The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Konstantinos Chatzikokolakis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tom Chothia, Konstantinos Chatzikokolakis
    A Survey of Anonymous Peer-to-Peer File-Sharing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:744-755 [Conf]
  2. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    Probable Innocence Revisited. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:142-157 [Conf]
  3. Konstantinos Chatzikokolakis, George Boukeas, Panagiotis Stamatopoulos
    Construction and Repair: A Hybrid Approach to Search in CSPs. [Citation Graph (0, 0)][DBLP]
    SETN, 2004, pp:342-351 [Conf]
  4. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    A Framework for Analyzing Probabilistic Protocols and Its Application to the Partial Secrets Exchange. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:146-162 [Conf]
  5. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    Probable innocence revisited. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:123-138 [Journal]
  6. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    Making Random Choices Invisible to the Scheduler. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2007, pp:42-58 [Conf]
  7. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    Making Random Choices Invisible to the Scheduler [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  8. Probability of Error in Information-Hiding Protocols. [Citation Graph (, )][DBLP]


  9. Formal Verification of Privacy for RFID Systems. [Citation Graph (, )][DBLP]


  10. Compositional Methods for Information-Hiding. [Citation Graph (, )][DBLP]


  11. Bisimulation for Demonic Schedulers. [Citation Graph (, )][DBLP]


  12. Epistemic Strategies and Games on Concurrent Processes. [Citation Graph (, )][DBLP]


  13. Statistical Measurement of Information Leakage. [Citation Graph (, )][DBLP]


  14. Formal Approaches to Information-Hiding (Tutorial). [Citation Graph (, )][DBLP]


  15. Anonymity Protocols as Noisy Channels. [Citation Graph (, )][DBLP]


  16. A Monotonicity Principle for Information Theory. [Citation Graph (, )][DBLP]


  17. Quantitative Notions of Leakage for One-try Attacks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002