Adrian Perrig, Ph.D. - Publications

Affiliations: 
2001 Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science

143 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Pappas C, Lee T, Reischuk RM, Szalachowski P, Perrig A. Network Transparency for Better Internet Security Ieee Acm Transactions On Networking. 27: 2028-2042. DOI: 10.1109/Tnet.2019.2937132  0.5
2018 Trammell B, Smith J, Perrig A. Adding Path Awareness to the Internet Architecture Ieee Internet Computing. 22: 96-102. DOI: 10.1109/Mic.2018.022021673  0.377
2017 Barrera D, Chuat L, Perrig A, Reischuk RM, Szalachowski P. The SCION internet architecture Communications of the Acm. 60: 56-65. DOI: 10.1145/3085591  0.305
2016 Ke YM, Chen CW, Hsiao HC, Perrig A, Sekar V. CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 699-710. DOI: 10.1145/2897845.2897866  0.331
2016 Basin DA, Cremers C, Kim TH, Perrig A, Sasse R, Szalachowski P. Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure Ieee Transactions On Dependable and Secure Computing. 15: 393-408. DOI: 10.1109/Tdsc.2016.2601610  0.673
2016 Sasaki T, Perrig A, Asoni DE. Control-plane isolation and recovery for a secure SDN architecture Ieee Netsoft 2016 - 2016 Ieee Netsoft Conference and Workshops: Software-Defined Infrastructure For Networks, Clouds, Iot and Services. 459-464. DOI: 10.1109/NETSOFT.2016.7502485  0.37
2016 An H, Lee H, Perrig A. Coordination of anti-spoofing mechanisms in partial deployments Journal of Communications and Networks. 18: 948-961. DOI: 10.1109/Jcn.2016.000129  0.467
2016 Pappas C, Reischuk RM, Perrig A. FAIR: Forwarding accountability for internet reputability Proceedings - International Conference On Network Protocols, Icnp. 2016: 189-200. DOI: 10.1109/ICNP.2015.22  0.318
2016 Szalachowski P, Chuat L, Perrig A. PKI safety net (PKISN): Addressing the too-big-to-be-revoked problem of the TLS ecosystem Proceedings - 2016 Ieee European Symposium On Security and Privacy, Euro S and P 2016. 407-422. DOI: 10.1109/EuroSP.2016.38  0.33
2016 Zhang Y, Wang X, Perrig A, Zheng Z. Tumbler: Adaptable link access in the bots-infested Internet Computer Networks. 105: 180-193. DOI: 10.1016/J.Comnet.2016.06.005  0.432
2016 Kwon J, Lee J, Lee H, Perrig A. PsyBoG: A scalable botnet detection method for large-scale DNS traffic Computer Networks. 97: 48-73. DOI: 10.1016/J.Comnet.2015.12.008  0.415
2016 Asoni DE, Chen C, Barrera D, Perrig A. On building onion routing into future internet architectures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9591: 71-81. DOI: 10.1007/978-3-319-39028-4_6  0.369
2015 Perrig A. Session details: Network architecture 1 Computer Communication Review. 44. DOI: 10.1145/3263790  0.37
2015 Lee T, Pappas C, Basescu C, Han J, Hoefler T, Perrig A. Source-based path selection: The data plane perspective Acm International Conference Proceeding Series. 8: 41-45. DOI: 10.1145/2775088.2775090  0.337
2015 Szalachowski P, Perrig A. Lightweight protection of group content distribution Iotpts 2015 - Proceedings of the 1st Acm Workshop On Iot Privacy, Trust, and Security, Part of Asiaccs 2015. 35-42. DOI: 10.1145/2732209.2732215  0.423
2015 Chen C, Matsumoto S, Perrig A. ECO-DNS: Expected Consistency Optimization for DNS Proceedings - International Conference On Distributed Computing Systems. 2015: 256-267. DOI: 10.1109/ICDCS.2015.34  0.306
2015 Chuat L, Szalachowski P, Perrig A, Laurie B, Messeri E. Efficient gossip protocols for verifying the consistency of Certificate logs 2015 Ieee Conference On Communications and Networksecurity, Cns 2015. 415-423. DOI: 10.1109/CNS.2015.7346853  0.368
