Search results

  • Conference contribution

    Passtrans: An Improved Password Reuse Model Based on Transformer

    He, X., Cheng, H., Xie, J., Wang, P. & Liang, K., 2022, Proceedings of the ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE, p. 3044-3048 5 p. 9746731

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    49 Downloads (Pure)
  • Performance analysis of multilayer perceptron in profiling side-channel analysis

    Weissbart, L., 2020, Applied Cryptography and Network Security Workshops : ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA. Zhou, J., Ahmed, C. M., Conti, M., Losiouk, E., Au, M. H., Batina, L., Li, Z., Lin, J., Luo, B., Majumdar, S., Meng, W., Ochoa, M., Picek, S., Portokalidis, G., Wang, C. & Zhang, K. (eds.). Cham: Springer, p. 198-216 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12418 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Per Priority Data Rate Measurement in Data Plane

    Mostafaei, H. & Smaragdakis, G., 2023, EuroP4 '23: Proceedings of the 6th on European P4 WorkshopD. Gurevich, V. & Signorello, S. (eds.). p. 9-15 7 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    19 Downloads (Pure)
  • Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel

    Spolaor, R., Liu, H., Turrin, F., Conti, M. & Cheng, X., 2023, Proceedings of the INFOCOM 2023 - IEEE International Conference on Computer Communications. Danvers: IEEE, 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Downloads (Pure)
  • Popularity-Based Detection of Domain Generation Algorithms

    Abbink, J. & Doerr, C., 2017, ARES 2017: Proceedings of the 12th International Conference on Availability, Reliability and Security. New York, NY: Association for Computing Machinery (ACM), p. 1-8 8 p. 79

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Poster: Recovering the input of neural networks via single shot side-channel attacks

    Batina, L., Bhasin, S., Jap, D. & Picek, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2657-2659 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    16 Citations (Scopus)
  • Poster: When adversary becomes the guardian - Towards side-channel security with adversarial attacks

    Picek, S., Jap, D. & Bhasin, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2673-2675 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Poster: Clean-label Backdoor Attack on Graph Neural Networks

    Xu, J. & Picek, S., 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 3491-3493 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    261 Downloads (Pure)
  • Post-quantum adaptor signatures and payment channel networks

    Esgin, M. F., Ersoy, O. & Erkin, Z., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings: 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Part II ed. Cham: Springer, p. 378-397 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    12 Citations (Scopus)
    80 Downloads (Pure)
  • Post-quantum WireGuard

    Hulsing, A., Ning, K. C., Schwabe, P., Weber, F. & Zimmermann, P. R., 2021, 2021 IEEE Symposium on Security and Privacy (SP): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 304-321 18 p. 9519445

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    18 Citations (Scopus)
  • Practical Exchange for Unique Digital Goods

    Ersoy, O., Genç, Z. A., Erkin, Z. & Conti, M., 2021, 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS): Proceedings. O'Conner, L. (ed.). Piscataway: IEEE, p. 49-58 10 p. 9566170

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    28 Downloads (Pure)
  • Practical Verifiable & Privacy-Preserving Double Auctions

    Memar Zahedani, A., Vos, J. & Erkin, Z., 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery (ACM), 9 p. 25. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    22 Downloads (Pure)
  • PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model

    Ugwuoke, C., Erkin, Z., Reinders, M. & Lagendijk, R., 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Carminati, B. & Kantarcioglu, M. (eds.). Association for Computing Machinery (ACM), p. 329-340 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    92 Downloads (Pure)
  • PRIDE: A Privacy-Preserving Decentralised Key Management System

    Kester, D., Li, T. & Erkin, Z., 2022, Proceedings of the 2022 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    21 Downloads (Pure)
  • Privacy concerns and protection measures in online behavioural advertising

    Helsloot, L. J., Tillem, G. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 89-96 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy-Friendly De-Authentication with BLUFADE: Blurred Face Detection

    Cardaioli, M., Conti, M., Tricomi, P. P. & Tsudik, G., 2022, 2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 197-206 10 p. (2022 IEEE International Conference on Pervasive Computing and Communications, PerCom 2022).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    528 Downloads (Pure)
  • Privacy-Preserving Alpha Algorithm for Software Analysis

    Tillem, G., Erkin, Z. & Lagendijk, I., 2016, 37th WIC Symposium on Information Theory in the Benelux / 6th WIC/IEEE SP Symposium on Information Theory and Signal Processing in the Benelux. p. 136-143 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    264 Downloads (Pure)
  • Privacy-Preserving Collection and Retrieval of Medical Wearables Data

    Nateghizad, M., Maulany, C. & Erkin, Z., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 141-148 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    71 Downloads (Pure)
  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation

