dblp.uni-trier.dewww.uni-trier.de

John Ioannidis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
37EEPatrick McDaniel, William Aiello, Kevin R. B. Butler, John Ioannidis: Origin authentication in interdomain routing. Computer Networks 50(16): 2953-2980 (2006)
2005
36 John Ioannidis, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings ACNS 2005
35EEDebra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350
34EEStephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis: gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193
33EEStelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108
2004
32EEAngelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134
31EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004)
30EEAdam Stubblefield, John Ioannidis, Aviel D. Rubin: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004)
2003
29EEWilliam Aiello, John Ioannidis, Patrick Drew McDaniel: Origin authentication in interdomain routing. ACM Conference on Computer and Communications Security 2003: 165-178
28EEJohn Ioannidis: Fighting Spam by Encapsulating Policy in Email Addresses. NDSS 2003
27EEGeoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin: Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. NDSS 2003
26EEMatt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis: TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100
25EEMatt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232
24EEStefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Secure and Flexible Global File Sharing. USENIX Annual Technical Conference, FREENIX Track 2003: 165-178
23EERoland C. Dowdeswell, John Ioannidis: The CryptoGraphic Disk Driver. USENIX Annual Technical Conference, FREENIX Track 2003: 179-186
22EESotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274
21EEAlexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis: WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64
20EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300
2002
19EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58
18EEJohn Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis: Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299
17EEJohn Ioannidis, Steven M. Bellovin: Implementing Pushback: Router-Based Defense Against DDoS Attacks. NDSS 2002
16EEAdam Stubblefield, John Ioannidis, Aviel D. Rubin: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. NDSS 2002
15EEKostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Michael Greenwald, Jonathan M. Smith, John Ioannidis: Efficient packet monitoring for network management. NOMS 2002: 423-436
14EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002)
13EERatul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Aggregate congestion control. Computer Communication Review 32(1): 69 (2002)
12EERatul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Controlling high bandwidth aggregates in the network. Computer Communication Review 32(3): 62-73 (2002)
2001
11EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40
10EEMatt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management for IPsec. NDSS 2001
9EEWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39
2000
8EEJohn Ioannidis, Angelos D. Keromytis: Network security and IPsec (tutorial). ACM Conference on Computer and Communications Security 2000
7EEJohn Ioannidis: Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion). Security Protocols Workshop 2000: 142-154
6EEVirgil D. Gligor, Matt Blaze, John Ioannidis: Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203
1999
5 Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118
1993
4 John Ioannidis, Gerald Q. Maguire Jr.: The Design and Implementation of a Mobile Internetworking Architecture. USENIX Winter 1993: 489-502
1991
3EEJohn Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.: IP-Based Protocols for Mobile Internetworking. SIGCOMM 1991: 235-245
2EEJohn Ioannidis, Gerald Q. Maguire Jr., Israel Ben-Shaul, Marios Levedopoulos, Micky Liu: Porting AIX onto the Student Electronic Notebook. SIGSMALL/PC 1991: 76-82
1988
1 Calton Pu, Henry Massalin, John Ioannidis: The Synthesis Kernel. Computing Systems 1(1): 11-32 (1988)

Coauthor Index

1William Aiello [9] [19] [27] [29] [31] [37]
2Kostas G. Anagnostakis [15]
3Steven M. Bellovin [9] [12] [13] [17] [19] [22] [31]
4Israel Ben-Shaul [2]
5Matt Blaze [5] [6] [9] [10] [11] [14] [19] [20] [25] [26] [31]
6Kevin R. B. Butler [37]
7Ran Canetti [9] [19] [31]
8Stephen T. Chou [34]
9Debra L. Cook [35]
10Roland C. Dowdeswell [23]
11Dan Duchamp (Daniel J. Duchamp) [3]
12Sally Floyd [12] [13]
13Virgil D. Gligor [6]
14Geoffrey Goodell [27]
15Michael B. Greenwald (Michael Greenwald) [15]
16Timothy G. Griffin (Timothy Griffin) [27]
17Sotiris Ioannidis [15] [18] [21] [22] [24] [26]
18Angelos D. Keromytis [5] [8] [9] [10] [11] [14] [18] [19] [20] [21] [22] [24] [25] [26] [31] [32] [33] [34] [35] [36]
19Marios Levedopoulos [2]
20Alexander Levine [21]
21Micky Liu [2]
22Jake Luck [35]
23Gerald Q. Maguire Jr. [2] [3] [4]
24Ratul Mahajan [12] [13]
25Tal Malkin [25]
26Henry Massalin [1]
27Patrick Drew McDaniel (Patrick McDaniel) [27] [29] [37]
28Stefan Miltchev [15] [24]
29Vishal Misra [32]
30Pekka Nikander [26]
31Vern Paxson [12] [13]
32Vassilis Prevelakis [18] [21] [24] [26]
33Calton Pu [1]
34Omer Reingold [9] [19] [31]
35Dan Rubenstein [32]
36Aviel D. Rubin [16] [25] [27] [30]
37Scott Shenker [12] [13]
38Stelios Sidiroglou [33]
39Jonathan M. Smith [15] [22] [24]
40Angelos Stavrou [32] [34]
41Salvatore J. Stolfo [33]
42Adam Stubblefield [16] [30]
43Moti Yung (Mordechai M. Yung) [36]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)