2015 Kwon J, Seo D, Kwon M, Lee H, Perrig A, Kim H. An incrementally deployable anti-spoofing mechanism for software-defined networks Computer Communications. 64: 1-20. DOI: 10.1016/J.Comcom.2015.03.003  0.5
2015 Li Y, Cheng Y, Gligor V, Perrig A. Establishing software-only root of trust on embedded systems: Facts and fiction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9379: 50-68. DOI: 10.1007/978-3-319-26096-9_7  0.381
2014 Szalachowski P, Matsumoto S, Perrig A. PoliCert: Secure and flexible TLS certificate management Proceedings of the Acm Conference On Computer and Communications Security. 406-417. DOI: 10.1145/2660267.2660355  0.392
2014 Zhang F, Jia L, Basescu C, Kim THJ, Hu YC, Perrig A. Mechanized network origin and path authenticity proofs Proceedings of the Acm Conference On Computer and Communications Security. 346-357. DOI: 10.1145/2660267.2660349  0.455
2014 Basin D, Cremers C, Kim THJ, Perrig A, Sasse R, Szalachowski P. ARPKI: Attack resilient public-key infrastructure Proceedings of the Acm Conference On Computer and Communications Security. 382-393. DOI: 10.1145/2660267.2660298  0.404
2014 Bechtold S, Perrig A. Law and technology accountability in future internet architectures Communications of the Acm. 57: 21-23. DOI: 10.1145/2644146  0.304
2014 Han J, Lin YH, Perrig A, Bai F. Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles Wisec 2014 - Proceedings of the 7th Acm Conference On Security and Privacy in Wireless and Mobile Networks. 51-56. DOI: 10.1145/2627393.2627400  0.446
2014 Kim THJ, Basescu C, Jia L, Lee SB, Hu YC, Perrig A. Lightweight source authentication and path validation Sigcomm 2014 - Proceedings of the 2014 Acm Conference On Special Interest Group On Data Communication. 271-282. DOI: 10.1145/2619239.2626323  0.466
2014 Zhang X, Zhou F, Zhu X, Sun H, Perrig A, Vasilakos AV, Guan H. DFL: secure and practical fault localization for datacenter networks Ieee Acm Transactions On Networking. 22: 1218-1231. DOI: 10.1109/Tnet.2013.2274662  0.456
2014 Perrig A. Scion: Scalability, control, and isolation on next-generation networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8804. DOI: 10.1109/SP.2011.45  0.361
2014 Kwon J, Kim J, Lee J, Lee H, Perrig A. PsyBoG: Power spectral density analysis for detecting botnet groups Proceedings of the 9th Ieee International Conference On Malicious and Unwanted Software, Malcon 2014. 85-92. DOI: 10.1109/MALWARE.2014.6999414  0.302
2013 Farb M, Lin YH, Kim THJ, Mccune J, Perrig A. SafeSlinger: Easy-to-use and secure public-key exchange Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 417-428. DOI: 10.1145/2500423.2500428  0.468
2013 An H, Lee H, Perrig A. UAS: Universal anti-spoofing by incorporating existing mechanisms Proceedings - Conference On Local Computer Networks, Lcn. 316-319. DOI: 10.1109/LCN.2013.6761258  0.328
2013 Kim THJ, Gligor V, Perrig A. GeoPKI: Converting spatial trust into certificate trust Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7868: 128-144. DOI: 10.1007/978-3-642-40012-4_9  0.363
2013 Kim THJ, Yamada A, Gligor V, Hong J, Perrig A. RelationGram: Tie-strength visualization for user-controlled online identity authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7859: 69-77. DOI: 10.1007/978-3-642-39884-1_7  0.342
2013 Zhou Z, Han J, Lin YH, Perrig A, Gligor V. KISS: "Key It Simple and Secure" corporate key management Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7904: 1-18. DOI: 10.1007/978-3-642-38908-5_1  0.436
