Search Results - "Mitrokotsa, Aikaterini"
-
1
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
Published in Ad hoc networks (01-01-2013)“…Intrusion detection is frequently used as a second line of defense in Mobile Ad-hoc Networks (MANETs). In this paper we examine how to properly use…”
Get full text
Journal Article -
2
Unbounded Predicate Inner Product Functional Encryption from Pairings
Published in Journal of cryptology (01-07-2023)“…Predicate inner product functional encryption (P-IPFE) is essentially attribute-based IPFE (AB-IPFE) which additionally hides attributes associated to…”
Get full text
Journal Article -
3
Homomorphic signcryption with public plaintext‐result checkability
Published in IET information security (01-09-2021)“…Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees. This…”
Get full text
Journal Article -
4
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
Published in Cryptography (01-09-2020)“…Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These…”
Get full text
Journal Article -
5
Statically Aggregate Verifiable Random Functions and Application to E-Lottery
Published in Cryptography (01-12-2020)“…Cohen, Goldwasser, and Vaikuntanathan (TCC’15) introduced the concept of aggregate pseudo-random functions (PRFs), which allow efficiently computing the…”
Get full text
Journal Article -
6
Privacy-Preserving Biometric Authentication: Challenges and Directions
Published in Security and communication networks (01-01-2017)“…An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as…”
Get full text
Journal Article -
7
Decentralised Functional Signatures
Published in Mobile networks and applications (01-06-2019)“…With the rapid development of the Internet of Things (IoT) a lot of critical information is shared however without having guarantees about the origin and…”
Get full text
Journal Article -
8
Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close
Published in IEEE communications letters (01-07-2016)“…The use of wireless communications has had tremendous expansion and has led to the development of wearable devices with limited resources. Often, to gain…”
Get full text
Journal Article -
9
Near-optimal blacklisting
Published in Computers & security (01-01-2017)“…Many applications involve agents sharing a resource, such as networks or services. When agents are honest, the system functions well and there is a net profit…”
Get full text
Journal Article -
10
DDoS attacks and defense mechanisms: classification and state-of-the-art
Published in Computer networks (Amsterdam, Netherlands : 1999) (05-04-2004)“…Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in today’s Internet. Of particular concern are…”
Get full text
Journal Article -
11
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context
Published in Computers & security (01-09-2018)“…•Physical context can enables proximity verification and key establishment.•We classify and survey the main approaches to security with physical context.•We…”
Get full text
Journal Article -
12
Classifying RFID attacks and defenses
Published in Information systems frontiers (01-11-2010)“…RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a…”
Get full text
Journal Article -
13
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours
Published in IEEE communications letters (01-07-2015)“…Distance-bounding protocols allow devices to cryptographically verify the physical proximity of two parties and is a prominent secure neighbour detection…”
Get full text
Journal Article -
14
HB+DB: Distance bounding meets human based authentication
Published in Future generation computer systems (01-03-2018)“…Authentication for resource-constrained devices is seen as one of the major challenges in current wireless communication networks. The HB+ protocol by Juels…”
Get full text
Journal Article -
15
Location leakage in distance bounding: Why location privacy does not work
Published in Computers & security (01-09-2014)“…In many cases, we can only have access to a service by proving we are sufficiently close to a particular location (e.g. in automobile or building access…”
Get full text
Journal Article -
16
Evaluation of classification algorithms for intrusion detection in MANETs
Published in Knowledge-based systems (01-12-2012)“…Mobile Ad hoc Networks (MANETs) are wireless networks without fixed infrastructure based on the cooperation of independent mobile nodes. The proliferation of…”
Get full text
Journal Article -
17
Special issue on recent advances in physical-layer security
Published in Computer networks (Amsterdam, Netherlands : 1999) (09-11-2016)Get full text
Journal Article -
18
Lattice-Based Simulatable VRFs: Challenges and Future Directions
Published in Journal of internet services and information security (2018)“…Lattice-based cryptography is evolving rapidly and is often employed to design cryptographic primitives that hold a great promise to be post-quantum resistant…”
Get full text
Journal Article -
19
A comprehensive RFID solution to enhance inpatient medication safety
Published in International journal of medical informatics (Shannon, Ireland) (01-01-2011)“…Abstract Errors involving medication administration can be costly, both in financial and in human terms. Indeed, there is much potential for errors due to the…”
Get full text
Journal Article -
20
VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the Internet of Things
Published in Pervasive and mobile computing (01-09-2018)“…Smartphones are a key enabling technology in the Internet of Things (IoT) for gathering crowd-sensed data. However, collecting crowd-sensed data for research…”
Get full text
Journal Article