81. MOVE: An End-to-End Solution To Network Denial of Service Stavrou, Angelos; Keromytis, Angelos D.; Nieh, Jason; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
82. On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
83. PachyRand: SQL Randomization for the PostgreSQL JDBC Driver Locasto, Michael E.; Keromytis, Angelos D. 2005 Reports Computer science
84. Remotely Keyed Cryptographics: Secure Remote Display Access Using (Mostly) Untrusted Hardware Cook, Debra L.; Baratto, Ricardo A.; Keromytis, Angelos D. 2005 Articles Computer science
85. Speculative Virtual Verification: Policy-Constrained Speculative Execution Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
86. The Bandwidth Exchange Architecture Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2005 Articles Computer science
87. The Case for Crypto Protocol Awareness Inside the OS Kernel Burnside, Matthew Spindel; Keromytis, Angelos D. 2005 Articles Computer science
88. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet Kamra, Abhinav; Feng, Hanhua; Misra, Vishal; Keromytis, Angelos D. 2005 Articles Computer science
89. The Pseudorandomness of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
90. Towards Collaborative Security and P2P Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science