scispace - formally typeset
A

Angelos D. Keromytis

Researcher at Columbia University

Publications -  384
Citations -  20234

Angelos D. Keromytis is an academic researcher from Columbia University. The author has contributed to research in topics: The Internet & Denial-of-service attack. The author has an hindex of 71, co-authored 380 publications receiving 19448 citations. Previous affiliations of Angelos D. Keromytis include AT&T & Rothamsted Research.

Papers
More filters
Book ChapterDOI

A Survey of Voice over IP Security Research

TL;DR: A survey of Voice over IP security research is presented to provide a roadmap for researchers seeking to understand existing capabilities and, and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems.
Patent

Systems and methods for computing data transmission characteristics of a network path based on single-ended measurements

TL;DR: In this paper, the authors present a system and methods for computing data transmission characteristics of a network path, where the network path has a sending host, at least one intermediate host and a receiving host, and the transmission characteristics are computed based on single-ended measurements performed at the sending host.

The Use of HMAC-RIPEMD-160-96 within ESP and AH

TL;DR: This memo describes the use of the HMAC algorithm in conjunction with the RIPEMD-160 algorithm as an authentication mechanism within the revised IPSEC Encapsulating Security Payload [ESP] and the revisedIPSEC Authentication Header [AH].
Proceedings ArticleDOI

Application communities: using monoculture for dependability

TL;DR: A set of parameters that define an Application Communities (AC) are proposed and the tradeoffs between the minimal size of an AC, the marginal overhead imposed on each member, and the speed with which new faults are detected are explored.
Book ChapterDOI

Detecting traffic snooping in tor using decoys

TL;DR: The use of decoy traffic for the detection of traffic interception on anonymous proxying systems is explored based on the injection of traffic that exposes bait credentials for decoy services that require user authentication to entice prospective eavesdroppers to access decoy accounts on servers under their control using the intercepted credentials.