    Dekker, F. W. & Erkin, Z., 2021, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings. Sako, K. & Tippenhauer, N. O. (eds.). 19 ed. Kamakura, Japan: Springer Nature, Vol. 12727. p. 79-98 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12727 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    1110 Downloads (Pure)
  • Privacy-preserving Distributed Access Control for Medical Data

    Maulany, C., Nateghizad, M., Mennink, B. & Erkin, Z., 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. Samarati, P. & Obaisat, M. S. (eds.). SciTePress, Vol. 1: SECRYPT. p. 322-331 10 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain

    Hendriks, R. C., Erkin, Z. & Gerkmann, T., 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 7005-7009 5 p. 6639020. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    14 Citations (Scopus)
  • Privacy-Preserving Equality Test

    Nateghizad, M., Erkin, Z. & Lagendijk, I., 2017, Proceedings of the 2017 Symposium on Information Theory and Signal Processing in the Benelux. Heusdens, R. & Weber, J. H. (eds.). p. 167-177 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    64 Downloads (Pure)
  • Privacy-preserving multi-party access control

    Sheikhalishahi, M., Tillem, G., Erkin, Z. & Zannone, N., 2019, WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. New York: Association for Computing Machinery (ACM), p. 1-13 13 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Privacy-safe linkage analysis with homomorphic encryption

    Ugwuoke, C., Erkin, Z. & Lagendijk, R. L., 2017, 25th European Signal Processing Conference, EUSIPCO 2017. Piscataway, NJ: IEEE, p. 961-965 5 p. 8081350

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Private Data Aggregation in Decentralized Networks

    Setia, P. K., Tillem, G. & Erkin, Z., 2019, 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG). Cetin, A. (ed.). IEEE, p. 76-80 5 p. 8782377

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Profiled Side-Channel Analysis in the Efficient Attacker Framework

    Picek, S., Heuser, A., Perin, G. & Guilley, S., 2022, Smart Card Research and Advanced Applications : 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Cham: Springer, Vol. 13173. p. 44-63 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    33 Downloads (Pure)
  • Pushing Alias Resolution to the Limit

    Albakour, T., Gasser, O. & Smaragdakis, G., 2023, Proceedings of the 2023 ACM on Internet Measurement Conference. p. 584–590 7 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    27 Downloads (Pure)
  • Quality Evaluation of Cyber Threat Intelligence Feeds

    Griffioen, H., Booij, T. & Doerr, C., 2020, Applied Cryptography and Network Security. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Part II ed. Cham: Springer, p. 277-296 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12147 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    23 Citations (Scopus)
  • Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter

    Blenn, N., Ghiëtte, V. & Doerr, C., 2017, ARES 2017: Proceedings of the 12th International Conference on Availability, Reliability and Security. New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 21

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    28 Citations (Scopus)
  • Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection

    Herrera Semenets, V., Hernández-León, R., Bustio-Martínez, L. & van den Berg, J., 2022, Advances in Computational Intelligence 21st Mexican International Conference on Artificial Intelligence, MICAI 2022, Monterrey, Mexico, October 24–29, 2022, Proceedings, Part II. Pichardo Laguna, O., Martínez-Miranda, J. & Martínez Seis, B. (eds.). Springer, p. 316-327 12 p. (Lecture Notes in Computer Science; no. 13613).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • Reinforcement Learning-Based Design of Side-Channel Countermeasures

    Rijsdijk, J., Wu, L. & Perin, G., 2022, Security, Privacy, and Applied Cryptography Engineering : 11th International Conference, SPACE 2021, Proceedings. Batina, L., Picek, S., Picek, S. & Mondal, M. (eds.). 1 ed. Cham: Springer, p. 168-187 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13162 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    44 Downloads (Pure)
  • Reliable Machine Learning for Networking: Key Issues and Approaches

    Hammerschmidt, C. A., Garcia, S., Verwer, S. & State, R., 2017, 2017 IEEE 42nd conference on Local Computer Networks, LCN 2017. IEEE, p. 167-170 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Remote Identification of Port Scan Toolchains

    Ghiëtte, V., Blenn, N. & Doerr, C., 2016, IFIP International Conference on New Technologies, Mobility and Security. Badra, M., Pau, G. & Vassiliou, V. (eds.). Piscataway, NJ: IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    332 Downloads (Pure)
  • Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

    Li, M., Zhang, M., Gao, J., Lal, C., Conti, M. & Alazab, M., 2022, Information and Communications Security - 24th International Conference, ICICS 2022, Proceedings. Alcaraz, C., Chen, L., Li, S. & Samarati, P. (eds.). Springer, p. 261-280 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13407 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    70 Downloads (Pure)
  • ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility

    Yildiz, B., Hung, H., Krijthe, J. H., Liem, C. C. S., Loog, M., Migut, G., Oliehoek, F. A., Panichella, A., Pawełczak, P., Picek, S., de Weerdt, M. & van Gemert, J., 2021, Reproducible Research in Pattern Recognition - 3rd International Workshop, RRPR 2021, Revised Selected Papers. Kerautret, B., Colom, M., Krähenbühl, A., Lopresti, D., Monasse, P. & Talbot, H. (eds.). Springer, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12636 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    5 Citations (Scopus)
    86 Downloads (Pure)
  • Rethinking the Trigger-injecting Position in Graph Backdoor Attack

    Xu, J., Abad, G. & Picek, S., 2023, Proceedings of the 2023 International Joint Conference on Neural Networks (IJCNN). Piscataway: IEEE, p. 1-8 8 p. (Proceedings of the International Joint Conference on Neural Networks; vol. 2023-June).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    8 Downloads (Pure)
  • SAGE: Intrusion Alert-driven Attack Graph Extractor

    Nadeem, A., Verwer, S. E. & Yang, S. J., 2021, 18th IEEE Symposium on Visualization for Cyber Security. IEEE, p. 36-41 6 p. 9629418

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    7 Citations (Scopus)
    13 Downloads (Pure)
  • Scaling website fingerprinting

    Ghiette, V. & Doerr, C., 2020, 2020 IFIP Networking Conference (Networking): Proceedings. IEEE, p. 199-207 9 p. 9142795

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks

    Griffioen, H., Oosthoek, K., van der Knaap, P. & Doerr, C., 2021, CCS 2021 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 940-954 15 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    10 Citations (Scopus)
    122 Downloads (Pure)
  • Scan Prediction and Reconnaissance Mitigation through Commodity Graphics Cards

    Doerr, C., El Maouchi, M., Kamoen, S. & Moree, J., 2016, IEEE Conference on Communications and Network Security. IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting

    Nadeem, A. & Verwer, S., 2023, Machine Learning and Knowledge Discovery in Databases.: European Conference, ECML PKDD 2022, Proceedings. Amini, M-R., Canu, S., Fischer, A., Guns, T., Kralj Novak, P. & Tsoumakas, G. (eds.). Part 1 ed. Cham: Springer, p. 157-173 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13713 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    14 Downloads (Pure)
  • Secure Equality Testing Protocols in the Two-Party Setting

    Nateghizad, M., Veugen, T., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 3

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Secure Fixed-point Division for Homomorphically Encrypted Operands

    Ugwuoke, C., Erkin, Z. & Lagendijk, I., 2018, ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security . New York: Association for Computer Machinery, p. 1-10 10 p. 33

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Secure Key-Exchange Protocol for Implants Using Heartbeats

    Seepers, R., Weber, J., Erkin, Z., Sourdis, Y. & Strydis, C., 2016, Proceedings of the ACM International Conference on Computing Frontiers, CF '16. New York: Association for Computing Machinery (ACM), p. 119-126 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    21 Citations (Scopus)
  • Secure Matching of Dutch Car License Plates

    Bindu Sunil, A., Erkin, Z. & Veugen, T., 2016, 24th European Signal Processing Conference, EUSIPCO 2016. Piscataway: IEEE, p. 2116-2120 5 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Secure public-auditing cloud storage enabling data dynamics in the standard model

    Ma, M., Weber, J. & Van Den Berg, J., 2016, Proceedings - 3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications, DIPDMWC 2016. Piscataway, NJ: IEEE, p. 170-175 6 p. 7529384

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    7 Citations (Scopus)
  • Securing Federated Sensitive Topic Classification against Poisoning Attacks

    Chu, T., Garcia-Recuero, A., Iordanou, C., Smaragdakis, G. & Laoutaris, N., 2023, Securing Federated Sensitive Topic Classification against Poisoning Attacks. 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    18 Downloads (Pure)
  • Security Vulnerabilities in LoRaWAN

    Yang, X., Karampatzakis, E., Doerr, C. & Kuipers, F., 19 Apr 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 12 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    100 Citations (Scopus)
    2082 Downloads (Pure)
  • SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer

    Karakoç, F., Nateghizad, M. & Erkin, Z., 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019: Proceedings of the 14th International Conference on Availability, Reliability and Security. New York: Association for Computing Machinery (ACM), p. 1-9 9 p. 3339264. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Seven years in the life of Hypergiants' off-nets

    Gigis, P., Calder, M., Manassakis, L., Nomikos, G., Kotronis, V., Dimitropoulos, X., Katz-Bassett, E. & Smaragdakis, G., 2021, SIGCOMM 2021 : Proceedings of the ACM SIGCOMM 2021 Conference. New York: Association for Computing Machinery (ACM), p. 516-533 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    19 Citations (Scopus)
    127 Downloads (Pure)