Konstantinos Chatzikokolakis
57
Documents
Identifiants chercheurs
- konstantinos-chatzikokolakis
- Arxiv : chatzikokolakis_k_1
- IdRef : 183871707
Présentation
Publications
- 35
- 14
- 7
- 7
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 5
- 1
- 5
- 3
- 4
- 7
- 3
- 3
- 4
- 2
- 2
- 3
- 5
- 2
- 2
Optimal Obfuscation Mechanisms via Machine LearningCSF 2020 - 33rd IEEE Computer Security Foundations Symposium, Jun 2020, Online, United States. pp.153-168
Communication dans un congrès
hal-03091514v1
|
|
|
Estimating g-Leakage via Machine LearningProceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), Nov 2020, Online, United States. pp.697-716
Communication dans un congrès
hal-03091469v1
|
F-BLEAU: Fast Black-Box Leakage EstimationS&P 2019 - 40th IEEE Symposium on Security and Privacy, May 2019, San Francisco, United States. pp.835-852, ⟨10.1109/SP.2019.00073⟩
Communication dans un congrès
hal-02422945v1
|
|
|
Catch Me If You Can: How Geo-indistinguishability Affects Utility in Mobility-based Geographic DatasetsLocalRec2019 workshop, jointly with ACM SIGSPATIAL 2019, Nov 2019, Chicago, United States. pp.1-10, ⟨10.1145/3356994.3365498⟩
Communication dans un congrès
hal-02423337v1
|
|
Comparing systems: max-case refinement orders and application to differential privacyCSF 2019 - 32nd IEEE Computer Security Foundations Symposium, Jun 2019, Hoboken, United States. pp.442--457, ⟨10.1109/CSF.2019.00037⟩
Communication dans un congrès
hal-02126848v1
|
|
On the Additive Capacity Problem for Quantitative Information Flow15th International Conference on Quantitative Evaluation of SysTems (QEST 2018), Sep 2018, Beijing, China. pp.1-19
Communication dans un congrès
hal-01845330v1
|
Information Leakage GamesDecision and Game Theory for Security - 8th International Conference, Oct 2017, Vienna, Austria. pp.437-457, ⟨10.1007/978-3-319-68711-7_23⟩
Communication dans un congrès
hal-01678950v1
|
|
|
Trading Optimality for Performance in Location Privacy11th EAI International Conference on Performance Evaluation Methodologies and Tools, Dec 2017, Venice, Italy
Communication dans un congrès
hal-01678256v1
|
|
Up-To Techniques for Generalized Bisimulation Metrics27th International Conference on Concurrency Theory (CONCUR 2016), Aug 2016, Québec City, Canada. pp.35:1--35:14, ⟨10.4230/LIPIcs.CONCUR.2016.35⟩
Communication dans un congrès
hal-01335234v1
|
|
Axioms for Information Leakage29th Computer Security Foundations Symposium (CSF 2016), IEEE, Jun 2016, Lisbon, Portugal. pp.16
Communication dans un congrès
hal-01330414v1
|
|
Geo-indistinguishability: A Principled Approach to Location PrivacyICDCIT 2015 - Proceedings of the 11th International Conference on Distributed Computing and Internet Technology, Feb 2015, Bhubaneswar, India. pp.49-72, ⟨10.1007/978-3-319-14977-6_4⟩
Communication dans un congrès
hal-01114241v1
|
Location Privacy via Geo-IndistinguishabilityProceedings of the 12th International Colloquium on Theoretical Aspects of Computing (ICTAC), 2015, Cali, Colombia. pp.28-38
Communication dans un congrès
hal-01271276v1
|
|
A Predictive Differentially-Private Mechanism for Mobility TracesPETS 2014 - 14th Privacy Enhancing Technologies Symposium, Jul 2014, Amsterdam, Netherlands. pp.21-41, ⟨10.1007/978-3-319-08506-7_2⟩
Communication dans un congrès
hal-01011260v1
|
|
|
