The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bryan Parno: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bryan Parno, Cynthia Kuo, Adrian Perrig
    Phoolproof Phishing Prevention. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:1-19 [Conf]
  2. Nick Elprin, Bryan Parno
    An Analysis of Database-Driven Mail Servers. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:15-22 [Conf]
  3. Bryan Parno, Adrian Perrig, Virgil D. Gligor
    Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:49-63 [Conf]
  4. Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri
    Minimal TCB Code Execution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:267-272 [Conf]
  5. Bryan Parno, Mema Roussopoulos
    Defending a P2P Digital Preservation System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:4, pp:209-222 [Journal]
  6. Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu
    Portcullis: protecting connection setup from denial-of-capability attacks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:289-300 [Conf]

  7. How low can you go?: recommendations for hardware-supported minimal TCB code execution. [Citation Graph (, )][DBLP]


  8. SNAPP: stateless network-authenticated path pinning. [Citation Graph (, )][DBLP]


  9. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. [Citation Graph (, )][DBLP]


  10. Countermeasures against Government-Scale Monetary Forgery. [Citation Graph (, )][DBLP]


  11. Bootstrapping Trust in Commodity Computers. [Citation Graph (, )][DBLP]


  12. CLAMP: Practical Prevention of Large-Scale Data Leaks. [Citation Graph (, )][DBLP]


  13. Bootstrapping Trust in a "Trusted" Platform. [Citation Graph (, )][DBLP]


  14. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. [Citation Graph (, )][DBLP]


  15. Flicker: an execution infrastructure for tcb minimization. [Citation Graph (, )][DBLP]


  16. Secure sensor network routing: a clean-slate approach. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002