Year |
Citation |
Score |
2019 |
Pappas C, Lee T, Reischuk RM, Szalachowski P, Perrig A. Network Transparency for Better Internet Security Ieee Acm Transactions On Networking. 27: 2028-2042. DOI: 10.1109/Tnet.2019.2937132 |
0.5 |
|
2018 |
Trammell B, Smith J, Perrig A. Adding Path Awareness to the Internet Architecture Ieee Internet Computing. 22: 96-102. DOI: 10.1109/Mic.2018.022021673 |
0.377 |
|
2017 |
Barrera D, Chuat L, Perrig A, Reischuk RM, Szalachowski P. The SCION internet architecture Communications of the Acm. 60: 56-65. DOI: 10.1145/3085591 |
0.305 |
|
2016 |
Ke YM, Chen CW, Hsiao HC, Perrig A, Sekar V. CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 699-710. DOI: 10.1145/2897845.2897866 |
0.331 |
|
2016 |
Basin DA, Cremers C, Kim TH, Perrig A, Sasse R, Szalachowski P. Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure Ieee Transactions On Dependable and Secure Computing. 15: 393-408. DOI: 10.1109/Tdsc.2016.2601610 |
0.673 |
|
2016 |
Sasaki T, Perrig A, Asoni DE. Control-plane isolation and recovery for a secure SDN architecture Ieee Netsoft 2016 - 2016 Ieee Netsoft Conference and Workshops: Software-Defined Infrastructure For Networks, Clouds, Iot and Services. 459-464. DOI: 10.1109/NETSOFT.2016.7502485 |
0.37 |
|
2016 |
An H, Lee H, Perrig A. Coordination of anti-spoofing mechanisms in partial deployments Journal of Communications and Networks. 18: 948-961. DOI: 10.1109/Jcn.2016.000129 |
0.467 |
|
2016 |
Pappas C, Reischuk RM, Perrig A. FAIR: Forwarding accountability for internet reputability Proceedings - International Conference On Network Protocols, Icnp. 2016: 189-200. DOI: 10.1109/ICNP.2015.22 |
0.318 |
|
2016 |
Szalachowski P, Chuat L, Perrig A. PKI safety net (PKISN): Addressing the too-big-to-be-revoked problem of the TLS ecosystem Proceedings - 2016 Ieee European Symposium On Security and Privacy, Euro S and P 2016. 407-422. DOI: 10.1109/EuroSP.2016.38 |
0.33 |
|
2016 |
Zhang Y, Wang X, Perrig A, Zheng Z. Tumbler: Adaptable link access in the bots-infested Internet Computer Networks. 105: 180-193. DOI: 10.1016/J.Comnet.2016.06.005 |
0.432 |
|
2016 |
Kwon J, Lee J, Lee H, Perrig A. PsyBoG: A scalable botnet detection method for large-scale DNS traffic Computer Networks. 97: 48-73. DOI: 10.1016/J.Comnet.2015.12.008 |
0.415 |
|
2016 |
Asoni DE, Chen C, Barrera D, Perrig A. On building onion routing into future internet architectures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9591: 71-81. DOI: 10.1007/978-3-319-39028-4_6 |
0.369 |
|
2015 |
Perrig A. Session details: Network architecture 1 Computer Communication Review. 44. DOI: 10.1145/3263790 |
0.37 |
|
2015 |
Lee T, Pappas C, Basescu C, Han J, Hoefler T, Perrig A. Source-based path selection: The data plane perspective Acm International Conference Proceeding Series. 8: 41-45. DOI: 10.1145/2775088.2775090 |
0.337 |
|
2015 |
Szalachowski P, Perrig A. Lightweight protection of group content distribution Iotpts 2015 - Proceedings of the 1st Acm Workshop On Iot Privacy, Trust, and Security, Part of Asiaccs 2015. 35-42. DOI: 10.1145/2732209.2732215 |
0.423 |
|
2015 |
Chen C, Matsumoto S, Perrig A. ECO-DNS: Expected Consistency Optimization for DNS Proceedings - International Conference On Distributed Computing Systems. 2015: 256-267. DOI: 10.1109/ICDCS.2015.34 |
0.306 |
|
2015 |
Chuat L, Szalachowski P, Perrig A, Laurie B, Messeri E. Efficient gossip protocols for verifying the consistency of Certificate logs 2015 Ieee Conference On Communications and Networksecurity, Cns 2015. 415-423. DOI: 10.1109/CNS.2015.7346853 |
0.368 |
|
2015 |
Kwon J, Seo D, Kwon M, Lee H, Perrig A, Kim H. An incrementally deployable anti-spoofing mechanism for software-defined networks Computer Communications. 64: 1-20. DOI: 10.1016/J.Comcom.2015.03.003 |
