Panagiotis Papadopoulos

According to our database1, Panagiotis Papadopoulos authored at least 26 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation.
CoRR, 2018

Truth in Web Mining: Measuring the Profitability and Cost of Cryptominers as a Web Monetization Model.
CoRR, 2018

Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask.
CoRR, 2018

The Cost of Digital Advertisement: Comparing User and Advertiser Views.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Øpass: Zero-storage Password Management Based on Password Reminders.
Proceedings of the 11th European Workshop on Systems Security, 2018

Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session.
Proceedings of the 11th European Workshop on Systems Security, 2018

Where's Wally?: How to Privately Discover your Friends on the Internet.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Privacy Risks from Public Data Sources.
CoRR, 2017

Computing the advertising value of users by tapping on RTB.
CoRR, 2017

Computational resource management for data-driven applications with deadline constraints.
Concurrency and Computation: Practice and Experience, 2017

The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps.
Proceedings of the 26th International Conference on World Wide Web, 2017

CCSP: A compressed certificate status protocol.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

If you are not paying for it, you are the product: how much do advertisers pay to reach you?
Proceedings of the 2017 Internet Measurement Conference, 2017

No Sugar but All the Taste! Memory Encryption Without Architectural Support.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Provable Network Activity for Protecting Users Against False Accusation.
Proceedings of the Information Security Theory and Practice, 2016

DCSP: performant certificate revocation a DNS-based approach.
Proceedings of the 9th European Workshop on System Security, 2016

2015
MAD: A Middleware Framework for Multi-step Attack Detection.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
TRACER: A Platform for Securing Legacy Code.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

ACaZoo: A Distributed Key-Value Store Based on Replicated LSM-Trees.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

Securing Legacy Code with the TRACER Platform.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Enforcing Quality of Service on OpenNebula-Based Shared Clouds.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

The Vulnerability Dataset of a Large Software Ecosystem.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
Coordination of the Charging of Electric Vehicles Using a Multi-Agent System.
IEEE Trans. Smart Grid, 2013

Strengthening Consistency in the Cassandra Distributed Key-Value Store.
Proceedings of the Distributed Applications and Interoperable Systems, 2013

A Distributed In-Transit Processing Infrastructure for Forecasting Electric Vehicle Charging Demand.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

k-subscription: privacy-preserving microblogging browsing through obfuscation.
Proceedings of the Annual Computer Security Applications Conference, 2013


  Loading...