default search action
John Ioannidis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [r3]John Ioannidis:
DoS Pushback. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 363-365 - [r2]John Ioannidis:
IPsec. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 635-638
2000 – 2009
- 2009
- [j9]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
Anonymity in Wireless Broadcast Networks. Int. J. Netw. Secur. 8(1): 37-51 (2009) - 2007
- [j8]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas G. Anagnostakis, Jonathan M. Smith:
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications. Int. J. Netw. Secur. 4(1): 69-80 (2007) - 2006
- [j7]Patrick D. McDaniel, William Aiello, Kevin R. B. Butler, John Ioannidis:
Origin authentication in interdomain routing. Comput. Networks 50(16): 2953-2980 (2006) - 2005
- [c30]Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck:
CryptoGraphics: Secret Key Cryptography Using Graphics Cards. CT-RSA 2005: 334-350 - [c29]Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo:
An Email Worm Vaccine Architecture. ISPEC 2005: 97-108 - [c28]Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis:
gore: Routing-Assisted Defense Against DDoS Attacks. ISC 2005: 179-193 - [e1]John Ioannidis, Angelos D. Keromytis, Moti Yung:
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3531, 2005, ISBN 3-540-26223-7 [contents] - 2004
- [j6]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Just fast keying: Key agreement in a hostile internet. ACM Trans. Inf. Syst. Secur. 7(2): 242-273 (2004) - [j5]Adam Stubblefield, John Ioannidis, Aviel D. Rubin:
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. 7(2): 319-332 (2004) - [c27]Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
A Pay-per-Use DoS Protection Mechanism for the Web. ACNS 2004: 120-134 - [r1]John Ioannidis, Angelos D. Keromytis:
Distributed Trust. The Practical Handbook of Internet Computing 2004 - 2003
- [c26]William Aiello, John Ioannidis, Patrick D. McDaniel:
Origin authentication in interdomain routing. CCS 2003: 165-178 - [c25]Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis:
TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100 - [c24]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust 2003: 284-300 - [c23]Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick D. McDaniel, Aviel D. Rubin:
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. NDSS 2003 - [c22]John Ioannidis:
Fighting Spam by Encapsulating Policy in Email Addresses. NDSS 2003 - [c21]Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
WAR: Wireless Anonymous Routing. Security Protocols Workshop 2003: 218-232 - [c20]Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith:
Secure and Flexible Global File Sharing. USENIX ATC, FREENIX Track 2003: 165-178 - [c19]Roland C. Dowdeswell, John Ioannidis:
The CryptoGraphic Disk Driver. USENIX ATC, FREENIX Track 2003: 179-186 - [c18]Alexander Levine, Vassilis Prevelakis, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis:
WebDAVA: An Administrator-Free Approach To Web File-Sharing. WETICE 2003: 59-64 - [c17]Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith:
Design and Implementation of Virtual Private Services. WETICE 2003: 269-274 - [i4]Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Randall R. Stewart:
On the Use of Stream Control Transmission Protocol (SCTP) with IPsec. RFC 3554: 1-9 (2003) - 2002
- [j4]Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker:
Aggregate congestion control. Comput. Commun. Rev. 32(1): 69 (2002) - [j3]Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker:
Controlling high bandwidth aggregates in the network. Comput. Commun. Rev. 32(3): 62-73 (2002) - [j2]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust management for IPsec. ACM Trans. Inf. Syst. Secur. 5(2): 95-118 (2002) - [c16]William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis:
Efficient, DoS-resistant, secure key exchange for internet protocols. CCS 2002: 48-58 - [c15]John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis:
Fileteller: Paying and Getting Paid for File Storage. Financial Cryptography 2002: 282-299 - [c14]John Ioannidis, Steven M. Bellovin:
Implementing Pushback: Router-Based Defense Against DDoS Attacks. NDSS 2002 - [c13]Adam Stubblefield, John Ioannidis, Aviel D. Rubin:
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. NDSS 2002 - [c12]Kostas G. Anagnostakis, Sotiris Ioannidis, Stefan Miltchev, Michael Greenwald, Jonathan M. Smith, John Ioannidis:
Efficient packet monitoring for network management. NOMS 2002: 423-436 - 2001
- [c11]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Offline Micropayments without Trusted Hardware. Financial Cryptography 2001: 21-40 - [c10]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust Management for IPsec. NDSS 2001 - [c9]William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Security Protocols Workshop 2001: 27-39 - 2000
- [c8]John Ioannidis, Angelos D. Keromytis:
Network security and IPsec (tutorial). CCS 2000 - [c7]John Ioannidis:
Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion). Security Protocols Workshop 2000: 142-154 - [c6]Virgil D. Gligor, Matt Blaze, John Ioannidis:
Denial of Service - Panel Discussion. Security Protocols Workshop 2000: 194-203 - [i3]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System. RFC 2792: 1-7 (2000)
1990 – 1999
- 1999
- [c5]Matt Blaze, John Ioannidis, Angelos D. Keromytis:
Trust Management and Network Layer Security Protocols. Security Protocols Workshop 1999: 103-118 - [i2]Matt Blaze, Joan Feigenbaum, John Ioannidis, Angelos D. Keromytis:
The KeyNote Trust-Management System Version 2. RFC 2704: 1-37 (1999) - 1993
- [c4]John Ioannidis, Gerald Q. Maguire Jr.:
The Design and Implementation of a Mobile Internetworking Architecture. USENIX Winter 1993: 489-502 - [c3]John Ioannidis, Matt Blaze:
The Architecture and Implementation of Network Layer Security in UNIX. USENIX Security Symposium 1993 - 1991
- [c2]John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.:
IP-Based Protocols for Mobile Internetworking. SIGCOMM 1991: 235-245 - [c1]John Ioannidis, Gerald Q. Maguire Jr., Israel Ben-Shaul, Marios Levedopoulos, Micky Liu:
Porting AIX onto the Student Electronic Notebook. SIGSMALL/PC 1991: 76-82 - [i1]John Ioannidis, Gerald Q. Maguire Jr.:
Coherent File Distribution Protocol. RFC 1235: 1-12 (1991)
1980 – 1989
- 1988
- [j1]Calton Pu, Henry Massalin, John Ioannidis:
The Synthesis Kernel. Comput. Syst. 1(1): 11-32 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint