Nikos Triandopoulos

ASSOCIATE PROFESSOR
Building: North Building
Room: 321
Phone: +1 (201) 216-3751
Email: ntriando@stevens.edu
Education
  • Ph.D. in Computer Science, Brown University, 2007
  • Sc.M. in Computer Science, Brown University, 2002
  • Diploma in Computer Engineering & Informatics, University of Patras, 1999
Research

       Broadly spanning the areas of Security, Privacy & Cryptography

  • Network & Distributed System Security
  • Mobile & Enterprise security
  • Applied Cryptography & Secure Protocol Design
Experience
  • 2010 - 2016, Principal Research Scientist, RSA Laboratories, RSA, The Security Division of EMC
  • 2010 - 2016, Adjunct Assistant Professor, Dept. of Computer Science, Boston University
  • 2008 - 2011, Adjunct Assistant Professor (Research), Dept. of Computer Science, Brown University
  • 2008 - 2010, Research Assistant Professor, Dept. of Computer Science, Boston University
  • 2007 - 2008, Research Assistant Professor, Dept. of Computer Science, Aarhus University
  • 2006 - 2007, Postdoctoral Research Fellow, Dept. of Computer Science, Dartmouth College
Professional Service

      Program Committee Member

  • 2018: NDSS
  • 2017: NDSS, IEEE EuroS&P, ACM CCSW
  • 2016: ACM CCS, IEEE EuroS&P, ACM AISec
  • 2015: ACM CCS
  • 2014: ACM CCSW, BalkanCryptSec, IACR CANS, ICDCS
  • 2013: ACM SIGMOD
  • 2012: IEEE GLOBECOM (ManSec-CC)
  • 2011: CT-RSA

      Organizing Committee Member

  • 2013: EUROCRYPT (Sponsorship Chair)

      Panelist

  • 2013: European Commission Workshop on Cloud Computing Security
  • 2012: NSF Trustworthy Computing Program
  • 2011: Advanced Cyber Security Center Second Annual Working Conference, New England Faculty Summit on Cyber Security
Appointments
  • 2016 - Present, Associate Professor, Dept. of Computer Science, Stevens Institute of Technology
Professional Societies
  • Member of ACM, IEEE, IACR
Grants, Contracts & Funds
  • 2017 - 2020, $.5M, U.S. National Science Foundation, Secure & Trustworthy Cyberspace, Award No. CNS-171882, An integrated approach for enterprise intrusion resilience.
  • 2010 - 2016, $3M, U.S. National Science Foundation, CISE–Trustworthy Computing, Award No. CNS-1012798, Towards trustworthy interactions in the cloud.
  • 2010 - 2016, $3M, U.S. National Science Foundation, CISE–Trustworthy Computing, Award No. CNS-1012910, Securing the open softphone.
  • 2006 - 2007, $150K, U.S. Department of Homeland Security, Office of Science and Technology, Algorithms for high assurance in cyber-security.
Patents & Inventions
  • Co-Inventor of 45 issued U.S. patents - full list available through the U.S. Pattent Office here
Selected Publications
Conference Proceedings
  1. Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, and Nikos Triandopoulos. "Server-aided secure computation with off-line parties", In Proceedings of European Symposium on Research in Computer Security, Part I (ESORICS), LNCS, Vol. 10492, Springer, pp. 103-123, Oslo, Norway, September, 2017.
  2. Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos. (2016). "Zero-knowledge accumulators and set algebra", In Proceedings of IACR Int. Conference on the Theory and Applications of Cryptology and Information Security, Part II (ASIACRYPT), LNCS, Vol. 10032, Springer, pp. 67-100, Hanoi, Vietnam, December, 2016.
  3. Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos. (2015). "Falcon codes: Fast, authenticated LT codes (Or: Making Rapid Tornadoes unstoppable)", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 1032-1047.
  4. Dimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos. (2014). "Taking authenticated range queries to arbitrary dimensions", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 819-830.
  5. Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos. (2014). "PillarBox: Combating next-generation malware with fast forward-secure logging", In Proceedings International Sympo- sium on Research in Attacks, Intrusions and Defenses (RAID), pp. 46-67. .
  6. Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos. (2014). "TRUESET: faster verifiable set computations", In Proceedings of USENIX Security Symposium (USENIX Security), pp. 765-780.
  7. Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos. (2014). "Verifiable set operations over outsourced databases", In Proceedings of Int. Conference on Practice and Theory of Public-Key Cryptography (PKC), pp. 113-130.
  8. Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias. (2013). "Delegateable pseudorandom functions and applications", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 669-684.
  9. Marten van Dijk, Ari Juels, Emil Stefanov, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos. (2012). "Hourglass schemes: How to prove that cloud files are encrypted", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 265-280. .
  10. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. (2011). "Optimal authentication of operations on dynamic sets", In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 6841, Springer, pp. 91-110.
  11. Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos. (2009). "Privacy-enhancing auctions using rational cryptography", In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 5677, Springer, pp. 541-558.
  12. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. (2008). "Authenticated hash tables", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 437-448.
  13. Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin, Nikos Triandopoulos. (2008). "AnonySense: Privacy-aware people-centric sensing", In Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 211-224.
  14. Apu Kapadia, Nikos Triandopoulos. (2008). "Halo: High-assurance locate for distributed hash tables", In Proceedings of Annual Network & Distributed System Security Symposium (NDSS), pp. 61-79.
  15. Anna Lysyanskaya, Nikos Triandopoulos. (2006). "Rationality and adversarial behavior in multi-party computation", In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 4117, Springer, pp. 180-197.
Journals
  1. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. (2016). "Authenticated hash tables based on cryptographic accumulators", Algorithmica, 74(2):664-712.
  2. Dimitrios Papadopoulos, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. (2015). "Practical authenticated pattern matching with optimal proof size", In Proceedings of the VLDB Endowment (PVLDB), 8(7): 750-761.
  3. Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Cristina Videira Lopes. (2012). "Efficient verification of Web-content searching through authenticated Web crawlers", In Proceedings of the VLDB Endowment (PVLDB), 5(10):920-931.
  4. Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos. (2011). "Efficient authenticated data structures for graph connectivity and geometric search problems", Algorithmica, 60(3):505-552.
  5. Minho Shin, Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Nikos Triandopoulos. (2011). "AnonySense: A system for anonymous opportunistic sensing", Journal of Pervasive and Mobile Computing (PMC), 7(1):16-30.
  6. Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos. (2010). "Authenticated error-correcting codes with applications to multicast authentication", ACM Transactions on Information and System Security (TISSEC), 13(2).
Courses
  • CS 579 Foundations of Cryptography
  • CS 306 Introduction to IT Security