default search action
Adrian Perrig
Person information
- affiliation: ETH Zürich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Simon Scherrer, Seyedali Tabaeiaghdaei, Adrian Perrig:
Quality Competition Among Internet Service Providers. SIGMETRICS Perform. Evaluation Rev. 51(4): 4-5 (2024) - [j59]Arish Sateesan, Jo Vliegen, Simon Scherrer, Hsu-Chun Hsiao, Adrian Perrig, Nele Mentens:
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements. ACM Trans. Priv. Secur. 27(4): 29:1-29:34 (2024) - [c244]Giacomo Giuliari, Alberto Sonnino, Marc Frei, Fabio Streun, Lefteris Kokoris-Kogias, Adrian Perrig:
An Empirical Study of Consensus Protocols' DoS Resilience. AsiaCCS 2024 - [c243]Piet De Vaere, Felix Stöger, Adrian Perrig, Gene Tsudik:
The SA4P Framework: Sensing and Actuation as a Privilege. AsiaCCS 2024 - [c242]Marc Wyss, Roland Meier, Llorenç Romá Álvarez, Cyrill Krähenbühl, Adrian Perrig, Vincent Lenders:
On Building Secure Wide-Area Networks over Public Internet Service Providers. CyCon 2024: 7-27 - [c241]Seyedali Tabaeiaghdaei, Filippo Costa, Jonghoon Kwon, Patrick Bamert, Yih-Chun Hu, Adrian Perrig:
Debuglet: Programmable and Verifiable Inter-Domain Network Telemetry. ICDCS 2024: 255-265 - [c240]Marina Ivanovic, François Wirz, Jordi Subirà Nieto, Adrian Perrig:
Charting Censorship Resilience and Global Internet Reachability: A Quantitative Approach. IFIP Networking 2024: 529-535 - [c239]Cyrill Krähenbühl, Seyedali Tabaeiaghdaei, Simon Scherrer, Matthias Frei, Adrian Perrig:
Toward Global Latency Transparency. IFIP Networking 2024: 536-542 - [c238]Huayi Duan, Marco Bearzi, Jodok Vieli, David A. Basin, Adrian Perrig, Si Liu, Bernhard Tellenbach:
CAMP: Compositional Amplification Attacks against DNS. USENIX Security Symposium 2024 - [c237]Marc Wyss, Adrian Perrig:
Zero-setup Intermediate-rate Communication Guarantees in a Global Internet. USENIX Security Symposium 2024 - [i48]Marina Ivanovic, François Wirz, Jordi Subirà Nieto, Adrian Perrig:
Charting Censorship Resilience & Global Internet Reachability: A Quantitative Approach. CoRR abs/2403.09447 (2024) - [i47]Cyrill Krähenbühl, Seyedali Tabaeiaghdaei, Simon Scherrer, Matthias Frei, Adrian Perrig:
GLIDS: A Global Latency Information Dissemination System. CoRR abs/2405.04319 (2024) - [i46]João C. Pereira, Tobias Klenze, Sofia Giampietro, Markus Limbeck, Dionysios Spiliopoulos, Felix A. Wolf, Marco Eilers, Christoph Sprenger, David A. Basin, Peter Müller, Adrian Perrig:
Protocols to Code: Formal Verification of a Next-Generation Internet Router. CoRR abs/2405.06074 (2024) - 2023
- [j58]Simon Scherrer, Seyedali Tabaeiaghdaei, Adrian Perrig:
Quality competition among internet service providers. Perform. Evaluation 162: 102375 (2023) - [c236]Seyedali Tabaeiaghdaei, Simon Scherrer, Jonghoon Kwon, Adrian Perrig:
Carbon-Aware Global Routing in Path-Aware Networks. e-Energy 2023: 144-158 - [c235]Felix Stöger, Anxin Zhou, Huayi Duan, Adrian Perrig:
Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking. FC 2023: 182-199 - [c234]Marten Gartner, Jean-Pierre Smith, Matthias Frei, François Wirz, Cédric Neukom, David Hausheer, Adrian Perrig:
Hercules: High-Speed Bulk-Transfer over SCION. IFIP Networking 2023: 1-9 - [c233]Tony John, Adrian Perrig, David Hausheer:
DMTP: Deadline-aware Multipath Transport Protocol. IFIP Networking 2023: 1-9 - [c232]Huayi Duan, Rubén Fischer, Jie Lou, Si Liu, David A. Basin, Adrian Perrig:
RHINE: Robust and High-performance Internet Naming with E2E Authenticity. NSDI 2023: 531-553 - [c231]Shohei Mitani, Jonghoon Kwon, Nakul Ghate, Taniya Singh, Hirofumi Ueda, Adrian Perrig:
