Author image not provided
 Andreas Pashalidis

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.21
Citation Count99
Publication count19
Publication years2003-2014
Available for download5
Average downloads per article243.80
Downloads (cumulative)1,219
Downloads (12 Months)77
Downloads (6 Weeks)7
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


19 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 19 of 19
Sort by:

1
June 2014 International Journal of Information Security: Volume 13 Issue 3, June 2014
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user's card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary's access ...
Keywords: Smart cards, Kerberos, PKINIT

2
March 2013 Computers & Mathematics with Applications: Volume 65 Issue 5, March, 2013
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 0


3 published by ACM
October 2012 WPES '12: Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 206

Full text available: PDFPDF
This paper presents 'For Human Eyes Only' (FHEO), our Firefox extension that enables one to conveniently post online messages, such as short emails, comments, and tweets in a form that discourages automatic processing of these messages. Similar to CAPTCHA systems, FHEO distorts the text to various extents. We provide a ...
Keywords: privacy, online messaging, social networks

4
September 2012 IEEE Transactions on Knowledge and Data Engineering: Volume 24 Issue 9, September 2012
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

While personalization is key to increase the usability of online services, disclosing one's preferences is undesirable from a privacy perspective, because it enables profiling through the linkage of what may otherwise be unlinkable service invocations. This paper considers an easily implementable class of obfuscation strategies as a means to mitigate ...
Keywords: Privacy,Servers,Bayesian methods,Clustering algorithms,Simulated annealing,Partitioning algorithms,Probability distribution,unlinkability,Preferences,obfuscation,privacy

5 published by ACM
May 2012 ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 2,   Downloads (12 Months): 14,   Downloads (Overall): 153

Full text available: PDFPDF
Public key Kerberos (PKINIT) is a standardized authentication and key establishment protocol which is used by the Windows active directory subsystem. In this paper we show that card-based public key Kerberos is flawed. In particular, access to a user's card enables an adversary to impersonate that user even after the ...
Keywords: key agreement, smart-cards, security protocols

6 published by ACM
October 2011 WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 153

Full text available: PDFPDF
This paper describes a formal model for multiple privacy notions that apply to reputation systems and shows that, for certain classes of systems, very strong privacy notions are unachievable. In particular, it is shown that, systems where a user's reputation depends exclusively on the ratings he received, necessarily leak information ...
Keywords: anonymity, limits, privacy, reputation systems, unlinkability

7
September 2011 ESORICS'11: Proceedings of the 16th European conference on Research in computer security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 26

This paper critically examines some recently proposed RFID privacy models. It shows that some models suffer from weaknesses such as insufficient generality and unrealistic assumptions regarding the adversary's ability to corrupt tags. We propose a new RFID privacy model that is based on the notion of indistinguishability and that does ...
Keywords: authentication, identification, privacy model, RFID

8
July 2011 CLOUD '11: Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly. Working in tandem with legal agreements, our open source software supports: trust and reputation management, sticky policies with ...
Keywords: Security, Trust, Privacy, Sticky Policies, Trust Negotiation, Audit, Reputation

9 published by ACM
June 2011 ACM Transactions on Information and System Security (TISSEC): Volume 14 Issue 1, May 2011
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 3,   Downloads (12 Months): 40,   Downloads (Overall): 563

Full text available: PDFPDF
This article presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistinguishability between two worlds, provide new insights into the relation between, and the fundamental structure of, different privacy notions. We furthermore place previous privacy definitions ...
Keywords: Adversarial model, anonymity, privacy notions, unlinkability

10
September 2010 ESORICS'10: Proceedings of the 15th European conference on Research in computer security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

In this paper, we introduce a framework for measuring un-linkability both per subject and for an entire system. The framework enables the evaluator to attach different sensitivities to individual items in the system, and to specify the severity of different types of error that an adversary can make. These parameters, ...

11
July 2009 Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistinguishability between two worlds, provide new insights into the relation between, and the fundamental structure of, different privacy notions. We apply our definitions to group ...

12
March 2009 CSIE '09: Proceedings of the 2009 WRI World Congress on Computer Science and Information Engineering - Volume 04
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a task that can be delegated to a remote proxy server. This server has to engage the user in a challenge-response mechanism that does ...
Keywords: one-time passwords, spyware, keyloggers, password, authentication

13
December 2008 APSCC '08: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

In this paper, we develop a framework for measuring the level of protection offered by relation hiding systems. Theframework provides a uniform way to define a variety of privacy notions, including anonymity and unlinkability, by means of information-theoretic metrics. Moreover, based on the framework, a fairness metric for relation hiding ...

14
February 2008 SOMITAS '08: Proceedings of the 2008 Ambi-Sys workshop on Software Organisation and MonIToring of Ambient Systems
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 0,   Downloads (12 Months): 1,   Downloads (Overall): 144

Full text available: PdfPdf
There is a clear trend towards making multimedia applications context-aware so as to customize them by taking into account any collection of information which may be relevant, such as e.g. user location. However, current multimedia services are dominated by IMS, which is seen as a service platform that uses the ...
Keywords: service management, pervasiveness, sensor network integration, context-awareness

15
June 2007 PET'07: Proceedings of the 7th international conference on Privacy enhancing technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 10

A system that protects the unlinkability of certain data items (e. g. identifiers of communication partners, messages, pseudonyms, transactions, votes) does not leak information that would enable an adversary to link these items. The adversary could, however, take advantage of hints from the context in which the system operates. In ...

16
June 2006 PET'06: Proceedings of the 6th international conference on Privacy Enhancing Technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

In this paper we study a particular attack that may be launched by cooperating organisations in order to link the transactions and the pseudonyms of the users of an anonymous credential system. The results of our analysis are both positive and negative. The good (resp. bad) news, from a privacy ...

17
April 2004 SP'04: Proceedings of the 12th international conference on Security Protocols
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure. The paper provides some simple heuristics that aim to mitigate the exposure to the threats and identifies directions for further research.
Keywords: timing attacks, anonymous credential systems, privacy, unlinkability, pseudonym systems

18
March 2004 Journal of Network and Systems Management: Volume 12 Issue 1, March 2004
Publisher: Plenum Press
Bibliometrics:
Citation Count: 3

Mobile agents (MAs) have been proposed for decentralized network management. This paper explains how Aglets, a Java open-source MA framework, not a proprietary system, can be used for security-enhanced network management, complementing the security of the Simple Network Management Protocol (SNMP) version 3. The solution prototyped is a hybrid environment ...
Keywords: secure clock, cryptography, Aglets, SNMP

19
July 2003 ACISP'03: Proceedings of the 8th Australasian conference on Information security and privacy
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 28

At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single Sign-On (SSO) has been proposed as a solution to the usability, security and management implications of this situation. Under SSO, users authenticate themselves only once ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us