2013 Kim THJ, Huang LS, Perrig A, Jackson C, Gligor V. Accountable key infrastructure (AKI): A proposal for a public-key validation infrastructure Www 2013 - Proceedings of the 22nd International Conference On World Wide Web. 679-689.  0.314
2012 Vasudevan A, McCune J, Newsome J, Perrig A, Van Doorn L. CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms Asiaccs 2012 - 7th Acm Symposium On Information, Computer and Communications Security. 48-49. DOI: 10.1145/2414456.2414484  0.306
2012 Parno B, Zhou Z, Perrig A. Using trustworthy host-based information in the network Proceedings of the Acm Conference On Computer and Communications Security. 33-44. DOI: 10.1145/2382536.2382544  0.462
2012 Kim THJ, Gupta P, Han J, Owusu E, Hong J, Perrig A, Gao D. OTO: Online trust oracle for user-centric trust establishment Proceedings of the Acm Conference On Computer and Communications Security. 391-403. DOI: 10.1145/2382196.2382239  0.345
2012 Mustafa H, Zhang X, Liu Z, Xu W, Perrig A. Jamming-resilient multipath routing Ieee Transactions On Dependable and Secure Computing. 9: 852-864. DOI: 10.1109/Tdsc.2012.69  0.37
2012 Hsiao HC, Kim THJ, Perrig A, Yamada A, Nelson SC, Gruteser M, Meng W. LAP: Lightweight anonymity and privacy Proceedings - Ieee Symposium On Security and Privacy. 506-520. DOI: 10.1109/SP.2012.37  0.39
2012 Zhang X, Lan C, Perrig A. Secure and scalable fault localization under dynamic traffic patterns Proceedings - Ieee Symposium On Security and Privacy. 317-331. DOI: 10.1109/SP.2012.27  0.37
2012 Han J, Owusu E, Nguyen LT, Perrig A, Zhang J. ACComplice: Location inference using accelerometers on smartphones 2012 4th International Conference On Communication Systems and Networks, Comsnets 2012. DOI: 10.1109/COMSNETS.2012.6151305  0.36
2012 Kao YW, Zhang X, Studer A, Perrig A. Mobile encryption for laptop data protection (MELP) Iet Information Security. 6: 291-298. DOI: 10.1049/Iet-Ifs.2011.0347  0.75
2012 Vasudevan A, Parno B, Qu N, Gligor VD, Perrig A. Lockdown: Towards a safe and practical architecture for security applications on commodity platforms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7344: 34-54. DOI: 10.1007/978-3-642-30921-2_3  0.364
2011 Li Y, McCune JM, Perrig A. VIPER: Verifying the integrity of peripherals' firmware Proceedings of the Acm Conference On Computer and Communications Security. 3-16. DOI: 10.1145/2046707.2046711  0.568
2011 Hsiao HC, Studer A, Chen C, Perrig A, Bai F, Bellur B, Iyer A. Flooding-resilient broadcast authentication for VANETs Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 193-204. DOI: 10.1145/2030613.2030635  0.47
2011 Hsiao HC, Studer A, Dubey R, Shi E, Perrig A. Efficient and secure threshold-based event validation for VANETs Wisec'11 - Proceedings of the 4th Acm Conference On Wireless Network Security. 163-174. DOI: 10.1145/1998412.1998440  0.382
2011 Kim THJ, Bauer L, Newsome J, Perrig A, Walker J. Access right assignment mechanisms for secure home networks Journal of Communications and Networks. 13: 175-186. DOI: 10.1109/Jcn.2011.6157417  0.492
2011 Song K, Seo D, Park H, Lee H, Perrig A. OMAP: One-way memory attestation protocol for smart meters Proceedings - 9th Ieee International Symposium On Parallel and Distributed Processing With Applications Workshops, Ispaw 2011 - Icase 2011, Sgh 2011, Gsdp 2011. 111-118. DOI: 10.1109/ISPAW.2011.37  0.322
2011 Zhang X, Zhou Z, Hasker G, Perrig A, Gligor V. Network fault localization with small TCB Proceedings - International Conference On Network Protocols, Icnp. 143-154. DOI: 10.1109/ICNP.2011.6089046  0.368
