Nikos Triandopoulos' Publications

Journal Publications

  1. Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Authenticated hash tables based on cryptographic accumulators
    . [pdf]
    Algorithmica
    , 74(2):664–712, 2016.
  2. Dimitrios Papadopoulos, Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Practical authenticated pattern matching with optimal proof size. [pdf]
    In Proceedings of the VLDB Endowment (PVLDB)
    , 8(7): 750–761, Kohala Coast, HI, September, 2015.
  3. Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, and David Kotz.
    Location privacy for mobile crowd sensing through population mapping
    . [pdf]
    Sensors
    , June 2015. DOI: 10.3390/s150715285.
  4. Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, and Cristina Videira Lopes.
    Efficient verification of Web-content searching through authenticated Web crawlers. [pdf] [full]
    In Proceedings of the VLDB Endowment (PVLDB), 5(10):920–931, Istanbul, Turkey, August 2012.
  5. Michael T. Goodrich, Roberto Tamassia, and Nikos Triandopoulos.
    Efficient authenticated data structures for graph connectivity and geometric search problems. [pdf]
    Algorithmica, 60(3):505–552, 2011.
  6. Minho Shin, Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, and Nikos Triandopoulos.
    AnonySense: A system for anonymous opportunistic sensing. [pdf]
    Journal of Pervasive and Mobile Computing (PMC)
    , 7(1):16-30, 2011.
  7. Anna Lysyanskaya, Roberto Tamassia, and Nikos Triandopoulos.
    Authenticated error-correcting codes with applications to multicast authentication
    . [pdf]
    ACM Transactions on Information and System Security (TISSEC)
    , 13(2), 2010.

Conference and Other Publications (Preprints, Technical Reports, Manuscripts)

