Keromytis, Angelos D. (ed.) Financial cryptography and data security. 16th international conference, FC 2012, Kralendijk, Bonaire, Februray 27 – March 2, 2012. Revised selected papers. (English) Zbl 1250.94007 Lecture Notes in Computer Science 7397. Berlin: Springer (ISBN 978-3-642-32945-6/pbk). xi, 416 p. (2012). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{A. D. Keromytis} (ed.), Financial cryptography and data security. 16th international conference, FC 2012, Kralendijk, Bonaire, Februray 27 -- March 2, 2012. Revised selected papers. Berlin: Springer (2012; Zbl 1250.94007) Full Text: DOI
Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore J. On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems. (English) Zbl 1470.68038 Mach. Learn. 81, No. 2, 179-205 (2010). MSC: 68M25 68T05 PDFBibTeX XMLCite \textit{Y. Song} et al., Mach. Learn. 81, No. 2, 179--205 (2010; Zbl 1470.68038) Full Text: DOI
Cook, Debra L.; Yung, Moti; Keromytis, Angelos Constructing variable-length PRPs and SPRPs from fixed-length PRPs. (English) Zbl 1237.94057 Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 157-180 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{D. L. Cook} et al., Lect. Notes Comput. Sci. 5487, 157--180 (2009; Zbl 1237.94057) Full Text: DOI DOI
Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. Methods for linear and differential cryptanalysis of elastic block ciphers. (English) Zbl 1279.94068 Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 187-202 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{D. L. Cook} et al., Lect. Notes Comput. Sci. 5107, 187--202 (2008; Zbl 1279.94068) Full Text: DOI
Bellovin, Steven M. (ed.); Gennaro, Rosario (ed.); Keromytis, Angelos (ed.); Yung, Moti (ed.) Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. (English) Zbl 1137.94301 Lecture Notes in Computer Science 5037. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). xi, 508 p. (2008). MSC: 94-06 94A60 68P25 00B25 PDFBibTeX XMLCite \textit{S. M. Bellovin} (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3--6, 2008. Proceedings. Berlin: Springer (2008; Zbl 1137.94301) Full Text: DOI
Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. The security of elastic block ciphers against key-recovery attacks. (English) Zbl 1138.94358 Garay, Juan A. (ed.) et al., Information security. 10th international conference, ISC 2007, Valparaíso, Chile, October 9–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75495-4/pbk). Lecture Notes in Computer Science 4779, 89-103 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{D. L. Cook} et al., Lect. Notes Comput. Sci. 4779, 89--103 (2007; Zbl 1138.94358) Full Text: DOI
Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. W3Bcrypt: Encryption as a stylesheet. (English) Zbl 1151.94571 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 349-364 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Stavrou} et al., Lect. Notes Comput. Sci. 3989, 349--364 (2006; Zbl 1151.94571) Full Text: DOI
Cook, Debra; Keromytis, Angelos CryptoGraphics. Exploiting cards for security. (English) Zbl 1119.68075 Advances in Information Security 20. New York, NY: Springer (ISBN 0-387-29015-X). 136 p. (2006). MSC: 68P25 68-01 PDFBibTeX XMLCite \textit{D. Cook} and \textit{A. Keromytis}, CryptoGraphics. Exploiting cards for security. New York, NY: Springer (2006; Zbl 1119.68075) Full Text: DOI
Ioannidis, John (ed.); Keromytis, Angelos (ed.); Yung, Moti (ed.) Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. (English) Zbl 1106.68003 Lecture Notes in Computer Science 3531. Berlin: Springer (ISBN 3-540-26223-7/pbk). xi, 530 p. (2005). MSC: 68-06 94-06 00B25 68P25 94A60 PDFBibTeX XMLCite \textit{J. Ioannidis} (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7--10, 2005. Proceedings. Berlin: Springer (2005; Zbl 1106.68003) Full Text: DOI
Cook, Debra L.; Baratto, Ricardo; Keromytis, Angelos D. Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware. (English) Zbl 1122.68427 Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 363-375 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{D. L. Cook} et al., Lect. Notes Comput. Sci. 3783, 363--375 (2005; Zbl 1122.68427) Full Text: DOI
Chou, Stephen T.; Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D. gore: routing-assisted defense against DDoS attacks. (English) Zbl 1127.68375 Zhou, Jianying (ed.) et al., Information security. 8th international conference, ISC 2005, Singapore, September 20–23, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29001-X/pbk). Lecture Notes in Computer Science 3650, 179-193 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{S. T. Chou} et al., Lect. Notes Comput. Sci. 3650, 179--193 (2005; Zbl 1127.68375) Full Text: DOI
Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. A dynamic mechanism for recovering from buffer overflow attacks. (English) Zbl 1127.68397 Zhou, Jianying (ed.) et al., Information security. 8th international conference, ISC 2005, Singapore, September 20–23, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29001-X/pbk). Lecture Notes in Computer Science 3650, 1-15 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{S. Sidiroglou} et al., Lect. Notes Comput. Sci. 3650, 1--15 (2005; Zbl 1127.68397) Full Text: DOI
Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake CryptoGraphics: Secret key cryptography using graphics cards. (English) Zbl 1079.94540 Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 334-350 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{D. L. Cook} et al., Lect. Notes Comput. Sci. 3376, 334--350 (2005; Zbl 1079.94540) Full Text: DOI
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer Just Fast Keying: key agreement in a hostile internet. (English) Zbl 1291.94041 ACM Trans. Inf. Syst. Secur. 7, No. 2, 242-273 (2004). MSC: 94A60 68M11 PDFBibTeX XMLCite \textit{W. Aiello} et al., ACM Trans. Inf. Syst. Secur. 7, No. 2, 242--273 (2004; Zbl 1291.94041) Full Text: DOI
El-Khalil, Rakan; Keromytis, Angelos D. Hydan: Hiding information in program binaries. (English) Zbl 1109.68449 Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 187-199 (2004). MSC: 68P25 PDFBibTeX XMLCite \textit{R. El-Khalil} and \textit{A. D. Keromytis}, Lect. Notes Comput. Sci. 3269, 187--199 (2004; Zbl 1109.68449) Full Text: DOI
Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Dan A pay-per-use DoS protection mechanism for the web. (English) Zbl 1103.68538 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 120-134 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{A. Stavrou} et al., Lect. Notes Comput. Sci. 3089, 120--134 (2004; Zbl 1103.68538) Full Text: DOI
Boyd, Stephen W.; Keromytis, Angelos D. SQLrand: Preventing SQL injection attacks. (English) Zbl 1103.68509 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 292-302 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{S. W. Boyd} and \textit{A. D. Keromytis}, Lect. Notes Comput. Sci. 3089, 292--302 (2004; Zbl 1103.68509) Full Text: DOI
Locasto, Michael E.; Keromytis, Angelos D. CamouflageFS: Increasing the effective key length in cryptographic filesystems on the cheap. (English) Zbl 1103.68529 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 1-15 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{M. E. Locasto} and \textit{A. D. Keromytis}, Lect. Notes Comput. Sci. 3089, 1--15 (2004; Zbl 1103.68529) Full Text: DOI
Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. Experience with the KeyNote trust management system: Applications and future directions. (English) Zbl 1051.68588 Nixon, Paddy (ed.) et al., Trust management. First international conference, iTrust 2003, Heraklion, Crete, Greece, May 28–30, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40224-1/pbk). Lect. Notes Comput. Sci. 2692, 284-300 (2003). MSC: 68U99 68U35 68M10 68M14 PDFBibTeX XMLCite \textit{M. Blaze} et al., Lect. Notes Comput. Sci. 2692, 284--300 (2003; Zbl 1051.68588) Full Text: Link
Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. Offline micropayments without trusted hardware. (English) Zbl 1051.94502 Syverson, Paul F. (ed.), Financial cryptography. 5th international conference, FC 2001, Grand Cayman, British West Indies, February 19–22, 2001. Proceedings. Berlin: Springer (ISBN 3-540-44079-8). Lect. Notes Comput. Sci. 2339, 21-40 (2002). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Blaze} et al., Lect. Notes Comput. Sci. 2339, 21--40 (2002; Zbl 1051.94502) Full Text: Link
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer Efficient, DoS-resistant, secure key exchange for internet protocols. (English) Zbl 1017.68556 Christianson, Bruce (ed.) et al., Security protocols. 9th international workshop, Cambridge, UK, April 25-27, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2467, 27-39 (2002). MSC: 68U99 68M12 68P25 PDFBibTeX XMLCite \textit{W. Aiello} et al., Lect. Notes Comput. Sci. 2467, 27--39 (2002; Zbl 1017.68556) Full Text: Link