Angelos

Results: 194



#Item
1Cryptography / Computing / Internet / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Public-key cryptography / Transport Layer Security / Hostname / X.509 / Public key certificate

HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:27
2

ἀρετή student online philosophy journal Dezember 2014, Nº 2 ANGELOS SCHOINAS The Aristotelean Concept of Habituation - A Psychological Approach

Add to Reading List

Source URL: www.philosophie.unibe.ch

Language: English - Date: 2015-03-24 11:14:14
    3

    Ice, ice maybe? Angelos Michaelides1 1 Thomas Young Centre, Department of Physics and Astronomy, University College London, UK

    Add to Reading List

    Source URL: conferences.au.dk

    Language: English - Date: 2018-03-09 04:47:43
      4

      Bypassing clang’s SafeStack for Fun and Profit Enes Göktaş, Angelos Economopoulos, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2018-05-11 13:27:48
        5

        HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2017-04-03 15:58:27
          6

          1 Distributed Trust John Ioannidis, AT&T Labs – Research Angelos D. Keromytis, Columbia University CONTENTS

          Add to Reading List

          Source URL: www.cs.columbia.edu

          Language: English - Date: 2005-01-21 17:53:06
            7

            Developing a Benchmark Suite for Semantic Web Data from Existing Workflows Antonis Troumpoukis1 , Angelos Charalambidis1 , Giannis Mouchakis1 , Stasinos Konstantopoulos1 , Ronald Siebes2 , Victor de Boer2 , Stian Soiland

            Add to Reading List

            Source URL: ceur-ws.org

            Language: English - Date: 2016-09-06 06:55:28
              8

              DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Mansoor Alicherry Angelos D. Keromytis Department of Computer Science, Columbia University in the City of New York

              Add to Reading List

              Source URL: www.cs.columbia.edu

              - Date: 2009-03-19 11:59:22
                9

                (IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke

                Add to Reading List

                Source URL: www.ics.forth.gr

                - Date: 2012-03-22 09:28:00
                  UPDATE