Additive and multiplicative notions of leakage, and their capacities27th Computer Security Foundations Symposium (CSF 2014), Jul 2014, Vienna, Austria. pp.308--322, ⟨10.1109/CSF.2014.29⟩
Communication dans un congrès
hal-00989462v1
|
|
Metrics for Differential Privacy in Concurrent Systems34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Communication dans un congrès
hal-00879140v2
|
|
Compositionality Results for Quantitative Information FlowProceedings of the 11th International Conference on Quantitative Evaluation of SysTems (QEST 2014), Sep 2014, Florence, Italy. pp.368-383, ⟨10.1007/978-3-319-10696-0⟩
Communication dans un congrès
hal-01006381v2
|
|
Generalized bisimulation metricsCONCUR - 25th Conference on Concurrency Theory, Sep 2014, Rome, Italy. pp.32-46, ⟨10.1007/978-3-662-44584-6_4⟩
Communication dans un congrès
hal-01011471v1
|
Optimal Geo-Indistinguishable Mechanisms for Location PrivacyProceedings of the 21st ACM Conference on Computer and Communications Security (CCS), Gail-Joon Ahn, Nov 2014, Scottsdale, Arizona, United States. pp.251-262, ⟨10.1145/2660267.2660345⟩
Communication dans un congrès
hal-00950479v1
|
|
|
Broadening the Scope of Differential Privacy Using MetricsThe 13th Privacy Enhancing Technologies Symposium, Jul 2013, Bloomington, Indiana, United States. pp.82-102, ⟨10.1007/978-3-642-39077-7⟩
Communication dans un congrès
hal-00767210v1
|
|
A differentially private mechanism of optimal utility for a region of priors2nd Conference on Principles of Security and Trust (POST 2013), Mar 2013, Rome, Italy. pp.41-62, ⟨10.1007/978-3-642-36830-1_3⟩
Communication dans un congrès
hal-00760735v2
|
Geo-Indistinguishability: Differential Privacy for Location-Based SystemsProceedings of the 20th ACM Conference on Computer and Communications Security, ACM, Nov 2013, Berlin, Germany. pp.901-914, ⟨10.1145/2508859.2516735⟩
Communication dans un congrès
hal-00766821v1
|
|
|
Linking UnlinkabilityTGC 2012 - 7th International Symposium on Trustworthy Global Computing, Sep 2012, Newcastle upon Tyne, United Kingdom. pp.129-144, ⟨10.1007/978-3-642-41157-1_9⟩
Communication dans un congrès
hal-00760150v1
|
|
Measuring Information Leakage using Generalized Gain FunctionsComputer Security Foundations, 2012, Cambridge MA, United States. pp.265-279, ⟨10.1109/CSF.2012.26⟩
Communication dans un congrès
hal-00734044v1
|
|
Differential Privacy: on the trade-off between Utility and Information LeakageThe 8th International Workshop on Formal Aspects of Security & Trust (FAST), Sep 2011, Leuven, Belgium. pp.39--54, ⟨10.1007/978-3-642-29420-4_3⟩
Communication dans un congrès
inria-00580122v5
|
|
Quantitative Information Flow and Applications to Differential PrivacyFOSAD 2011 - 11th International School on Foundations of Security Analysis and Design, Aug 2011, Bertinoro, Italy. pp.211-230, ⟨10.1007/978-3-642-23082-0_8⟩
Communication dans un congrès
hal-00655522v1
|
|
On the relation between Differential Privacy and Quantitative Information Flow38th International Colloquium on Automata, Languages and Programming - ICALP 2011, 2011, Zurich, Switzerland. pp.60-76, ⟨10.1007/978-3-642-22012-8_4⟩
Communication dans un congrès
inria-00627937v1
|
|
Quantitative Notions of Leakage for One-try AttacksProceedings of the 25th Conference on Mathematical Foundations of Programming Semantics (MFPS 2009), May 2009, Oxford, United Kingdom. pp.75-91
Communication dans un congrès
inria-00424852v1
|
|