0.5 |
|
2015 |
Li Y, Cheng Y, Gligor V, Perrig A. Establishing software-only root of trust on embedded systems: Facts and fiction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9379: 50-68. DOI: 10.1007/978-3-319-26096-9_7 |
0.381 |
|
2014 |
Szalachowski P, Matsumoto S, Perrig A. PoliCert: Secure and flexible TLS certificate management Proceedings of the Acm Conference On Computer and Communications Security. 406-417. DOI: 10.1145/2660267.2660355 |
0.392 |
|
2014 |
Zhang F, Jia L, Basescu C, Kim THJ, Hu YC, Perrig A. Mechanized network origin and path authenticity proofs Proceedings of the Acm Conference On Computer and Communications Security. 346-357. DOI: 10.1145/2660267.2660349 |
0.455 |
|
2014 |
Basin D, Cremers C, Kim THJ, Perrig A, Sasse R, Szalachowski P. ARPKI: Attack resilient public-key infrastructure Proceedings of the Acm Conference On Computer and Communications Security. 382-393. DOI: 10.1145/2660267.2660298 |
0.404 |
|
2014 |
Bechtold S, Perrig A. Law and technology accountability in future internet architectures Communications of the Acm. 57: 21-23. DOI: 10.1145/2644146 |
0.304 |
|
2014 |
Han J, Lin YH, Perrig A, Bai F. Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles Wisec 2014 - Proceedings of the 7th Acm Conference On Security and Privacy in Wireless and Mobile Networks. 51-56. DOI: 10.1145/2627393.2627400 |
0.446 |
|
2014 |
Kim THJ, Basescu C, Jia L, Lee SB, Hu YC, Perrig A. Lightweight source authentication and path validation Sigcomm 2014 - Proceedings of the 2014 Acm Conference On Special Interest Group On Data Communication. 271-282. DOI: 10.1145/2619239.2626323 |
0.466 |
|
2014 |
Zhang X, Zhou F, Zhu X, Sun H, Perrig A, Vasilakos AV, Guan H. DFL: secure and practical fault localization for datacenter networks Ieee Acm Transactions On Networking. 22: 1218-1231. DOI: 10.1109/Tnet.2013.2274662 |
0.456 |
|
2014 |
Perrig A. Scion: Scalability, control, and isolation on next-generation networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8804. DOI: 10.1109/SP.2011.45 |
0.361 |
|
2014 |
Kwon J, Kim J, Lee J, Lee H, Perrig A. PsyBoG: Power spectral density analysis for detecting botnet groups Proceedings of the 9th Ieee International Conference On Malicious and Unwanted Software, Malcon 2014. 85-92. DOI: 10.1109/MALWARE.2014.6999414 |
0.302 |
|
2013 |
Farb M, Lin YH, Kim THJ, Mccune J, Perrig A. SafeSlinger: Easy-to-use and secure public-key exchange Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 417-428. DOI: 10.1145/2500423.2500428 |
0.468 |
|
2013 |
An H, Lee H, Perrig A. UAS: Universal anti-spoofing by incorporating existing mechanisms Proceedings - Conference On Local Computer Networks, Lcn. 316-319. DOI: 10.1109/LCN.2013.6761258 |
0.328 |
|
2013 |
Kim THJ, Gligor V, Perrig A. GeoPKI: Converting spatial trust into certificate trust Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7868: 128-144. DOI: 10.1007/978-3-642-40012-4_9 |
0.363 |
|
2013 |
Kim THJ, Yamada A, Gligor V, Hong J, Perrig A. RelationGram: Tie-strength visualization for user-controlled online identity authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7859: 69-77. DOI: 10.1007/978-3-642-39884-1_7 |
0.342 |
|
2013 |
Zhou Z, Han J, Lin YH, Perrig A, Gligor V. KISS: "Key It Simple and Secure" corporate key management Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7904: 1-18. DOI: 10.1007/978-3-642-38908-5_1 |
0.436 |
|
2013 |
Kim THJ, Huang LS, Perrig A, Jackson C, Gligor V. Accountable key infrastructure (AKI): A proposal for a public-key validation infrastructure Www 2013 - Proceedings of the 22nd International Conference On World Wide Web. 679-689. |
