Suivre
Iraklis Leontiadis
Titre
Citée par
Citée par
Année
Private and dynamic time-series data aggregation with trust relaxation
I Leontiadis, K Elkhiyaoui, R Molva
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
612014
PUDA–Privacy and Unforgeability for Data Aggregation
I Leontiadis, K Elkhiyaoui, M Önen, R Molva
Cryptology ePrint Archive, 2015
412015
Storage Efficient Substring Searchable Symmetric Encryption.
I Leontiadis, M Li
IACR Cryptology ePrint Archive 2017 (153), 2017
222017
Secure storage with replication and transparent deduplication
I Leontiadis, R Curtmola
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
202018
Private message franking with after opening privacy
I Leontiadis, S Vaudenay
International Conference on Information and Communications Security, 197-214, 2023
142023
Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols
S Carpov, K Deforth, N Gama, M Georgieva, D Jetchev, J Katz, ...
132021
Privacy preserving similarity detection for data analysis
I Leontiadis, M Önen, R Molva, MJ Chorley, GB Colombo
2013 International Conference on Cloud and Green Computing, 547-552, 2013
112013
A message franking channel
L Huguenin-Dumittan, I Leontiadis
Information Security and Cryptology: 17th International Conference, Inscrypt …, 2021
102021
Privacy preserving statistics in the smart grid
I Leontiadis, R Molva, M Önen
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
62014
SEVDSI: Secure, Efficient and Verifiable Data Set Intersection
O Oksuz, I Leontiadis, S Chen, A Russell, Q Tang, B Wang
52017
ANOSIP: anonymizing the SIP protocol
I Leontiadis, C Delakouridis, L Kazatzopoulos, GF Marias
Proceedings of the First Workshop on Measurement, Privacy, and Mobility, 1-6, 2012
42012
Secreach: secure reachability computation on encrypted location check-in data
H Quan, B Wang, I Leontiadis, M Li, Y Zhang
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
22016
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic
MG Belorgey, S Carpov, K Deforth, D Jetchev, A Sae-Tang, M Vuille, ...
Journal of Cryptology 36 (3), 31, 2023
12023
Secure and collusion-resistant data aggregation from convertible tags
I Leontiadis, M Li
International Journal of Information Security 20 (1), 1-20, 2021
12021
Auditable Compressed Storage
I Leontiadis, R Curtmola
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
12019
Collusion Resistant Aggregation from Convertible Tags
I Leontiadis, M Li
Cryptology ePrint Archive, 2015
12015
FastReach: A system for privacy-preserving reachability queries over location data
H Quan, B Wang, M Li, I Leontiadis
Computers & Security 135, 103513, 2023
2023
Doctorat ParisTech
I LEONTIADIS
TELECOM ParisTech, 2015
2015
A P2P based usage control enforcement scheme resilient to re-injection attacks
I Leontiadis, R Molva, M Önen
Proceeding of IEEE International Symposium on a World of Wireless, Mobile …, 2014
2014
Group ID U10433 Affiliated authors Aellig, Alexandre
D Aggarwal, G Avoine, T Baignères, MF Balli, S Banik, K Barooti, A Bay, ...
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20