2011 Vasudevan A, Qu N, Perrig A. XTRec: Secure real-time execution trace recording on commodity platforms Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2011.500  0.362
2011 Seshadri A, Luk M, Perrig A. SAKE: Software attestation for key establishment in sensor networks Ad Hoc Networks. 9: 1059-1067. DOI: 10.1016/j.adhoc.2010.08.011  0.347
2010 Chan H, Hsiao HC, Perrig A, Song D. Secure distributed data aggregation Foundations and Trends in Databases. 3: 149-201. DOI: 10.1561/1900000025  0.337
2010 Kim D, Chiang JT, Hu YC, Perrig A, Kumar PR. CRAFT: A new secure congestion control architecture Proceedings of the Acm Conference On Computer and Communications Security. 705-707. DOI: 10.1145/1866307.1866404  0.31
2010 Studer A, Perrig A. Mobile User Location-specific Encryption (MULE): Using your office as your password Wisec'10 - Proceedings of the 3rd Acm Conference On Wireless Network Security. 151-162. DOI: 10.1145/1741866.1741892  0.371
2010 Lin YH, Studer A, Chen YH, Hsiao HC, Kuo LH, McCune JM, Wang KH, Krohn M, Perrig A, Yang BY, Sun HM, Lin PL, Lee J. SPATE: Small-group PKI-less authenticated trust establishment Ieee Transactions On Mobile Computing. 9: 1666-1681. DOI: 10.1109/Tmc.2010.150  0.739
2010 Parno B, McCune JM, Perrig A. Bootstrapping trust in commodity computers Proceedings - Ieee Symposium On Security and Privacy. 414-429. DOI: 10.1109/SP.2010.32  0.458
2010 Chan H, Perrig A. Round-efficient broadcast authentication protocols for fixed topology classes Proceedings - Ieee Symposium On Security and Privacy. 257-272. DOI: 10.1109/SP.2010.22  0.305
2010 McCune JM, Li Y, Qu N, Zhou Z, Datta A, Gligor V, Perrig A. Trust visor: Efficient TCB reduction and attestation Proceedings - Ieee Symposium On Security and Privacy. 143-158. DOI: 10.1109/SP.2010.17  0.58
2010 Takemori K, Perrig A, Qu N, Miyake Y. Remote attestation for HDD files using kernel protection mechanism Ieee International Conference On Communications. DOI: 10.1109/ICC.2010.5501979  0.391
2010 Lee SB, Gligor VD, Perrig A. Dependable connection setup for network capabilities Proceedings of the International Conference On Dependable Systems and Networks. 301-310. DOI: 10.1109/DSN.2010.5544303  0.385
2010 Isohara T, Takemori K, Miyake Y, Qu N, Perrig A. LSM-based secure system monitoring using kernel protection schemes Ares 2010 - 5th International Conference On Availability, Reliability, and Security. 591-596. DOI: 10.1109/ARES.2010.48  0.428
2010 Li Y, McCune JM, Perrig A. SBAP: Software-based attestation for peripherals Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 16-29. DOI: 10.1007/978-3-642-13869-0_2  0.582
2010 Vasudevan A, McCune JM, Qu N, Van Doorn L, Perrig A. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 141-165. DOI: 10.1007/978-3-642-13869-0_10  0.58
2010 Trappe W, Ning P, Perrig A. Security and Privacy for Sensor Networks Handbook On Array Processing and Sensor Networks. 855-887. DOI: 10.1002/9780470487068.ch28  0.359
2009 Kuo C, Perrig A, Walker J. Designing user studies for security applications: A case study with wireless network configuration International Journal of Security and Networks. 4: 101-109. DOI: 10.1504/Ijsn.2009.023429  0.536
2009 McCune JM, Perrig A, Reiter MK. Seeing-Is-Believing: Using camera phones for human-verifiable authentication International Journal of Security and Networks. 4: 43-56. DOI: 10.1504/IJSN.2009.023425  0.589
2009 Parno B, McCune JM, Wendlandt D, Andersen DG, Perrig A. CLAMP: Practical prevention of large-scale data leaks Proceedings - Ieee Symposium On Security and Privacy. 154-169. DOI: 10.1109/SP.2009.21  0.591
