Adrian Perrig, Ph.D.

Affiliations: 
2001 Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science
Google:
"Adrian Perrig"

Parents

Sign in to add mentor
J Doug Tygar grad student 2001 Carnegie Mellon
 (Security protocols for broadcast communication.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Pappas C, Lee T, Reischuk RM, et al. (2019) Network Transparency for Better Internet Security Ieee Acm Transactions On Networking. 27: 2028-2042
Trammell B, Smith J, Perrig A. (2018) Adding Path Awareness to the Internet Architecture Ieee Internet Computing. 22: 96-102
Barrera D, Chuat L, Perrig A, et al. (2017) The SCION internet architecture Communications of the Acm. 60: 56-65
Ke YM, Chen CW, Hsiao HC, et al. (2016) CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 699-710
Basin DA, Cremers C, Kim TH, et al. (2016) Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure Ieee Transactions On Dependable and Secure Computing. 15: 393-408
Sasaki T, Perrig A, Asoni DE. (2016) Control-plane isolation and recovery for a secure SDN architecture Ieee Netsoft 2016 - 2016 Ieee Netsoft Conference and Workshops: Software-Defined Infrastructure For Networks, Clouds, Iot and Services. 459-464
An H, Lee H, Perrig A. (2016) Coordination of anti-spoofing mechanisms in partial deployments Journal of Communications and Networks. 18: 948-961
Pappas C, Reischuk RM, Perrig A. (2016) FAIR: Forwarding accountability for internet reputability Proceedings - International Conference On Network Protocols, Icnp. 2016: 189-200
Szalachowski P, Chuat L, Perrig A. (2016) PKI safety net (PKISN): Addressing the too-big-to-be-revoked problem of the TLS ecosystem Proceedings - 2016 Ieee European Symposium On Security and Privacy, Euro S and P 2016. 407-422
Zhang Y, Wang X, Perrig A, et al. (2016) Tumbler: Adaptable link access in the bots-infested Internet Computer Networks. 105: 180-193
See more...