Mitigate DoS and DDoS Attack in Ad Hoc Networks Michalas, A., Komninos, N. and Prasad Neeli, R. 2011. Mitigate DoS and DDoS Attack in Ad Hoc Networks. International Journal of Digital Crime and Forensics (IJDCF). 3 (1), pp. 14-36. https://doi.org/10.4018/jdcf.2011010102
2024
Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing Gridin, I. and Michalas, A. 2024. Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing. Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing. Mytilene, Lesvos, Greece 26 - 28 Aug 2024 Springer.
2024
Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training Khan, T., Budzys, M., Nguyen, K. and Michalas, A. 2024. Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training. Privacy Enhancing Technologies Symposium 2024. Bristol, UK 15 - 20 Jul 2024 Proceedings on Privacy Enhancing Technologies. https://doi.org/10.56553/popets-2024-0072
2024
Rainbow Over Clouds: A Lightweight Pairing-free Multi-Replica Multi-Cloud Public Auditing Scheme Rabaninejad, R., Michalas, A. and Kanhere, S. 2024. Rainbow Over Clouds: A Lightweight Pairing-free Multi-Replica Multi-Cloud Public Auditing Scheme. The 19th International Conference on Risks and Security of Internet and Systems (CRiSIS'24). Aix-en-Provence, France 26 - 28 Nov 2024 Springer.
2024
SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption Nuoskala, C., Abdinasibfar, H. and Michalas, A. 2024. SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption. The 20th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’24). Dubai, United Arab Emirates 28 - 30 Oct 2024 EAI.
2024
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning Khan, T., Budzys, M. and Michalas, A. 2024. Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning. The 29th ACM Symposium on Access Control Models and Technologies. San Antonio, TX, USA 15 - 17 May 2024 Association for Computing Machinery (ACM). https://doi.org/10.1145/3649158.3657039
2024
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption Nuoskala, C., Rabbaninejad, R., Dimitriou, T. and Michalas, A. 2024. FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. The 29th ACM Symposium on Access Control Models and Technologies. San Antonio, TX, USA 15 - 17 May 2024 Association for Computing Machinery (ACM). https://doi.org/10.1145/3649158.3657049
2024
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption Frimpong, E., Nguyen, K., Budzys, M., Khan, T. and Michalas, A. 2024. GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption. Michalas, A. (ed.) 39th ACM/SIGAPP Symposium On Applied Computing (SAC'24). Avila, Spain 08 - 12 Apr 2024 Association for Computing Machinery (ACM). https://doi.org/10.1145/3605098.3635983
2023
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives Bakas, A., Frimpong, E. and Michalas, A. 2023. Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives. 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’22). Kansas City, United States 17 - 19 Oct 2022 Springer. https://doi.org/10.1007/978-3-031-25538-0_19
2023
MetaPriv: Acting in Favor of Privacy on Social Media Platforms Cantaragiu, R., Michalas, A., Frimpong, E. and Bakas, A. 2023. MetaPriv: Acting in Favor of Privacy on Social Media Platforms. 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’22). Kansas City, United States 17 - 19 Oct 2022 Springer. https://doi.org/10.1007/978-3-031-25538-0_36
stoRNA: Stateless Transparent Proofs of Storage-time Rabaninejad, R., Abdolmaleki, B., Malavolta, G., Michalas, A. and Nabizadeh, A. 2023. stoRNA: Stateless Transparent Proofs of Storage-time. 28th European Symposium on Research in Computer Security (ESORICS’23). The Hague, the Netherlands 25 - 29 Sep 2023 Springer. https://doi.org/10.1007/978-3-031-51479-1_20
2023
Split Without a Leak: Reducing Privacy Leakage in Split Learning Nguyen, K., Khan, T. and Michalas, A. 2023. Split Without a Leak: Reducing Privacy Leakage in Split Learning. 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’23). Hong Kong SAR, Hong Kong 19 - 21 Oct 2023 Springer.