  1. Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, and Nikos Triandopoulos.
    Zero-knowledge accumulators and set operations. [pdf]
    IACR Cryptology ePrint Archive 2015: 404, 2015.
  2. Ari Juels, James Kelley, Roberto Tamassia, and Nikos Triandopoulos.
    Falcon codes: Fast, authenticated LT codes (Or: Making Rapid Tornadoes unstoppable). [pdf]
    In Proceedings of ACM Conference on Computer and Communications Security (CCS)
    , pp. 1032–1047, Denver, CO, October, 2015.
  3. Dimitrios Papadopoulos, Stavros Papadopoulos, and Nikos Triandopoulos.
    Taking authenticated range queries to arbitrary dimensions. [pdf]
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 819–830, Scottsdale, AZ, November, 2014.
  4. Kevin D. Bowers, Catherine Hart, Ari Juels, and Nikos Triandopoulos.
    PillarBox: Combating next-generation malware with fast forward-secure logging. [pdf] [full]
    In Proceedings International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pp. 46–67, Gothenburg, Sweden, September, 2014.
  5. Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, and Nikos Triandopoulos.
    TRUESET: faster verifiable set computations. [pdf] [full]
    In Proceedings of USENIX Security Symposium, pp. 765–780, San Diego, CA, August, 2014.
  6. Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, and Nikos Triandopoulos.
    Verifiable set operations over outsourced databases. [pdf] [full]
    In Proceedings of International Conference on Practice and Theory of Public-Key Cryptography (PKC), pp. 113–130, Buenos Aires, Argentina, March, 2014.
  7. Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, and Thomas Zacharias.
    Delegateable pseudorandom functions and applications. [pdf] [full]
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 669–684, Berlin, Germany, November 2013.
  8. Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos.
    Defending against the unknown enemy: Applying FLIPIT to system security. [pdf] [full]
    In Proceedings of Conference on Decision and Game Theory for Security (GameSec), LNCS, Vol. 7638, Springer, pp. 248–263, Budapest, Hungary, November 2012.
  9. Marten van Dijk, Ari Juels, Emil Stefanov, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos.
    Hourglass schemes: How to prove that cloud files are encrypted. [pdf]
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 265–280, Raleigh, NC, USA, October 2012.
  10. James Kelley, Roberto Tamassia, and Nikos Triandopoulos.
    Hardening access control and data protection in GFS-like file systems. [pdf]
    In Proceedings of European Symposium on Research in Computer Security (ESORICS), LNCS, Vol. 7459, Springer, pp. 19–36, Pisa, Italy, September 2012.
  11. Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Optimal authentication of operations on dynamic sets. [pdf] [full]
    In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 6841, Springer, pp. 91–110, Santa Barbara CA, USA, August 2011.
  12. Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Optimal authenticated data structures with multilinear forms. [pdf]
    In Proceedings of International Conference on Pairing-based Cryptography (Pairing), LNCS, Vol. 6487, Springer, pp. 246–264, Yamanaka, Japan, December 2010.
  13. Roberto Tamassia and Nikos Triandopoulos.
    Certification and authentication of data structures. [pdf]
    In Proceedings of Alberto Mendelzon International Workshop on Foundations of Data Management (AMW), Buenos Aires, Argentina, May 2010.
  14. Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, and Nikos Triandopoulos.
    Reliable resource searching in P2P networks. [pdf]
    In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm), LNICST, Vol. 19, Springer, pp. 437–447, Athens, Greece, September 2009.
  15. Peter Bro Miltersen, Jesper Buus Nielsen, and Nikos Triandopoulos.
    Privacy-enhancing auctions using rational cryptography. [pdf] [full]
    In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 5677, Springer, pp. 541–558, Santa Barbara CA, USA, August 2009.
  16. Apu Kapadia, David Kotz, and Nikos Triandopoulos.
    Opportunistic sensing: Security challenges for the new paradigm. [pdf]
    In Proceedings of 1st International Conference on Communication Systems and Networks (COMSNETS), pp. 1–10, Bangalore, India, January 2009. (Invited paper.)
  17. Ivan Damgård and Nikos Triandopoulos.
    Supporting non-membership proofs with bilinear-map accumulators. [pdf]
    IACR Cryptology ePrint Archive 2008: 538, December 2008.
  18. Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Authenticated hash tables. [pdf] [full]
    In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 437–448, Alexandria VA, USA, October 2008.
  19. Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, and Nikos Triandopoulos.
    Athos: Efficient authentication of outsourced file systems. [pdf]
    In Proceedings of Information Security Conference (ISC), LNCS, Vol. 5222, Springer, pp. 80–96, Taipei, Taiwan, September 2008.
  20. Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin, and Nikos Triandopoulos.
    AnonySense: Privacy-aware people-centric sensing. [pdf]
    In Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 211–224, Breckenridge CO, USA, June 2008.
  21. Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Daniel Peebles, and David Kotz.
    AnonySense: Opportunistic and privacy-preserving context collection. [pdf]
    In Proceedings of International Conference on Pervasive Computing (Pervasive), LNCS, Vol. 5013, Springer, pp. 280–297, Sydney, Australia, May 2008.
  22. Michael T. Goodrich, Roberto Tamassia, and Nikos Triandopoulos.
    Super-efficient verification of dynamic outsourced databases. [pdf]
    In Proceedings of CT-RSA Conference, LNCS, Vol. 4964, Springer, pp. 407–424, San Francisco CA, USA, April 2008.
  23. Apu Kapadia and Nikos Triandopoulos.
    Halo: High-assurance locate for distributed hash tables. [pdf]
    In Proceedings of Annual Network & Distributed System Security Symposium (NDSS), pp. 61–79, San Diego CA, USA, February 2008.
  24. Yi Ouyang, Zhengyi Le, Yurong Xu, Nikos Triandopoulos, Sheng Zhang, James Ford, and Fillia Makedon.
    Providing anonymity in wireless sensor networks. [pdf]
    In Proceedings of IEEE International Conference on Pervasive Services (ICPS), Istanbul, Turkey, July 2007.
  25. Roberto Tamassia and Nikos Triandopoulos.
    Efficient content authentication in peer-to-peer networks. [pdf]
    In Proceedings of International Conference on Applied Cryptography and Network Security (ACNS), LNCS, Vol. 4521, Springer, pp. 354–372, Zhuhai, China, June 2007.
  26. Peter Johnson, Apu Kapadia, David Kotz, and Nikos Triandopoulos.
    People-centric urban sensing: Security challenges for the new paradigm. [pdf]
    Technical Report TR2007–586, Dartmouth College, Computer Science, Hanover, NH, February 2007.
  27. Anna Lysyanskaya and Nikos Triandopoulos.
    Rationality and adversarial behavior in multi-party computation. [pdf]
    In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 4117, Springer, pp. 180–197, Santa Barbara CA, USA, August 2006.
  28. Roberto Tamassia and Nikos Triandopoulos.
    Computational bounds on hierarchical data processing with applications to information security. [pdf]
    In Proceedings of International Colloquium on Automata, Languages and Programming (ICALP), Track C: Security and Cryptography Foundations, LNCS, Vol. 3580, Springer, pp. 153–165, Lisbon, Portugal, July 2005.
  29. Anna Lysyanskaya, Roberto Tamassia, and Nikos Triandopoulos.
    Multicast authentication in fully adversarial networks. [pdf]
    In Proceedings of IEEE Symposium on Security and Privacy (SSP - Oakland), pp. 241–255, Oakland CA, USA, May 2004.
  30. Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, and Robert Cohen.
    Authenticated data structures for graph and geometric searching. [pdf]
    In Proceedings of CT–RSA Conference, LNCS, Vol. 2612, Springer, pp. 295–313, San Francisco CA, USA, April 2003.
  31. Roberto Tamassia and Nikos Triandopoulos.
    On the cost of authenticated data structures. [pdf]
    Technical Report, Center for Geometric Computing, Brown University, 2003.