The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Adrian Perrig: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yih-Chun Hu, Markus Jakobsson, Adrian Perrig
    Efficient Constructions for One-Way Hash Chains. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:423-441 [Conf]
  2. Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig
    Intrusion Detection for Encrypted Web Accesses. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:569-576 [Conf]
  3. Dawn Xiaodong Song, Adrian Perrig, Doantam Phan
    AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CAV, 2001, pp:241-245 [Conf]
  4. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Simple and fault-tolerant key agreement for dynamic collaborative groups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:235-244 [Conf]
  5. Adrian Perrig
    The BiBa one-time signature and broadcast authentication protocol. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:28-37 [Conf]
  6. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
    Secure hierarchical in-network aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:278-287 [Conf]
  7. Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig
    BASE: an incrementally deployable mechanism for viable IP spoofing prevention. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:20-31 [Conf]
  8. Adrian Perrig, D. Song
    Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:64-76 [Conf]
  9. Haowen Chan, Mark Luk, Adrian Perrig
    Using Clustering Information for Sensor Network Localization. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2005, pp:109-125 [Conf]
  10. Haowen Chan, Adrian Perrig
    ACE: An Emergent Algorithm for Highly Uniform Cluster Formation. [Citation Graph (0, 0)][DBLP]
    EWSN, 2004, pp:154-171 [Conf]
  11. Bryan Parno, Cynthia Kuo, Adrian Perrig
    Phoolproof Phishing Prevention. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:1-19 [Conf]
  12. Ross J. Anderson, Haowen Chan, Adrian Perrig
    Key Infection: Smart Trust for Smart Dust. [Citation Graph (0, 0)][DBLP]
    ICNP, 2004, pp:206-215 [Conf]
  13. Haowen Chan, Adrian Perrig
    PIKE: peer intermediaries for key establishment in sensor networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:524-535 [Conf]
  14. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  15. Dawn Xiaodong Song, Adrian Perrig
    Advanced and Authenticated Marking Schemes for IP Traceback. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:878-886 [Conf]
  16. Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
    FIT: fast Internet traceback. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1395-1406 [Conf]
  17. Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar
    SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:170- [Conf]
  18. James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig
    The sybil attack in sensor networks: analysis & defenses. [Citation Graph (0, 0)][DBLP]
    IPSN, 2004, pp:259-268 [Conf]
  19. Adrian Perrig
    Security in sensor networks: industry trends, present and future research directions. [Citation Graph (0, 0)][DBLP]
    IPSN, 2006, pp:1- [Conf]
  20. Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor
    MiniSec: a secure sensor network communication architecture. [Citation Graph (0, 0)][DBLP]
    IPSN, 2007, pp:479-488 [Conf]
  21. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Ariadne: a secure on-demand routing protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2002, pp:12-23 [Conf]
  22. Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar
    SPINS: security protocols for sensor netowrks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:189-199 [Conf]
  23. Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar
    Distillation Codes and Applications to DoS Resistant Multicast Authentication. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  24. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Efficient Security Mechanisms for Routing Protocolsa. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  25. Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar
    Efficient and Secure Source Authentication for Multicast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  26. Adrian Perrig, Dawn Xiaodong Song
    A First Step Towards the Automatic Generation of Security Protocols. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  27. Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica
    Brief announcement: towards a secure indirection infrastructure. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:383- [Conf]
  28. Mark Luk, Adrian Perrig, Bram Whillock
    Seven cardinal properties of sensor network broadcast authentication. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:147-156 [Conf]
  29. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Communication-Efficient Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:229-244 [Conf]
  30. Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perrig
    SIA: secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:255-265 [Conf]
  31. Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang
    Modeling adoptability of secure BGP protocol. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:279-290 [Conf]
  32. Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
    SPV: secure path vector routing for securing BGP. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:179-192 [Conf]
  33. Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang
    Modeling adoptability of secure BGP protocols. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:389-390 [Conf]
  34. Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla
    Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:1-16 [Conf]
  35. Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
    Random Key Predistribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:197-0 [Conf]
  36. Jonathan M. McCune, Adrian Perrig, Michael K. Reiter
    Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:110-124 [Conf]
  37. Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter
    Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:64-78 [Conf]
  38. Bryan Parno, Adrian Perrig, Virgil D. Gligor
    Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:49-63 [Conf]
  39. Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:56-73 [Conf]
  40. Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar
    ELK, A New Protocol for Efficient Large-Group Key Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:247-0 [Conf]
  41. Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla
    SWATT: SoftWare-based ATTestation for Embedded Devices. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:272-0 [Conf]
  42. Elaine Shi, Adrian Perrig, Leendert van Doorn
    BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:154-168 [Conf]
  43. Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
    Pi: A Path Identification Mechanism to Defend against DDoS Attack. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:93-0 [Conf]
  44. Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
    SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:130-0 [Conf]
  45. Dawn Xiaodong Song, David Wagner, Adrian Perrig
    Practical Techniques for Searches on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:44-55 [Conf]
  46. Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri
    Minimal TCB Code Execution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:267-272 [Conf]
  47. Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig
    Multi-Dimensional Range Query over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:350-364 [Conf]
  48. Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas C. Bressoud, Adrian Perrig
    Opportunistic Use of Content Addressable Storage for Distributed File Systems. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2003, pp:127-140 [Conf]
  49. Jonathan M. McCune, Adrian Perrig, Michael K. Reiter
    Bump in the Ether: A Framework for Securing Sensitive User Input. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:185-198 [Conf]
  50. Yih-Chun Hu, David B. Johnson, Adrian Perrig
    SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2002, pp:3-13 [Conf]
  51. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Rushing attacks and defense in wireless ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:30-40 [Conf]
  52. Yih-Chun Hu, David B. Johnson, Adrian Perrig
    SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2003, v:1, n:1, pp:175-192 [Journal]
  53. Adrian Perrig, John A. Stankovic, David Wagner
    Security in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:6, pp:53-57 [Journal]
  54. Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla
    Externally verifiable code execution. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:9, pp:45-49 [Journal]
  55. Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica
    Taming IP packet flooding attacks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:1, pp:45-50 [Journal]
  56. Haowen Chan, Adrian Perrig
    Security and Privacy in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:10, pp:103-105 [Journal]
  57. Yih-Chun Hu, Adrian Perrig
    A Survey of Secure Wireless Ad Hoc Routing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:28-39 [Journal]
  58. Cynthia Kuo, Adrian Perrig, Jesse Walker
    Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration. [Citation Graph (0, 0)][DBLP]
    Interactions, 2006, v:13, n:3, pp:28-31 [Journal]
  59. Dawn Xiaodong Song, Sergey Berezin, Adrian Perrig
    Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:1/2, pp:47-74 [Journal]
  60. Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song
    SIA: Secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:69-102 [Journal]
  61. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Group Key Agreement Efficient in Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:7, pp:905-921 [Journal]
  62. Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan
    On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:233-247 [Journal]
  63. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Tree-based group key agreement. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:60-96 [Journal]
  64. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:1-2, pp:21-38 [Journal]
  65. Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler
    SPINS: Security Protocols for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:5, pp:521-534 [Journal]
  66. Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu
    Portcullis: protecting connection setup from denial-of-capability attacks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:289-300 [Conf]
  67. Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig
    SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:335-350 [Conf]
  68. Mahadev Satyanarayanan, Benjamin Gilbert, Matt Toups, Niraj Tolia, Ajay Surie, David R. O'Hallaron, Adam Wolbach, Jan Harkes, Adrian Perrig, David J. Farber, Michael Kozuch, Casey Helfrich, Partho Nath, H. Andrés Lagar-Cavilla
    Pervasive Personal Computing in an Internet Suspend/Resume System. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2007, v:11, n:2, pp:16-25 [Journal]

