Aggelos Kiayias
Aggelos Kiayias
在 ed.ac.uk 的电子邮件经过验证
标题引用次数年份
The bitcoin backbone protocol: Analysis and applications
J Garay, A Kiayias, N Leonardos
Annual International Conference on the Theory and Applications of …, 2015
5012015
Robust key generation from signal envelopes in wireless networks
B Azimi-Sadjadi, A Kiayias, A Mercado, B Yener
Proceedings of the 14th ACM conference on Computer and communications …, 2007
3442007
Ouroboros: A provably secure proof-of-stake blockchain protocol
A Kiayias, A Russell, B David, R Oliynykov
Annual International Cryptology Conference, 357-388, 2017
2952017
Traceable signatures
A Kiayias, Y Tsiounis, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2004
2742004
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
International Conference on the Theory and Applications of Cryptographic …, 2004
2362004
Delegatable pseudorandom functions and applications
A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1962013
Self-tallying elections and perfect ballot secrecy
A Kiayias, M Yung
International Workshop on Public Key Cryptography, 141-158, 2002
1412002
Traitor tracing with constant transmission rate
A Kiayias, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2002
1242002
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1142014
Group signatures with efficient concurrent join
A Kiayias, M Yung
Annual International Conference on the Theory and Applications of …, 2005
1132005
On the portability of generalized schnorr proofs
J Camenisch, A Kiayias, M Yung
Annual International Conference on the Theory and Applications of …, 2009
982009
Breaking and repairing asymmetric public-key traitor tracing
A Kiayias, M Yung
ACM Workshop on Digital Rights Management, 32-50, 2002
962002
Decoding of interleaved Reed Solomon codes over noisy data
D Bleichenbacher, A Kiayias, M Yung
International Colloquium on Automata, Languages, and Programming, 97-108, 2003
852003
Blockchain mining games
A Kiayias, E Koutsoupias, M Kyropoulou, Y Tselekounis
Proceedings of the 2016 ACM Conference on Economics and Computation, 365-382, 2016
812016
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
A Kiayias, M Yung
IACR Cryptology ePrint Archive 2004, 76, 2004
772004
Cryptographic hardness based on the decoding of Reed-Solomon codes
A Kiayias, M Yung
International Colloquium on Automata, Languages, and Programming, 232-243, 2002
77*2002
An internet voting system supporting user privacy
A Kiayias, M Korman, D Walluck
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 165-174, 2006
752006
Secure scalable group signature with dynamic joins and separable authorities
A Kiayias, M Yung
International Journal of Security and Networks 1 (1/2), 24-45, 2006
712006
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
702006
The vector-ballot e-voting approach
A Kiayias, M Yung
International Conference on Financial Cryptography, 72-89, 2004
702004
系统目前无法执行此操作,请稍后再试。
文章 1–20