2009 Studer A, Shi E, Bai F, Perrig A. TACKing together efficient authentication, revocation, and privacy in VANETs 2009 6th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2009. DOI: 10.1109/SAHCN.2009.5168976  0.4
2009 Studer A, Bai F, Bellur B, Perrig A. Flexible, extensible, and efficient VANET authentication Journal of Communications and Networks. 11: 574-588. DOI: 10.1109/Jcn.2009.6388411  0.749
2009 Perrig A, Trappe W, Gligor V, Poovendran R, Lee H. Secure wireless networking Journal of Communications and Networks. 11: 533-537. DOI: 10.1109/Jcn.2009.6388406  0.502
2009 Panayappan R, Palarz T, Bauer L, Perrig A. Usable key agreement in home networks 1st International Conference On Communication Systems and Networks and Workshops, Comsnets 2009. DOI: 10.1109/COMSNETS.2009.4808898  0.461
2009 Hsiao HC, Lin YH, Studer A, Studer C, Wang KH, Kikuchi H, Perrig A, Sun HM, Yang BY. A study of user-friendly hash comparison schemes Proceedings - Annual Computer Security Applications Conference, Acsac. 105-114. DOI: 10.1109/ACSAC.2009.20  0.329
2009 Perrig A. Building secure networked systems with code attestation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5888: 278. DOI: 10.1007/978-3-642-10433-6_18  0.398
2009 Studer A, Perrig A. The coremelt attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 37-52. DOI: 10.1007/978-3-642-04444-1_3  0.36
2009 Li Q, Zhao M, Walker J, Hu YC, Perrig A, Trappe W. SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks Security and Communication Networks. 2: 325-340. DOI: 10.1002/Sec.60  0.504
2009 Studer A, Bai F, Bellur B, Perrig A. Flexible, extensible, and efficient VANET authentication Journal of Communications and Networks. 11: 574-588.  0.49
2008 Kuo C, Perrig A, Walker J. Security configuration for non-experts: A case study in wireless network configuration Social and Human Elements of Information Security: Emerging Trends and Countermeasures. 179-195. DOI: 10.4018/978-1-60566-036-3.ch011  0.456
2008 Zhang X, Jain A, Perrig A. Packet-dropping adversary identification for data plane security Proceedings of 2008 Acm Conext Conference - 4th International Conference On Emerging Networking Experiments and Technologies, Conext '08. DOI: 10.1145/1544012.1544036  0.374
2008 Chan H, Perrig A. Efficient security primitives derived from a secure aggregation algorithm Proceedings of the Acm Conference On Computer and Communications Security. 521-533. DOI: 10.1145/1455770.1455836  0.38
2008 Hayashi E, Dhamija R, Christin N, Perrig A. Use Your Illusion: Secure authentication usable anywhere Soups 2008 - Proceedings of the 4th Symposium On Usable Privacy and Security. 35-43. DOI: 10.1145/1408664.1408670  0.406
2008 Franklin J, Luk M, McCune JM, Seshadri A, Perrig A, Van Doorn L. Remote detection of virtual machine monitors with fuzzy benchmarking Operating Systems Review (Acm). 42: 83-92. DOI: 10.1145/1368506.1368518  0.51
2008 Parno B, Perrig A, Andersen D. SNAPP: Stateless network-authenticated path pinning Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 168-178. DOI: 10.1145/1368310.1368336  0.378
2008 McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for tcb minimization Eurosys'08 - Proceedings of the Eurosys 2008 Conference. 315-328. DOI: 10.1145/1352592.1352625  0.529
2008 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. How low can you go?: Recommendations for hardware-supported minimal TCB code execution Operating Systems Review (Acm). 42: 14-25. DOI: 10.1145/1346281.1346285  0.6