0.314 |
|
2012 |
Vasudevan A, McCune J, Newsome J, Perrig A, Van Doorn L. CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms Asiaccs 2012 - 7th Acm Symposium On Information, Computer and Communications Security. 48-49. DOI: 10.1145/2414456.2414484 |
0.306 |
|
2012 |
Parno B, Zhou Z, Perrig A. Using trustworthy host-based information in the network Proceedings of the Acm Conference On Computer and Communications Security. 33-44. DOI: 10.1145/2382536.2382544 |
0.462 |
|
2012 |
Kim THJ, Gupta P, Han J, Owusu E, Hong J, Perrig A, Gao D. OTO: Online trust oracle for user-centric trust establishment Proceedings of the Acm Conference On Computer and Communications Security. 391-403. DOI: 10.1145/2382196.2382239 |
0.345 |
|
2012 |
Mustafa H, Zhang X, Liu Z, Xu W, Perrig A. Jamming-resilient multipath routing Ieee Transactions On Dependable and Secure Computing. 9: 852-864. DOI: 10.1109/Tdsc.2012.69 |
0.37 |
|
2012 |
Hsiao HC, Kim THJ, Perrig A, Yamada A, Nelson SC, Gruteser M, Meng W. LAP: Lightweight anonymity and privacy Proceedings - Ieee Symposium On Security and Privacy. 506-520. DOI: 10.1109/SP.2012.37 |
0.39 |
|
2012 |
Zhang X, Lan C, Perrig A. Secure and scalable fault localization under dynamic traffic patterns Proceedings - Ieee Symposium On Security and Privacy. 317-331. DOI: 10.1109/SP.2012.27 |
0.37 |
|
2012 |
Han J, Owusu E, Nguyen LT, Perrig A, Zhang J. ACComplice: Location inference using accelerometers on smartphones 2012 4th International Conference On Communication Systems and Networks, Comsnets 2012. DOI: 10.1109/COMSNETS.2012.6151305 |
0.36 |
|
2012 |
Kao YW, Zhang X, Studer A, Perrig A. Mobile encryption for laptop data protection (MELP) Iet Information Security. 6: 291-298. DOI: 10.1049/Iet-Ifs.2011.0347 |
0.75 |
|
2012 |
Vasudevan A, Parno B, Qu N, Gligor VD, Perrig A. Lockdown: Towards a safe and practical architecture for security applications on commodity platforms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7344: 34-54. DOI: 10.1007/978-3-642-30921-2_3 |
0.364 |
|
2011 |
Li Y, McCune JM, Perrig A. VIPER: Verifying the integrity of peripherals' firmware Proceedings of the Acm Conference On Computer and Communications Security. 3-16. DOI: 10.1145/2046707.2046711 |
0.568 |
|
2011 |
Hsiao HC, Studer A, Chen C, Perrig A, Bai F, Bellur B, Iyer A. Flooding-resilient broadcast authentication for VANETs Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 193-204. DOI: 10.1145/2030613.2030635 |
0.47 |
|
2011 |
Hsiao HC, Studer A, Dubey R, Shi E, Perrig A. Efficient and secure threshold-based event validation for VANETs Wisec'11 - Proceedings of the 4th Acm Conference On Wireless Network Security. 163-174. DOI: 10.1145/1998412.1998440 |
0.382 |
|
2011 |
Kim THJ, Bauer L, Newsome J, Perrig A, Walker J. Access right assignment mechanisms for secure home networks Journal of Communications and Networks. 13: 175-186. DOI: 10.1109/Jcn.2011.6157417 |
0.492 |
|
2011 |
Song K, Seo D, Park H, Lee H, Perrig A. OMAP: One-way memory attestation protocol for smart meters Proceedings - 9th Ieee International Symposium On Parallel and Distributed Processing With Applications Workshops, Ispaw 2011 - Icase 2011, Sgh 2011, Gsdp 2011. 111-118. DOI: 10.1109/ISPAW.2011.37 |
0.322 |
|
2011 |
Zhang X, Zhou Z, Hasker G, Perrig A, Gligor V. Network fault localization with small TCB Proceedings - International Conference On Network Protocols, Icnp. 143-154. DOI: 10.1109/ICNP.2011.6089046 |
0.368 |
|
2011 |
Vasudevan A, Qu N, Perrig A. XTRec: Secure real-time execution trace recording on commodity platforms Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2011.500 |
0.362 |
|
