Full database reconstruction with access and search pattern leakage EA Markatou, R Tamassia International Conference on Information Security, 25-43, 2019 | 55 | 2019 |
Full database reconstruction in two dimensions F Falzon, EA Markatou, Akshima, D Cash, A Rivkin, J Stern, R Tamassia Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 44 | 2020 |
Reconstructing with less: Leakage abuse attacks in two dimensions EA Markatou, F Falzon, R Tamassia, W Schor Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 25 | 2021 |
Mitigation techniques for attacks on 1-dimensional databases that support range queries EA Markatou, R Tamassia Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 17 | 2019 |
Leader Election in SINR Model with Arbitrary Power Control⋆ MM Halldórsson, S Holzer, EA Markatou SIROCCO, 2017 | 16 | 2017 |
Range search over encrypted multi-attribute data F Falzon, EA Markatou, Z Espiritu, R Tamassia Cryptology ePrint Archive, 2022 | 10 | 2022 |
Attacks on encrypted range search schemes in multiple dimensions F Falzon, EA Markatou, Z Espiritu, R Tamassia Cryptology ePrint Archive, 2022 | 8 | 2022 |
Time-and space-efficient aggregate range queries over encrypted databases Z Espiritu, EA Markatou, R Tamassia Proceedings on Privacy Enhancing Technologies, 2022 | 6 | 2022 |
Attacks on encrypted response-hiding range search schemes in multiple dimensions EA Markatou, F Falzon, Z Espiritu, R Tamassia Proceedings on Privacy Enhancing Technologies, 2023 | 5 | 2023 |
Database reconstruction attacks in two dimensions EA Markatou, R Tamassia Cryptology ePrint Archive, 2020 | 5 | 2020 |
Brief announcement: Leader election in SINR model with arbitrary power control MM Halldórsson, S Holzer, EA Markatou Proceedings of the ACM Symposium on Principles of Distributed Computing, 203-205, 2017 | 2 | 2017 |
Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols F Falzon, EA Markatou Proceedings on Privacy Enhancing Technologies, 2025 | 1 | 2025 |
A principled approach to defining anonymization as applied to EU data protection law M Altman, A Cohen, F Falzon, EA Markatou, K Nissim, MJ Reymond, ... Kobbi and Reymond, Michel Jose and Saraogi, Sidhant and Wood, Alexandra, A …, 2022 | 1 | 2022 |
Limits of Astrometric and Photometric Precision on KBOs E Dunham, M Kosiarek, EA Markatou, A Wang Publications of the Astronomical Society of the Pacific 126 (943), 863-867, 2014 | 1 | 2014 |
Reconstructing with Even Less: Amplifying Leakage and Drawing Graphs EA Markatou, R Tamassia Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |
On the Insecurity of Bloom Filter-Based Private Set Intersections J Vos, J van Assen, T Koster, EA Markatou, Z Erkin Cryptology ePrint Archive, 2024 | | 2024 |
Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions. F Falzon, EA Markatou, W Schor, R Tamassia IACR Cryptol. ePrint Arch. 2020, 1531, 2020 | | 2020 |
The loudest one wins: efficient communication in theoretical wireless networks EA Markatou Massachusetts Institute of Technology, 2018 | | 2018 |
Limits of Astrometric and Photometric Precision on KBOs using Small Telescopes EA Markatou, A Wang, M Kosiarek, E Dunham American Astronomical Society Meeting Abstracts# 224 224, 422.08, 2014 | | 2014 |
Leader Election in SINR Model with Arbitrary Power Control EA Markatou | | |