  69. LSM-Based Secure System Monitoring Using Kernel Protection Schemes. [Citation Graph (, )][DBLP]


  70. A Study of User-Friendly Hash Comparison Schemes. [Citation Graph (, )][DBLP]


  71. How low can you go?: recommendations for hardware-supported minimal TCB code execution. [Citation Graph (, )][DBLP]


  72. Building Secure Networked Systems with Code Attestation. [Citation Graph (, )][DBLP]


  73. Privacy-Preserving Relationship Path Discovery in Social Networks. [Citation Graph (, )][DBLP]


  74. An inquiry into the nature and causes of the wealth of internet miscreants. [Citation Graph (, )][DBLP]


  75. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. [Citation Graph (, )][DBLP]


  76. SNAPP: stateless network-authenticated path pinning. [Citation Graph (, )][DBLP]


  77. Efficient security primitives derived from a secure aggregation algorithm. [Citation Graph (, )][DBLP]


  78. SAKE: Software Attestation for Key Establishment in Sensor Networks. [Citation Graph (, )][DBLP]


  79. The Coremelt Attack. [Citation Graph (, )][DBLP]


  80. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. [Citation Graph (, )][DBLP]


  81. Countermeasures against Government-Scale Monetary Forgery. [Citation Graph (, )][DBLP]


  82. Centaur: A Hybrid Approach for Reliable Policy-Based Routing. [Citation Graph (, )][DBLP]


  83. VANET-based approach for parking space availability. [Citation Graph (, )][DBLP]


  84. GAnGS: gather, authenticate 'n group securely. [Citation Graph (, )][DBLP]


  85. SPATE: small-group PKI-less authenticated trust establishment. [Citation Graph (, )][DBLP]


  86. Safe Passage for Passwords and Other Sensitive Data. [Citation Graph (, )][DBLP]


  87. Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  88. Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes. [Citation Graph (, )][DBLP]


  89. Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. [Citation Graph (, )][DBLP]


  90. Bootstrapping Trust in Commodity Computers. [Citation Graph (, )][DBLP]


  91. CLAMP: Practical Prevention of Large-Scale Data Leaks. [Citation Graph (, )][DBLP]


  92. TrustVisor: Efficient TCB Reduction and Attestation. [Citation Graph (, )][DBLP]


  93. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. [Citation Graph (, )][DBLP]


  94. Security in sensor networks: industry trends, present and future research directions. [Citation Graph (, )][DBLP]


  95. SCUBA: Secure Code Update By Attestation in sensor networks. [Citation Graph (, )][DBLP]


  96. Flicker: an execution infrastructure for tcb minimization. [Citation Graph (, )][DBLP]


  97. Mobile user location-specific encryption (MULE): using your office as your password. [Citation Graph (, )][DBLP]


  98. Mind your manners: socially appropriate wireless key establishment for groups. [Citation Graph (, )][DBLP]


  99. Secure sensor network routing: a clean-slate approach. [Citation Graph (, )][DBLP]


  100. Packet-dropping adversary identification for data plane security. [Citation Graph (, )][DBLP]


  101. Use Your Illusion: secure authentication usable anywhere. [Citation Graph (, )][DBLP]


  102. Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. [Citation Graph (, )][DBLP]


  103. SBAP: Software-Based Attestation for Peripherals. [Citation Graph (, )][DBLP]


  104. Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. [Citation Graph (, )][DBLP]


  105. A Trustable Reputation Scheme Based on Private Relationships. [Citation Graph (, )][DBLP]


  106. Secure wireless communications: Secret keys through multipath. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002