|
Search the dblp DataBase
Angelos D. Keromytis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michael E. Locasto, Angelos D. Keromytis
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:1-15 [Conf]
- Stephen W. Boyd, Angelos D. Keromytis
SQLrand: Preventing SQL Injection Attacks. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:292-302 [Conf]
- Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
A Pay-per-Use DoS Protection Mechanism for the Web. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:120-134 [Conf]
- Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
W3Bcrypt: Encryption as a Stylesheet. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:349-364 [Conf]
- Gaurav S. Kc, Angelos D. Keromytis
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:286-302 [Conf]
- Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:393-396 [Conf]
- Angelos D. Keromytis
Tagging Data in the Network Stack: mbuf_tags. [Citation Graph (0, 0)][DBLP] BSDCon, 2003, pp:125-132 [Conf]
- Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung
The dual receiver cryptosystem and its applications. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:330-343 [Conf]
- William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf]
- John Ioannidis, Angelos D. Keromytis
Network security and IPsec (tutorial). [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:- [Conf]
- Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith
Implementing a distributed firewall. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:190-199 [Conf]
- Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis
Countering code-injection attacks with instruction-set randomization. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:272-280 [Conf]
- William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
Using graphic turing tests to counter automated DDoS attacks against web servers. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:8-19 [Conf]
- Angelos Stavrou, Angelos D. Keromytis
Countering DoS attacks with stateless multipath overlays. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:249-259 [Conf]
- Debra L. Cook, Angelos D. Keromytis, Moti Yung
Elastic block ciphers: the basic design. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:350-352 [Conf]
- Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck
CryptoGraphics: Secret Key Cryptography Using Graphics Cards. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:334-350 [Conf]
- Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith
A Secure PLAN. [Citation Graph (0, 0)][DBLP] DANCE, 2002, pp:224-237 [Conf]
- Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith
The STRONGMAN Architecture. [Citation Graph (0, 0)][DBLP] DISCEX (1), 2003, pp:178-188 [Conf]
- D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith
Security in Active Networks. [Citation Graph (0, 0)][DBLP] Secure Internet Programming, 1999, pp:433-451 [Conf]
- Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
The Role of Trust Management in Distributed Systems Security. [Citation Graph (0, 0)][DBLP] Secure Internet Programming, 1999, pp:185-210 [Conf]
- Matt Blaze, John Ioannidis, Angelos D. Keromytis
Offline Micropayments without Trusted Hardware. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2001, pp:21-40 [Conf]
- John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis
Fileteller: Paying and Getting Paid for File Storage. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:282-299 [Conf]
- Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:363-375 [Conf]
- Rakan El-Khalil, Angelos D. Keromytis
Hydan: Hiding Information in Program Binaries. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:187-199 [Conf]
- Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis
TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP] PWC, 2003, pp:90-100 [Conf]
- Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis
The effect of DNS delays on worm propagation in an IPv6 Internet. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:2405-2414 [Conf]
- David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis
The Bandwidth Exchange Architecture. [Citation Graph (0, 0)][DBLP] ISCC, 2005, pp:939-944 [Conf]
- Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
An Email Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:97-108 [Conf]
- Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
gore: Routing-Assisted Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:179-193 [Conf]
- Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:427-442 [Conf]
- Matthew Burnside, Angelos D. Keromytis
Low Latency Anonymity with Mix Rings. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:32-45 [Conf]
- Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:1-15 [Conf]
- Debra L. Cook, Angelos D. Keromytis
Conversion and Proxy Functions for Symmetric Key Ciphers. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:662-667 [Conf]
- Matt Blaze, John Ioannidis, Angelos D. Keromytis
Experience with the KeyNote Trust Management System: Applications and Future Directions. [Citation Graph (0, 0)][DBLP] iTrust, 2003, pp:284-300 [Conf]
- Kostas G. Anagnostakis, Michael W. Hicks, Sotiris Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
Scalable Resource Control in Active Networks. [Citation Graph (0, 0)][DBLP] IWAN, 2000, pp:343-357 [Conf]
- Michael W. Hicks, Angelos D. Keromytis
A Secure Plan. [Citation Graph (0, 0)][DBLP] IWAN, 1999, pp:307-314 [Conf]
- Mark C. Benvenuto, Angelos D. Keromytis
EasyVPN: IPsec Remote Access Made Easy. [Citation Graph (0, 0)][DBLP] LISA, 2003, pp:87-94 [Conf]
- William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith
Automated Recovery in a Secure Bootstrap Process. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Matt Blaze, John Ioannidis, Angelos D. Keromytis
Trust Management for IPsec. [Citation Graph (0, 0)][DBLP] NDSS, 2001, pp:- [Conf]
- Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis
Software Self-Healing Using Collaborative Application Communities. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein
MOVE: An End-to-End Solution to Network Denial of Service. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:82-101 [Conf]
- Aleksey Kurchuk, Angelos D. Keromytis
Recursive Sandboxes: Extending Systrace To Empower Applications. [Citation Graph (0, 0)][DBLP] SEC, 2004, pp:473-488 [Conf]
- Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
SOS: secure overlay services. [Citation Graph (0, 0)][DBLP] SIGCOMM, 2002, pp:61-72 [Conf]
- Stelios Sidiroglou, Oren Laadan, Angelos D. Keromytis, Jason Nieh
Using Rescue Points to Navigate Software Recovery. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:273-280 [Conf]
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:27-39 [Conf]
- Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1998, pp:59-63 [Conf]
- Matt Blaze, John Ioannidis, Angelos D. Keromytis
Trust Management and Network Layer Security Protocols. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:103-118 [Conf]
- Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin
WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:218-232 [Conf]
- Niklas Hallqvist, Angelos D. Keromytis
Implementing Internet Key Exchange (IKE). [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2000, pp:201-214 [Conf]
- Angelos D. Keromytis, Jason L. Wright
Transparent Network Security Policy Enforcement. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2000, pp:215-226 [Conf]
- Angelos D. Keromytis, Jason L. Wright, Theo de Raadt
The Design of the {OpenBSD} Cryptographic Framework. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2003, pp:181-196 [Conf]
- Stefan Miltchev, Sotiris Ioannidis, Angelos D. Keromytis
A Study of the Relative Costs of Network Security Protocols. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2002, pp:41-48 [Conf]
- Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
Secure and Flexible Global File Sharing. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2003, pp:165-178 [Conf]
- Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos
Cryptography in OpenBSD: An Overview. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 1999, pp:93-101 [Conf]
- Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis
Building a Reactive Immune System for Software Services. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2005, pp:149-161 [Conf]
- Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP] WETICE, 2003, pp:269-274 [Conf]
- Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis
WebDAVA: An Administrator-Free Approach To Web File-Sharing. [Citation Graph (0, 0)][DBLP] WETICE, 2003, pp:59-64 [Conf]
- Stelios Sidiroglou, Angelos D. Keromytis
A Network Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP] WETICE, 2003, pp:220-225 [Conf]
- Angelos Stavrou, Debra L. Cook, William G. Morein, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
WebSOS: an overlay-based system for protecting web servers from denial of service attacks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:5, pp:781-807 [Journal]
- Angelos D. Keromytis
"Patch on Demand" Saves Even More Time? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:8, pp:94-96 [Journal]
- Stelios Sidiroglou, Angelos D. Keromytis
Countering Network Worms Through Automatic Patch Generation. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:6, pp:41-49 [Journal]
- Stelios Sidiroglou, Angelos D. Keromytis
Execution transactions for defending against software failures: use and evaluation. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:2, pp:77-91 [Journal]
- Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis
Hardware support for self-healing software services. [Citation Graph (0, 0)][DBLP] SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:42-47 [Journal]
- Matthew Burnside, Angelos D. Keromytis
The case for crypto protocol awareness inside the OS kernel. [Citation Graph (0, 0)][DBLP] SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:58-64 [Journal]
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal]
- Matt Blaze, John Ioannidis, Angelos D. Keromytis
Trust management for IPsec. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:95-118 [Journal]
- Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside
Cryptography as an operating system service: A case study. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2006, v:24, n:1, pp:1-38 [Journal]
- Michael W. Hicks, Angelos D. Keromytis, Jonathan M. Smith
A secure PLAN. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:413-426 [Journal]
- Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
A Study of Malcode-Bearing Documents. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:231-250 [Conf]
- Debra L. Cook, Moti Yung, Angelos D. Keromytis
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:89-103 [Conf]
- Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis
Dark application communities. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:11-18 [Conf]
- David Michael Turner, Vassilis Prevelakis, Angelos D. Keromytis
The Bandwidth Exchange Architecture [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
- Angelos D. Keromytis, Jonathan M. Smith
Requirements for scalable access control and security management architectures. [Citation Graph (0, 0)][DBLP] ACM Trans. Internet Techn., 2007, v:7, n:2, pp:- [Journal]
Capturing Information Flow with Concatenated Dynamic Taint Analysis. [Citation Graph (, )][DBLP]
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. [Citation Graph (, )][DBLP]
Pushback for Overlay Networks: Protecting Against Malicious Insiders. [Citation Graph (, )][DBLP]
SSARES: Secure Searchable Automated Remote Email Storage. [Citation Graph (, )][DBLP]
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. [Citation Graph (, )][DBLP]
A Network Access Control Mechanism Based on Behavior Profiles. [Citation Graph (, )][DBLP]
ASSURE: automatic software self-healing using rescue points. [Citation Graph (, )][DBLP]
On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]
Asynchronous policy evaluation and enforcement. [Citation Graph (, )][DBLP]
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. [Citation Graph (, )][DBLP]
Bridging the Network Reservation Gap Using Overlays. [Citation Graph (, )][DBLP]
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. [Citation Graph (, )][DBLP]
A Survey of Voice over IP Security Research. [Citation Graph (, )][DBLP]
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. [Citation Graph (, )][DBLP]
DoubleCheck: Multi-path verification against man-in-the-middle attacks. [Citation Graph (, )][DBLP]
Behavior-Based Network Access Control: A Proof-of-Concept. [Citation Graph (, )][DBLP]
Path-Based Access Control for Enterprise Networks. [Citation Graph (, )][DBLP]
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. [Citation Graph (, )][DBLP]
Adding Trust to P2P Distribution of Paid Content. [Citation Graph (, )][DBLP]
A2M: Access-Assured Mobile Desktop Computing. [Citation Graph (, )][DBLP]
Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]
Online Network Forensics for Automatic Repair Validation. [Citation Graph (, )][DBLP]
Authentication on Untrusted Remote Hosts with Public-Key Sudo. [Citation Graph (, )][DBLP]
Taming the Devil: Techniques for Evaluating Anonymized Network Data. [Citation Graph (, )][DBLP]
Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. [Citation Graph (, )][DBLP]
An Analysis of Rogue AV Campaigns. [Citation Graph (, )][DBLP]
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. [Citation Graph (, )][DBLP]
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. [Citation Graph (, )][DBLP]
From STEM to SEAD: Speculative Execution for Automated Defense. [Citation Graph (, )][DBLP]
Automating the injection of believable decoys to detect snooping. [Citation Graph (, )][DBLP]
Dynamic Trust Management. [Citation Graph (, )][DBLP]
Decentralized access control in distributed file systems. [Citation Graph (, )][DBLP]
Search in 0.032secs, Finished in 0.040secs
|