Angelos D. Keromytis |
|
---|---|
Author's Web Page ![]() | |
8 papers in database with 289 citations ![]() Editor of 2 conference proceedings books H-number: 5 | |
Conference Proceedings |
|
![]() | 1. Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung, editors, Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-68913-3. [Papers] Find this book on amazon.com |
![]() | 2. John Ioannidis, Angelos D. Keromytis, Moti Yung, editors, Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings. Springer, 2005. ISBN 3-540-26223-7. [Papers] Find this book on amazon.com |
Conference Papers |
|
1. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis, Pushback for Overlay Networks: Protecting Against Malicious Insiders, pp. 39 - 54, ACNS 2008. [ ![]() ![]() | |
2. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis, W3Bcrypt: Encryption as a Stylesheet, pp. 349 - 364, ACNS 2006. [ ![]() ![]() | |
3. Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck, CryptoGraphics: Secret Key Cryptography Using Graphics Cards, pp. 334 - 350, CT-RSA 2005. [ ![]() ![]() | |
4. Michael E. Locasto, Angelos D. Keromytis, CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap, pp. 1 - 15, ACNS 2004. [ ![]() ![]() | |
5. Stephen W. Boyd, Angelos D. Keromytis, SQLrand: Preventing SQL Injection Attacks, pp. 292 - 302, ACNS 2004. [ ![]() ![]() ![]() ![]() | |
6. Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein, A Pay-per-Use DoS Protection Mechanism for the Web, pp. 120 - 134, ACNS 2004. [ ![]() ![]() | |
7. John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis, Fileteller: Paying and Getting Paid for File Storage, pp. 282 - 299, FC 2002. [ ![]() ![]() ![]() | |
8. Matt Blaze, John Ioannidis, Angelos D. Keromytis, Offline Micropayments without Trusted Hardware, pp. 21 - 40, FC 2001. [ ![]() ![]() ![]() |
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals