Dimitrios Papadopoulos
Dimitrios Papadopoulos
Verified email at - Homepage
Cited by
Cited by
Secureboost: A lossless federated learning framework
K Cheng, T Fan, Y Jin, Y Liu, T Chen, D Papadopoulos, Q Yang
IEEE Intelligent Systems 36 (6), 87-98, 2021
New constructions for forward and backward private symmetric searchable encryption
J Ghareh Chamani, D Papadopoulos, C Papamanthou, R Jalili
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Proceeding of IEEE Symposium on Security and Privacy (S&P), 2017
{TRUESET}: Faster Verifiable Set Computations
AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 765-780, 2014
NSEC5: Provably Preventing DNSSEC Zone Enumeration
S Goldberg, M Naor, D Papadopoulos, VS Reyzin, Leonid, A Ziv
NDSS, 2015
Verifiable Set Operations over Outsourced Databases
R Canetti, O Paneth, D Papadopoulos, N Triandopoulos
Public Key Cryptography 2014, 113-130, 2014
Searchable encryption with optimal locality: Achieving sublogarithmic read efficiency
I Demertzis, D Papadopoulos, C Papamanthou
Annual International Cryptology Conference, 371-406, 2018
Privacy in decentralized cryptocurrencies
D Genkin, D Papadopoulos, C Papamanthou
Communications of the ACM 61 (6), 78-88, 2018
vRAM: Faster verifiable RAM with program-independent preprocessing
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Proceeding of IEEE Symposium on Security and Privacy (S&P), 2018
A zero-knowledge version of vSQL
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Cryptology ePrint Archive, 2017
Dynamic searchable encryption with small client storage
I Demertzis, JG Chamani, D Papadopoulos, C Papamanthou
NDSS 2020, 2020
Bitextract: Interactive visualization for extracting bitcoin exchange intelligence
X Yue, X Shu, X Zhu, X Du, Z Yu, D Papadopoulos, S Liu
IEEE transactions on visualization and computer graphics 25 (1), 162-171, 2018
{SEAL}: Attack mitigation for encrypted databases via adjustable leakage
I Demertzis, D Papadopoulos, C Papamanthou, S Shintre
29th USENIX Security Symposium (USENIX Security 20), 2433-2450, 2020
Taking Authenticated Range Queries to Arbitrary Dimensions
D Papadopoulos, S Papadopoulos, N Triandopoulos
ACM Conference on Computer and Communications Security 2014, 819-830, 2014
Verifiable random functions (VRFs)
S Goldberg, J Vcelak, D Papadopoulos, L Reyzin
Internet Engineering Task Force, 2018
Zero-knowledge accumulators and set algebra
E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos
International Conference on the Theory and Application of Cryptology and …, 2016
Transparency logs via append-only authenticated dictionaries
A Tomescu, V Bhupatiraju, D Papadopoulos, C Papamanthou, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Practical Authenticated Pattern Matching with Optimal Proof Size
D Papadopoulos, C Papamanthou, R Tamassia, N Triandopoulos
PVLDB 2015 8 (7), 750-761, 2015
Making NSEC5 practical for DNSSEC
D Papadopoulos, D Wessels, S Huque, M Naor, J Včelák, L Reyzin, ...
Cryptology ePrintArchive, Report 2017/099, 2017
Combining Traditional Map Labeling with Boundary Labeling
M Bekos, M Kaufmann, D Papadopoulos, A Symvonis
SOFSEM 2011, 2011
The system can't perform the operation now. Try again later.
Articles 1–20