SPINS: Security protocols for sensor networks A Perrig, R Szewczyk, V Wen, D Culler, JD Tygar Proceedings of the 7th annual international conference on Mobile computing …, 2001 | 6157 | 2001 |
Practical techniques for searches on encrypted data DX Song, D Wagner, A Perrig Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000 | 5050 | 2000 |
Random key predistribution schemes for sensor networks H Chan, A Perrig, D Song 2003 Symposium on Security and Privacy, 2003., 197-213, 2003 | 4417 | 2003 |
Ariadne: A secure on-demand routing protocol for ad hoc networks YC Hu, A Perrig, DB Johnson Proceedings of the 8th annual international conference on Mobile computing …, 2002 | 3461 | 2002 |
Packet leashes: a defense against wormhole attacks in wireless networks YC Hu, A Perrig, DB Johnson IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 2690 | 2003 |
Security in wireless sensor networks A Perrig, J Stankovic, D Wagner Communications of the ACM 47 (6), 53-57, 2004 | 2204 | 2004 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Proceedings of the 3rd international symposium on Information processing in …, 2004 | 2162 | 2004 |
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks YC Hu, DB Johnson, A Perrig Ad hoc networks 1 (1), 175-192, 2003 | 2105 | 2003 |
Efficient authentication and signing of multicast streams over lossy channels A Perrig, R Canetti, JD Tygar, D Song Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000 | 1444 | 2000 |
TESLA broadcast authentication A Perrig, JD Tygar, A Perrig, JD Tygar Secure Broadcast Communication: In Wired and Wireless Networks, 29-53, 2003 | 1373 | 2003 |
Déjà Vu: a user study. Using Images for Authentication. R Dhamija, A Perrig USENIX Security Symposium, 45-58, 2000 | 1349 | 2000 |
Cyber–physical security of a smart grid infrastructure Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli Proceedings of the IEEE 100 (1), 195-209, 2011 | 1320 | 2011 |
Advanced and authenticated marking schemes for IP traceback DX Song, A Perrig Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 1317 | 2001 |
SIA: Secure information aggregation in sensor networks B Przydatek, D Song, A Perrig Proceedings of the 1st international conference on Embedded networked sensor …, 2003 | 1098 | 2003 |
Rushing attacks and defense in wireless ad hoc network routing protocols YC Hu, A Perrig, DB Johnson Proceedings of the 2nd ACM workshop on Wireless security, 30-40, 2003 | 1047 | 2003 |
Wormhole attacks in wireless networks YC Hu, A Perrig, DB Johnson IEEE journal on selected areas in communications 24 (2), 370-380, 2006 | 1035 | 2006 |
Flicker: An execution infrastructure for TCB minimization JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008 | 1007 | 2008 |
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes A Seshadri, M Luk, N Qu, A Perrig Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007 | 981 | 2007 |
Efficient and secure source authentication for multicast A Perrig, R Canetti, D Song, JD Tygar Network and distributed system security symposium, NDSS 1 (2001), 35-46, 2001 | 981 | 2001 |
Distributed detection of node replication attacks in sensor networks B Parno, A Perrig, V Gligor 2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005 | 969 | 2005 |