2008 Lakshminarayanan K, Adkins D, Perrig A, Stoica I. Securing user-controlled routing infrastructures Ieee/Acm Transactions On Networking. 16: 549-561. DOI: 10.1109/Tnet.2007.903980  0.569
2008 Sayeed A, Perrig A. Secure wireless communications: Secret keys through multipath Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 3013-3016. DOI: 10.1109/ICASSP.2008.4518284  0.385
2008 Teng PY, Huang SI, Perrig A. Multi-layer encryption for multi-level access control in wireless sensor networks Ifip International Federation For Information Processing. 278: 705-709. DOI: 10.1007/978-0-387-09699-5_49  0.398
2008 Chen YT, Studer A, Perrig A. Combining TLS and TPMs to achieve device and user authentication for Wi-Fi and WiMAX citywide networks Ieee Wireless Communications and Networking Conference, Wcnc. 2804-2809.  0.504
2008 Franklin J, Luk M, McCune JM, Seshadri A, Perrig A, Doorn Lv. Towards sound detection of virtual machines Advances in Information Security. 36: 89-116.  0.473
2007 Kuo C, Luk M, Negi R, Perrig A. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes Sensys'07 - Proceedings of the 5th Acm Conference On Embedded Networked Sensor Systems. 233-246. DOI: 10.1145/1322263.1322286  0.5
2007 Panayappan R, Trivedi JM, Studer A, Perrig A. VANET-based approach for parking space availability Vanet'07: Proceedings of the Fourth Acm International Workshop On Vehicular Ad Hoc Networks. 75-76. DOI: 10.1145/1287748.1287763  0.451
2007 Parno B, Wendlandt D, Shi E, Perrig A, Maggs B, Hu YC. Portcullis: Protecting connection setup from denial-of-capability attacks Acm Sigcomm 2007: Conference On Computer Communications. 289-300. DOI: 10.1145/1282380.1282413  0.346
2007 Luk M, Mezzour G, Perrig A, Gligor V. MiniSec: A secure sensor network communication architecture Ipsn 2007: Proceedings of the Sixth International Symposium On Information Processing in Sensor Networks. 479-488. DOI: 10.1145/1236360.1236421  0.398
2007 Shi E, Bethencourt J, Chan THH, Song D, Perrig A. Multi-Dimensional Range Query over Encrypted Data Proceedings - Ieee Symposium On Security and Privacy. 350-364. DOI: 10.1109/SP.2007.29  0.413
2007 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution Proceedings - Ieee Symposium On Security and Privacy. 267-272. DOI: 10.1109/SP.2007.27  0.578
2007 Studer A, Luk M, Perrig A. Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 422-431. DOI: 10.1109/SECCOM.2007.4550363  0.432
2007 Surie A, Perrig A, Satyanarayanan M, Farber DJ. Rapid trust establishment for pervasive personal computing Ieee Pervasive Computing. 6: 24-30. DOI: 10.1109/Mprv.2007.84  0.49
2007 Satyanarayanan M, Gilbert B, Toups M, Tolia N, Surie A, O'Hallaron DR, Wolbach A, Harkes J, Perrig A, Farber DJ, Kozuch MA, Helfrich CJ, Nath P, Lagar-Cavilla HA. Pervasive personal computing in an Internet Suspend/Resume system Ieee Internet Computing. 11: 16-25. DOI: 10.1109/Mic.2007.46  0.394
2007 Yamada A, Miyake Y, Takemori K, Studer A, Perrig A. Intrusion detection for encrypted web accesses Proceedings - 21st International Conference On Advanced Information Networking and Applications Workshops/Symposia, Ainaw'07. 2: 569-576. DOI: 10.1109/AINAW.2007.212  0.377
2007 Chan H, Perrig A, Przydatek B, Song D. SIA: Secure information aggregation in sensor networks Journal of Computer Security. 15: 69-102.  0.335
2007 Kuo C, Walker J, Perrig A. Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and Wi-Fi protected setup Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4886: 325-340.  0.458
2006 Parno B, Luk M, Gaustad E, Perrig A. Secure sensor network routing: A cleanslate approach Proceedings of Conext'06 - 2nd Conference On Future Networking Technologies. DOI: 10.1145/1368436.1368452  0.421
2006 Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks Proceedings of the Acm Conference On Computer and Communications Security. 278-287. DOI: 10.1145/1180405.1180440  0.31
2006 Luk M, Perrig A, Whillock B. Seven cardinal properties of sensor network broadcast authentication Proceedings of the Fourth Acm Workshop On Security of Ad Hoc and Sensor Networks, Sasn 2006. a Workshop Held in Conjuction With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 147-156. DOI: 10.1145/1180345.1180364  0.348
2006 Seshadri A, Luk M, Perrig A, Van Doorn L, Khosla P. SCUBA: Secure Code Update by Attestation in sensor networks Wise 2006 - Proceedings of the 5th Acm Workshop On Wireless Security. 2006: 85-94. DOI: 10.1145/1161289.1161306  0.331
2006 Perrig A. Security in sensor networks: Industry trends, present and future research directions Wise 2006 - Proceedings of the 5th Acm Workshop On Wireless Security. 2006: 53. DOI: 10.1145/1161289.1161300  0.406
2006 Chan H, Dash D, Perrig A, Zhang H. Modeling adoptability of secure BGP protocols Performance Evaluation Review. 34: 389-390. DOI: 10.1145/1140103.1140334  0.376
2006 Kuo C, Perrig A, Walker J. Designing on evaluation method for security user interfaces: Lessons rom studying secure wireless network configuration Interactions. 13: 28-31. DOI: 10.1145/1125864.1125886  0.712
2006 Yaar A, Perrig A, Song D. StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense Ieee Journal On Selected Areas in Communications. 24: 1853-1863. DOI: 10.1109/Jsac.2006.877138  0.392
2006 Hu YC, Perrig A. Wormhole attacks in wireless networks Ieee Journal On Selected Areas in Communications. 24: 370-379. DOI: 10.1109/Jsac.2005.861394  0.509
2006 Parno B, Kuo C, Perrig A. Phoolproof phishing prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 1-19.  0.438
2005 McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication Proceedings - Ieee Symposium On Security and Privacy. 110-124. DOI: 10.1504/Ijsn.2009.023425  0.634
2005 Chan H, Gligor VD, Perrig A, Muralidharan G. On the distribution and revocation of cryptographic keys in sensor networks Ieee Transactions On Dependable and Secure Computing. 2: 233-247. DOI: 10.1109/Tdsc.2005.37  0.666
2005 Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks Proceedings - Ieee Symposium On Security and Privacy. 49-63. DOI: 10.1109/SP.2005.8  0.304
2005 McCune JM, Shi E, Perrig A, Reiter MK. Detection of denial-of-message attacks on sensor network broadcasts Proceedings - Ieee Symposium On Security and Privacy. 64-78. DOI: 10.1109/SP.2005.7  0.571
2005 Chan H, Perrig A. PIKE: Peer intermediaries for key establishment in sensor networks Proceedings - Ieee Infocom. 1: 524-535.  0.364
2005 Yaar A, Perrig A, Song D. FIT: Fast Internet traceback Proceedings - Ieee Infocom. 2: 1395-1406.  0.349
2004 Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks Communications of the Acm. 47: 53-57. DOI: 10.1145/990680.990707  0.504
2004 Kim Y, Perrig A, Tsudik G. Tree-based group key agreement Acm Transactions On Information and System Security. 7: 60-96. DOI: 10.1145/984334.984337  0.423
2004 Lakshminarayanan K, Adkins D, Perrig A, Stoica I. Taming IP packet flooding attacks Computer Communication Review. 34: 45-50. DOI: 10.1145/972374.972383  0.3
2004 Hu YC, Perrig A, Sirbu M. SPV: Secure path vector routing for securing BGP Computer Communication Review. 34: 179-192. DOI: 10.1145/1030194.1015488  0.452
2004 Kim Y, Perrig A, Tsudik G. Group key agreement efficient in communication Ieee Transactions On Computers. 53: 905-921. DOI: 10.1109/Tc.2004.31  0.45
