User profiles for Antonis Michalas
![]() | Antonis MichalasAssociate Professor in Cyber Security, Tampere University, Tampere, Finland Verified email at tuni.fi Cited by 1675 |
[HTML][HTML] Fake news outbreak 2021: Can we stop the viral spread?
Social Networks' omnipresence and ease of use has revolutionized the generation and
distribution of information in today's world. However, easy access to information does not equal …
distribution of information in today's world. However, easy access to information does not equal …
Providing user security guarantees in public infrastructure clouds
…, C Gehrmann, A Michalas - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability,
where tenants - insulated from the minutiae of hardware maintenance - rent computing …
where tenants - insulated from the minutiae of hardware maintenance - rent computing …
The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing
A Michalas - Proceedings of the 34th ACM/SIGAPP symposium on …, 2019 - dl.acm.org
Secure cloud storage is considered one of the most important issues that both businesses
and end-users are considering before moving their private data to the cloud. Lately, we have …
and end-users are considering before moving their private data to the cloud. Lately, we have …
Paasword: A holistic data privacy and security by design framework for cloud services
Enterprises increasingly recognize the compelling economic and operational benefits from
virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable …
virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable …
Multi-party trust computation in decentralized environments in the presence of malicious adversaries
T Dimitriou, A Michalas - Ad Hoc Networks, 2014 - Elsevier
In this paper, we describe a decentralized privacy-preserving protocol for securely casting
trust ratings in distributed reputation systems. Our protocol allows n participants to cast their …
trust ratings in distributed reputation systems. Our protocol allows n participants to cast their …
Modern family: A revocable hybrid encryption scheme based on attribute-based encryption, symmetric searchable encryption and SGX
A Bakas, A Michalas - Security and Privacy in Communication Networks …, 2019 - Springer
Secure cloud storage is considered as one of the most important issues that both businesses
and end-users take into account before moving their private data to the cloud. Lately, we …
and end-users take into account before moving their private data to the cloud. Lately, we …
Security aspects of e-health systems migration to the cloud
A Michalas, N Paladi… - 2014 IEEE 16th …, 2014 - ieeexplore.ieee.org
As adoption of e-health solutions advances, new computing paradigms - such as cloud
computing - bring the potential to improve efficiency in managing medical health records and …
computing - bring the potential to improve efficiency in managing medical health records and …
Split ways: Privacy-preserving training of encrypted data using split learning
Split Learning (SL) is a new collaborative learning technique that allows participants, eg a
client and a server, to train machine learning models without the client sharing raw data. In …
client and a server, to train machine learning models without the client sharing raw data. In …
Domain based storage protection with secure access control for the cloud
Cloud computing has evolved from a promising concept to one of the fastest growing
segments of the IT industry. However, many businesses and individuals continue to view cloud …
segments of the IT industry. However, many businesses and individuals continue to view cloud …
Health data security and privacy: Challenges and solutions for the future
This chapter reviews the common health data security and privacy challenges to provide an
overview of the context—the concerns and the types of cybersecurity threats that healthcare …
overview of the context—the concerns and the types of cybersecurity threats that healthcare …