Search the dblp DataBase
John Ioannidis :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John Ioannidis , Dan Duchamp , Gerald Q. Maguire Jr. IP-Based Protocols for Mobile Internetworking. [Citation Graph (2, 0)][DBLP ] SIGCOMM, 1991, pp:235-245 [Conf ] John Ioannidis , Gerald Q. Maguire Jr. The Design and Implementation of a Mobile Internetworking Architecture. [Citation Graph (2, 0)][DBLP ] USENIX Winter, 1993, pp:489-502 [Conf ] Angelos Stavrou , John Ioannidis , Angelos D. Keromytis , Vishal Misra , Dan Rubenstein A Pay-per-Use DoS Protection Mechanism for the Web. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:120-134 [Conf ] William Aiello , Steven M. Bellovin , Matt Blaze , John Ioannidis , Omer Reingold , Ran Canetti , Angelos D. Keromytis Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf ] William Aiello , John Ioannidis , Patrick Drew McDaniel Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:165-178 [Conf ] John Ioannidis , Angelos D. Keromytis Network security and IPsec (tutorial). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:- [Conf ] Debra L. Cook , John Ioannidis , Angelos D. Keromytis , Jake Luck CryptoGraphics: Secret Key Cryptography Using Graphics Cards. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:334-350 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Offline Micropayments without Trusted Hardware. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2001, pp:21-40 [Conf ] John Ioannidis , Sotiris Ioannidis , Angelos D. Keromytis , Vassilis Prevelakis Fileteller: Paying and Getting Paid for File Storage. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:282-299 [Conf ] Matt Blaze , John Ioannidis , Sotiris Ioannidis , Angelos D. Keromytis , Pekka Nikander , Vassilis Prevelakis TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP ] PWC, 2003, pp:90-100 [Conf ] Stelios Sidiroglou , John Ioannidis , Angelos D. Keromytis , Salvatore J. Stolfo An Email Worm Vaccine Architecture. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:97-108 [Conf ] Stephen T. Chou , Angelos Stavrou , John Ioannidis , Angelos D. Keromytis gore : Routing-Assisted Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:179-193 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Experience with the KeyNote Trust Management System: Applications and Future Directions. [Citation Graph (0, 0)][DBLP ] iTrust, 2003, pp:284-300 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Trust Management for IPsec. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Geoffrey Goodell , William Aiello , Timothy Griffin , John Ioannidis , Patrick Drew McDaniel , Aviel D. Rubin Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] John Ioannidis Fighting Spam by Encapsulating Policy in Email Addresses. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] John Ioannidis , Steven M. Bellovin Implementing Pushback: Router-Based Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] Adam Stubblefield , John Ioannidis , Aviel D. Rubin Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] John Ioannidis , Gerald Q. Maguire Jr. , Israel Ben-Shaul , Marios Levedopoulos , Micky Liu Porting AIX onto the Student Electronic Notebook. [Citation Graph (0, 0)][DBLP ] SIGSMALL/PC, 1991, pp:76-82 [Conf ] William Aiello , Steven M. Bellovin , Matt Blaze , Ran Canetti , John Ioannidis , Angelos D. Keromytis , Omer Reingold Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:27-39 [Conf ] Virgil D. Gligor , Matt Blaze , John Ioannidis Denial of Service - Panel Discussion. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:194-203 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Trust Management and Network Layer Security Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:103-118 [Conf ] John Ioannidis Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:142-154 [Conf ] Matt Blaze , John Ioannidis , Angelos D. Keromytis , Tal Malkin , Aviel D. Rubin WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:218-232 [Conf ] Roland C. Dowdeswell , John Ioannidis The CryptoGraphic Disk Driver. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, FREENIX Track, 2003, pp:179-186 [Conf ] Stefan Miltchev , Vassilis Prevelakis , Sotiris Ioannidis , John Ioannidis , Angelos D. Keromytis , Jonathan M. Smith Secure and Flexible Global File Sharing. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, FREENIX Track, 2003, pp:165-178 [Conf ] Sotiris Ioannidis , Steven M. Bellovin , John Ioannidis , Angelos D. Keromytis , Jonathan M. Smith Design and Implementation of Virtual Private Services. [Citation Graph (0, 0)][DBLP ] WETICE, 2003, pp:269-274 [Conf ] Alexander Levine , Vassilis Prevelakis , John Ioannidis , Sotiris Ioannidis , Angelos D. Keromytis WebDAVA: An Administrator-Free Approach To Web File-Sharing. [Citation Graph (0, 0)][DBLP ] WETICE, 2003, pp:59-64 [Conf ] Ratul Mahajan , Steven M. Bellovin , Sally Floyd , John Ioannidis , Vern Paxson , Scott Shenker Aggregate congestion control. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:1, pp:69- [Journal ] Ratul Mahajan , Steven M. Bellovin , Sally Floyd , John Ioannidis , Vern Paxson , Scott Shenker Controlling high bandwidth aggregates in the network. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:3, pp:62-73 [Journal ] Patrick McDaniel , William Aiello , Kevin Butler , John Ioannidis Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:16, pp:2953-2980 [Journal ] Calton Pu , Henry Massalin , John Ioannidis The Synthesis Kernel. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1988, v:1, n:1, pp:11-32 [Journal ] William Aiello , Steven M. Bellovin , Matt Blaze , Ran Canetti , John Ioannidis , Angelos D. Keromytis , Omer Reingold Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal ] Matt Blaze , John Ioannidis , Angelos D. Keromytis Trust management for IPsec. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:95-118 [Journal ] Adam Stubblefield , John Ioannidis , Aviel D. Rubin A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:319-332 [Journal ] Efficient packet monitoring for network management. [Citation Graph (, )][DBLP ] Search in 0.082secs, Finished in 0.085secs