2008 | ||
---|---|---|
94 | EE | Haowen Chan, Adrian Perrig: Efficient security primitives derived from a secure aggregation algorithm. ACM Conference on Computer and Communications Security 2008: 521-534 |
93 | EE | Bryan Parno, Adrian Perrig, Dave Andersen: SNAPP: stateless network-authenticated path pinning. ASIACCS 2008: 168-178 |
92 | EE | Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe: SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. ASIACCS 2008: 201-204 |
91 | EE | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri: How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25 |
90 | EE | Arvind Seshadri, Mark Luk, Adrian Perrig: SAKE: Software Attestation for Key Establishment in Sensor Networks. DCOSS 2008: 372-385 |
89 | EE | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki: Flicker: an execution infrastructure for tcb minimization. EuroSys 2008: 315-328 |
88 | EE | Alessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig: Countermeasures against Government-Scale Monetary Forgery. Financial Cryptography 2008: 262-266 |
87 | EE | Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu: GAnGS: gather, authenticate 'n group securely. MOBICOM 2008: 92-103 |
86 | EE | Po-Yuan Teng, Shih-I Huang, Adrian Perrig: Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. SEC 2008: 705-709 |
85 | EE | Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig: Use Your Illusion: secure authentication usable anywhere. SOUPS 2008: 35-45 |
84 | EE | Dan Wendlandt, David G. Andersen, Adrian Perrig: Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. USENIX Annual Technical Conference 2008: 321-334 |
83 | EE | Yu-Tso Chen, Ahren Studer, Adrian Perrig: Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. WCNC 2008: 2804-2809 |
82 | EE | Cynthia Kuo, Ahren Studer, Adrian Perrig: Mind your manners: socially appropriate wireless key establishment for groups. WISEC 2008: 125-130 |
81 | EE | Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn: Towards Sound Detection of Virtual Machines. Botnet Detection 2008: 89-116 |
80 | EE | Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica: Securing user-controlled routing infrastructures. IEEE/ACM Trans. Netw. 16(3): 549-561 (2008) |
2007 | ||
79 | EE | Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig: Intrusion Detection for Encrypted Web Accesses. AINA Workshops (1) 2007: 569-576 |
78 | EE | Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig: BASE: an incrementally deployable mechanism for viable IP spoofing prevention. ASIACCS 2007: 20-31 |
77 | EE | Cynthia Kuo, Jesse Walker, Adrian Perrig: Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. Financial Cryptography 2007: 325-340 |
76 | EE | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri: Minimal TCB Code Execution. IEEE Symposium on Security and Privacy 2007: 267-272 |
75 | EE | Elaine Shi, John Bethencourt, Hubert T.-H. Chan, Dawn Xiaodong Song, Adrian Perrig: Multi-Dimensional Range Query over Encrypted Data. IEEE Symposium on Security and Privacy 2007: 350-364 |
74 | EE | Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor: MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488 |
73 | EE | Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu: Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300 |
72 | EE | Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. SOSP 2007: 335-350 |
71 | EE | Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig: Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes. SenSys 2007: 233-246 |
70 | EE | Ramu Panayappan, Jayini Mukul Trivedi, Ahren Studer, Adrian Perrig: VANET-based approach for parking space availability. Vehicular Ad Hoc Networks 2007: 75-76 |
69 | EE | Mahadev Satyanarayanan, Benjamin Gilbert, Matt Toups, Niraj Tolia, Ajay Surie, David R. O'Hallaron, Adam Wolbach, Jan Harkes, Adrian Perrig, David J. Farber, Michael Kozuch, Casey Helfrich, Partho Nath, H. Andrés Lagar-Cavilla: Pervasive Personal Computing in an Internet Suspend/Resume System. IEEE Internet Computing 11(2): 16-25 (2007) |
68 | EE | Ajay Surie, Adrian Perrig, Mahadev Satyanarayanan, David J. Farber: Rapid Trust Establishment for Pervasive Personal Computing. IEEE Pervasive Computing 6(4): 24-30 (2007) |
67 | EE | Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song: SIA: Secure information aggregation in sensor networks. Journal of Computer Security 15(1): 69-102 (2007) |
2006 | ||
