Aggelos Kiayias, Ph.D. - Publications

Affiliations: 
2002 City University of New York, New York, NY, United States 
Area:
Computer Science

36 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Patsonakis C, Samari K, Kiayias A, Roussopoulos M. Implementing a Smart Contract PKI Ieee Transactions On Engineering Management. 1-19. DOI: 10.1109/Tem.2020.2972638  0.389
2020 Kiayias A, Litos OST. A Composable Security Treatment of the Lightning Network Cell Structure and Function. 334-349. DOI: 10.1109/Csf49147.2020.00031  0.352
2019 Chondros N, Zhang B, Zacharias T, Diamantopoulos P, Maneas S, Patsonakis C, Delis A, Kiayias A, Roussopoulos M. Distributed, end-to-end verifiable, and privacy-preserving internet voting systems Computers & Security. 83: 268-299. DOI: 10.1016/J.Cose.2019.03.001  0.314
2016 Edman M, Kiayias A, Tang Q, Yener B. On the Security of Key Extraction From Measuring Physical Quantities Ieee Transactions On Information Forensics and Security. 11: 1796-1806. DOI: 10.1109/Tifs.2016.2543687  0.351
2015 Kiayias A, Leonardos N, Lipmaa H, Pavlyk K, Tang Q. Communication optimal tardos-based asymmetric fingerprinting Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9048: 469-486. DOI: 10.1007/978-3-319-16715-2_25  0.315
2014 Kiayias A, Raekow Y, Russell A, Shashidhar N. A one-time stegosystem and applications to efficient covert communication Journal of Cryptology. 27: 23-44. DOI: 10.1007/S00145-012-9135-4  0.387
2011 Choi SG, Kiayias A, Malkin T. BiTR: Built-in tamper resilience Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7073: 740-758. DOI: 10.1007/978-3-642-25385-0_40  0.338
2010 Kiayias A, Yung M. Tree-homomorphic encryption and scalable hierarchical secret-ballot elections Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 257-271. DOI: 10.1007/978-3-642-14577-3_20  0.463
2010 Kiayias A, Pehlivanoglu S. Improving the round complexity of traitor tracing schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6123: 273-290. DOI: 10.1007/978-3-642-13708-2_17  0.32
2010 Kiayias A, Yung M. The vector-ballot approach for online voting procedures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6000: 155-174. DOI: 10.1007/978-3-642-12980-3_9  0.55
2009 Kiayias A, Pehlivanoglu S. On the security of a public-key traitor tracing scheme with sublinear ciphertext size Proceedings of the Acm Conference On Computer and Communications Security. 1-10. DOI: 10.1145/1655048.1655050  0.325
2009 Kiayias A. Robust fingerprinting codes and applications Proceedings of Spie - the International Society For Optical Engineering. 7254. DOI: 10.1117/12.810749  0.317
2009 Kiayias A, Zhou HS. Hidden identity-based signatures Iet Information Security. 3: 119-127. DOI: 10.1049/Iet-Ifs.2007.0151  0.377
2008 Kiayias A, Yung M. Public-key traitor tracing from efficient decoding and unbounded enrollment Proceedings of the Acm Conference On Computer and Communications Security. 9-17. DOI: 10.1145/1456520.1456525  0.474
2007 Bleichenbacher D, Kiayias A, Yung M. Decoding interleaved Reed-Solomon codes over noisy channels Theoretical Computer Science. 379: 348-360. DOI: 10.1016/J.Tcs.2007.02.043  0.509
2006 Kiayias A, Yung M. Secure scalable group signature with dynamic joins and separable authorities International Journal of Security and Networks. 1: 24-45. DOI: 10.1504/Ijsn.2006.010821  0.571
2006 Kiayias A, Yung M. Efficient cryptographic protocols realizing E-markets with price discrimination Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 311-325.  0.417
2005 Kiayias A, Yung M. Cryptography and decoding reed-solomon codes as a hard problem 2005 Ieee Information Theory Workshop On Theory and Practice in Information-Theoretic Security. 2005: 48. DOI: 10.1109/ITWTPI.2005.1543956  0.492
2005 Kiayias A, Yung M. Efficient secure group signatures with dynamic joins and keeping anonymity against group managers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3715: 151-170. DOI: 10.1007/11554868_11  0.552
2005 Kiayias A, Yung M. Group signatures with efficient concurrent join Lecture Notes in Computer Science. 3494: 198-214.  0.444
2004 Kiayias A, Yung M. Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3329: 401-416. DOI: 10.1007/S10623-007-9055-8  0.547
2004 Kiayias A, Yung M. Directions in polynomial reconstruction based cryptography Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 978-985.  0.419
2004 Kiayias A, Yung M. DRM 2004: Proceeding of the Fourth ACM Workshop on Digital Rights Management: Foreword Drm 2004: Proceedings of the Fourth Acm Workshop On Digital Rights Management 0.4
2004 Kiayias A, Yung M. The vector-ballot e-voting approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3110: 72-89.  0.415
2004 Dodis Y, Kiayias A, Nicolosi A, Shoup V. Anonymous identification in ad hoc groups Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 609-626.  0.302
2003 Dodis Y, Fazio N, Kiayias A, Yung M. Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199. DOI: 10.1007/S00446-004-0120-5  0.556
2003 Kiayias A, Yung M. Extracting group signatures from traitor tracing schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2656: 630-648.  0.467
2003 Kiayias A, Yung M. Non-interactive zero-sharing with applications to private distributed decision making Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2742: 303-320.  0.4
2003 Kiayias A, Yung M. Breaking and repairing asymmetric public-key traitor tracing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 32-50.  0.409
2002 Kiayias A, Yung M. Cryptographic hardness based on the decoding of Reed-Solomon Codes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2380: 232-243. DOI: 10.1109/Tit.2008.921876  0.546
2002 Kiayias A, Yung M. On crafty pirates and foxy tracers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2320: 22-39. DOI: 10.1007/3-540-47870-1_3  0.538
2002 Kiayias A, Yung M. Self-tallying elections and perfect ballot secrecy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2274: 141-158. DOI: 10.1007/3-540-45664-3_10  0.508
2002 Kiayias A, Yung M. Traitor tracing with constant transmission rate Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 450-465.  0.541
2001 Kiayias A, Yung M. Secure games with polynomial expressions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2076: 939-950.  0.52
2001 Kiayias A, Yung M. Polynomial reconstruction based cryptography (A short survey) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2259: 129-133.  0.518
2001 Kiayias A, Yung M. Self protecting pirates and black-box traitor tracing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 63-79.  0.389
Show low-probability matches.