
Katerina Mitrokotsa
Full Professor in Cyber Security
katerina.mitrokotsa at unisg dot ch
I am a professor at the University of St. Gallen in Switzerland at the School of Computer Science, where I lead the Cybersecurity and Applied Cryptography group. Formerly I was a professor at Chalmers University of Technology in Sweden.
Before that, I held positions as a visiting professor at the department of Computer Science at ETHZ, a visiting associate professor at Tokyo Institute of Technology and a visiting scholar at Harvard University. After receiving my PhD (2007), I was a visiting assistant professor at Vrije Universiteit in Amsterdam and then a postdoctoral fellow at TU Delft and a Marie Curie fellow at EPFL.
In 2013, I joined Chalmers University of Technology and the department of Computer Science and Engineering. I have been active both in European and National research projects, while I have been awarded the VR (Swedish Research Council) young researcher project grant, the Rubicon Research Grant by the Netherlands Organization for Scientific Research (NWO) and a Marie Curie Intra European Fellowship
Before that, I held positions as a visiting professor at the department of Computer Science at ETHZ, a visiting associate professor at Tokyo Institute of Technology and a visiting scholar at Harvard University. After receiving my PhD (2007), I was a visiting assistant professor at Vrije Universiteit in Amsterdam and then a postdoctoral fellow at TU Delft and a Marie Curie fellow at EPFL.
In 2013, I joined Chalmers University of Technology and the department of Computer Science and Engineering. I have been active both in European and National research projects, while I have been awarded the VR (Swedish Research Council) young researcher project grant, the Rubicon Research Grant by the Netherlands Organization for Scientific Research (NWO) and a Marie Curie Intra European Fellowship
A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional Encryption
J. Ernst and A. Mitrokotsa
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan
WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks
G. Tsaloli, A. Lancho, A. Mitrokotsa and G. Durisi
Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
C. Brunetta, G. Tsaloli, B. Liang, G. Banegas and A. Mitrokotsa
DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
G. Tsaloli, B. Liang, C. Brunetta, G. Banegas and A. Mitrokotsa
Information Security - 24th International Conference, ISC 2021, Virtual Event
Turn-Based Communication Channels
C. Brunetta, M. Larangeira, B. Liang, A. Mitrokotsa and K. Tanaka
Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China
A Delegated Proof of Proximity Scheme for Industrial Internet of Things Consensus
L. Ledwaba, G.P. Hancke, A. Mitrokotsa and S.J. Isaac
In Proceedings of IECON 2020, pp 4441--4446, IEEE, Oct. 2020
Robust Distributed Pseudorandom Functions for mNP Access Structures
B. Liang and A. Mitrokotsa
In Proceedings of International Conference on Information Security (ISC 2019), pp 107-126, LNCS, New York, US, Sept. 2019
Code-Based Zero Knowledge PRF Arguments
C. Brunetta, B. Liang and A. Mitrokotsa
In Proceedings of International Conference on Information Security (ISC 2019), pp 171-189, LNCS, New York, US, Sept. 2019
Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity Guarantees
G. Tsaloli and A. Mitrokotsa
In Proceedings of SECRYPT 2019, Prague, Czech Republic, June 2019
Sum It Up: Verifiable Additive Homomorphic Secret Sharing
G. Tsaloli and A. Mitrokotsa
In Proceedings of ICISC 2019, Seoul, South Korea, Dec. 2019
Verifiable Homomorphic Secret Sharing
G. Tsaloli, B. Liang and A. Mitrokotsa
In Proceedings of ProvSec 2018, Jeju Island, Republic of Korea, Oct. 2018
Distributed Pseudorandom Functions for General Access Structures in NP
B. Liang and A. Mitrokotsa
In Proceedings of ICICS 2017, Beijing, China, Dec. 2017
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
B. Liang and A. Mitrokotsa
In Proceedings of ISPEC 2017, Australia, Dec. 2017
A Differential Private Encryption Scheme
C. Brunetta, C. Dimitrakakis, B. Liang and A. Mitrokotsa
In Proceedings of ISC 2017, Vietnam, Nov. 2017
Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?
E. Pagnin, J. Liu and A. Mitrokotsa
In Proceedings of CANS 2017, HK, Nov. 2017
Anonymous Single-Round Server-Aided Verification
E. Pagnin, A. Mitrokotsa and K. Tanaka
In Proceedings of Latincrypt 2017, Cuba, Sep. 2017
Revisiting Two-hop distance bounding protocols: Are you really close enough?
