Author of the publication

Building a Secure Web Browser.

, and . USENIX Annual Technical Conference, FREENIX Track, page 127-134. USENIX, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ioannidis, Sotiris
add a person with the name Ioannidis, Sotiris
 

Other publications of authors with the same name

Understanding the behavior of malicious applications in social networks., , , , , and . IEEE Network, 24 (5): 14-19 (2010)Flying Memcache: Lessons Learned from Different Acceleration Strategies., , , , and . SBAC-PAD, page 25-32. IEEE Computer Society, (2014)Cross-Device Tracking: Systematic Method to Detect and Measure CDT., , , and . CoRR, (2018)Secure and Flexible Global File Sharing., , , , , and . USENIX Annual Technical Conference, FREENIX Track, page 165-178. USENIX, (2003)Distributed Privacy-Preserving Policy Reconciliation., , and . ICC, page 1342-1349. IEEE, (2007)GPU-assisted malware., , and . Int. J. Inf. Sec., 14 (3): 289-297 (2015)Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications., , , , , and . I. J. Network Security, 4 (1): 69-80 (2007)A cooperative immunization system for an untrusting Internet., , , , and . ICON, page 403-408. IEEE, (2003)Investigating the complete corpus of referendum and elections tweets., , , , and . ASONAM, page 100-105. IEEE Computer Society, (2016)A deployable routing system for nanonetworks., , , , and . ICC, page 1-6. IEEE, (2016)