2011 |
Seshadri A, Luk M, Perrig A. SAKE: Software attestation for key establishment in sensor networks Ad Hoc Networks. 9: 1059-1067. DOI: 10.1016/j.adhoc.2010.08.011 |
0.347 |
|
2010 |
Chan H, Hsiao HC, Perrig A, Song D. Secure distributed data aggregation Foundations and Trends in Databases. 3: 149-201. DOI: 10.1561/1900000025 |
0.337 |
|
2010 |
Kim D, Chiang JT, Hu YC, Perrig A, Kumar PR. CRAFT: A new secure congestion control architecture Proceedings of the Acm Conference On Computer and Communications Security. 705-707. DOI: 10.1145/1866307.1866404 |
0.31 |
|
2010 |
Studer A, Perrig A. Mobile User Location-specific Encryption (MULE): Using your office as your password Wisec'10 - Proceedings of the 3rd Acm Conference On Wireless Network Security. 151-162. DOI: 10.1145/1741866.1741892 |
0.371 |
|
2010 |
Lin YH, Studer A, Chen YH, Hsiao HC, Kuo LH, McCune JM, Wang KH, Krohn M, Perrig A, Yang BY, Sun HM, Lin PL, Lee J. SPATE: Small-group PKI-less authenticated trust establishment Ieee Transactions On Mobile Computing. 9: 1666-1681. DOI: 10.1109/Tmc.2010.150 |
0.739 |
|
2010 |
Parno B, McCune JM, Perrig A. Bootstrapping trust in commodity computers Proceedings - Ieee Symposium On Security and Privacy. 414-429. DOI: 10.1109/SP.2010.32 |
0.458 |
|
2010 |
Chan H, Perrig A. Round-efficient broadcast authentication protocols for fixed topology classes Proceedings - Ieee Symposium On Security and Privacy. 257-272. DOI: 10.1109/SP.2010.22 |
0.305 |
|
2010 |
McCune JM, Li Y, Qu N, Zhou Z, Datta A, Gligor V, Perrig A. Trust visor: Efficient TCB reduction and attestation Proceedings - Ieee Symposium On Security and Privacy. 143-158. DOI: 10.1109/SP.2010.17 |
0.58 |
|
2010 |
Takemori K, Perrig A, Qu N, Miyake Y. Remote attestation for HDD files using kernel protection mechanism Ieee International Conference On Communications. DOI: 10.1109/ICC.2010.5501979 |
0.391 |
|
2010 |
Lee SB, Gligor VD, Perrig A. Dependable connection setup for network capabilities Proceedings of the International Conference On Dependable Systems and Networks. 301-310. DOI: 10.1109/DSN.2010.5544303 |
0.385 |
|
2010 |
Isohara T, Takemori K, Miyake Y, Qu N, Perrig A. LSM-based secure system monitoring using kernel protection schemes Ares 2010 - 5th International Conference On Availability, Reliability, and Security. 591-596. DOI: 10.1109/ARES.2010.48 |
0.428 |
|
2010 |
Li Y, McCune JM, Perrig A. SBAP: Software-based attestation for peripherals Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 16-29. DOI: 10.1007/978-3-642-13869-0_2 |
0.582 |
|
2010 |
Vasudevan A, McCune JM, Qu N, Van Doorn L, Perrig A. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 141-165. DOI: 10.1007/978-3-642-13869-0_10 |
0.58 |
|
2010 |
Trappe W, Ning P, Perrig A. Security and Privacy for Sensor Networks Handbook On Array Processing and Sensor Networks. 855-887. DOI: 10.1002/9780470487068.ch28 |
0.359 |
|
2009 |
Kuo C, Perrig A, Walker J. Designing user studies for security applications: A case study with wireless network configuration International Journal of Security and Networks. 4: 101-109. DOI: 10.1504/Ijsn.2009.023429 |
0.536 |
|
2009 |
McCune JM, Perrig A, Reiter MK. Seeing-Is-Believing: Using camera phones for human-verifiable authentication International Journal of Security and Networks. 4: 43-56. DOI: 10.1504/IJSN.2009.023425 |
0.589 |
|
2009 |
Parno B, McCune JM, Wendlandt D, Andersen DG, Perrig A. CLAMP: Practical prevention of large-scale data leaks Proceedings - Ieee Symposium On Security and Privacy. 154-169. DOI: 10.1109/SP.2009.21 |
0.591 |
|
2009 |
Studer A, Shi E, Bai F, Perrig A. TACKing together efficient authentication, revocation, and privacy in VANETs 2009 6th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2009. DOI: 10.1109/SAHCN.2009.5168976 |
