Elli Androulaki
contact information
Distinguished Research Staff MemberZurich Research Laboratory, Zurich, Switzerland +41
44
724
86
99




links
2015
Misbehavior in bitcoin: A study of double-spending and accountability
Ghassan O Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Capkun
ACM Transactions on Information and System Security (TISSEC) 18(1), 2, 2015
Ghassan O Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Capkun
ACM Transactions on Information and System Security (TISSEC) 18(1), 2, 2015
2014
Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage
Nathalie Baracaldo, Elli Androulaki, Joseph Glider, Alessandro Sorniotti
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, pp. 21-32, 2014
Nathalie Baracaldo, Elli Androulaki, Joseph Glider, Alessandro Sorniotti
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, pp. 21-32, 2014
Hiding transaction amounts and balances in bitcoin
Elli Androulaki, Ghassan O Karame
Trust and Trustworthy Computing, pp. 161--178, Springer, 2014
Elli Androulaki, Ghassan O Karame
Trust and Trustworthy Computing, pp. 161--178, Springer, 2014
Erasure-coded Byzantine storage with separate metadata
Elli Androulaki, Christian Cachin, Dan Dobre, Marko Vukolic
Principles of Distributed Systems, pp. 76-90, Springer, 2014
Elli Androulaki, Christian Cachin, Dan Dobre, Marko Vukolic
Principles of Distributed Systems, pp. 76-90, Springer, 2014
Enforcing Location and Time-Based Access Control on Cloud-Stored Data
Elli Androulaki, Claudio Soriente, Luka Malisa, Srdjan Capkun
IEEE 34th International Conference on Distributed Computing Systems (ICDCS), pp. 637-648, 2014
Elli Androulaki, Claudio Soriente, Luka Malisa, Srdjan Capkun
IEEE 34th International Conference on Distributed Computing Systems (ICDCS), pp. 637-648, 2014
2013
A Secure Data Deduplication Scheme for Cloud Storage
Jan Stanek, Alessandro Sorniotti, Elli Androulaki, Lukas Kencl
Technical Report RZ 3852, 2013
Jan Stanek, Alessandro Sorniotti, Elli Androulaki, Lukas Kencl
Technical Report RZ 3852, 2013
Evaluating User Privacy in Bitcoin
Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun
Proceedings of the Financial Cryptography and Data Security Conference (FC), 2013
Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun
Proceedings of the Financial Cryptography and Data Security Conference (FC), 2013
2012
Evaluating User Privacy in Bitcoin
Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
IACR Cryptology ePrint Archive, 596, 2012
Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
IACR Cryptology ePrint Archive, 596, 2012
Double-spending fast payments in bitcoin
Ghassan O Karame, Elli Androulaki, Srdjan Capkun
Proceedings of the 2012 ACM conference on Computer and communications security, pp. 906--917
Ghassan O Karame, Elli Androulaki, Srdjan Capkun
Proceedings of the 2012 ACM conference on Computer and communications security, pp. 906--917
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
Ghassan Karame, Elli Androulaki, Srdjan Capkun
IACR Cryptology ePrint Archive, 248, 2012
Ghassan Karame, Elli Androulaki, Srdjan Capkun
IACR Cryptology ePrint Archive, 248, 2012
2011
A Privacy Preserving ECommerce Oriented Identity Management Architecture
Elli Androulaki
Ph.D. Thesis, 2011
Elli Androulaki
Ph.D. Thesis, 2011
2010
Privacy-preserving, taxable bank accounts
Elli Androulaki, Binh Vo, and Steven M. Bellovin
Technical Report CUCS-005-10, Department of Computer Science, Columbia University, 2010
Elli Androulaki, Binh Vo, and Steven M. Bellovin
Technical Report CUCS-005-10, Department of Computer Science, Columbia University, 2010
Privacy-preserving, taxable bank accounts
Elli Androulaki, Binh Vo, Steven Bellovin
Computer Security-ESORICS 2010, pp. 37-54, Springer
Elli Androulaki, Binh Vo, Steven Bellovin
Computer Security-ESORICS 2010, pp. 37-54, Springer
