Search Results - "Mitrokotsa, Aikaterini"

Refine Results
  1. 1

    Intrusion detection in MANET using classification algorithms: The effects of cost and model selection by Mitrokotsa, Aikaterini, Dimitrakakis, Christos

    Published in Ad hoc networks (01-01-2013)
    “…Intrusion detection is frequently used as a second line of defense in Mobile Ad-hoc Networks (MANETs). In this paper we examine how to properly use…”
    Get full text
    Journal Article
  2. 2

    Unbounded Predicate Inner Product Functional Encryption from Pairings by Dowerah, Uddipana, Dutta, Subhranil, Mitrokotsa, Aikaterini, Mukherjee, Sayantan, Pal, Tapas

    Published in Journal of cryptology (01-07-2023)
    “…Predicate inner product functional encryption (P-IPFE) is essentially attribute-based IPFE (AB-IPFE) which additionally hides attributes associated to…”
    Get full text
    Journal Article
  3. 3

    Homomorphic signcryption with public plaintext‐result checkability by Li, Shimin, Liang, Bei, Mitrokotsa, Aikaterini, Xue, Rui

    Published in IET information security (01-09-2021)
    “…Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees. This…”
    Get full text
    Journal Article
  4. 4

    Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing by Tsaloli, Georgia, Banegas, Gustavo, Mitrokotsa, Aikaterini

    Published in Cryptography (01-09-2020)
    “…Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These…”
    Get full text
    Journal Article
  5. 5

    Statically Aggregate Verifiable Random Functions and Application to E-Lottery by Liang, Bei, Banegas, Gustavo, Mitrokotsa, Aikaterini

    Published in Cryptography (01-12-2020)
    “…Cohen, Goldwasser, and Vaikuntanathan (TCC’15) introduced the concept of aggregate pseudo-random functions (PRFs), which allow efficiently computing the…”
    Get full text
    Journal Article
  6. 6

    Privacy-Preserving Biometric Authentication: Challenges and Directions by Pagnin, Elena, Mitrokotsa, Aikaterini

    Published in Security and communication networks (01-01-2017)
    “…An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as…”
    Get full text
    Journal Article
  7. 7

    Decentralised Functional Signatures by Liang, Bei, Mitrokotsa, Aikaterini

    Published in Mobile networks and applications (01-06-2019)
    “…With the rapid development of the Internet of Things (IoT) a lot of critical information is shared however without having guarantees about the origin and…”
    Get full text
    Journal Article
  8. 8

    Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close by Karlsson, Christoffer, Mitrokotsa, Aikaterini

    Published in IEEE communications letters (01-07-2016)
    “…The use of wireless communications has had tremendous expansion and has led to the development of wearable devices with limited resources. Often, to gain…”
    Get full text
    Journal Article
  9. 9

    Near-optimal blacklisting by Dimitrakakis, Christos, Mitrokotsa, Aikaterini

    Published in Computers & security (01-01-2017)
    “…Many applications involve agents sharing a resource, such as networks or services. When agents are honest, the system functions well and there is a net profit…”
    Get full text
    Journal Article
  10. 10

    DDoS attacks and defense mechanisms: classification and state-of-the-art by Douligeris, Christos, Mitrokotsa, Aikaterini

    “…Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in today’s Internet. Of particular concern are…”
    Get full text
    Journal Article
  11. 11

    Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context by Hu, Qiao, Zhang, Jingyi, Mitrokotsa, Aikaterini, Hancke, Gerhard

    Published in Computers & security (01-09-2018)
    “…•Physical context can enables proximity verification and key establishment.•We classify and survey the main approaches to security with physical context.•We…”
    Get full text
    Journal Article
  12. 12

    Classifying RFID attacks and defenses by Mitrokotsa, Aikaterini, Rieback, Melanie R., Tanenbaum, Andrew S.

    Published in Information systems frontiers (01-11-2010)
    “…RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a…”
    Get full text
    Journal Article
  13. 13

    Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours by Pagnin, Elena, Hancke, Gerhard, Mitrokotsa, Aikaterini

    Published in IEEE communications letters (01-07-2015)
    “…Distance-bounding protocols allow devices to cryptographically verify the physical proximity of two parties and is a prominent secure neighbour detection…”
    Get full text
    Journal Article
  14. 14

    HB+DB: Distance bounding meets human based authentication by Pagnin, Elena, Yang, Anjia, Hu, Qiao, Hancke, Gerhard, Mitrokotsa, Aikaterini

    Published in Future generation computer systems (01-03-2018)
    “…Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB+  protocol by Juels…”
    Get full text
    Journal Article
  15. 15

    Location leakage in distance bounding: Why location privacy does not work by Mitrokotsa, Aikaterini, Onete, Cristina, Vaudenay, Serge

    Published in Computers & security (01-09-2014)
    “…In many cases, we can only have access to a service by proving we are sufficiently close to a particular location (e.g. in automobile or building access…”
    Get full text
    Journal Article
  16. 16

    Evaluation of classification algorithms for intrusion detection in MANETs by Pastrana, Sergio, Mitrokotsa, Aikaterini, Orfila, Agustin, Peris-Lopez, Pedro

    Published in Knowledge-based systems (01-12-2012)
    “…Mobile Ad hoc Networks (MANETs) are wireless networks without fixed infrastructure based on the cooperation of independent mobile nodes. The proliferation of…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Lattice-Based Simulatable VRFs: Challenges and Future Directions by Brunetta, Carlo, Liang, Bei, Mitrokotsa, Aikaterini

    “…Lattice-based cryptography is evolving rapidly and is often employed to design cryptographic primitives that hold a great promise to be post-quantum resistant…”
    Get full text
    Journal Article
  19. 19

    A comprehensive RFID solution to enhance inpatient medication safety by Peris-Lopez, Pedro, Orfila, Agustin, Mitrokotsa, Aikaterini, van der Lubbe, Jan C.A

    “…Abstract Errors involving medication administration can be costly, both in financial and in human terms. Indeed, there is much potential for errors due to the…”
    Get full text
    Journal Article
  20. 20