Nikos Triandopoulos

ASSOCIATE PROFESSOR
Building: Lieb
Room: 305
Phone: 201 216 3751
Email: ntriando@stevens.edu
Website
Education
  • Ph.D. in Computer Science, Brown University, 2007
  • Sc.M. in Computer Science, Brown University, 2002
  • Diploma in Computer Engineering & Informatics, University of Patras, 1999
Research

       Broadly spanning the areas of Security, Privacy & Cryptography

  • Cloud & network security
  • Mobile & enterprise security
  • Applied cryptography & secure protocol design
Experience
  • 2010 - 2016, Principal Research Scientist, RSA Laboratories, RSA, The Security Division of EMC
  • 2010 - 2016, Adjunct Assistant Professor, Dept. of Computer Science, Boston University
  • 2008 - 2011, Adjunct Assistant Professor (Research), Dept. of Computer Science, Brown University
  • 2008 - 2010, Research Assistant Professor, Dept. of Computer Science, Boston University
  • 2007 - 2008, Research Assistant Professor, Dept. of Computer Science, Aarhus University
  • 2006 - 2007, Postdoctoral Research Fellow, Dept. of Computer Science, Dartmouth College
Professional Service

      Program Committee Member

  • 2017: NDSS
  • 2016: ACM CCS, IEEE EuroS&P, ACM AISec
  • 2015: ACM CCS
  • 2014: ACM CCSW, BalkanCryptSec, IACR CANS, ICDCS
  • 2013: ACM SIGMOD
  • 2012: IEEE GLOBECOM (ManSec-CC)
  • 2011: CT-RSA

      Organizing Committee Member

  • 2013: EUROCRYPT (Sponsorship Chair)

      Panelist

  • 2013: European Commission Workshop on Cloud Computing Security
  • 2012: NSF Trustworthy Computing Program
  • 2011: Advanced Cyber Security Center Second Annual Working Conference, New England Faculty Summit on Cyber Security
Appointments
  • 2016 - Present, Associate Professor, Dept. of Computer Science, Stevens Institute of Technology
Professional Societies
  • Member of ACM, IEEE, IACR
Grants, Contracts & Funds
  • 2010 - 2016, U.S. National Science Foundation, CISE–Trustworthy Computing, Award No. CNS-1012798, Towards trustworthy interactions in the cloud, $3M
  • 2010 - 2016, U.S. National Science Foundation, CISE–Trustworthy Computing, Award No. CNS-1012910, Securing the open softphone, $3M
  • 2006 - 2007, U.S. Department of Homeland Security, Office of Science and Technology, Algorithms for high assurance in cyber-security, $150K
Patents & Inventions
  • Co-Inventor of 34 issued U.S. patents - full list available through the U.S. Pattent Office here
Selected Publications
Conference Proceedings
  1. Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos. (2016). "Zero-knowledge accumulators and set algebra", In Proceedings of Annual International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt). (To appear.).
  2. Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos. (2015). "Falcon codes: Fast, authenticated LT codes (Or: Making Rapid Tornadoes unstoppable)", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 1032-1047.
  3. Dimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos. (2014). "Taking authenticated range queries to arbitrary dimensions", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 819-830.
  4. Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos. (2014). "PillarBox: Combating next-generation malware with fast forward-secure logging", In Proceedings International Sympo- sium on Research in Attacks, Intrusions and Defenses (RAID), pp. 46-67. .
  5. Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos. (2014). "TRUESET: faster verifiable set computations", In Proceedings of USENIX Security Symposium (USENIX Security), pp. 765-780.
  6. Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos. (2014). "Verifiable set operations over outsourced databases", In Proceedings of Int. Conference on Practice and Theory of Public-Key Cryptography (PKC), pp. 113-130.
  7. Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias. (2013). "Delegateable pseudorandom functions and applications", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 669-684.
  8. Marten van Dijk, Ari Juels, Emil Stefanov, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos. (2012). "Hourglass schemes: How to prove that cloud files are encrypted", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 265-280. .
  9. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. (2011). "Optimal authentication of operations on dynamic sets", In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 6841, Springer, pp. 91-110.
  10. Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos. (2009). "Privacy-enhancing auctions using rational cryptography", In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 5677, Springer, pp. 541-558.
  11. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. (2008). "Authenticated hash tables", In Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 437-448.
  12. Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin, Nikos Triandopoulos. (2008). "AnonySense: Privacy-aware people-centric sensing", In Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 211-224.
  13. Apu Kapadia, Nikos Triandopoulos. (2008). "Halo: High-assurance locate for distributed hash tables", In Proceedings of Annual Network & Distributed System Security Symposium (NDSS), pp. 61-79.
  14. Anna Lysyanskaya, Nikos Triandopoulos. (2006). "Rationality and adversarial behavior in multi-party computation", In Proceedings of Annual International Cryptology Conference (CRYPTO), LNCS, Vol. 4117, Springer, pp. 180-197.
Journals
  1. Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. (2016). "Authenticated hash tables based on cryptographic accumulators", Algorithmica, 74(2):664-712.
  2. Dimitrios Papadopoulos, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. (2015). "Practical authenticated pattern matching with optimal proof size", In Proceedings of the VLDB Endowment (PVLDB), 8(7): 750-761.
  3. Michael T. Goodrich, Duy Nguyen, Olga Ohrimenko, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Cristina Videira Lopes. (2012). "Efficient verification of Web-content searching through authenticated Web crawlers", In Proceedings of the VLDB Endowment (PVLDB), 5(10):920-931.
  4. Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos. (2011). "Efficient authenticated data structures for graph connectivity and geometric search problems", Algorithmica, 60(3):505-552.
  5. Minho Shin, Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Nikos Triandopoulos. (2011). "AnonySense: A system for anonymous opportunistic sensing", Journal of Pervasive and Mobile Computing (PMC), 7(1):16-30.
  6. Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos. (2010). "Authenticated error-correcting codes with applications to multicast authentication", ACM Transactions on Information and System Security (TISSEC), 13(2).
Courses
  • CS 306 Introduction to IT Security