2004 Shi E, Perrig A. Designing secure sensor networks Ieee Wireless Communications. 11: 38-43. DOI: 10.1109/Mwc.2004.1368895  0.486
2004 Hu YC, Perrig A. A survey of secure wireless ad hoc routing Ieee Security and Privacy. 2: 28-39. DOI: 10.1109/MSP.2004.1  0.422
2004 Chan H, Perrig A, Song D. Key distribution techniques for sensor networks Wireless Sensor Network. 277-303. DOI: 10.1007/978-1-4020-7884-2_13  0.651
2004 Anderson R, Chan H, Perrig A. Key infection: Smart trust for smart dust Proceedings - International Conference On Network Protocols, Icnp. 206-215.  0.368
2004 Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: Analysis & defenses Third International Symposium On Information Processing in Sensor Networks, Ipsn 2004. 259-268.  0.352
2003 Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks Proceedings - Ieee Symposium On Security and Privacy. 2003: 197-213. DOI: 10.1109/SECPRI.2003.1199337  0.341
2003 Yaar A, Perrig A, Song D. Pi: A path identification mechanism to defend against DDoS attacks Proceedings - Ieee Symposium On Security and Privacy. 2003: 93-107. DOI: 10.1109/SECPRI.2003.1199330  0.351
2003 Chan H, Perrig A. Security and privacy in sensor networks Computer. 36: 103-105. DOI: 10.1109/Mc.2003.1236475  0.695
2003 Hu YC, Perrig A, Johnson DB. Packet leashes: A defense against wormhole attacks in wireless networks Proceedings - Ieee Infocom. 3: 1976-1986.  0.417
2003 Hu YC, Perrig A, Johnson DB. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Proceedings of the Workshop On Wireless Security. 30-40.  0.433
2002 Hu YC, Johnson DB, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks Proceedings - 4th Ieee Workshop On Mobile Computing Systems and Applications, Wmcsa 2002. 3-13. DOI: 10.1109/MCSA.2002.1017480  0.397
2002 Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. SPINS: Security protocols for sensor networks Wireless Networks. 8: 521-534. DOI: 10.1023/A:1016598314198  0.731
2002 Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for ad hoc networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 12-23. DOI: 10.1007/S11276-004-4744-Y  0.457
2002 Kim Y, Perrig A, Tsudik G. Communication-efficient group key agreement Ifip Advances in Information and Communication Technology. 65: 229-244.  0.419
2001 Song DX, Berezin S, Perrig A. Athena: A novel approach to efficient automatic security protocol analysis Journal of Computer Security. 9: 47-74. DOI: 10.3233/Jcs-2001-91-203  0.469
2001 Song D, Perrig A, Phan D. AGVI — automatic generation, verification, and implementation of security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2102: 241-245. DOI: 10.1007/3-540-44585-4_21  0.41
2001 Perrig A. The BiBa one-time signature and broadcast authentication protocol Proceedings of the Acm Conference On Computer and Communications Security. 28-37.  0.418
2001 Song DX, Perrig A. Advanced and authenticated marking schemes for IP traceback Proceedings - Ieee Infocom. 2: 878-886.  0.408
2001 Perrig A, Song D, Tygar JD. ELK, a new protocol for efficient large-group key distribution Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 247-262.  0.715
2001 Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: Security protocols for sensor networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 189-199.  0.735
2000 Kim Y, Perrig A, Tsudik G. Simple and fault-tolerant key agreement for dynamic collaborative groups Proceedings of the Acm Conference On Computer and Communications Security. 235-244.  0.312
Show low-probability matches.