Aggelos Kiayias
Aggelos Kiayias
在 ed.ac.uk 的电子邮件经过验证
标题引用次数年份
The bitcoin backbone protocol: Analysis and applications
J Garay, A Kiayias, N Leonardos
Annual International Conference on the Theory and Applications of …, 2015
4092015
Robust key generation from signal envelopes in wireless networks
B Azimi-Sadjadi, A Kiayias, A Mercado, B Yener
Proceedings of the 14th ACM conference on Computer and communications …, 2007
3352007
Traceable signatures
A Kiayias, Y Tsiounis, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2004
2692004
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
International Conference on the Theory and Applications of Cryptographic …, 2004
2342004
Ouroboros: A provably secure proof-of-stake blockchain protocol
A Kiayias, A Russell, B David, R Oliynykov
Annual International Cryptology Conference, 357-388, 2017
1922017
Delegatable pseudorandom functions and applications
A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1852013
Self-tallying elections and perfect ballot secrecy
A Kiayias, M Yung
International Workshop on Public Key Cryptography, 141-158, 2002
1362002
Traitor tracing with constant transmission rate
A Kiayias, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2002
1242002
Group signatures with efficient concurrent join
A Kiayias, M Yung
Annual International Conference on the Theory and Applications of …, 2005
1102005
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1032014
Breaking and repairing asymmetric public-key traitor tracing
A Kiayias, M Yung
ACM Workshop on Digital Rights Management, 32-50, 2002
992002
On the portability of generalized schnorr proofs
J Camenisch, A Kiayias, M Yung
Annual International Conference on the Theory and Applications of …, 2009
902009
Decoding of interleaved Reed Solomon codes over noisy data
D Bleichenbacher, A Kiayias, M Yung
International Colloquium on Automata, Languages, and Programming, 97-108, 2003
782003
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
C Di Chio, JJ Merelo, S Cagnoni, F Neri, C Cotta, M Preuss, M Ebner, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2011
77*2011
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
A Kiayias, M Yung
IACR Cryptology ePrint Archive 2004, 76, 2004
762004
Cryptographic hardness based on the decoding of Reed-Solomon codes
A Kiayias, M Yung
International Colloquium on Automata, Languages, and Programming, 232-243, 2002
76*2002
Timed-release cryptography
W Mao
International Workshop on Selected Areas in Cryptography, 342-357, 2001
742001
An internet voting system supporting user privacy
A Kiayias, M Korman, D Walluck
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, 165-174, 2006
722006
The vector-ballot e-voting approach
A Kiayias, M Yung
International Conference on Financial Cryptography, 72-89, 2004
672004
Secure scalable group signature with dynamic joins and separable authorities
A Kiayias, M Yung
International Journal of Security and Networks 1 (1-2), 24-45, 2006
662006
系统目前无法执行此操作,请稍后再试。
文章 1–20