0.4 |
|
2009 |
Studer A, Bai F, Bellur B, Perrig A. Flexible, extensible, and efficient VANET authentication Journal of Communications and Networks. 11: 574-588. DOI: 10.1109/Jcn.2009.6388411 |
0.749 |
|
2009 |
Perrig A, Trappe W, Gligor V, Poovendran R, Lee H. Secure wireless networking Journal of Communications and Networks. 11: 533-537. DOI: 10.1109/Jcn.2009.6388406 |
0.502 |
|
2009 |
Panayappan R, Palarz T, Bauer L, Perrig A. Usable key agreement in home networks 1st International Conference On Communication Systems and Networks and Workshops, Comsnets 2009. DOI: 10.1109/COMSNETS.2009.4808898 |
0.461 |
|
2009 |
Hsiao HC, Lin YH, Studer A, Studer C, Wang KH, Kikuchi H, Perrig A, Sun HM, Yang BY. A study of user-friendly hash comparison schemes Proceedings - Annual Computer Security Applications Conference, Acsac. 105-114. DOI: 10.1109/ACSAC.2009.20 |
0.329 |
|
2009 |
Perrig A. Building secure networked systems with code attestation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5888: 278. DOI: 10.1007/978-3-642-10433-6_18 |
0.398 |
|
2009 |
Studer A, Perrig A. The coremelt attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 37-52. DOI: 10.1007/978-3-642-04444-1_3 |
0.36 |
|
2009 |
Li Q, Zhao M, Walker J, Hu YC, Perrig A, Trappe W. SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks Security and Communication Networks. 2: 325-340. DOI: 10.1002/Sec.60 |
0.504 |
|
2009 |
Studer A, Bai F, Bellur B, Perrig A. Flexible, extensible, and efficient VANET authentication Journal of Communications and Networks. 11: 574-588. |
0.49 |
|
2008 |
Kuo C, Perrig A, Walker J. Security configuration for non-experts: A case study in wireless network configuration Social and Human Elements of Information Security: Emerging Trends and Countermeasures. 179-195. DOI: 10.4018/978-1-60566-036-3.ch011 |
0.456 |
|
2008 |
Zhang X, Jain A, Perrig A. Packet-dropping adversary identification for data plane security Proceedings of 2008 Acm Conext Conference - 4th International Conference On Emerging Networking Experiments and Technologies, Conext '08. DOI: 10.1145/1544012.1544036 |
0.374 |
|
2008 |
Chan H, Perrig A. Efficient security primitives derived from a secure aggregation algorithm Proceedings of the Acm Conference On Computer and Communications Security. 521-533. DOI: 10.1145/1455770.1455836 |
0.38 |
|
2008 |
Hayashi E, Dhamija R, Christin N, Perrig A. Use Your Illusion: Secure authentication usable anywhere Soups 2008 - Proceedings of the 4th Symposium On Usable Privacy and Security. 35-43. DOI: 10.1145/1408664.1408670 |
0.406 |
|
2008 |
Franklin J, Luk M, McCune JM, Seshadri A, Perrig A, Van Doorn L. Remote detection of virtual machine monitors with fuzzy benchmarking Operating Systems Review (Acm). 42: 83-92. DOI: 10.1145/1368506.1368518 |
0.51 |
|
2008 |
Parno B, Perrig A, Andersen D. SNAPP: Stateless network-authenticated path pinning Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 168-178. DOI: 10.1145/1368310.1368336 |
0.378 |
|
2008 |
McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for tcb minimization Eurosys'08 - Proceedings of the Eurosys 2008 Conference. 315-328. DOI: 10.1145/1352592.1352625 |
0.529 |
|
2008 |
McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. How low can you go?: Recommendations for hardware-supported minimal TCB code execution Operating Systems Review (Acm). 42: 14-25. DOI: 10.1145/1346281.1346285 |
0.6 |
|
2008 |
Lakshminarayanan K, Adkins D, Perrig A, Stoica I. Securing user-controlled routing infrastructures Ieee/Acm Transactions On Networking. 16: 549-561. DOI: 10.1109/Tnet.2007.903980 |
