2006 |
37 | EE | Patrick McDaniel,
William Aiello,
Kevin R. B. Butler,
John Ioannidis:
Origin authentication in interdomain routing.
Computer Networks 50(16): 2953-2980 (2006) |
2005 |
36 | | John Ioannidis,
Angelos D. Keromytis,
Moti Yung:
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings
ACNS 2005 |
35 | EE | Debra L. Cook,
John Ioannidis,
Angelos D. Keromytis,
Jake Luck:
CryptoGraphics: Secret Key Cryptography Using Graphics Cards.
CT-RSA 2005: 334-350 |
34 | EE | Stephen T. Chou,
Angelos Stavrou,
John Ioannidis,
Angelos D. Keromytis:
gore: Routing-Assisted Defense Against DDoS Attacks.
ISC 2005: 179-193 |
33 | EE | Stelios Sidiroglou,
John Ioannidis,
Angelos D. Keromytis,
Salvatore J. Stolfo:
An Email Worm Vaccine Architecture.
ISPEC 2005: 97-108 |
2004 |
32 | EE | Angelos Stavrou,
John Ioannidis,
Angelos D. Keromytis,
Vishal Misra,
Dan Rubenstein:
A Pay-per-Use DoS Protection Mechanism for the Web.
ACNS 2004: 120-134 |
31 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
Ran Canetti,
John Ioannidis,
Angelos D. Keromytis,
Omer Reingold:
Just fast keying: Key agreement in a hostile internet.
ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) |
30 | EE | Adam Stubblefield,
John Ioannidis,
Aviel D. Rubin:
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004) |
2003 |
29 | EE | William Aiello,
John Ioannidis,
Patrick Drew McDaniel:
Origin authentication in interdomain routing.
ACM Conference on Computer and Communications Security 2003: 165-178 |
28 | EE | John Ioannidis:
Fighting Spam by Encapsulating Policy in Email Addresses.
NDSS 2003 |
27 | EE | Geoffrey Goodell,
William Aiello,
Timothy Griffin,
John Ioannidis,
Patrick Drew McDaniel,
Aviel D. Rubin:
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
NDSS 2003 |
26 | EE | Matt Blaze,
John Ioannidis,
Sotiris Ioannidis,
Angelos D. Keromytis,
Pekka Nikander,
Vassilis Prevelakis:
TAPI: Transactions for Accessing Public Infrastructure.
PWC 2003: 90-100 |
25 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis,
Tal Malkin,
Aviel D. Rubin:
WAR: Wireless Anonymous Routing.
Security Protocols Workshop 2003: 218-232 |
24 | EE | Stefan Miltchev,
Vassilis Prevelakis,
Sotiris Ioannidis,
John Ioannidis,
Angelos D. Keromytis,
Jonathan M. Smith:
Secure and Flexible Global File Sharing.
USENIX Annual Technical Conference, FREENIX Track 2003: 165-178 |
23 | EE | Roland C. Dowdeswell,
John Ioannidis:
The CryptoGraphic Disk Driver.
USENIX Annual Technical Conference, FREENIX Track 2003: 179-186 |
22 | EE | Sotiris Ioannidis,
Steven M. Bellovin,
John Ioannidis,
Angelos D. Keromytis,
Jonathan M. Smith:
Design and Implementation of Virtual Private Services.
WETICE 2003: 269-274 |
21 | EE | Alexander Levine,
Vassilis Prevelakis,
John Ioannidis,
Sotiris Ioannidis,
Angelos D. Keromytis:
WebDAVA: An Administrator-Free Approach To Web File-Sharing.
WETICE 2003: 59-64 |
20 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Experience with the KeyNote Trust Management System: Applications and Future Directions.
iTrust 2003: 284-300 |
2002 |
19 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
John Ioannidis,
Omer Reingold,
Ran Canetti,
Angelos D. Keromytis:
Efficient, DoS-resistant, secure key exchange for internet protocols.
ACM Conference on Computer and Communications Security 2002: 48-58 |
18 | EE | John Ioannidis,
Sotiris Ioannidis,
Angelos D. Keromytis,
Vassilis Prevelakis:
Fileteller: Paying and Getting Paid for File Storage.
Financial Cryptography 2002: 282-299 |
17 | EE | John Ioannidis,
Steven M. Bellovin:
Implementing Pushback: Router-Based Defense Against DDoS Attacks.
NDSS 2002 |
16 | EE | Adam Stubblefield,
John Ioannidis,
Aviel D. Rubin:
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
NDSS 2002 |
15 | EE | Kostas G. Anagnostakis,
Sotiris Ioannidis,
Stefan Miltchev,
Michael Greenwald,
Jonathan M. Smith,
John Ioannidis:
Efficient packet monitoring for network management.
NOMS 2002: 423-436 |
14 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Trust management for IPsec.
ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002) |
13 | EE | Ratul Mahajan,
Steven M. Bellovin,
Sally Floyd,
John Ioannidis,
Vern Paxson,
Scott Shenker:
Aggregate congestion control.
Computer Communication Review 32(1): 69 (2002) |
12 | EE | Ratul Mahajan,
Steven M. Bellovin,
Sally Floyd,
John Ioannidis,
Vern Paxson,
Scott Shenker:
Controlling high bandwidth aggregates in the network.
Computer Communication Review 32(3): 62-73 (2002) |
2001 |
11 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Offline Micropayments without Trusted Hardware.
Financial Cryptography 2001: 21-40 |
10 | EE | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Trust Management for IPsec.
NDSS 2001 |
9 | EE | William Aiello,
Steven M. Bellovin,
Matt Blaze,
Ran Canetti,
John Ioannidis,
Angelos D. Keromytis,
Omer Reingold:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.
Security Protocols Workshop 2001: 27-39 |
2000 |
8 | EE | John Ioannidis,
Angelos D. Keromytis:
Network security and IPsec (tutorial).
ACM Conference on Computer and Communications Security 2000 |
7 | EE | John Ioannidis:
Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion).
Security Protocols Workshop 2000: 142-154 |
6 | EE | Virgil D. Gligor,
Matt Blaze,
John Ioannidis:
Denial of Service - Panel Discussion.
Security Protocols Workshop 2000: 194-203 |
1999 |
5 | | Matt Blaze,
John Ioannidis,
Angelos D. Keromytis:
Trust Management and Network Layer Security Protocols.
Security Protocols Workshop 1999: 103-118 |
1993 |
4 | | John Ioannidis,
Gerald Q. Maguire Jr.:
The Design and Implementation of a Mobile Internetworking Architecture.
USENIX Winter 1993: 489-502 |
1991 |
3 | EE | John Ioannidis,
Dan Duchamp,
Gerald Q. Maguire Jr.:
IP-Based Protocols for Mobile Internetworking.
SIGCOMM 1991: 235-245 |
2 | EE | John Ioannidis,
Gerald Q. Maguire Jr.,
Israel Ben-Shaul,
Marios Levedopoulos,
Micky Liu:
Porting AIX onto the Student Electronic Notebook.
SIGSMALL/PC 1991: 76-82 |
1988 |
1 | | Calton Pu,
Henry Massalin,
John Ioannidis:
The Synthesis Kernel.
Computing Systems 1(1): 11-32 (1988) |