Year |
Citation |
Score |
2020 |
Patsonakis C, Samari K, Kiayias A, Roussopoulos M. Implementing a Smart Contract PKI Ieee Transactions On Engineering Management. 1-19. DOI: 10.1109/Tem.2020.2972638 |
0.389 |
|
2020 |
Kiayias A, Litos OST. A Composable Security Treatment of the Lightning Network Cell Structure and Function. 334-349. DOI: 10.1109/Csf49147.2020.00031 |
0.352 |
|
2019 |
Chondros N, Zhang B, Zacharias T, Diamantopoulos P, Maneas S, Patsonakis C, Delis A, Kiayias A, Roussopoulos M. Distributed, end-to-end verifiable, and privacy-preserving internet voting systems Computers & Security. 83: 268-299. DOI: 10.1016/J.Cose.2019.03.001 |
0.314 |
|
2016 |
Edman M, Kiayias A, Tang Q, Yener B. On the Security of Key Extraction From Measuring Physical Quantities Ieee Transactions On Information Forensics and Security. 11: 1796-1806. DOI: 10.1109/Tifs.2016.2543687 |
0.351 |
|
2015 |
Kiayias A, Leonardos N, Lipmaa H, Pavlyk K, Tang Q. Communication optimal tardos-based asymmetric fingerprinting Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9048: 469-486. DOI: 10.1007/978-3-319-16715-2_25 |
0.315 |
|
2014 |
Kiayias A, Raekow Y, Russell A, Shashidhar N. A one-time stegosystem and applications to efficient covert communication Journal of Cryptology. 27: 23-44. DOI: 10.1007/S00145-012-9135-4 |
0.387 |
|
2011 |
Choi SG, Kiayias A, Malkin T. BiTR: Built-in tamper resilience Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7073: 740-758. DOI: 10.1007/978-3-642-25385-0_40 |
0.338 |
|
2010 |
Kiayias A, Yung M. Tree-homomorphic encryption and scalable hierarchical secret-ballot elections Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 257-271. DOI: 10.1007/978-3-642-14577-3_20 |
0.463 |
|
2010 |
Kiayias A, Pehlivanoglu S. Improving the round complexity of traitor tracing schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6123: 273-290. DOI: 10.1007/978-3-642-13708-2_17 |
0.32 |
|
2010 |
Kiayias A, Yung M. The vector-ballot approach for online voting procedures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6000: 155-174. DOI: 10.1007/978-3-642-12980-3_9 |
0.55 |
|
2009 |
Kiayias A, Pehlivanoglu S. On the security of a public-key traitor tracing scheme with sublinear ciphertext size Proceedings of the Acm Conference On Computer and Communications Security. 1-10. DOI: 10.1145/1655048.1655050 |
0.325 |
|
2009 |
Kiayias A. Robust fingerprinting codes and applications Proceedings of Spie - the International Society For Optical Engineering. 7254. DOI: 10.1117/12.810749 |
0.317 |
|
2009 |
Kiayias A, Zhou HS. Hidden identity-based signatures Iet Information Security. 3: 119-127. DOI: 10.1049/Iet-Ifs.2007.0151 |
0.377 |
|
2008 |
Kiayias A, Yung M. Public-key traitor tracing from efficient decoding and unbounded enrollment Proceedings of the Acm Conference On Computer and Communications Security. 9-17. DOI: 10.1145/1456520.1456525 |
0.474 |
|
2007 |
Bleichenbacher D, Kiayias A, Yung M. Decoding interleaved Reed-Solomon codes over noisy channels Theoretical Computer Science. 379: 348-360. DOI: 10.1016/J.Tcs.2007.02.043 |
0.509 |
|
2006 |
Kiayias A, Yung M. Secure scalable group signature with dynamic joins and separable authorities International Journal of Security and Networks. 1: 24-45. DOI: 10.1504/Ijsn.2006.010821 |
0.571 |
|
2006 |
Kiayias A, Yung M. Efficient cryptographic protocols realizing E-markets with price discrimination Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 311-325. |
0.417 |
|
2005 |
Kiayias A, Yung M. Cryptography and decoding reed-solomon codes as a hard problem 2005 Ieee Information Theory Workshop On Theory and Practice in Information-Theoretic Security. 2005: 48. DOI: 10.1109/ITWTPI.2005.1543956 |
0.492 |
|
2005 |
Kiayias A, Yung M. Efficient secure group signatures with dynamic joins and keeping anonymity against group managers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3715: 151-170. DOI: 10.1007/11554868_11 |
0.552 |
|
2005 |
Kiayias A, Yung M. Group signatures with efficient concurrent join Lecture Notes in Computer Science. 3494: 198-214. |
0.444 |
|
2004 |
Kiayias A, Yung M. Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3329: 401-416. DOI: 10.1007/S10623-007-9055-8 |
0.547 |
|
2004 |
Kiayias A, Yung M. Directions in polynomial reconstruction based cryptography Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 978-985. |
0.419 |
|
2004 |
Kiayias A, Yung M. DRM 2004: Proceeding of the Fourth ACM Workshop on Digital Rights Management: Foreword Drm 2004: Proceedings of the Fourth Acm Workshop On Digital Rights Management. |
0.4 |
|
2004 |
Kiayias A, Yung M. The vector-ballot e-voting approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3110: 72-89. |
0.415 |
|
2004 |
Dodis Y, Kiayias A, Nicolosi A, Shoup V. Anonymous identification in ad hoc groups Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 609-626. |
0.302 |
|
2003 |
Dodis Y, Fazio N, Kiayias A, Yung M. Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199. DOI: 10.1007/S00446-004-0120-5 |
0.556 |
|
2003 |
Kiayias A, Yung M. Extracting group signatures from traitor tracing schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2656: 630-648. |
0.467 |
|
2003 |
Kiayias A, Yung M. Non-interactive zero-sharing with applications to private distributed decision making Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2742: 303-320. |
0.4 |
|
2003 |
Kiayias A, Yung M. Breaking and repairing asymmetric public-key traitor tracing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 32-50. |
0.409 |
|
2002 |
Kiayias A, Yung M. Cryptographic hardness based on the decoding of Reed-Solomon Codes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2380: 232-243. DOI: 10.1109/Tit.2008.921876 |
0.546 |
|
2002 |
Kiayias A, Yung M. On crafty pirates and foxy tracers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2320: 22-39. DOI: 10.1007/3-540-47870-1_3 |
0.538 |
|
2002 |
Kiayias A, Yung M. Self-tallying elections and perfect ballot secrecy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2274: 141-158. DOI: 10.1007/3-540-45664-3_10 |
0.508 |
|
2002 |
Kiayias A, Yung M. Traitor tracing with constant transmission rate Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 450-465. |
0.541 |
|
2001 |
Kiayias A, Yung M. Secure games with polynomial expressions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2076: 939-950. |
0.52 |
|
2001 |
Kiayias A, Yung M. Polynomial reconstruction based cryptography (A short survey) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2259: 129-133. |
0.518 |
|
2001 |
Kiayias A, Yung M. Self protecting pirates and black-box traitor tracing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 63-79. |
0.389 |
|
Show low-probability matches. |