Panagiotis Papadopoulos

According to our database1, Panagiotis Papadopoulos authored at least 21 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




The Cost of Digital Advertisement: Comparing User and Advertiser Views.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Øpass: Zero-storage Password Management Based on Password Reminders.
Proceedings of the 11th European Workshop on Systems Security, 2018

Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session.
Proceedings of the 11th European Workshop on Systems Security, 2018

Where's Wally?: How to Privately Discover your Friends on the Internet.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Computational resource management for data-driven applications with deadline constraints.
Concurrency and Computation: Practice and Experience, 2017

The Long-Standing Privacy Debate: Mobile Websites vs Mobile Apps.
Proceedings of the 26th International Conference on World Wide Web, 2017

CCSP: A compressed certificate status protocol.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

If you are not paying for it, you are the product: how much do advertisers pay to reach you?
Proceedings of the 2017 Internet Measurement Conference, 2017

No Sugar but All the Taste! Memory Encryption Without Architectural Support.
Proceedings of the Computer Security - ESORICS 2017, 2017

Provable Network Activity for Protecting Users Against False Accusation.
Proceedings of the Information Security Theory and Practice, 2016

DCSP: performant certificate revocation a DNS-based approach.
Proceedings of the 9th European Workshop on System Security, 2016

MAD: A Middleware Framework for Multi-step Attack Detection.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

TRACER: A Platform for Securing Legacy Code.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

ACaZoo: A Distributed Key-Value Store Based on Replicated LSM-Trees.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

Securing Legacy Code with the TRACER Platform.
Proceedings of the 18th Panhellenic Conference on Informatics, 2014

Enforcing Quality of Service on OpenNebula-Based Shared Clouds.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

The Vulnerability Dataset of a Large Software Ecosystem.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

Coordination of the Charging of Electric Vehicles Using a Multi-Agent System.
IEEE Trans. Smart Grid, 2013

Strengthening Consistency in the Cassandra Distributed Key-Value Store.
Proceedings of the Distributed Applications and Interoperable Systems, 2013

A Distributed In-Transit Processing Infrastructure for Forecasting Electric Vehicle Charging Demand.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

k-subscription: privacy-preserving microblogging browsing through obfuscation.
Proceedings of the Annual Computer Security Applications Conference, 2013