66 | EE | Haowen Chan, Adrian Perrig, Dawn Xiaodong Song: Secure hierarchical in-network aggregation in sensor networks. ACM Conference on Computer and Communications Security 2006: 278-287 |
65 | EE | Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig: Secure sensor network routing: a clean-slate approach. CoNEXT 2006: 11 |
64 | EE | Bryan Parno, Cynthia Kuo, Adrian Perrig: Phoolproof Phishing Prevention. Financial Cryptography 2006: 1-19 |
63 | EE | Adrian Perrig: Security in sensor networks: industry trends, present and future research directions. IPSN 2006: 1 |
62 | EE | Mark Luk, Adrian Perrig, Bram Whillock: Seven cardinal properties of sensor network broadcast authentication. SASN 2006: 147-156 |
61 | EE | Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang: Modeling adoptability of secure BGP protocol. SIGCOMM 2006: 279-290 |
60 | EE | Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang: Modeling adoptability of secure BGP protocols. SIGMETRICS/Performance 2006: 389-390 |
59 | EE | Jonathan M. McCune, Adrian Perrig, Michael K. Reiter: Bump in the Ether: A Framework for Securing Sensitive User Input. USENIX Annual Technical Conference, General Track 2006: 185-198 |
58 | EE | Adrian Perrig: Security in sensor networks: industry trends, present and future research directions. Workshop on Wireless Security 2006: 53 |
57 | EE | Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: SCUBA: Secure Code Update By Attestation in sensor networks. Workshop on Wireless Security 2006: 85-94 |
56 | EE | Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: Externally verifiable code execution. Commun. ACM 49(9): 45-49 (2006) |
55 | EE | Abraham Yaar, Adrian Perrig, D. Song: StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE Journal on Selected Areas in Communications 24(10): 1853-1863 (2006) |
54 | EE | Yih-Chun Hu, Adrian Perrig, David B. Johnson: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2): 370-380 (2006) |
53 | EE | Cynthia Kuo, Adrian Perrig, Jesse Walker: Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration. Interactions 13(3): 28-31 (2006) |
2005 | ||
52 | EE | Yih-Chun Hu, Markus Jakobsson, Adrian Perrig: Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441 |
51 | EE | Haowen Chan, Mark Luk, Adrian Perrig: Using Clustering Information for Sensor Network Localization. DCOSS 2005: 109-125 |
50 | EE | Jonathan M. McCune, Adrian Perrig, Michael K. Reiter: Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. IEEE Symposium on Security and Privacy 2005: 110-124 |
49 | EE | Elaine Shi, Adrian Perrig, Leendert van Doorn: BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. IEEE Symposium on Security and Privacy 2005: 154-168 |
48 | EE | Bryan Parno, Adrian Perrig, Virgil D. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy 2005: 49-63 |
47 | EE | Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. IEEE Symposium on Security and Privacy 2005: 64-78 |
46 | EE | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: FIT: fast Internet traceback. INFOCOM 2005: 1395-1406 |
45 | EE | Haowen Chan, Adrian Perrig: PIKE: peer intermediaries for key establishment in sensor networks. INFOCOM 2005: 524-535 |
44 | EE | Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. SOSP 2005: 1-16 |
43 | EE | Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 233-247 (2005) |
42 | EE | Yih-Chun Hu, Adrian Perrig, David B. Johnson: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11(1-2): 21-38 (2005) |
2004 | ||
41 | Markus Jakobsson, Adrian Perrig: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004 ACM 2004 | |
40 | EE | Haowen Chan, Adrian Perrig: ACE: An Emergent Algorithm for Highly Uniform Cluster Formation. EWSN 2004: 154-171 |
39 | EE | Ross J. Anderson, Haowen Chan, Adrian Perrig: Key Infection: Smart Trust for Smart Dust. ICNP 2004: 206-215 |
38 | EE | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. IEEE Symposium on Security and Privacy 2004: 130- |
37 | EE | Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla: SWATT: SoftWare-based ATTestation for Embedded Devices. IEEE Symposium on Security and Privacy 2004: 272- |
36 | EE | James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig: The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268 |
35 | EE | Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar: Distillation Codes and Applications to DoS Resistant Multicast Authentication. NDSS 2004 |
34 | EE | Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica: Brief announcement: towards a secure indirection infrastructure. PODC 2004: 383 |