A Real World Identity Management System with Master Secret Revocation
Elli Androulaki, Binh D Vo, Steven Michael Bellovin
Technical Report, Department of Computer Science, Columbia University, 2010
Elli Androulaki, Binh D Vo, Steven Michael Bellovin
Technical Report, Department of Computer Science, Columbia University, 2010
A secure and privacy-preserving targeted ad-system
Elli Androulaki, Steven M Bellovin
Financial Cryptography and Data Security, pp. 123--135, Springer, 2010
Elli Androulaki, Steven M Bellovin
Financial Cryptography and Data Security, pp. 123--135, Springer, 2010
2009
A Secure and Privacy-Preserving Targeted Ad System
Elli Androulaki and Steven M. Bellovin
Technical Report CUCS-044-09, Department of Computer Science, Columbia University, 2009
Elli Androulaki and Steven M. Bellovin
Technical Report CUCS-044-09, Department of Computer Science, Columbia University, 2009
APOD: Anonymous Physical Object Delivery
Elli Androulaki, Steven Bellovin
Privacy Enhancing Technologies, pp. 202--215, 2009
Elli Androulaki, Steven Bellovin
Privacy Enhancing Technologies, pp. 202--215, 2009
Cybersecurity through an identity management system
Elli Androulaki, Binh D Vo, Steven Michael Bellovin
Technical Report, 2009
Elli Androulaki, Binh D Vo, Steven Michael Bellovin
Technical Report, 2009
An anonymous credit card system
Elli Androulaki, Steven Bellovin
Trust, Privacy and Security in Digital Business, pp. 42--51, Springer, 2009
Elli Androulaki, Steven Bellovin
Trust, Privacy and Security in Digital Business, pp. 42--51, Springer, 2009
An anonymous credit card system
E Androulaki, S Bellovin
Technical Report, Technical Report cucs-010-09. Columbia University, New York, USA, 2009
E Androulaki, S Bellovin
Technical Report, Technical Report cucs-010-09. Columbia University, New York, USA, 2009
2008
Reputation systems for anonymous networks
Elli Androulaki, Seung Geol Choi, Steven M Bellovin, Tal Malkin
Privacy Enhancing Technologies, pp. 202--218, 2008
Elli Androulaki, Seung Geol Choi, Steven M Bellovin, Tal Malkin
Privacy Enhancing Technologies, pp. 202--218, 2008
PAR: Payment for anonymous routing
Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M Bellovin
Privacy Enhancing Technologies, pp. 219--236, 2008
Elli Androulaki, Mariana Raykova, Shreyas Srivatsan, Angelos Stavrou, Steven M Bellovin
Privacy Enhancing Technologies, pp. 219--236, 2008
2007
Study of Malcode-Bearing Documents
Wei-Jen Li, Salvatore Stolfo, Angelos Stavrou, Elli Androulaki, and Angelos D. Keromytis
Technical Report CUCS-028-07, Department of Computer Science, Columbia University, 2007
Wei-Jen Li, Salvatore Stolfo, Angelos Stavrou, Elli Androulaki, and Angelos D. Keromytis
Technical Report CUCS-028-07, Department of Computer Science, Columbia University, 2007
Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, and Tal Malkin
Reputation systems for anonymous networks
Technical Report CUCS-029-07, Department of Computer Science, Columbia University, 2007
Reputation systems for anonymous networks
Technical Report CUCS-029-07, Department of Computer Science, Columbia University, 2007
OpenTor: Anonymity as a Commodity Service
Elli Androulaki, Mariana Petrova Raykova, Angelos Stavrou, Steven Michael Bellovin
Technical Report, Department of Computer Science, Columbia University, 2007
Elli Androulaki, Mariana Petrova Raykova, Angelos Stavrou, Steven Michael Bellovin
Technical Report, Department of Computer Science, Columbia University, 2007
A study of malcode-bearing documents
Wei-Jen Li, Salvatore Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D Keromytis
Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 231--250, Springer, 2007
Wei-Jen Li, Salvatore Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D Keromytis
Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 231--250, Springer, 2007