SUMMARY
Tassos Dimitriou is a Professor in the Computer Engineering Department of Kuwait University (KU). Dr. Dimitriou conducts research in areas spanning from the theoretical foundations of cryptography to the design and implementation of leading edge efficient and secure communication protocols. Emphasis is given in authentication and privacy issues for various types of networks (adhoc, sensor nets, RFID, smart grid, ubiquitous computing, etc.), security architectures for wireless and telecommunication networks and the development of secure applications for networking and electronic commerce.
Prior to joining KU, Dr Dimitriou was an Associate professor at Athens Information Technology - Greece and adjunct faculty of Information Networking Institute at Carnegie Mellon University, USA. At AIT he was leading the Algorithms and Security group where the primary objective was to bring together expertise in education, research and practice in the field of information security and algorithms. A brochure and a snapshot of this research which is still ongoing can be seen here. Dr Dimitriou was also the organizer of PRACSE, a semi-annual event event focusing on issues related to important properties of systems and business security, however, with an emphasis on practical aspects of security.
Dr Dimitriou's research in the above fields has resulted in numerous publications, some of which received distinction, and numerous invitations for talks in prestigious conferences. Furthermore, apart from his usual academic admin/teaching/research duties, he regularly consults with companies on topics related to security and he gives short and professional courses aimed at professionals and people who want to become familiar with the exciting field of network security.
Dr. Dimitriou is a senior member of IEEE, member of ACM and a Fulbright fellow. He has also been a Distinguished Lecturer for ACM.
ADVERTISEMENTS
Here are some recent conferences that I'm somehow involved. Older activities can be found here.
- The 14th ACM Conference on Data and Application Security and Privacy (CODASPY 2024). June 19–21, 2024. Porto, Portugal.
- The International Conference on Availability, Reliability and Security (ARES 2024). July 30-August 1, 2024. Vienna, Austria.
- The 14th WISTP International Conference on Information Security Theory and Practice (WISTP 2024). Feb 29 & March 1st 2024, Paris, France.
- The 27th European Symposium on Research in Computer Security (ESORICS 2022). 26-30 September 2022, Copenhagen, Denmark.
- The 27th Nordic Conference on Secure IT Systems (NordSec 2022). 30 November 2022 - 02 December 2022, Reykjavik University, Iceland.
- The 26th European Symposium on Research in Computer Security (ESORICS 2021). 4-8 October 2021, Copenhagen, Denmark.
- 3rd Workshop on Cyber-Security Arms Race (CYSARM). Co-located with the 28th ACM Conference on Computer and Communications Security. November 19, 2021.
- The 26th Nordic Conference on Secure IT Systems (NordSec 2021). 29-30 November 2021, Tampere University, Finland.
- The 25th European Symposium on Research in Computer Security (ESORICS 2020). September 14-18, 2020. Surray, UK.
- 2nd Workshop on Cyber-Security Arms Race (CYSARM). Co-located with the 27th ACM Conference on Computer and Communications Security. November 13, 2020. Orlando, USA
- International Conference on Privacy and Forensics in Smart Mobility. December 2-4, 2020. Viana do Castelo, Portugal
- 13th WISTP International Conference on Information Security Theory and Practice (WISTP'2019). December 11-12, 2019. Paris, France.
- 1st Workshop on Cyber-Security Arms Race (CYSARM). co-located with the 26th ACM Conference on Computer and Communications Security. November 15, 2019. London, UK
- 6th International Symposium on Security in Computing and Communications (SSCC’18) September 19-22, 2018, Bangalore, India.
- 32nd International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2017, May 29-31, 2017, Rome, Italy.
- 14th International Conference on Security and Cryptography (SECRYPT 2017), 24-26 July 2017, Madrid, Spain.
- 5th International Symposium on Security in Computing and Communications (SSCC’17) 13-16 September, 2017, Manipal University, India.
- 13th International Conference on Security and Cryptography (SECRYPT 2016), 26-28 July 2016, Lisbon, Portugal.
- 10th International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE 2016), July 24-28, 2016, Nice, France.
RESEARCH RESULTS
The Black Hat Collection
BlackHat USA - SpySense Spyware Tool
...Spy-Sense is a spyware tool that allows the injection of stealthy exploits in the heart of each node in a sensor network. Spy-Sense is undetectable, hard to recognize and get rid of, and once activated, it runs in a discrete background operation without interfering or disrupting normal network operation.
BlackHat Europe - Sensys Attack Tool
...SenSys is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality of a sensor network. It can analyze overheard radio messages and use this information to perform attacks such as Sinkhole, Replay/Modify Data, Selective Forwarding, Malicious Code Injection, etc... For more information, check out the Sensys web site!!!
and More...
Selected, representative papers (a complete list can be found here)
- A paper about Visor: Privacy-Preserving Reputation for Decentralized Marketplaces. In the 38th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024), July 2024, San Jose, CA, USA.
- A paper on FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. In the ACM Symposium on Access Control Models and Technologies (SACMAT 2024), May 2024, San Antonio, Texas, USA. An extended version can be found here.
- A paper about CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. In the 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2023), November 2023. An extended version can be found here.
- A journal paper on Extended Berkeley Packet Filter: An Application Perspective. In IEEE Access, December 2022. https://doi.org/10.1109/ACCESS.2022.3226269
- A paper on Private Lives Matter: A Differential Private Functional Encryption Scheme. In the 12th ACM Conference on Data and Application Security and Privacy (CODASPY 2022), Baltimore-Washington DC Area, USA, 2022. An extended version can be found here.
- A journal paper on Incentivizing Participation in Crowd-Sensing Applications Through Fair and Private Bitcoin Rewards. In IEEE Access, December 2022. https://doi.org/10.1109/ACCESS.2022.3227633
- A journal paper on Blockchain-Based Fair and Secure Certified Electronic Mail Without a TTP. In IEEE Access, July 2021. https://doi.org/10.1109/ACCESS.2021.3096661 (Open access)
- A paper on Decentralized Reputation. In the 11th ACM Conference on Data and Application Security and Privacy (CODASPY 2021), April 26-28, 2021. An extended version can be found in the Cryptology ePrint Archive: Report 2020/761.
- A journal paper on Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data. In IEEE Internet of Things Journal, April 2020, https://doi.org/10.1109/JIOT.2020.2990666. Author's version, here.
- A journal paper on Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting. In Computer Networks, April 2020, https://doi.org/10.1016/j.comnet.2020.107234. A preliminary version can be found in Cryptology ePrint Archive, Report 2019/1406.
- A paper about Fair and private Bitcoin rewards: Incentivizing participation in Crowd-sensing applications. In the IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS 2020), Oxford, United Kingdom, 2020. An extended version can be found here.
- A journal paper on Container Security: Issues, Challenges, and Road Ahead. In IEEE Access, April 2019. https://doi.org/10.1109/ACCESS.2019.2911732 (Open access)
- A journal paper on REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems. In Computer Communications, March 2019. https://doi.org/10.1016/j.comcom.2019.01.009
- A journal paper on a Deniable, Privacy-Aware Scheme for Decentralized Location-Based Services. In Future Generation Computer Systems, 2018. https://doi.org/10.1016/j.future.2018.04.004
- A journal paper on Enabling Anonymous Authorization and Rewarding in the Smart Grid. In IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol. 14, No. 5, September/October 2017. http://dx.doi.org/10.1109/TDSC.2015.2496211
- A journal paper on Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications. In Journal of Network and Computer Applications, Vol. 100, December 2017. https://doi.org/10.1016/j.jnca.2017.10.012
- A paper on Deniability in Location-Based Services. In 15th International Conference on
Cryptology and Network Security (CANS), Milan, Italy, November 2016.
- A journal paper on Imposter Detection in Mobile Sensor Networks. In Computer Networks, Volume 108, October 2016. http://dx.doi.org/10.1016/j.comnet.2016.08.019
- A journal paper on Secure and Scalable Aggregation in the Smart Grid. In Ad Hoc Networks, Elsevier, 2016. http://dx.doi.org/10.1016/j.adhoc.2016.06.014
- A journal paper on Key Evolving RFID Systems: Forward/Backward Privacy and Ownership Transfer of RFID tags. Ad Hoc Networks, Elsevier, 2015. http://dx.doi.org/10.1016/j.adhoc.2015.08.019
- A paper on "Privacy-Friendly Planning of Energy Distribution in Smart Grids". In SEGS 2014, in association with the 21st ACM Conference on Computer and Communications Security, Arizona, USA. November 3 - 7, 2014.
- LDAC: A Localized and Decentralized Algorithm for Efficiently Countering Wormholes in Mobile Wireless Networks. Journal of Computer and System Sciences, Elsevier, 2014. http://dx.doi.org/10.1016/j.jcss.2013.06.015
- A journal paper on Multi-Party Trust Computation in Decentralized Environments in the Presence of Malicious Adversaries. Ad Hoc Networks, Elsevier, 2013. http://dx.doi.org/10.1016/j.adhoc.2013.04.013
- A journal paper on Worm Propagation in Sensor Networks. The Computer Journal, Special Issue on Algorithms, Protocols, and Future Applications of Wireless Sensor Networks. Oxford University Press, 2010.
The material presented here is to ensure timely dissemination of scholarly and technical work. If it is going to be used for other than personal use, please contact the corresponding copyright owner...
Running for fun (but not profit)
Back in March 2010, I made a potentially life changing decision: I signed up for the 28th Athens Classic Marathon, honoring the 2,500 years anniversary from the Marathon Battle. Running a Marathon was something of a "dream" when I started running a couple of years ago, but always felt like a mission impossible... Most probably this challenge would prove to be way out of my league, but I figured if there was ever a time, that would be it! Fortunately, I was good for the challenge... So, here are some pictures from my first Marathon race... (as well as a couple of subsequent ones...). Since then I ran a few more but I stopped posting them here... :-)
- 2010 Marathon (clear sky, perfect weather) Time, 21km, Finish1, Finish2
- 2011 Marathon (cold, about 7oC and rainy) Time, 21km, Finish1, Finish2
- 2012 Marathon (mostly sunny, about 20oC) Time, Finish1, Finish2