33 | EE | Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu: SPV: secure path vector routing for securing BGP. SIGCOMM 2004: 179-192 |
32 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) |
31 | EE | Adrian Perrig, John A. Stankovic, David Wagner: Security in wireless sensor networks. Commun. ACM 47(6): 53-57 (2004) |
30 | EE | Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica: Taming IP packet flooding attacks. Computer Communication Review 34(1): 45-50 (2004) |
29 | EE | Yih-Chun Hu, Adrian Perrig: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 2(3): 28-39 (2004) |
28 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004) |
2003 | ||
27 | W. Douglas Maughan, Adrian Perrig: Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003 ACM 2003 | |
26 | EE | Haowen Chan, Adrian Perrig, Dawn Xiaodong Song: Random Key Predistribution Schemes for Sensor Networks. IEEE Symposium on Security and Privacy 2003: 197- |
25 | EE | Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song: Pi: A Path Identification Mechanism to Defend against DDoS Attack. IEEE Symposium on Security and Privacy 2003: 93- |
24 | EE | Yih-Chun Hu, Adrian Perrig, David B. Johnson: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. INFOCOM 2003 |
23 | EE | Yih-Chun Hu, Adrian Perrig, David B. Johnson: Efficient Security Mechanisms for Routing Protocolsa. NDSS 2003 |
22 | EE | Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perrig: SIA: secure information aggregation in sensor networks. SenSys 2003: 255-265 |
21 | EE | Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas C. Bressoud, Adrian Perrig: Opportunistic Use of Content Addressable Storage for Distributed File Systems. USENIX Annual Technical Conference, General Track 2003: 127-140 |
20 | EE | Yih-Chun Hu, Adrian Perrig, David B. Johnson: Rushing attacks and defense in wireless ad hoc network routing protocols. Workshop on Wireless Security 2003: 30-40 |
19 | EE | Yih-Chun Hu, David B. Johnson, Adrian Perrig: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1(1): 175-192 (2003) |
18 | EE | Haowen Chan, Adrian Perrig: Security and Privacy in Sensor Networks. IEEE Computer 36(10): 103-105 (2003) |
2002 | ||
17 | EE | Yih-Chun Hu, Adrian Perrig, David B. Johnson: Ariadne: a secure on-demand routing protocol for ad hoc networks. MOBICOM 2002: 12-23 |
16 | EE | Yih-Chun Hu, David B. Johnson, Adrian Perrig: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. WMCSA 2002: 3-13 |
15 | Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5): 521-534 (2002) | |
2001 | ||
14 | EE | Adrian Perrig: The BiBa one-time signature and broadcast authentication protocol. ACM Conference on Computer and Communications Security 2001: 28-37 |
13 | EE | Dawn Xiaodong Song, Adrian Perrig, Doantam Phan: AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. CAV 2001: 241-245 |
12 | EE | Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar: ELK, A New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privacy 2001: 247- |
11 | EE | Dawn Xiaodong Song, Adrian Perrig: Advanced and Authenticated Marking Schemes for IP Traceback. INFOCOM 2001: 878-886 |
10 | Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar: SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170 | |
9 | EE | Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar: SPINS: security protocols for sensor netowrks. MOBICOM 2001: 189-199 |
8 | EE | Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar: Efficient and Secure Source Authentication for Multicast. NDSS 2001 |
7 | Yongdae Kim, Adrian Perrig, Gene Tsudik: Communication-Efficient Group Key Agreement. SEC 2001: 229-244 | |
6 | Dawn Xiaodong Song, Sergey Berezin, Adrian Perrig: Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. Journal of Computer Security 9(1/2): 47-74 (2001) | |
2000 | ||
5 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Simple and fault-tolerant key agreement for dynamic collaborative groups. ACM Conference on Computer and Communications Security 2000: 235-244 |
4 | EE | Adrian Perrig, D. Song: Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. CSFW 2000: 64-76 |
3 | EE | Dawn Xiaodong Song, David Wagner, Adrian Perrig: Practical Techniques for Searches on Encrypted Data. IEEE Symposium on Security and Privacy 2000: 44-55 |
2 | EE | Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. IEEE Symposium on Security and Privacy 2000: 56-73 |
1 | EE | Adrian Perrig, Dawn Xiaodong Song: A First Step Towards the Automatic Generation of Security Protocols. NDSS 2000 |