关注
Adrian Perrig
Adrian Perrig
Professor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab Fellow
在 inf.ethz.ch 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
SPINS: Security protocols for sensor networks
A Perrig, R Szewczyk, V Wen, D Culler, JD Tygar
Proceedings of the 7th annual international conference on Mobile computing …, 2001
61572001
Practical techniques for searches on encrypted data
DX Song, D Wagner, A Perrig
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000
50502000
Random key predistribution schemes for sensor networks
H Chan, A Perrig, D Song
2003 Symposium on Security and Privacy, 2003., 197-213, 2003
44172003
Ariadne: A secure on-demand routing protocol for ad hoc networks
YC Hu, A Perrig, DB Johnson
Proceedings of the 8th annual international conference on Mobile computing …, 2002
34612002
Packet leashes: a defense against wormhole attacks in wireless networks
YC Hu, A Perrig, DB Johnson
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
26902003
Security in wireless sensor networks
A Perrig, J Stankovic, D Wagner
Communications of the ACM 47 (6), 53-57, 2004
22042004
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Proceedings of the 3rd international symposium on Information processing in …, 2004
21622004
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
YC Hu, DB Johnson, A Perrig
Ad hoc networks 1 (1), 175-192, 2003
21052003
Efficient authentication and signing of multicast streams over lossy channels
A Perrig, R Canetti, JD Tygar, D Song
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000
14442000
TESLA broadcast authentication
A Perrig, JD Tygar, A Perrig, JD Tygar
Secure Broadcast Communication: In Wired and Wireless Networks, 29-53, 2003
13732003
Déjà Vu: a user study. Using Images for Authentication.
R Dhamija, A Perrig
USENIX Security Symposium, 45-58, 2000
13492000
Cyber–physical security of a smart grid infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2011
13202011
Advanced and authenticated marking schemes for IP traceback
DX Song, A Perrig
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
13172001
SIA: Secure information aggregation in sensor networks
B Przydatek, D Song, A Perrig
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
10982003
Rushing attacks and defense in wireless ad hoc network routing protocols
YC Hu, A Perrig, DB Johnson
Proceedings of the 2nd ACM workshop on Wireless security, 30-40, 2003
10472003
Wormhole attacks in wireless networks
YC Hu, A Perrig, DB Johnson
IEEE journal on selected areas in communications 24 (2), 370-380, 2006
10352006
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
10072008
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
A Seshadri, M Luk, N Qu, A Perrig
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
9812007
Efficient and secure source authentication for multicast
A Perrig, R Canetti, D Song, JD Tygar
Network and distributed system security symposium, NDSS 1 (2001), 35-46, 2001
9812001
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005
9692005
系统目前无法执行此操作,请稍后再试。
文章 1–20