John Ioannidis

According to our database1, John Ioannidis authored at least 44 papers between 1988 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
IPsec.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

DoS Pushback.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2009
Anonymity in Wireless Broadcast Networks.
Int. J. Netw. Secur., 2009

2007
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.
Int. J. Netw. Secur., 2007

2006
Origin authentication in interdomain routing.
Comput. Networks, 2006

2005
<i>gore</i>: Routing-Assisted Defense Against DDoS Attacks.
Proceedings of the Information Security, 8th International Conference, 2005

An Email Worm Vaccine Architecture.
Proceedings of the Information Security Practice and Experience, 2005

CryptoGraphics: Secret Key Cryptography Using Graphics Cards.
Proceedings of the Topics in Cryptology, 2005

2004
Distributed Trust.
Proceedings of the Practical Handbook of Internet Computing., 2004

A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
ACM Trans. Inf. Syst. Secur., 2004

Just fast keying: Key agreement in a hostile internet.
ACM Trans. Inf. Syst. Secur., 2004

A Pay-per-Use DoS Protection Mechanism for the Web.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
On the Use of Stream Control Transmission Protocol (SCTP) with IPsec.
RFC, July, 2003

WebDAVA: An Administrator-Free Approach To Web File-Sharing.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Design and Implementation of Virtual Private Services.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Secure and Flexible Global File Sharing.
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003

The CryptoGraphic Disk Driver.
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003

WAR: Wireless Anonymous Routing.
Proceedings of the Security Protocols, 2003

Fighting Spam by Encapsulating Policy in Email Addresses.
Proceedings of the Network and Distributed System Security Symposium, 2003

Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
Proceedings of the Network and Distributed System Security Symposium, 2003

Experience with the KeyNote Trust Management System: Applications and Future Directions.
Proceedings of the Trust Management, First International Conference, 2003

TAPI: Transactions for Accessing Public Infrastructure.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

Origin authentication in interdomain routing.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Trust management for IPsec.
ACM Trans. Inf. Syst. Secur., 2002

Controlling high bandwidth aggregates in the network.
Comput. Commun. Rev., 2002

Aggregate congestion control.
Comput. Commun. Rev., 2002

Efficient packet monitoring for network management.
Proceedings of the Management Solutions for the New Communications World, 2002

Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
Proceedings of the Network and Distributed System Security Symposium, 2002

Implementing Pushback: Router-Based Defense Against DDoS Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2002

Fileteller: Paying and Getting Paid for File Storage.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Efficient, DoS-resistant, secure key exchange for internet protocols.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Offline Micropayments without Trusted Hardware.
Proceedings of the Financial Cryptography, 2001

2000
DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System.
RFC, March, 2000

Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

Denial of Service - Panel Discussion.
Proceedings of the Security Protocols, 2000

Network security and IPsec (tutorial).
Proceedings of the CCS 2000, 2000

1999
The KeyNote Trust-Management System Version 2.
RFC, September, 1999

Trust Management and Network Layer Security Protocols.
Proceedings of the Security Protocols, 1999

1993
The Architecture and Implementation of Network Layer Security in UNIX.
Proceedings of the 4th USENIX Security Symposium, Santa Clara, CA, USA, October 4-6, 1993, 1993

The Design and Implementation of a Mobile Internetworking Architecture.
Proceedings of the Usenix Winter 1993 Technical Conference, 1993

1991
Coherent File Distribution Protocol.
RFC, June, 1991

Porting AIX onto the Student Electronic Notebook.
Proceedings of the 1991 ACM SIGSMALL/PC Symposium on Small Systems, 1991

IP-Based Protocols for Mobile Internetworking.
Proceedings of the Conference on Communications Architecture & Protocols, 1991

1988
The Synthesis Kernel.
Comput. Syst., 1988


  Loading...