Nikos Triandopoulos (home page)


Nikos Triandopoulos

Research Assistant Professor
Department of Computer Science & RISCS Center
Boston University

Contact Information

nikos at cs dot bu dot edu

Department of Computer Science
111 Cummington St
Boston University, Office: MCS 175
Boston, MA 02215, USA
+1 (617) 358 1184 (voice), +1 (617) 353 6457 (fax)

Bio Sketch

I am a Research Assistant Professor in the Department of Computer Science and the Center for Reliable Information Systems & Cyber Security (RISCS) at Boston University. I am a member of BU Security Group.
I also hold an adjunct research faculty position at Brown University's CS Department.

Before joining BU, I was a post-doctoral researcher in the Department of Computer Science at Aarhus University, Denmark, and in the Institute for Security, Technology, and Society at Dartmouth College.
I hold a Ph.D. and Sc.M. in Computer Science from Brown University and a diploma in Computer
Engineering and Informatics from the University of Patras, Greece.


Teaching

  • CSCI0040: "Introduction to Scientific Computing and Problem Solving", Spring 2010, Brown University

  • CSCI0040: "Introduction to Scientific Computing and Problem Solving", Spring 2009, Brown University

Research Interests

  • Information Security & Privacy
    •  theory and applications, trustworthy computing, secure data management

  • Network Security
    • security and privacy in peer-to-peer and sensor networks

  • Distributed System Security
    • secure distributed storage, secure cloud services

  • Secure Protocol Design
    • data authentication, secure protocols for rational parties

Research Projects

  • Cloud computing security: data authentication and trustworthy computing
  • Rational security: design and implementation of rationally secure protocols
  • Peer-to-peer network security: integrity and privacy in peer-to-peer storage systems
  • Sensor network security: integrity and privacy in mobile, human-centric sensor networks

