Aikaterini (Katerina) Mitrokotsa
Cytowane przez
Cytowane przez
DDoS attacks and defense mechanisms: classification and state-of-the-art
C Douligeris, A Mitrokotsa
Computer networks 44 (5), 643-666, 2004
Classifying RFID attacks and defenses
A Mitrokotsa, MR Rieback, AS Tanenbaum
Information Systems Frontiers 12, 491-505, 2010
DDoS attacks and defense mechanisms: a classification
C Douligeris, A Mitrokotsa
Proceedings of the 3rd IEEE International Symposium on Signal Processing and …, 2003
Classification of RFID attacks
A Mitrokotsa, MR Rieback, AS Tanenbaum
Gen 15693 (14443), 14, 2010
A comprehensive RFID solution to enhance inpatient medication safety
P Peris-Lopez, A Orfila, A Mitrokotsa, JCA van der Lubbe
international journal of medical informatics 80 (1), 13-24, 2011
Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
A Mitrokotsa, C Dimitrakakis
Ad hoc networks 11 (1), 226-237, 2013
Robust and private Bayesian inference
C Dimitrakakis, B Nelson, A Mitrokotsa, BIP Rubinstein
Algorithmic Learning Theory: 25th International Conference, ALT 2014, Bled …, 2014
Integrated RFID and sensor networks: architectures and applications
A Mitrokotsa, C Douligeris
RFID and Sensor Networks, 531-556, 2009
Practical and provably secure distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Journal of Computer Security 23 (2), 229-257, 2015
Privacy‐Preserving Biometric Authentication: Challenges and Directions
E Pagnin, A Mitrokotsa
Security and Communication Networks 2017 (1), 7129505, 2017
Towards secure distance bounding
I Boureanu, A Mitrokotsa, S Vaudenay
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
Detecting denial of service attacks using emergent self-organizing maps
A Mitrokotsa, C Douligeris
Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005
Differential privacy for Bayesian inference through posterior sampling
C Dimitrakakis, B Nelson, Z Zhang, A Mitrokotsa, BIP Rubinstein
Journal of machine learning research 18 (11), 1-39, 2017
Multi-key homomorphic authenticators
D Fiore, A Mitrokotsa, L Nizzardo, E Pagnin
International conference on the theory and application of cryptology and …, 2016
Intrusion detection with neural networks and watermarking techniques for MANET
A Mitrokotsa, N Komninos, C Douligeris
IEEE International Conference on Pervasive Services, 118-127, 2007
Secure and lightweight distance-bounding
I Boureanu, A Mitrokotsa, S Vaudenay
International workshop on lightweight cryptography for security and privacy …, 2013
Evaluation of classification algorithms for intrusion detection in MANETs
S Pastrana, A Mitrokotsa, A Orfila, P Peris-Lopez
Knowledge-Based Systems 36, 217-225, 2012
The bussard-bagga and other distance-bounding protocols under attacks
A Bay, I Boureanu, A Mitrokotsa, I Spulber, S Vaudenay
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
On the leakage of information in biometric authentication
E Pagnin, C Dimitrakakis, A Abidin, A Mitrokotsa
International Conference on Cryptology in India, 265-280, 2014
On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!
I Boureanu, A Mitrokotsa, S Vaudenay
International Conference on Cryptology and Information Security in Latin …, 2012
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20