0.569 |
|
2008 |
Sayeed A, Perrig A. Secure wireless communications: Secret keys through multipath Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 3013-3016. DOI: 10.1109/ICASSP.2008.4518284 |
0.385 |
|
2008 |
Teng PY, Huang SI, Perrig A. Multi-layer encryption for multi-level access control in wireless sensor networks Ifip International Federation For Information Processing. 278: 705-709. DOI: 10.1007/978-0-387-09699-5_49 |
0.398 |
|
2008 |
Chen YT, Studer A, Perrig A. Combining TLS and TPMs to achieve device and user authentication for Wi-Fi and WiMAX citywide networks Ieee Wireless Communications and Networking Conference, Wcnc. 2804-2809. |
0.504 |
|
2008 |
Franklin J, Luk M, McCune JM, Seshadri A, Perrig A, Doorn Lv. Towards sound detection of virtual machines Advances in Information Security. 36: 89-116. |
0.473 |
|
2007 |
Kuo C, Luk M, Negi R, Perrig A. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes Sensys'07 - Proceedings of the 5th Acm Conference On Embedded Networked Sensor Systems. 233-246. DOI: 10.1145/1322263.1322286 |
0.5 |
|
2007 |
Panayappan R, Trivedi JM, Studer A, Perrig A. VANET-based approach for parking space availability Vanet'07: Proceedings of the Fourth Acm International Workshop On Vehicular Ad Hoc Networks. 75-76. DOI: 10.1145/1287748.1287763 |
0.451 |
|
2007 |
Parno B, Wendlandt D, Shi E, Perrig A, Maggs B, Hu YC. Portcullis: Protecting connection setup from denial-of-capability attacks Acm Sigcomm 2007: Conference On Computer Communications. 289-300. DOI: 10.1145/1282380.1282413 |
0.346 |
|
2007 |
Luk M, Mezzour G, Perrig A, Gligor V. MiniSec: A secure sensor network communication architecture Ipsn 2007: Proceedings of the Sixth International Symposium On Information Processing in Sensor Networks. 479-488. DOI: 10.1145/1236360.1236421 |
0.398 |
|
2007 |
Shi E, Bethencourt J, Chan THH, Song D, Perrig A. Multi-Dimensional Range Query over Encrypted Data Proceedings - Ieee Symposium On Security and Privacy. 350-364. DOI: 10.1109/SP.2007.29 |
0.413 |
|
2007 |
McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution Proceedings - Ieee Symposium On Security and Privacy. 267-272. DOI: 10.1109/SP.2007.27 |
0.578 |
|
2007 |
Studer A, Luk M, Perrig A. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 422-431. DOI: 10.1109/SECCOM.2007.4550363 |
0.432 |
|
2007 |
Surie A, Perrig A, Satyanarayanan M, Farber DJ. Rapid trust establishment for pervasive personal computing Ieee Pervasive Computing. 6: 24-30. DOI: 10.1109/Mprv.2007.84 |
0.49 |
|
2007 |
Satyanarayanan M, Gilbert B, Toups M, Tolia N, Surie A, O'Hallaron DR, Wolbach A, Harkes J, Perrig A, Farber DJ, Kozuch MA, Helfrich CJ, Nath P, Lagar-Cavilla HA. Pervasive personal computing in an Internet Suspend/Resume system Ieee Internet Computing. 11: 16-25. DOI: 10.1109/Mic.2007.46 |
0.394 |
|
2007 |
Yamada A, Miyake Y, Takemori K, Studer A, Perrig A. Intrusion detection for encrypted web accesses Proceedings - 21st International Conference On Advanced Information Networking and Applications Workshops/Symposia, Ainaw'07. 2: 569-576. DOI: 10.1109/AINAW.2007.212 |
0.377 |
|
2007 |
Chan H, Perrig A, Przydatek B, Song D. SIA: Secure information aggregation in sensor networks Journal of Computer Security. 15: 69-102. |
0.335 |
|
2007 |
Kuo C, Walker J, Perrig A. Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and Wi-Fi protected setup Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4886: 325-340. |
0.458 |
|
2006 |
Parno B, Luk M, Gaustad E, Perrig A. Secure sensor network routing: A cleanslate approach Proceedings of Conext'06 - 2nd Conference On Future Networking Technologies. DOI: 10.1145/1368436.1368452 |
0.421 |
|
2006 |
Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks Proceedings of the Acm Conference On Computer and Communications Security. 278-287. DOI: 10.1145/1180405.1180440 |
0.31 |
|
2006 |
Luk M, Perrig A, Whillock B. Seven cardinal properties of sensor network broadcast authentication Proceedings of the Fourth Acm Workshop On Security of Ad Hoc and Sensor Networks, Sasn 2006. a Workshop Held in Conjuction With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 147-156. DOI: 10.1145/1180345.1180364 |
0.348 |
|
2006 |
Seshadri A, Luk M, Perrig A, Van Doorn L, Khosla P. SCUBA: Secure Code Update by Attestation in sensor networks Wise 2006 - Proceedings of the 5th Acm Workshop On Wireless Security. 2006: 85-94. DOI: 10.1145/1161289.1161306 |
0.331 |
|
2006 |
Perrig A. Security in sensor networks: Industry trends, present and future research directions Wise 2006 - Proceedings of the 5th Acm Workshop On Wireless Security. 2006: 53. DOI: 10.1145/1161289.1161300 |
0.406 |
|
2006 |
Chan H, Dash D, Perrig A, Zhang H. Modeling adoptability of secure BGP protocols Performance Evaluation Review. 34: 389-390. DOI: 10.1145/1140103.1140334 |
0.376 |
|
2006 |
Kuo C, Perrig A, Walker J. Designing on evaluation method for security user interfaces: Lessons rom studying secure wireless network configuration Interactions. 13: 28-31. DOI: 10.1145/1125864.1125886 |
0.712 |
|
2006 |
Yaar A, Perrig A, Song D. StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense Ieee Journal On Selected Areas in Communications. 24: 1853-1863. DOI: 10.1109/Jsac.2006.877138 |
0.392 |
|
2006 |
Hu YC, Perrig A. Wormhole attacks in wireless networks Ieee Journal On Selected Areas in Communications. 24: 370-379. DOI: 10.1109/Jsac.2005.861394 |
0.509 |
|
2006 |
Parno B, Kuo C, Perrig A. Phoolproof phishing prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 1-19. |
0.438 |
|
2005 |
McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication Proceedings - Ieee Symposium On Security and Privacy. 110-124. DOI: 10.1504/Ijsn.2009.023425 |
0.634 |
|
2005 |
Chan H, Gligor VD, Perrig A, Muralidharan G. On the distribution and revocation of cryptographic keys in sensor networks Ieee Transactions On Dependable and Secure Computing. 2: 233-247. DOI: 10.1109/Tdsc.2005.37 |
0.666 |
|
2005 |
Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks Proceedings - Ieee Symposium On Security and Privacy. 49-63. DOI: 10.1109/SP.2005.8 |
0.304 |
|
2005 |
McCune JM, Shi E, Perrig A, Reiter MK. Detection of denial-of-message attacks on sensor network broadcasts Proceedings - Ieee Symposium On Security and Privacy. 64-78. DOI: 10.1109/SP.2005.7 |
0.571 |
|
2005 |
Chan H, Perrig A. PIKE: Peer intermediaries for key establishment in sensor networks Proceedings - Ieee Infocom. 1: 524-535. |
0.364 |
|
2005 |
Yaar A, Perrig A, Song D. FIT: Fast Internet traceback Proceedings - Ieee Infocom. 2: 1395-1406. |
0.349 |
|
2004 |
Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks Communications of the Acm. 47: 53-57. DOI: 10.1145/990680.990707 |
0.504 |
|
2004 |
Kim Y, Perrig A, Tsudik G. Tree-based group key agreement Acm Transactions On Information and System Security. 7: 60-96. DOI: 10.1145/984334.984337 |
0.423 |
|
2004 |
Lakshminarayanan K, Adkins D, Perrig A, Stoica I. Taming IP packet flooding attacks Computer Communication Review. 34: 45-50. DOI: 10.1145/972374.972383 |
0.3 |
|
2004 |
Hu YC, Perrig A, Sirbu M. SPV: Secure path vector routing for securing BGP Computer Communication Review. 34: 179-192. DOI: 10.1145/1030194.1015488 |
0.452 |
|
2004 |
Kim Y, Perrig A, Tsudik G. Group key agreement efficient in communication Ieee Transactions On Computers. 53: 905-921. DOI: 10.1109/Tc.2004.31 |