N. Kaloudi and A. Mitrokotsa
In Proceedings of WISTP 2017, Heraklion, Greece, Sept. 2017
Multi-Key Homomorphic Authenticators
D. Fiore, A. Mitrokotsa, L. Nizzardo and E. Pagnin
In Proceedings of ASIACRYPT 2016, Hanoi, Vietnam, Dec. 2016
Efficient Verifiable Computation of XOR for Biometric Authentication
A. Abidin, A. Aly, E. Argones Rua and A. Mitrokotsa
In Proceedings of CANS 2016, Milan, Italy, Dec. 2016
HB+DB: Mitigating Man-in-the-Middle Attacks against HB+ with Distance Bounding
E. Pagnin, A. Yang, G. Hancke and A. Mitrokotsa
In Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2015), New York, June 2015
Synergistic User: Context Analytics
A. Hossmann-Picu , Z. Li, Z. Zhao, T. Braun, C. M. Angelopoulos, O. Evangelatos, J. Rolim, M. Papandrea, K. Garg, S. Giordano, A. C. Y. Tossou, C. Dimitrakakis and A. Mitrokotsa
In Proceedings of the 7th ICT Innovations Conference, October 2015
On the Leakage of Information in Biometric Authentication
E. Pagnin, C. Dimitrakakis, A. Abidin and A. Mitrokotsa
In Proceedings of Indocrypt 2014, New Delhi, India, December 2014
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE
A. Abidin and A. Mitrokotsa
In Proceedings of the IEEE Workshop on Information Forensics and Security 2014 (WIFS 2014), Atlanta, USA, December 2014
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
A. Abidin, K. Matsuura and A. Mitrokotsa
In Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), Heraklion, Greece, October 2014
Robust and private Bayesian inference
C. Dimitrakakis, B. Nelson, A. Mitrokotsa and B.I.R. Rubinstein
In Proceedings of the International Conference on Algorithmic Learning Theory (ALT 2014), Bled, Slovenia, October 2014
Authentication in Constrained Settings
A. Mitrokotsa
In Proceedings of BalkanCryptSec 2014, Istanbul, Turkey 2014
Attacks on Privacy-Preserving Biometric Authentication
A. Abidin, E. Pagnin and A. Mitrokotsa
In Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014)
Differential Privacy and Private Bayesian Inference
C. Dimitrakakis, B. Nelson, A. Mitrokotsa and B.I.R. Rubinstein
In Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014)
Practical and Provably Secure Distance-Bounding
I. Boureanu, A. Mitrokotsa and S. Vaudenay
In Proceedings of the 16th Information Security Conference (ISC'13)
Towards Secure Distance-Bounding
I. Boureanu, A. Mitrokotsa and S. Vaudenay
In Proceedings of the 20th International Workshop on Fast Software Encryption, Singapore, 10-13 March 2013
Secure and Lightweight Distance-Bounding
I. Boureanu, A. Mitrokotsa, and S. Vaudenay
In Proceedings of Second International Workshop on Lightweight Cryptography for Security & Privacy - LightSec 2013
Expected loss bounds for authentication in constrained channels
C. Dimitrakakis, A. Mitrokotsa and S. Vaudenay
In Proceedings of INFOCOM 2012, Orlando Florida 2012
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds!
I. Boureanu, A. Mitrokotsa and S. Vaudenay
In Proceedings of LATINCRYPT 2012, 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, pp. 100-120, LNCS 7533 Springer 2012.
The Bussard-Bagga and Other Distance Bounding Protocols under Man-in-the-Middle Attacks
A. Bay, I. Boureanu, A. Mitrokotsa, I. Spulber and S. Vaudenay
In Proceedings of Inscrypt'2012, 8th China International Conference on Information Security and Cryptology, Nov. 28- Dec. 1, 2012, Beijing, China.
Near-Optimal Node Blacklisting in Adversarial Networks
C. Dimitrakakis and A. Mitrokotsa
2012 Conference on Decision and Game Theory for Security (GameSec 2012)
Mafia Fraud Attack against the RC Distance-Bounding Protocol
A. Mitrokotsa, C. Onete and S. Vaudenay
In Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A). November 2012, Nice, France.
On the Traceability of Tags in SUAP RFID Authentication Protocols
M. Safkhani, N. Bagheri, A. Mitrokotsa and P. Peris-Lopez
In Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A). November 2012, Nice, France.
Weaknesses in another Gen2-Based RFID Authentication Protocol
M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa and J.C. Hernandez-Castro
In Proceedings of the 2012 IEEE RFID Technology and Applications (IEEE RFID T-A), November 2012
Detecting Intrusions within RFID Systems through Non-Monotonic Reasoning Cleaning
P. Darcy, B. Stantic, A. Mitrokotsa, A. Sattar
In Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 7-10 December 2010, Brisbane, Australia
Statistical Decision Making for Authentication and Intrusion Detection
C. Dimitrakakis and A. Mitrokotsa
In Proceedings of the 8th IEEE International Conference on Machine Learning and Applications (ICMLA 2009)
Classification of RFID Attacks
A. Mitrokotsa, M.R. Rieback, and A.S. Tanenbaum
In Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT 2008)
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
A. Mitrokotsa, M. Tsagkaris, and C. Douligeris
In Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2008)
Intrusion Detection Using Cost-Sensitive Classification
A. Mitrokotsa, C. Dimitrakakis, and C. Douligeris
In Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND 2007)
Intrusion Detection with Neural Networks and Watermarking Techniques for MANET
A. Mitrokotsa, N. Komninos, and C. Douligeris
In Proceedings of IEEE International Conference on Pervasive Services 2007
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
A. Mitrokotsa, N. Komninos, and C. Douligeris
In Proceedings of the 6th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2007)
Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks
A. Mitrokotsa, R. Mavropodi, and C. Douligeris
In Proceedings of International Conference on Intelligent Systems and Computing: Theory and Applications
Intrusion Detection Using Emergent Self-Organizing Maps
A. Mitrokotsa and C. Douligeris
Hellenic Conference on Artificial Intelligence
Detecting Denial of Service attacks using Emergent Self-Organizing Maps
A. Mitrokotsa and C. Douligeris
Symposium on Signal Processing and Information Technology (ISSPIT 2005)
DDoS Attacks and Defense Mechanisms: A Classification
C. Douligeris and A. Mitrokotsa
In Proceedings of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2003)