Publications and Selected Research Papers

  1. M. T. Goodrich, J. Z. Sun, R. Tamassia and N. Triandopoulos, Reliable Resource Searching in P2P Networks. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm), LNICST, Volume 19, pp. 437—447, Springer,  Athens, Greece, September 2009.
  2. P. B. Miltersen, J. B. Nielsen and N. Triandopoulos, Privacy-Enhancing Auctions Using Rational Cryptography. In Proceedings of Annual International Cryptology Conference (CRYPTO), pp. 541–558, Springer, LNCS 5677, Santa Barbara CA, USA, August 2009. [Presentation]
  3. A. Kapadia, D. Kotz and N. Triandopoulos, Opportunistic Sensing, Security Challenges for the New Paradigm. In Proceedings of International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, January 2009. (Invited paper.)
  4. I. Damgård and N. Triandopoulos, Supporting Non-membership Proofs with Bilinear-map Accumulators. December 2008. Manuscript.
  5. C. Papamanthou, R. Tamassia and N. Triandopoulos, Authenticated Hash Tables. In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 437–448, Alexandria VA, USA, October 2008. [Full version]
  6. M. T. Goodrich, C. Papamanthou, R. Tamassia and N. Triandopoulos, Athos: Efficient Authentication of Outsourced File Systems. In Proceedings of Information Security Conference (ISC), pp. 80–96, Springer, LNCS 5222, Taipei, Taiwan, September 2008.
  7. C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin and N. Triandopoulos, AnonySense: Privacy-Aware People-Centric Sensing. In Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 211–224, Breckenridge CO, USA, June 2008.
  8. A. Kapadia, N. Triandopoulos, C. Cornelius, D. Peebles and D. Kotz, AnonySense: Opportunistic and Privacy-Preserving Context Collection.  In Proceedings of International Conference on Pervasive Computing (Pervasive), pp. 280–297, Springer, LNCS 5013, Sydney, Australia, May 2008.
  9. M. T. Goodrich, R. Tamassia and N. Triandopoulos, Super-Efficient Verification of Dynamic Outsourced Databases.  In Proceedings of RSA Conference - Cryptographers' Track (CT-RSA), pp. 407–424, Springer, LNCS 4964, San Francisco CA, USA, April 2008.
  10. A. Kapadia and N. Triandopoulos, Halo: High-Assurance Locate for Distributed Hash Tables.  In Proceedings of Annual Network & Distributed System Security Symposium (NDSS), pp. 61–79, San Diego CA, USA, February 2008.
  11. R. Tamassia and N. Triandopoulos, Certification and Authentication of Data Structures,  2007.
     Manuscript.
  12. Y. Ouyang, Z. Le, Y. Xu, N. Triandopoulos, S. Zhang, J. Ford, F. Makedon, Providing Anonymity in Wireless Sensor Networks.  In Proceedings of IEEE International Conference on Pervasive Services (ICPS), Istanbul, Turkey, July 2007.
  13. R. Tamassia and N. Triandopoulos, Efficient Content Authentication in Peer-to-Peer Networks.
     In Proceedings of International Conference on Applied Cryptography and Network Security (ACNS), pp. 354372, Springer, LNCS 4521, Zhuhai, China, June 2007.
  14. P. Johnson, A. Kapadia, D. Kotz and N. Triandopoulos, People-Centric Urban Sensing: Security Challenges for the New Paradigm. Technical Report TR2007-586, Dartmouth College, February 2007.
  15. A. Lysyanskaya and N. Triandopoulos, Rationality and Adversarial Behavior in Multi-Party Computation. In Proceedings of Annual International Cryptology Conference (CRYPTO), pp. 180197, Springer, LNCS 4117, Santa Barbara CA, USA, August 2006. [Full version]
  16. R. Tamassia and N. Triandopoulos, Computational Bounds on Hierarchical Data Processing with Applications to Information Security.  In Proceedings of International Colloquium on Automata, Languages and Programming (ICALP) -- Security and Cryptography Foundations (Track C), pp. 153165, Springer, LNCS 3580, Lisbon, Portugal, July 2005.
  17. A. Lysyanskaya, R. Tamassia and N. Triandopoulos, Multicast Authentication in Fully Adversarial Networks.  In Proceedings of IEEE Symposium on Security and Privacy (SSP), pp. 241255, Oakland CA, USA, May 2004.
  18. M. T. Goodrich, R. Tamassia, N. Triandopoulos and R. Cohen, Authenticated Data Structures for Graph and Geometric Searching.  In Proceedings of RSA Conference - Cryptographers' Track (CT-RSA), pp. 295313, Springer, LNCS 2612, San Francisco CA, USA, April 2003.
  19. R. Tamassia and N. Triandopoulos, On the Cost of Authenticated Data Structures.  Technical Report, Brown University, 2003.

Patents

  1. C. Papamanthou, R. Tamassia and N. Triandopoulos, “Methods providing data storage and access using authenticated hash tables”. U.S. patent application, August 2008.
  2. M. T. Goodrich, C. Papamanthou, R. Tamassia and N. Triandopoulos, “Apparatus, methods, and computer program products providing improved authentication for operations over an outsourced file system stored by an untrusted unit”. PCT and provisional U.S. patent application, US60/861,794, November 2006.
  3. M. T. Goodrich, R. Tamassia and N. Triandopoulos, “Super-efficient verification of dynamic outsourced databases”. PCT and provisional U.S. patent application, US60/833,878, July 2006.
  4. R. Tamassia and N. Triandopoulos, “Certification and authentication of data structures”. PCT and provisional U.S. patent application, US60/833,877, July 2006.
  5. M. T. Goodrich, R. Tamassia and N. Triandopoulos, “Load-balanced distributed authentication structures”. PCT and provisional U.S. patent application US60/833,876, July 2006.
  6. R. Tamassia and N. Triandopoulos, “Authenticated distributed hash tables”. PCT and provisional U.S. patent application US60/743,163, January 2006.