0.45 |
|
2004 |
Shi E, Perrig A. Designing secure sensor networks Ieee Wireless Communications. 11: 38-43. DOI: 10.1109/Mwc.2004.1368895 |
0.486 |
|
2004 |
Hu YC, Perrig A. A survey of secure wireless ad hoc routing Ieee Security and Privacy. 2: 28-39. DOI: 10.1109/MSP.2004.1 |
0.422 |
|
2004 |
Chan H, Perrig A, Song D. Key distribution techniques for sensor networks Wireless Sensor Network. 277-303. DOI: 10.1007/978-1-4020-7884-2_13 |
0.651 |
|
2004 |
Anderson R, Chan H, Perrig A. Key infection: Smart trust for smart dust Proceedings - International Conference On Network Protocols, Icnp. 206-215. |
0.368 |
|
2004 |
Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: Analysis & defenses Third International Symposium On Information Processing in Sensor Networks, Ipsn 2004. 259-268. |
0.352 |
|
2003 |
Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks Proceedings - Ieee Symposium On Security and Privacy. 2003: 197-213. DOI: 10.1109/SECPRI.2003.1199337 |
0.341 |
|
2003 |
Yaar A, Perrig A, Song D. Pi: A path identification mechanism to defend against DDoS attacks Proceedings - Ieee Symposium On Security and Privacy. 2003: 93-107. DOI: 10.1109/SECPRI.2003.1199330 |
0.351 |
|
2003 |
Chan H, Perrig A. Security and privacy in sensor networks Computer. 36: 103-105. DOI: 10.1109/Mc.2003.1236475 |
0.695 |
|
2003 |
Hu YC, Perrig A, Johnson DB. Packet leashes: A defense against wormhole attacks in wireless networks Proceedings - Ieee Infocom. 3: 1976-1986. |
0.417 |
|
2003 |
Hu YC, Perrig A, Johnson DB. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Proceedings of the Workshop On Wireless Security. 30-40. |
0.433 |
|
2002 |
Hu YC, Johnson DB, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks Proceedings - 4th Ieee Workshop On Mobile Computing Systems and Applications, Wmcsa 2002. 3-13. DOI: 10.1109/MCSA.2002.1017480 |
0.397 |
|
2002 |
Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. SPINS: Security protocols for sensor networks Wireless Networks. 8: 521-534. DOI: 10.1023/A:1016598314198 |
0.731 |
|
2002 |
Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for ad hoc networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 12-23. DOI: 10.1007/S11276-004-4744-Y |
0.457 |
|
2002 |
Kim Y, Perrig A, Tsudik G. Communication-efficient group key agreement Ifip Advances in Information and Communication Technology. 65: 229-244. |
0.419 |
|
2001 |
Song DX, Berezin S, Perrig A. Athena: A novel approach to efficient automatic security protocol analysis Journal of Computer Security. 9: 47-74. DOI: 10.3233/Jcs-2001-91-203 |
0.469 |
|
2001 |
Song D, Perrig A, Phan D. AGVI — automatic generation, verification, and implementation of security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2102: 241-245. DOI: 10.1007/3-540-44585-4_21 |
0.41 |
|
2001 |
Perrig A. The BiBa one-time signature and broadcast authentication protocol Proceedings of the Acm Conference On Computer and Communications Security. 28-37. |
0.418 |
|
2001 |
Song DX, Perrig A. Advanced and authenticated marking schemes for IP traceback Proceedings - Ieee Infocom. 2: 878-886. |
0.408 |
|
2001 |
Perrig A, Song D, Tygar JD. ELK, a new protocol for efficient large-group key distribution Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 247-262. |
0.715 |
|
2001 |
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security protocols for sensor networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 189-199. |
0.735 |
|
2000 |
Kim Y, Perrig A, Tsudik G. Simple and fault-tolerant key agreement for dynamic collaborative groups Proceedings of the Acm Conference On Computer and Communications Security. 235-244. |
0.312 |
|
Show low-probability matches. |