Angelos D Keromytis


Ontology type: schema:Person     


Person Info

NAME

Angelos D

SURNAME

Keromytis

Publications in SciGraph latest 50 shown

  • 2019 A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions in ADVANCES IN CYBER SECURITY: PRINCIPLES, TECHNIQUES, AND APPLICATIONS
  • 2018 Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs in CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
  • 2016 Privacy Threats in E-Shopping (Position Paper) in DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE
  • 2016 NaClDroid: Native Code Isolation for Android Applications in COMPUTER SECURITY – ESORICS 2016
  • 2016 Provable Network Activity for Protecting Users Against False Accusation in INFORMATION SECURITY THEORY AND PRACTICE
  • 2015-06 Detection and analysis of eavesdropping in anonymous communication networks in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2014 On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records in PASSIVE AND ACTIVE MEASUREMENT
  • 2014 Computational Decoys for Cloud Security in SECURE CLOUD COMPUTING
  • 2014 Dynamic Reconstruction of Relocation Information for Stripped Binaries in RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES
  • 2013 CloudFence: Data Flow Tracking as a Cloud Service in RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES
  • 2013 Practical Software Diversification Using In-Place Code Randomization in MOVING TARGET DEFENSE II
  • 2013 CellFlood: Attacking Tor Onion Routers on the Cheap in COMPUTER SECURITY – ESORICS 2013
  • 2013 Cloudopsy: An Autopsy of Data Flows in the Cloud in HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST
  • 2012 Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2012 Towards a Universal Data Provenance Framework Using Dynamic Instrumentation in INFORMATION SECURITY AND PRIVACY RESEARCH
  • 2011-08-05 Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution in MOVING TARGET DEFENSE
  • 2011 Biba Mandatory Integrity Policy in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Recognition in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Nonlinearity of Boolean Functions in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 BLP in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Fusion in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Authentication in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Noninteractive Proof in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Buffer Overrun in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Binding Pattern in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Nonlinear Feedback Shift Register in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Botnet Detection in Enterprise Networks in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometrics in Video Surveillance in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Number Theory in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Blowfish in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Number Field Sieve for Factoring in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Measuring the Deployment Hiccups of DNSSEC in ADVANCES IN COMPUTING AND COMMUNICATIONS
  • 2011 Crimeware Swindling without Virtual Machines in INFORMATION SECURITY
  • 2011 Blum–Goldwasser Public Key Encryption System in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Big Number Multiplication in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Broadcast Stream Authentication in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Bank Card in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Bytecode Verification in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Boomerang Attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Blum–Blum–Shub Pseudorandom Bit Generator in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Number Field Sieve in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Binary Exponentiation in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 BIOS Basic Input Output System in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 BLP Model in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Nonrepudiation of Digital Signatures in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Biometric Cryptosystem in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 NSA Suite B in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Buffer Overflow Attacks in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Nucleic Acid in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Binomial Distribution in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.21729.3f", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "https://www.grid.ac/institutes/grid.47100.32", 
            "type": "Organization"
          }
        ], 
        "familyName": "Keromytis", 
        "givenName": "Angelos D", 
        "id": "sg:person.0631731734.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0631731734.37"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:15", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1074.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.0631731734.37'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.0631731734.37'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.0631731734.37'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.0631731734.37'


     




    Preview window. Press ESC to close (or click here)


    ...