Papadopoulos

Results: 144



#Item
71Fourier analysis / Differential privacy / Exponential mechanism / Laplace transform / Laplace distribution / Pierre-Simon Laplace / Fourier transform / Differential equation / Mathematical analysis / Data privacy / Integral transforms

Practical Differential Privacy via Grouping and Smoothing Georgios Kellaris Stavros Papadopoulos Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:51
72Cryptographic hash function / Wireless sensor network / Cyberwarfare / Technology / Computing / Secure Data Aggregation in WSN / Cryptography / Homomorphic encryption / Secret sharing

1 Exact In-Network Aggregation with Integrity and Confidentiality Stavros Papadopoulos, Aggelos Kiayias, Dimitris Papadias Abstract—In-network aggregation reduces the energy cost of processing aggregate queries (such

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:50
73Educational psychology / Education policy / Inclusion / Individualized Education Program / Learning disability / Section 504 of the Rehabilitation Act / Developmental disability / Parent to Parent of New York State / Americans with Disabilities Act / Education / Special education / Disability

BotTalker: Generating Encrypted, Customizable C&C Traces Han Zhang, Christos Papadopoulos Computer Science Department Colorado State University Fort Collins, Colorado, United States

Add to Reading List

Source URL: www.cs.colostate.edu

Language: English - Date: 2015-02-10 17:24:31
74Radar / Symbol / R-tree / FO

Delegatable Pseudorandom Functions and Applications Aggelos Kiayias Stavros Papadopoulos Dept. of Informatics & Telecommunications

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:44
75Computer programming / Error detection and correction / B-tree / Hashing / Binary tree / Hash tree / Trie / Hash function / R* tree / Computing / R-tree / Data management

Spatial Outsourcing for Location-based Services Yin Yang#1, Stavros Papadopoulos#2, Dimitris Papadias#3, George Kollios*4 # Department of Computer Science and Engineering Hong Kong University of Science and Technology

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:44
76Privacy law / Cyberwarfare / Privacy / Internet ethics / Internet privacy / Information privacy / Data Protection Directive / Threat / Data sharing / Data privacy / Ethics / Computer security

Privacy Principles for Sharing Cyber Security Data Gina Fisk∗ , Calvin Ardi†∗ , Neale Pickett∗ , John Heidemann† , Mike Fisk∗ , Christos Papadopoulos‡ ∗ Los Alamos National Laboratory Los Alamos, New Mexi

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2015-03-04 15:08:17
77Data mining / Database / Data / Computer science / SIGMOD / VLDB / Data management

Stavros Papadopoulos MIT CSAIL 32 Vassar Street, Room 32-G918 Cambridge, MA 02139, USA T +[removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-01-17 17:36:36
78Maxima and minima / APT / Interval / Static single assignment form / Computing / Software / Calculus / Mathematical analysis / Mathematical optimization

Topologically Sorted Skylines for Partially Ordered Domains Dimitris Sacharidis #1 , Stavros Papadopoulos ∗2 , Dimitris Papadias ∗3 # National Technical University of Athens

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
79Public-key cryptography / Internet protocols / Homomorphic encryption / Secret sharing / HMAC / Encryption / Cryptographic hash function / Wireless sensor network / Database / Cryptography / Cryptographic protocols / Hashing

Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1 Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
80Search algorithms / Computing / Cryptography / Computer programming / Information retrieval / Hash function / Hash tree / SHA-1 / Bin / Hashing / Cryptographic hash functions / Error detection and correction

CADS: Continuous Authentication on Data Streams Stavros Papadopoulos Yin Yang Dimitris Papadias

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:50
UPDATE