Search the dblp DataBase
Adrian Perrig :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yih-Chun Hu , Markus Jakobsson , Adrian Perrig Efficient Constructions for One-Way Hash Chains. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:423-441 [Conf ] Akira Yamada , Yutaka Miyake , Keisuke Takemori , Ahren Studer , Adrian Perrig Intrusion Detection for Encrypted Web Accesses. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:569-576 [Conf ] Dawn Xiaodong Song , Adrian Perrig , Doantam Phan AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. [Citation Graph (0, 0)][DBLP ] CAV, 2001, pp:241-245 [Conf ] Yongdae Kim , Adrian Perrig , Gene Tsudik Simple and fault-tolerant key agreement for dynamic collaborative groups. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:235-244 [Conf ] Adrian Perrig The BiBa one-time signature and broadcast authentication protocol. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:28-37 [Conf ] Haowen Chan , Adrian Perrig , Dawn Xiaodong Song Secure hierarchical in-network aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:278-287 [Conf ] Heejo Lee , Minjin Kwon , Geoffrey Hasker , Adrian Perrig BASE: an incrementally deployable mechanism for viable IP spoofing prevention. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:20-31 [Conf ] Adrian Perrig , D. Song Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:64-76 [Conf ] Haowen Chan , Mark Luk , Adrian Perrig Using Clustering Information for Sensor Network Localization. [Citation Graph (0, 0)][DBLP ] DCOSS, 2005, pp:109-125 [Conf ] Haowen Chan , Adrian Perrig ACE: An Emergent Algorithm for Highly Uniform Cluster Formation. [Citation Graph (0, 0)][DBLP ] EWSN, 2004, pp:154-171 [Conf ] Bryan Parno , Cynthia Kuo , Adrian Perrig Phoolproof Phishing Prevention. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:1-19 [Conf ] Ross J. Anderson , Haowen Chan , Adrian Perrig Key Infection: Smart Trust for Smart Dust. [Citation Graph (0, 0)][DBLP ] ICNP, 2004, pp:206-215 [Conf ] Haowen Chan , Adrian Perrig PIKE: peer intermediaries for key establishment in sensor networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:524-535 [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Dawn Xiaodong Song , Adrian Perrig Advanced and Authenticated Marking Schemes for IP Traceback. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:878-886 [Conf ] Abraham Yaar , Adrian Perrig , Dawn Xiaodong Song FIT: fast Internet traceback. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:1395-1406 [Conf ] Adrian Perrig , Sean W. Smith , Dawn Xiaodong Song , J. D. Tygar SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. [Citation Graph (0, 0)][DBLP ] IPDPS, 2001, pp:170- [Conf ] James Newsome , Elaine Shi , Dawn Xiaodong Song , Adrian Perrig The sybil attack in sensor networks: analysis & defenses. [Citation Graph (0, 0)][DBLP ] IPSN, 2004, pp:259-268 [Conf ] Adrian Perrig Security in sensor networks: industry trends, present and future research directions. [Citation Graph (0, 0)][DBLP ] IPSN, 2006, pp:1- [Conf ] Mark Luk , Ghita Mezzour , Adrian Perrig , Virgil D. Gligor MiniSec: a secure sensor network communication architecture. [Citation Graph (0, 0)][DBLP ] IPSN, 2007, pp:479-488 [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Ariadne: a secure on-demand routing protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2002, pp:12-23 [Conf ] Adrian Perrig , Robert Szewczyk , Victor Wen , David E. Culler , J. D. Tygar SPINS: security protocols for sensor netowrks. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2001, pp:189-199 [Conf ] Chris Karlof , Naveen Sastry , Yaping Li , Adrian Perrig , J. D. Tygar Distillation Codes and Applications to DoS Resistant Multicast Authentication. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Efficient Security Mechanisms for Routing Protocolsa. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Adrian Perrig , Ran Canetti , Dawn Xiaodong Song , J. D. Tygar Efficient and Secure Source Authentication for Multicast. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Adrian Perrig , Dawn Xiaodong Song A First Step Towards the Automatic Generation of Security Protocols. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Karthik Lakshminarayanan , Daniel Adkins , Adrian Perrig , Ion Stoica Brief announcement: towards a secure indirection infrastructure. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:383- [Conf ] Mark Luk , Adrian Perrig , Bram Whillock Seven cardinal properties of sensor network broadcast authentication. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:147-156 [Conf ] Yongdae Kim , Adrian Perrig , Gene Tsudik Communication-Efficient Group Key Agreement. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:229-244 [Conf ] Bartosz Przydatek , Dawn Xiaodong Song , Adrian Perrig SIA: secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:255-265 [Conf ] Haowen Chan , Debabrata Dash , Adrian Perrig , Hui Zhang Modeling adoptability of secure BGP protocol. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2006, pp:279-290 [Conf ] Yih-Chun Hu , Adrian Perrig , Marvin A. Sirbu SPV: secure path vector routing for securing BGP. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2004, pp:179-192 [Conf ] Haowen Chan , Debabrata Dash , Adrian Perrig , Hui Zhang Modeling adoptability of secure BGP protocols. [Citation Graph (0, 0)][DBLP ] SIGMETRICS/Performance, 2006, pp:389-390 [Conf ] Arvind Seshadri , Mark Luk , Elaine Shi , Adrian Perrig , Leendert van Doorn , Pradeep K. Khosla Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. [Citation Graph (0, 0)][DBLP ] SOSP, 2005, pp:1-16 [Conf ] Haowen Chan , Adrian Perrig , Dawn Xiaodong Song Random Key Predistribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:197-0 [Conf ] Jonathan M. McCune , Adrian Perrig , Michael K. Reiter Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:110-124 [Conf ] Jonathan M. McCune , Elaine Shi , Adrian Perrig , Michael K. Reiter Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:64-78 [Conf ] Bryan Parno , Adrian Perrig , Virgil D. Gligor Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:49-63 [Conf ] Adrian Perrig , Ran Canetti , J. D. Tygar , Dawn Xiaodong Song Efficient Authentication and Signing of Multicast Streams over Lossy Channels. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:56-73 [Conf ] Adrian Perrig , Dawn Xiaodong Song , J. D. Tygar ELK, A New Protocol for Efficient Large-Group Key Distribution. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:247-0 [Conf ] Arvind Seshadri , Adrian Perrig , Leendert van Doorn , Pradeep K. Khosla SWATT: SoftWare-based ATTestation for Embedded Devices. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:272-0 [Conf ] Elaine Shi , Adrian Perrig , Leendert van Doorn BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:154-168 [Conf ] Abraham Yaar , Adrian Perrig , Dawn Xiaodong Song Pi: A Path Identification Mechanism to Defend against DDoS Attack. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:93-0 [Conf ] Abraham Yaar , Adrian Perrig , Dawn Xiaodong Song SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:130-0 [Conf ] Dawn Xiaodong Song , David Wagner , Adrian Perrig Practical Techniques for Searches on Encrypted Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:44-55 [Conf ] Jonathan M. McCune , Bryan Parno , Adrian Perrig , Michael K. Reiter , Arvind Seshadri Minimal TCB Code Execution. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:267-272 [Conf ] Elaine Shi , John Bethencourt , Hubert T.-H. Chan , Dawn Xiaodong Song , Adrian Perrig Multi-Dimensional Range Query over Encrypted Data. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:350-364 [Conf ] Niraj Tolia , Michael Kozuch , Mahadev Satyanarayanan , Brad Karp , Thomas C. Bressoud , Adrian Perrig Opportunistic Use of Content Addressable Storage for Distributed File Systems. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2003, pp:127-140 [Conf ] Jonathan M. McCune , Adrian Perrig , Michael K. Reiter Bump in the Ether: A Framework for Securing Sensitive User Input. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2006, pp:185-198 [Conf ] Yih-Chun Hu , David B. Johnson , Adrian Perrig SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] WMCSA, 2002, pp:3-13 [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Rushing attacks and defense in wireless ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2003, pp:30-40 [Conf ] Yih-Chun Hu , David B. Johnson , Adrian Perrig SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2003, v:1, n:1, pp:175-192 [Journal ] Adrian Perrig , John A. Stankovic , David Wagner Security in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:6, pp:53-57 [Journal ] Arvind Seshadri , Mark Luk , Adrian Perrig , Leendert van Doorn , Pradeep K. Khosla Externally verifiable code execution. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:45-49 [Journal ] Karthik Lakshminarayanan , Daniel Adkins , Adrian Perrig , Ion Stoica Taming IP packet flooding attacks. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:1, pp:45-50 [Journal ] Haowen Chan , Adrian Perrig Security and Privacy in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2003, v:36, n:10, pp:103-105 [Journal ] Yih-Chun Hu , Adrian Perrig A Survey of Secure Wireless Ad Hoc Routing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:3, pp:28-39 [Journal ] Cynthia Kuo , Adrian Perrig , Jesse Walker Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration. [Citation Graph (0, 0)][DBLP ] Interactions, 2006, v:13, n:3, pp:28-31 [Journal ] Dawn Xiaodong Song , Sergey Berezin , Adrian Perrig Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2001, v:9, n:1/2, pp:47-74 [Journal ] Haowen Chan , Adrian Perrig , Bartosz Przydatek , Dawn Xiaodong Song SIA: Secure information aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2007, v:15, n:1, pp:69-102 [Journal ] Yongdae Kim , Adrian Perrig , Gene Tsudik Group Key Agreement Efficient in Communication. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2004, v:53, n:7, pp:905-921 [Journal ] Haowen Chan , Virgil D. Gligor , Adrian Perrig , Gautam Muralidharan On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:233-247 [Journal ] Yongdae Kim , Adrian Perrig , Gene Tsudik Tree-based group key agreement. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:60-96 [Journal ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2005, v:11, n:1-2, pp:21-38 [Journal ] Adrian Perrig , Robert Szewczyk , J. D. Tygar , Victor Wen , David E. Culler SPINS: Security Protocols for Sensor Networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2002, v:8, n:5, pp:521-534 [Journal ] Bryan Parno , Dan Wendlandt , Elaine Shi , Adrian Perrig , Bruce M. Maggs , Yih-Chun Hu Portcullis: protecting connection setup from denial-of-capability attacks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:289-300 [Conf ] Arvind Seshadri , Mark Luk , Ning Qu , Adrian Perrig SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:335-350 [Conf ] Mahadev Satyanarayanan , Benjamin Gilbert , Matt Toups , Niraj Tolia , Ajay Surie , David R. O'Hallaron , Adam Wolbach , Jan Harkes , Adrian Perrig , David J. Farber , Michael Kozuch , Casey Helfrich , Partho Nath , H. Andrés Lagar-Cavilla Pervasive Personal Computing in an Internet Suspend/Resume System. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2007, v:11, n:2, pp:16-25 [Journal ] LSM-Based Secure System Monitoring Using Kernel Protection Schemes. [Citation Graph (, )][DBLP ] A Study of User-Friendly Hash Comparison Schemes. [Citation Graph (, )][DBLP ] How low can you go?: recommendations for hardware-supported minimal TCB code execution. [Citation Graph (, )][DBLP ] Building Secure Networked Systems with Code Attestation. [Citation Graph (, )][DBLP ] Privacy-Preserving Relationship Path Discovery in Social Networks. [Citation Graph (, )][DBLP ] An inquiry into the nature and causes of the wealth of internet miscreants. [Citation Graph (, )][DBLP ] SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. [Citation Graph (, )][DBLP ] SNAPP: stateless network-authenticated path pinning. [Citation Graph (, )][DBLP ] Efficient security primitives derived from a secure aggregation algorithm. [Citation Graph (, )][DBLP ] SAKE: Software Attestation for Key Establishment in Sensor Networks. [Citation Graph (, )][DBLP ] The Coremelt Attack. [Citation Graph (, )][DBLP ] Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. [Citation Graph (, )][DBLP ] Countermeasures against Government-Scale Monetary Forgery. [Citation Graph (, )][DBLP ] Centaur: A Hybrid Approach for Reliable Policy-Based Routing. [Citation Graph (, )][DBLP ] VANET-based approach for parking space availability. [Citation Graph (, )][DBLP ] GAnGS: gather, authenticate 'n group securely. [Citation Graph (, )][DBLP ] SPATE: small-group PKI-less authenticated trust establishment. [Citation Graph (, )][DBLP ] Safe Passage for Passwords and Other Sensitive Data. [Citation Graph (, )][DBLP ] Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes. [Citation Graph (, )][DBLP ] Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. [Citation Graph (, )][DBLP ] Bootstrapping Trust in Commodity Computers. [Citation Graph (, )][DBLP ] CLAMP: Practical Prevention of Large-Scale Data Leaks. [Citation Graph (, )][DBLP ] TrustVisor: Efficient TCB Reduction and Attestation. [Citation Graph (, )][DBLP ] Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. [Citation Graph (, )][DBLP ] Security in sensor networks: industry trends, present and future research directions. [Citation Graph (, )][DBLP ] SCUBA: Secure Code Update By Attestation in sensor networks. [Citation Graph (, )][DBLP ] Flicker: an execution infrastructure for tcb minimization. [Citation Graph (, )][DBLP ] Mobile user location-specific encryption (MULE): using your office as your password. [Citation Graph (, )][DBLP ] Mind your manners: socially appropriate wireless key establishment for groups. [Citation Graph (, )][DBLP ] Secure sensor network routing: a clean-slate approach. [Citation Graph (, )][DBLP ] Packet-dropping adversary identification for data plane security. [Citation Graph (, )][DBLP ] Use Your Illusion: secure authentication usable anywhere. [Citation Graph (, )][DBLP ] Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. [Citation Graph (, )][DBLP ] SBAP: Software-Based Attestation for Peripherals. [Citation Graph (, )][DBLP ] Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. [Citation Graph (, )][DBLP ] A Trustable Reputation Scheme Based on Private Relationships. [Citation Graph (, )][DBLP ] Secure wireless communications: Secret keys through multipath. [Citation Graph (, )][DBLP ] Search in 0.010secs, Finished in 0.017secs