Charalampos Papamanthou
Charalampos Papamanthou
Verified email at - Homepage
Cited by
Cited by
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE symposium on security and privacy (SP), 839-858, 2016
Dynamic provable data possession
CC Erway, A Küpçü, C Papamanthou, R Tamassia
ACM Transactions on Information and System Security (TISSEC) 17 (4), 1-29, 2015
Dynamic searchable symmetric encryption
S Kamara, C Papamanthou, T Roeder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Parallel and dynamic searchable symmetric encryption
S Kamara, C Papamanthou
International Conference on Financial Cryptography and Data Security, 258-274, 2013
Practical Dynamic Searchable Encryption with Small Leakage.
E Stefanov, C Papamanthou, E Shi
NDSS 71, 72-75, 2014
All your queries are belong to us: The power of file-injection attacks on searchable encryption
Y Zhang, J Katz, C Papamanthou
25th {USENIX} Security Symposium ({USENIX} Security 16), 707-720, 2016
Practical dynamic proofs of retrievability
E Shi, E Stefanov, C Papamanthou
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Optimal verification of operations on dynamic sets
C Papamanthou, R Tamassia, N Triandopoulos
Annual Cryptology Conference, 91-110, 2011
Authenticated hash tables
C Papamanthou, R Tamassia, N Triandopoulos
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Signatures of correct computation
C Papamanthou, E Shi, R Tamassia
Theory of Cryptography Conference, 222-242, 2013
Algorithms for location estimation based on RSSI sampling
C Papamanthou, FP Preparata, R Tamassia
International Symposium on Algorithms and Experiments for Sensor Systems …, 2008
Preserving link privacy in social network based systems
P Mittal, C Papamanthou, D Song
arXiv preprint arXiv:1208.6189, 2012
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
S Garg, P Mohassel, C Papamanthou
Annual International Cryptology Conference, 563-592, 2016
Cs2: A searchable cryptographic cloud storage system
S Kamara, C Papamanthou, T Roeder
Microsoft Research, TechReport MSR-TR-2011-58, 2011
Time and space efficient algorithms for two-party authenticated data structures
C Papamanthou, R Tamassia
International conference on information and communications security, 1-15, 2007
IntegriDB: Verifiable SQL for outsourced databases
Y Zhang, J Katz, C Papamanthou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
2017 IEEE Symposium on Security and Privacy (SP), 863-880, 2017
Dynamic symmetric searchable encryption
SF Kamara, C Papamanthou
US Patent 8,930,691, 2015
Athos: Efficient authentication of outsourced file systems
MT Goodrich, C Papamanthou, R Tamassia, N Triandopoulos
International Conference on Information Security, 80-96, 2008
{TRUESET}: Faster Verifiable Set Computations
AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 765-780, 2014
The system can't perform the operation now. Try again later.
Articles 1–20