Follow
Sotirios Terzis
Title
Cited by
Cited by
Year
Using trust for secure collaboration in uncertain environments
V Cahill, E Gray, JM Seigneur, CD Jensen, Y Chen, B Shand, N Dimmock, ...
IEEE pervasive computing 2 (3), 52-61, 2003
4942003
Dynamic trust models for ubiquitous computing environments
C English, P Nixon, S Terzis, A McGettrick, H Lowe
First workshop on security in ubiquitous computing at the fourth annual …, 2002
1082002
Security, privacy and trust issues in smart environments
PA Nixon, W Wagealla, C English, S Terzis
Smart Environments: Technologies, Protocols, and Applications, 249-270, 2004
802004
Efficient delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, R Metere, C Dong
IEEE Transactions on Dependable and Secure Computing 16 (4), 608-624, 2017
752017
O-PSI: delegated private set intersection on outsourced datasets
A Abadi, S Terzis, C Dong
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
692015
VD-PSI: verifiable delegated private set intersection on outsourced private datasets
A Abadi, S Terzis, C Dong
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
622017
Trusting collaboration in global computing systems
C English, W Wagealla, P Nixon, S Terzis, H Lowe, A McGettrick
Trust Management: First International Conference, iTrust 2003 Heraklion …, 2003
482003
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
C English, S Terzis, P Nixon
Personal and Ubiquitous Computing 10, 50-54, 2006
462006
Engineering trust based collaborations in a global computing environment
C English, S Terzis, W Wagealla
Trust Management: Second International Conference, iTrust 2004, Oxford, UK …, 2004
392004
Towards a middleware for generalised context management
R Glassey, G Stevenson, M Richmond, P Nixon, S Terzis, F Wang, ...
First International Workshop on Middleware for Pervasive and Ad Hoc …, 2003
372003
Trust-based model for privacy control in context aware systems
W Wagealla, S Terzis, C English
Second workshop on security in ubiquitous computing at the fifth annual …, 2003
312003
A formal model of trust lifecycle management
W Wagealla, M Carbone, C English, S Terzis, P Nixon
Workshop on Formal Aspects of Security and Trust (FAST2003) as part of the …, 2003
272003
Security models for trusting network appliances
C English, P Nixon, S Terzis, A McGettrick, H Lowe
Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time …, 2002
242002
Feather: Lightweight multi-party updatable delegated private set intersection
A Abadi, S Terzis, C Dong
Cryptology ePrint Archive, 2020
232020
Vanilla: an open language framework
S Dobson, P Nixon, V Wade, S Terzis, J Fuller
Generative and Component-Based Software Engineering: First International …, 2000
202000
Situation determination with reusable situation specifications
G Thomson, S Terzis, P Nixon
Fourth Annual IEEE International Conference on Pervasive Computing and …, 2006
182006
Component trading: The basis for a component-oriented development framework
S Terzis, P Nixon
13th European Conference on Object-Oriented Programming (ECOOP 99), 1999
181999
Danger theory and intrusion detection: Possibilities and limitations of the analogy
M Vella, M Roper, S Terzis
Artificial Immune Systems: 9th International Conference, ICARIS 2010 …, 2010
172010
Building the next generation groupware: A survey of groupware and its impact on the virtual enterprise
S Terzis, P Nixon
Trinity College Dublin, Department of Computer Science, 1999
151999
An approach to dynamic context discovery and composition
G Thomson, M Richmond, S Terzis, P Nixon
Proceedings of UbiSys' 03, System Support for Ubiquitous Computing Workshop, 2003
142003
The system can't perform the operation now. Try again later.
Articles 1–20