Aikaterini (Katerina) Mitrokotsa
Cytowane przez
Cytowane przez
DDoS attacks and defense mechanisms: classification and state-of-the-art
C Douligeris, A Mitrokotsa
Computer networks 44 (5), 643-666, 2004
Classifying RFID attacks and defenses
A Mitrokotsa, MR Rieback, AS Tanenbaum
Information Systems Frontiers 12, 491-505, 2010
Classification of RFID attacks
A Mitrokotsa, MR Rieback, AS Tanenbaum
Gen 15693 (14443), 14, 2010
A comprehensive RFID solution to enhance inpatient medication safety
P Peris-Lopez, A Orfila, A Mitrokotsa, JCA Van der Lubbe
international journal of medical informatics 80 (1), 13-24, 2011
DDoS attacks and defense mechanisms: a classification
C Douligeris, A Mitrokotsa
Proceedings of the 3rd IEEE International Symposium on Signal Processing and …, 2003
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
A Mitrokotsa, C Dimitrakakis
Ad Hoc Networks 11 (1), 226-237, 2013
Robust and private Bayesian inference
C Dimitrakakis, B Nelson, A Mitrokotsa, BIP Rubinstein
Algorithmic Learning Theory: 25th International Conference, ALT 2014, Bled …, 2014
Integrated RFID and sensor networks: architectures and applications
A Mitrokotsa, C Douligeris
RFID and Sensor Networks, 531-556, 2009
Practical and provably secure distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Journal of Computer Security 23 (2), 229-257, 2015
Detecting denial of service attacks using emergent self-organizing maps
A Mitrokotsa, C Douligeris
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
Privacy-preserving biometric authentication: challenges and directions
E Pagnin, A Mitrokotsa
Security and Communication Networks 2017, 2017
Towards secure distance bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
Intrusion detection with neural networks and watermarking techniques for MANET
A Mitrokotsa, N Komninos, C Douligeris
IEEE International Conference on Pervasive Services, 118-127, 2007
Secure and lightweight distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Lightweight Cryptography for Security and Privacy: Second International …, 2013
Evaluation of classification algorithms for intrusion detection in MANETs
S Pastrana, A Mitrokotsa, A Orfila, P Peris-Lopez
Knowledge-Based Systems 36, 217-225, 2012
Multi-key homomorphic authenticators
D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
Differential privacy for Bayesian inference through posterior sampling
C Dimitrakakis, B Nelson, Z Zhang, A Mitrokotsa, BIP Rubinstein
Journal of machine learning research 18 (11), 1− 39, 2017
The Bussard-Bagga and other distance-bounding protocols under attacks
A Bay, I Boureanu, A Mitrokotsa, I Spulber, S Vaudenay
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
RFID technology, systems, and applications
QZ Sheng, S Zeadally, A Mitrokotsa, Z Maamar
Journal of network and computer applications 34 (ARTICLE), 797-798, 2011
On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!
I Boureanu, A Mitrokotsa, S Vaudenay
Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20