The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John Ioannidis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
    IP-Based Protocols for Mobile Internetworking. [Citation Graph (2, 0)][DBLP]
    SIGCOMM, 1991, pp:235-245 [Conf]
  2. John Ioannidis, Gerald Q. Maguire Jr.
    The Design and Implementation of a Mobile Internetworking Architecture. [Citation Graph (2, 0)][DBLP]
    USENIX Winter, 1993, pp:489-502 [Conf]
  3. Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    A Pay-per-Use DoS Protection Mechanism for the Web. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:120-134 [Conf]
  4. William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
    Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf]
  5. William Aiello, John Ioannidis, Patrick Drew McDaniel
    Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:165-178 [Conf]
  6. John Ioannidis, Angelos D. Keromytis
    Network security and IPsec (tutorial). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:- [Conf]
  7. Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck
    CryptoGraphics: Secret Key Cryptography Using Graphics Cards. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:334-350 [Conf]
  8. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Offline Micropayments without Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:21-40 [Conf]
  9. John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis
    Fileteller: Paying and Getting Paid for File Storage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:282-299 [Conf]
  10. Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis
    TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:90-100 [Conf]
  11. Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
    An Email Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:97-108 [Conf]
  12. Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
    gore: Routing-Assisted Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:179-193 [Conf]
  13. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Experience with the KeyNote Trust Management System: Applications and Future Directions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:284-300 [Conf]
  14. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust Management for IPsec. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  15. Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin
    Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  16. John Ioannidis
    Fighting Spam by Encapsulating Policy in Email Addresses. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  17. John Ioannidis, Steven M. Bellovin
    Implementing Pushback: Router-Based Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  18. Adam Stubblefield, John Ioannidis, Aviel D. Rubin
    Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  19. John Ioannidis, Gerald Q. Maguire Jr., Israel Ben-Shaul, Marios Levedopoulos, Micky Liu
    Porting AIX onto the Student Electronic Notebook. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC, 1991, pp:76-82 [Conf]
  20. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:27-39 [Conf]
  21. Virgil D. Gligor, Matt Blaze, John Ioannidis
    Denial of Service - Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:194-203 [Conf]
  22. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust Management and Network Layer Security Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:103-118 [Conf]
  23. John Ioannidis
    Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:142-154 [Conf]
  24. Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin
    WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:218-232 [Conf]
  25. Roland C. Dowdeswell, John Ioannidis
    The CryptoGraphic Disk Driver. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2003, pp:179-186 [Conf]
  26. Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Secure and Flexible Global File Sharing. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2003, pp:165-178 [Conf]
  27. Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith
    Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:269-274 [Conf]
  28. Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis
    WebDAVA: An Administrator-Free Approach To Web File-Sharing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:59-64 [Conf]
  29. Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker
    Aggregate congestion control. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:1, pp:69- [Journal]
  30. Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker
    Controlling high bandwidth aggregates in the network. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2002, v:32, n:3, pp:62-73 [Journal]
  31. Patrick McDaniel, William Aiello, Kevin Butler, John Ioannidis
    Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:16, pp:2953-2980 [Journal]
  32. Calton Pu, Henry Massalin, John Ioannidis
    The Synthesis Kernel. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1988, v:1, n:1, pp:11-32 [Journal]
  33. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal]
  34. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Trust management for IPsec. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:95-118 [Journal]
  35. Adam Stubblefield, John Ioannidis, Aviel D. Rubin
    A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:319-332 [Journal]

  36. Efficient packet monitoring for network management. [Citation Graph (, )][DBLP]


Search in 0.082secs, Finished in 0.085secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002