×

Keromytis, Angelos D.

Author ID: keromytis.angelos-d Recent zbMATH articles by "Keromytis, Angelos D."
Published as: Keromytis, Angelos D.; Keromytis, Angelos

Publications by Year

Citations contained in zbMATH Open

10 Publications have been cited 24 times in 21 Documents Cited by Year
Just Fast Keying: key agreement in a hostile internet. Zbl 1291.94041
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
7
2004
CryptoGraphics: Secret key cryptography using graphics cards. Zbl 1079.94540
Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake
4
2005
Experience with the KeyNote trust management system: Applications and future directions. Zbl 1051.68588
Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.
3
2003
SQLrand: Preventing SQL injection attacks. Zbl 1103.68509
Boyd, Stephen W.; Keromytis, Angelos D.
3
2004
Efficient, DoS-resistant, secure key exchange for internet protocols. Zbl 1017.68556
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
2
2002
CryptoGraphics. Exploiting cards for security. Zbl 1119.68075
Cook, Debra; Keromytis, Angelos
1
2006
The security of elastic block ciphers against key-recovery attacks. Zbl 1138.94358
Cook, Debra L.; Yung, Moti; Keromytis, Angelos D.
1
2007
Methods for linear and differential cryptanalysis of elastic block ciphers. Zbl 1279.94068
Cook, Debra L.; Yung, Moti; Keromytis, Angelos D.
1
2008
On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems. Zbl 1470.68038
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore J.
1
2010
A dynamic mechanism for recovering from buffer overflow attacks. Zbl 1127.68397
Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D.
1
2005
On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems. Zbl 1470.68038
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore J.
1
2010
Methods for linear and differential cryptanalysis of elastic block ciphers. Zbl 1279.94068
Cook, Debra L.; Yung, Moti; Keromytis, Angelos D.
1
2008
The security of elastic block ciphers against key-recovery attacks. Zbl 1138.94358
Cook, Debra L.; Yung, Moti; Keromytis, Angelos D.
1
2007
CryptoGraphics. Exploiting cards for security. Zbl 1119.68075
Cook, Debra; Keromytis, Angelos
1
2006
CryptoGraphics: Secret key cryptography using graphics cards. Zbl 1079.94540
Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake
4
2005
A dynamic mechanism for recovering from buffer overflow attacks. Zbl 1127.68397
Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D.
1
2005
Just Fast Keying: key agreement in a hostile internet. Zbl 1291.94041
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
7
2004
SQLrand: Preventing SQL injection attacks. Zbl 1103.68509
Boyd, Stephen W.; Keromytis, Angelos D.
3
2004
Experience with the KeyNote trust management system: Applications and future directions. Zbl 1051.68588
Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.
3
2003
Efficient, DoS-resistant, secure key exchange for internet protocols. Zbl 1017.68556
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
2
2002

Citations by Year