Ioannidis

Results: 97



#Item
1Computer access control / Computer security / Cryptography / Federated identity / Webmail / Identity management / Cross-platform software / Google Account / Multi-factor authentication / Password / Gmail / Mail.com

Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis Foundation for Research and Technology—Hellas (FORTH), Greece {pet

Add to Reading List

Source URL: www.necoma-project.eu

Language: English - Date: 2016-04-22 11:46:30
2

Regular Expression Matching on Graphics Hardware for Intrusion Detection Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos, Sotiris Ioannidis, Evangelos P. Markatos FORTH-ICS, Greece

Add to Reading List

Source URL: www.rennes.supelec.fr

Language: English - Date: 2009-10-06 07:22:03
    3

    1 Distributed Trust John Ioannidis, AT&T Labs – Research Angelos D. Keromytis, Columbia University CONTENTS

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2005-01-21 17:53:06
      4

      Articles and Refereed Proceedings [1] Victoria Stodden, Marcia McNutt, David H. Bailey, Ewa Deelman, Yolanda Gil, Brooks Hanson, Michael A. Heroux, John P.A. Ioannidis, and Michela Taufer. Enhancing reproducibility for c

      Add to Reading List

      Source URL: www.sandia.gov

      - Date: 2017-03-10 10:12:57
        5

        Supplementary Online Material BUSCO: assessing genome assembly and annotation completeness with single-copy orthologs Felipe A. Simão†, Robert M. Waterhouse†, Panagiotis Ioannidis, Evgenia V. Kriventseva, and Evgeny

        Add to Reading List

        Source URL: bioinformatics.oxfordjournals.org

        - Date: 2015-06-09 01:36:21
          6

          MIDeA: A Multi-Parallel Intrusion Detection Architecture Giorgos Vasiliadis Michalis Polychronakis Sotiris Ioannidis

          Add to Reading List

          Source URL: dcs.ics.forth.gr

          - Date: 2012-03-22 09:28:00
            7

            Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware Thanasis Petsas,* Giannis Voyatzis,* Elias Athanasopoulos,* Michalis Polychronakis,† Sotiris Ioannidis* *

            Add to Reading List

            Source URL: www.necoma-project.eu

            - Date: 2014-04-25 08:04:21
              8

              Secure and Flexible Global File Sharing Stefan Miltchev Vassilis Prevelakis Sotiris Ioannidis

              Add to Reading List

              Source URL: www.cs.columbia.edu

              - Date: 2003-04-08 14:30:50
                9

                References 1. S. Adam, J. Ioannidis, and A. D. Rubin. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Technical report, ATT Labs TD-4ZCPZZ, Available at: http://www.cs.rice.edu/~astubble/wep., August.

                Add to Reading List

                Source URL: delta.cs.cinvestav.mx

                - Date: 2007-06-06 11:21:31
                  UPDATE