Georgios Kontaxis

According to our database1, Georgios Kontaxis authored at least 18 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Reducing Third Parties in the Network through Client-Side Intelligence.
PhD thesis, 2018

Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access.
CoRR, 2018

2016
Protecting Insecure Communications with Topology-aware Network Tunnels.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Tracking Protection in Firefox For Privacy and Performance.
CoRR, 2015

2014
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Computational Decoys for Cloud Security.
Proceedings of the Secure Cloud Computing, 2014

2013
SAuth: protecting user accounts from password database leaks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Minimizing information disclosure to third parties in social login platforms.
Int. J. Inf. Sec., 2012

All your face are belong to us: breaking Facebook's social authentication.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
we.b: the web of short urls.
Proceedings of the 20th International Conference on World Wide Web, 2011

Dynamic Monitoring of Dark IP Address Space (Poster).
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011

Detecting social network profile cloning.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms.
Proceedings of the Information Security, 14th International Conference, 2011

An empirical study on the security of cross-domain policies in rich internet applications.
Proceedings of the Fourth European Workshop on System Security, 2011

CAPTCHuring Automated (Smart)Phone Attacks.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

dead.drop: URL-Based Stealthy Messaging.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

Outsourcing Malicious Infrastructure to the Cloud.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Using social networks to harvest email addresses.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010


  Loading...