Epistemic Strategies and Games on Concurrent ProcessesSOFSEM 2009, Jan 2009, Špindlerův Mlýn, Czech Republic. pp.153-166
Communication dans un congrès
inria-00424854v1
|
|
Compositional Methods for Information-HidingFoundations of Software Science and Computation Structures (FOSSACS), 2008, Budapest, Hungary. ⟨10.1007/978-3-540-78499-9_31⟩
Communication dans un congrès
inria-00349227v1
|
|
Probability of Error in Information-Hiding Protocols20th IEEE Computer Security Foundations Symposium (CSF20), Jul 2007, Venice, Italy. pp.341-354, ⟨10.1109/CSF.2007.13⟩
Communication dans un congrès
inria-00200957v1
|
|
Formal Approaches to Information-Hiding (Tutorial)Trustworthy Global Computing, Nov 2007, Sophia-Antipolis, France. pp.347-362, ⟨10.1007/978-3-540-78663-4_23⟩
Communication dans un congrès
inria-00261827v1
|
|
Making Random Choices Invisible to the SchedulerCONCUR'07, Sep 2007, Lisboa, Portugal. ⟨10.1007/978-3-540-74407-8_4⟩
Communication dans un congrès
inria-00200967v1
|
|
Anonymity Protocols as Noisy Channels2nd Symposium on Trustworthy Global Computing (TGC), Nov 2006, Lucca, Italy. pp.281-300, ⟨10.1007/978-3-540-75336-0_18⟩
Communication dans un congrès
inria-00201110v1
|
|
A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets ExchangeFirst Symposium on Trustworthy Global Computing, Apr 2005, Edinburgh, United Kingdom. pp.146-162, ⟨10.1007/11580850_9⟩
Communication dans un congrès
inria-00201111v1
|
|
Probable Innocence RevisitedThird International Workshop on Formal Aspects in Security and Trust (FAST 2005), Jul 2005, Newcastle Upon Tyne, United Kingdom. pp.142-157
Communication dans un congrès
inria-00201109v1
|
The Science of Quantitative Information FlowSpringer, pp.XXVIII, 478, 2020, ⟨10.1007/978-3-319-96131-6⟩
Ouvrages
hal-01971490v1
|
|
Les ordonnances de l'automne 2017 : point d'aboutissement d'un changement de "modèle" du droit du travail ?LEJEP, pp.143, 2019
Ouvrages
hal-04490833v1
|
|
Proceedings of the 8th International Workshop on Security Issues in ConcurrencyKonstantinos Chatzikokolakis and Véronique Cortier. Electronic Proceedings in Theoretical Computer Science, 51, pp.51, 2011, Electronic Proceedings in Theoretical Computer Science, ⟨10.4204/EPTCS.51⟩
Ouvrages
hal-00641020v1
|
|
Refinement Metrics for Quantitative Information FlowMário S. Alvim; Kostas Chatzikokolakis; Carlos Olarte; Frank Valencia. The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy. Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday., 11760, Springer, pp.397-416, 2019, Lecture Notes in Computer Science, 978-3-030-31174-2. ⟨10.1007/978-3-030-31175-9_23⟩
Chapitre d'ouvrage
hal-02350777v1
|
|
Generalized differential privacy: regions of priors that admit robust optimal mechanismsvan Breugel, Franck and Kashefi, Elham and Palamidessi, Catuscia and Rutten, Jan. Horizons of the Mind. A Tribute to Prakash Panangaden, 8464, Springer International Publishing, pp.292-318, 2014, Lecture Notes in Computer Science, 978-3-319-06879-4. ⟨10.1007/978-3-319-06880-0_16⟩
Chapitre d'ouvrage
hal-01006380v1
|
The Bayes Security Measure2020
Pré-publication, Document de travail
hal-03091416v1
|
|
|
Differential Privacy versus Quantitative Information Flow2010
Pré-publication, Document de travail
hal-00548214v1
|
|
Spécification et vérification des protocoles de sécurité probabilistesInformatique [cs]. Ecole Polytechnique X, 2007. Français. ⟨NNT : ⟩
Thèse
pastel-00003950v1
|