2022
Cryptographic Role-Based Access Control, Reconsidered Liu, B., Michalas, A. and Warinschi, B. 2022. Cryptographic Role-Based Access Control, Reconsidered. 16th International Conference on Provable and Practical Security (ProvSec’22). Nanjing, China 11 - 12 Nov 2022 Springer. https://doi.org/10.1007/978-3-031-20917-8_19
2020
Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support Bakas, A. and Michalas, A. 2020. Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support. The 25th IEEE International Conference on Communications (ISCC’20). Rennes, France (switched to virtual due to the pandemic) 07 - 10 Jul 2020 IEEE . https://doi.org/10.1109/ISCC50000.2020.9219739
MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility Michalas, A. and Murray, R. 2017. MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility. The 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST’17) in Conjunction with ACM CCS 2017. Dallas, TX, USA 30 Oct - 03 Nov 2017 ACM. https://doi.org/10.1145/3139923.3139926
2017
Middle Man: An Efficient Two-Factor Authentication Framework Costa, J. and Michalas, A. 2017. Middle Man: An Efficient Two-Factor Authentication Framework. 3rd IEEE International Conference On Computing, Communication, Control And Automation. Pune, India 17 - 18 Aug 2017 IEEE . https://doi.org/10.1109/ICCUBEA.2017.8463686
2017
HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds Michalas, A. and Weingarten, N. 2017. HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds. Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems (CBMS’17). Thessaloniki, Greece 22 - 24 Jun 2017 IEEE . https://doi.org/10.1109/CBMS.017.30
2016
LocLess: Do You Really Care Where Your Cloud Files Are? Michalas, A. and Yigzaw, K.Y. 2016. LocLess: Do You Really Care Where Your Cloud Files Are? Cloud Security and Data Privacy by Design (CloudSPD’16), Workshop co-located with the 9th IEEE/ACM International Conference on Utility and Cloud Computing. Luxembourg 12 - 15 Dec 2016 IEEE . https://doi.org/10.1109/CloudCom.2016.0090
2016
Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud Michalas, A. 2016. Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud. 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016). Barcelona 05 - 07 Dec 2016 IEEE . https://doi.org/10.1109/ICITST.2016.7856693
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G. and Paraskakis, I. 2015. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. 5th International Conference on Cloud Computing and Services Science (CLOSER'15). Lisbon, Portugal 20 May 2015 SCITEPRESS. https://doi.org/10.5220/0005489302060213
2014
Domain Based Storage Protection with Secure Access Control for the Cloud Paladi, N., Michalas, A. and Gehrmann, C. 2014. Domain Based Storage Protection with Secure Access Control for the Cloud. The 2014 International Workshop on Security in Cloud Computing, held in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS). Kyoto, Japan 04 Jun 2014 ACM. https://doi.org/10.1145/2600075.2600082
Security aspects of e-health systems migration to the cloud Michalas, A., Paladi, N. and Gehrmann, C. 2014. Security aspects of e-health systems migration to the cloud. 16th IEEE International Conference on E-health Networking, Application & Services (Healthcom). Natal, Brazil 15 Oct 2014 IEEE . https://doi.org/10.1109/HealthCom.2014.7001843
2014
"One of our hosts in another country": Challenges of data geolocation in cloud storage Paladi, N. and Michalas, A. 2014. "One of our hosts in another country": Challenges of data geolocation in cloud storage. The 6th IEEE Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE). Aalborg, Denmark 11 May 2014 IEEE . https://doi.org/10.1109/VITAE.2014.6934507
2012
Multi-Party Trust Computation in Decentralized Environments Dimitriou, T. and Michalas, A. 2012. Multi-Party Trust Computation in Decentralized Environments. International Conference on New Technologies, Mobility and Security (NTMS). Istanbul 07 - 10 May 2012 IEEE . https://doi.org/10.1109/NTMS.2012.6208686
2012
Secure & Trusted Communication in Emergency Situations Michalas, A., Bakopoulos, M., Komninos, N. and Prasad Neeli, R. 2012. Secure & Trusted Communication in Emergency Situations. Sarnoff Symposium (SARNOFF). Newark, NJ 21 - 22 May 2012 IEEE . https://doi.org/10.1109/SARNOF.2012.6222751
2012
SecGOD - Google Docs: Now I Feel Safer! Michalas, A. and Bakopoulos, M. 2012. SecGOD - Google Docs: Now I Feel Safer! The 7th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2012). London, UK 10 Dec 2012 IEEE .
2022
Footsteps in the fog: Certificateless fog-based access control Frimpong, E., Michalas, A. and Ullah, A. 2022. Footsteps in the fog: Certificateless fog-based access control. Computers and Security. 121 102866. https://doi.org/10.1016/j.cose.2022.102866
2017
Providing User Security Guarantees in Public Infrastructure Clouds Paladi, N., Gehrmann, C. and Michalas, A. 2017. Providing User Security Guarantees in Public Infrastructure Clouds. IEEE Transactions on Cloud Computing. 5 (3), pp. 405-419. https://doi.org/10.1109/TCC.2016.2525991
2017
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G. and Paraskakis, I. 2017. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. Journal of Grid Computing. 15 (2), pp. 219-234. https://doi.org/10.1007/s10723-017-9394-2
Mem Tri: Memory Forensics Triage Tool Michalas, A. and Murray, R 2016. Mem Tri: Memory Forensics Triage Tool. Cyber Security Group, University of Westminster.
2018
Towards Secure Cloud Orchestration for Multi-Cloud Deployments Paladi, N., Michalas, A. and Dang, H. 2018. Towards Secure Cloud Orchestration for Multi-Cloud Deployments. The 5th Workshop on CrossCloud Infrastructures & Platforms. Porto, Portugal 23 - 26 Apr 2018 ACM.
Usage Statistics
5226 total views of outputs
7270 total downloads of outputs
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.