, Catherine Hart, Ari Juels, and Nikos Triandopoulos.
    PillarBox: Combating next-generation malware with fast forward-secure logging. [pdf]
    RAID 2014.
  8. Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, and Nikos Triandopoulos.
    TRUESET: faster verifiable set computations. [pdf]
    USENIX Security 2014.
  9. Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, and Nikos Triandopoulos.
    Verifiable set operations over outsourced databases. [pdf]
    PKC 2014.
  10. Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, and Thomas Zacharias.
    Delegateable pseudorandom functions and applications. [pdf]
    ACM CCS 2013.
  11. Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos.
    Defending against the unknown enemy: Applying FLIPIT to system security. [pdf]
    GameSec 2012.
  12. Marten van Dijk, Ari Juels, Emil Stefanov, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos.
    Hourglass schemes: How to prove that cloud files are encrypted. [pdf]
    ACM CCS 2012.
  13. James Kelley, Roberto Tamassia, and Nikos Triandopoulos.
    Hardening access control and data protection in GFS-like file systems. [pdf]
    ESORICS 2012.
  14. Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, and Cristina Videira Lopes.
    Efficient verification of Web-content searching through authenticated Web crawlers. [pdf]
    PVLDB
    2012.
  15. Michael T. Goodrich, Roberto Tamassia, and Nikos Triandopoulos.
    Efficient authenticated data structures for graph connectivity and geometric search problems. [pdf]
    Algorithmica 2011.
  16. Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Optimal authentication of operations on dynamic sets. [pdf]
    CRYPTO 2011.
  17. Minho Shin, Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, and Nikos Triandopoulos.
    AnonySense: A system for anonymous opportunistic sensing. [pdf]
    Journal PMC
    2011.

Selected Older Publications

  1. Anna Lysyanskaya, Roberto Tamassia, and Nikos Triandopoulos.
    Authenticated error-correcting codes with applications to multicast authentication
    . [pdf]
    ACM TISSEC
    2010.
  2. Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Optimal authenticated data structures with multilinear forms. [pdf]
    Pairing 2010.
  3. Roberto Tamassia and Nikos Triandopoulos.
    Certification and authentication of data structures. [pdf]
    AMW 2010.
  4. Peter Bro Miltersen, Jesper Buus Nielsen, and Nikos Triandopoulos.
    Privacy-enhancing auctions using rational cryptography. [pdf]
    CRYPTO 2009.
  5. Ivan Damgård and Nikos Triandopoulos.
    Supporting non-membership proofs with bilinear-map accumulators. [pdf]
    ePrint 2008/538, 2008. Manuscript.
  6. Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Authenticated hash tables. [pdf]
    ACM CCS 2008.
  7. Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin, and Nikos Triandopoulos.
    AnonySense: Privacy-aware people-centric sensing. [pdf]
    ACM/USENIX MobiSys 2008.
  8. Apu Kapadia and Nikos Triandopoulos.
    Halo: High-assurance locate for distributed hash tables. [pdf]
    NDSS 2008.
  9. Anna Lysyanskaya and Nikos Triandopoulos.
    Rationality and adversarial behavior in multi-party computation. [pdf]
    CRYPTO 2006.
  10. Roberto Tamassia and Nikos Triandopoulos.
    Computational bounds on hierarchical data processing with applications to information security. [pdf]
    ICALP 2005.
  11. Anna Lysyanskaya, Roberto Tamassia, and Nikos Triandopoulos.
    Multicast authentication in fully adversarial networks. [pdf]
    IEEE Symp. S&P 2004.