2006 | ||
---|---|---|
37 | EE | Patrick McDaniel, William Aiello, Kevin R. B. Butler, John Ioannidis: Origin authentication in interdomain routing. Computer Networks 50(16): 2953-2980 (2006) |
2005 | ||
36 | John Ioannidis, Angelos D. Keromytis, Moti Yung: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings ACNS 2005 | |
35 | EE | Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck: CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350 |
34 | EE | Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis: gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193 |
33 | EE | Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo: An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 |
2004 | ||
32 | EE | Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein: A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134 |
31 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) |
30 | EE | Adam Stubblefield, John Ioannidis, Aviel D. Rubin: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004) |
2003 | ||
29 | EE | William Aiello, John Ioannidis, Patrick Drew McDaniel: Origin authentication in interdomain routing. ACM Conference on Computer and Communications Security 2003: 165-178 |
28 | EE | John Ioannidis: Fighting Spam by Encapsulating Policy in Email Addresses. NDSS 2003 |
27 | EE | Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin: Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. NDSS 2003 |
26 | EE | Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis: TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100 |
25 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin: WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232 |
24 | EE | Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Secure and Flexible Global File Sharing. USENIX Annual Technical Conference, FREENIX Track 2003: 165-178 |
23 | EE | Roland C. Dowdeswell, John Ioannidis: The CryptoGraphic Disk Driver. USENIX Annual Technical Conference, FREENIX Track 2003: 179-186 |
22 | EE | Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith: Design and Implementation of Virtual Private Services. WETICE 2003: 269-274 |
21 | EE | Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis: WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64 |
20 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300 |
2002 | ||
19 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis: Efficient, DoS-resistant, secure key exchange for internet protocols. ACM Conference on Computer and Communications Security 2002: 48-58 |
18 | EE | John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis: Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299 |
17 | EE | John Ioannidis, Steven M. Bellovin: Implementing Pushback: Router-Based Defense Against DDoS Attacks. NDSS 2002 |
16 | EE | Adam Stubblefield, John Ioannidis, Aviel D. Rubin: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. NDSS 2002 |
15 | EE | Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Michael Greenwald, Jonathan M. Smith, John Ioannidis: Efficient packet monitoring for network management. NOMS 2002: 423-436 |
14 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002) |
13 | EE | Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Aggregate congestion control. Computer Communication Review 32(1): 69 (2002) |
12 | EE | Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker: Controlling high bandwidth aggregates in the network. Computer Communication Review 32(3): 62-73 (2002) |
2001 | ||
11 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40 |
10 | EE | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management for IPsec. NDSS 2001 |
9 | EE | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold: Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39 |
2000 | ||
8 | EE | John Ioannidis, Angelos D. Keromytis: Network security and IPsec (tutorial). ACM Conference on Computer and Communications Security 2000 |
7 | EE | John Ioannidis: Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion). Security Protocols Workshop 2000: 142-154 |
6 | EE | Virgil D. Gligor, Matt Blaze, John Ioannidis: Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203 |
1999 | ||
5 | Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118 | |
1993 | ||
4 | John Ioannidis, Gerald Q. Maguire Jr.: The Design and Implementation of a Mobile Internetworking Architecture. USENIX Winter 1993: 489-502 | |
1991 | ||
3 | EE | John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.: IP-Based Protocols for Mobile Internetworking. SIGCOMM 1991: 235-245 |
2 | EE | John Ioannidis, Gerald Q. Maguire Jr., Israel Ben-Shaul, Marios Levedopoulos, Micky Liu: Porting AIX onto the Student Electronic Notebook. SIGSMALL/PC 1991: 76-82 |
1988 | ||
1 | Calton Pu, Henry Massalin, John Ioannidis: The Synthesis Kernel. Computing Systems 1(1): 11-32 (1988) |