关注
Georgios Kontaxis
Georgios Kontaxis
Ph.D. in Computer Science, Columbia University
在 cs.columbia.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Detecting social network profile cloning
G Kontaxis, I Polakis, S Ioannidis, EP Markatos
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 …, 2011
1802011
we. b: The web of short URLs
D Antoniades, I Polakis, G Kontaxis, E Athanasopoulos, S Ioannidis, ...
Proceedings of the 20th international conference on World wide web, 715-724, 2011
1512011
SAuth: protecting user accounts from password database leaks
G Kontaxis, E Athanasopoulos, G Portokalidis, AD Keromytis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
752013
Using social networks to harvest email addresses
I Polakis, G Kontaxis, S Antonatos, E Gessiou, T Petsas, EP Markatos
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
732010
All your face are belong to us: breaking Facebook's social authentication
I Polakis, M Lancini, G Kontaxis, F Maggi, S Ioannidis, AD Keromytis, ...
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
642012
Privacy-preserving social plugins
G Kontaxis, M Polychronakis, AD Keromytis, EP Markatos
Proceedings of the 21st USENIX Security Symposium (August 2012), 2012
542012
Tracking Protection in Firefox For Privacy and Performance
G Kontaxis, M Chew
45*
Minimizing information disclosure to third parties in social login platforms
G Kontaxis, M Polychronakis, EP Markatos
International Journal of Information Security 11 (5), 321-332, 2012
422012
Faces in the distorting mirror: Revisiting photo-based social authentication
I Polakis, P Ilia, F Maggi, M Lancini, G Kontaxis, S Zanero, S Ioannidis, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
322014
An empirical study on the security of cross-domain policies in rich internet applications
G Kontaxis, D Antoniades, I Polakis, EP Markatos
Proceedings of the Fourth European Workshop on System Security, 7, 2011
192011
SudoWeb: Minimizing information disclosure to third parties in single sign-on platforms
G Kontaxis, M Polychronakis, EP Markatos
International Conference on Information Security, 197-212, 2011
172011
Methods, systems, and media for authenticating users using multiple services
AD Keromytis, E Athanasopoulos, G Kontaxis, G Portokalidis
US Patent App. 15/032,940, 2014
13*2014
Outsourcing Malicious Infrastructure to the Cloud
G Kontaxis, I Polakis, S Ioannidis
SysSec Workshop (SysSec), 2011 First, 35-42, 2011
52011
Protecting Insecure Communications with Topology-aware Network Tunnels
G Kontaxis, AD Keromytis
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
32016
dead. drop: URL-based Stealthy Messaging
G Kontaxis, I Polakis, M Polychronakis, EP Markatos
Proc. 7th European Conf. Comput. Network Defense (EC2ND), 17-24, 2011
32011
系统目前无法执行此操作,请稍后再试。
文章 1–15