Aggelos Kiayias
Aggelos Kiayias
在 ed.ac.uk 的电子邮件经过验证
标题引用次数年份
The bitcoin backbone protocol: Analysis and applications
J Garay, A Kiayias, N Leonardos
Annual International Conference on the Theory and Applications of …, 2015
4612015
Robust key generation from signal envelopes in wireless networks
B Azimi-Sadjadi, A Kiayias, A Mercado, B Yener
Proceedings of the 14th ACM conference on Computer and communications …, 2007
3402007
Traceable signatures
A Kiayias, Y Tsiounis, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2004
2682004
Ouroboros: A provably secure proof-of-stake blockchain protocol
A Kiayias, A Russell, B David, R Oliynykov
Annual International Cryptology Conference, 357-388, 2017
2552017
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
International Conference on the Theory and Applications of Cryptographic …, 2004
2342004
Delegatable pseudorandom functions and applications
A Kiayias, S Papadopoulos, N Triandopoulos, T Zacharias
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1892013
Self-tallying elections and perfect ballot secrecy
A Kiayias, M Yung
International Workshop on Public Key Cryptography, 141-158, 2002
1412002
Traitor tracing with constant transmission rate
A Kiayias, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2002
1222002
Group signatures with efficient concurrent join
A Kiayias, M Yung
Annual International Conference on the Theory and Applications of …, 2005
1112005
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1102014
On the portability of generalized schnorr proofs
J Camenisch, A Kiayias, M Yung
Annual International Conference on the Theory and Applications of …, 2009
962009
Breaking and repairing asymmetric public-key traitor tracing
A Kiayias, M Yung
ACM Workshop on Digital Rights Management, 32-50, 2002
962002
Decoding of interleaved Reed Solomon codes over noisy data
D Bleichenbacher, A Kiayias, M Yung
International Colloquium on Automata, Languages, and Programming, 97-108, 2003
832003
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
A Kiayias, M Yung
IACR Cryptology ePrint Archive 2004, 76, 2004
772004
Blockchain mining games
A Kiayias, E Koutsoupias, M Kyropoulou, Y Tselekounis
Proceedings of the 2016 ACM Conference on Economics and Computation, 365-382, 2016
752016
An internet voting system supporting user privacy
A Kiayias, M Korman, D Walluck
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 165-174, 2006
752006
Cryptographic hardness based on the decoding of Reed-Solomon codes
A Kiayias, M Yung
International Colloquium on Automata, Languages, and Programming, 232-243, 2002
75*2002
Secure scalable group signature with dynamic joins and separable authorities
A Kiayias, M Yung
International Journal of Security and Networks 1 (1/2), 24-45, 2006
702006
The vector-ballot e-voting approach
A Kiayias, M Yung
International Conference on Financial Cryptography, 72-89, 2004
702004
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
682006
系统目前无法执行此操作,请稍后再试。
文章 1–20