Qualitative Intention-aware Attribute-based Access Control Policy Refinement. SACMAT 2023: 201-208 - [c230]Si Liu, Huayi Duan, Lukas Heimes, Marco Bearzi, Jodok Vieli, David A. Basin, Adrian Perrig:
A Formal Framework for End-to-End DNS Resolution. SIGCOMM 2023: 932-949 - [c229]Christelle Gloor, Adrian Perrig:
Trusted Introductions for Secure Messaging. Security Protocols Workshop 2023: 123-135 - [c228]Virgil D. Gligor, Adrian Perrig, David A. Basin:
Determining an Economic Value of High Assurance for Commodity Software Security. Security Protocols Workshop 2023: 228-242 - [c227]Adrian Perrig:
Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion). Security Protocols Workshop 2023: 243-256 - [c226]Simon Scherrer, Jo Vliegen, Arish Sateesan, Hsu-Chun Hsiao, Nele Mentens, Adrian Perrig:
ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks. SRDS 2023: 162-172 - [c225]Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig:
SAGE: Software-based Attestation for GPU Execution. USENIX ATC 2023: 485-499 - [c224]Piet De Vaere, Adrian Perrig:
Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia. USENIX Security Symposium 2023: 2401-2418 - [c223]Cyrill Krähenbühl, Marc Wyss, David A. Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier:
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks. USENIX Security Symposium 2023: 5755-5772 - [c222]Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig:
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System. USENIX Security Symposium 2023: 6151-6166 - [i45]Cyrill Krähenbühl, Marc Wyss, David A. Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier:
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks. CoRR abs/2304.03108 (2023) - [i44]Simon Scherrer, Seyedali Tabaeiaghdaei, Adrian Perrig:
Quality Competition Among Internet Service Providers in a Path-Aware Internet. CoRR abs/2305.06811 (2023) - [i43]Simon Scherrer, Jo Vliegen, Arish Sateesan, Hsu-Chun Hsiao, Nele Mentens, Adrian Perrig:
ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks. CoRR abs/2306.14328 (2023) - [i42]Giacomo Giuliari, Markus Legner, Adrian Perrig, Jean-Pierre Smith, Karl Wüst:
Hummingbird: A Flexible and Lightweight Inter-Domain Bandwidth-Reservation System. CoRR abs/2308.09959 (2023) - [i41]Seyedali Tabaeiaghdaei, Marc Wyss, Giacomo Giuliari, Jelte van Bommel, Ahad N. Zehmakan, Adrian Perrig:
Inter-Domain Routing with Extensible Criteria. CoRR abs/2309.03551 (2023) - 2022
- [b4]Laurent Chuat, Markus Legner, David A. Basin, David Hausheer, Samuel Hitz, Peter Müller, Adrian Perrig:
The Complete Guide to SCION - From Design Principles to Formal Verification. Information Security and Cryptography, Springer 2022, ISBN 978-3-031-05287-3 - [j57]Francesco Da Dalt, Simon Scherrer, Adrian Perrig:
Bayesian Sketches for Volume Estimation in Data Streams. Proc. VLDB Endow. 16(4): 657-669 (2022) - [j56]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
An Axiomatic Perspective on the Performance Effects of End-Host Path Selection. SIGMETRICS Perform. Evaluation Rev. 49(3): 16-17 (2022) - [j55]Cyrill Krähenbühl, Adrian Perrig:
Ubiquitous Secure Communication in a Future Internet Architecture. SN Comput. Sci. 3(5): 350 (2022) - [c221]Piet De Vaere, Andrea Tulimiero, Adrian Perrig:
Hopper: Per-Device Nano Segmentation for the Industrial IoT. AsiaCCS 2022: 279-293 - [c220]Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler:
NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications. CCS 2022: 2765-2778 - [c219]Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig:
Protecting Critical Inter-Domain Communication through Flyover Reservations. CCS 2022: 2961-2974 - [c218]Thilo Weghorn, Si Liu, Christoph Sprenger, Adrian Perrig, David A. Basin:
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures. CSF 2022: 147-162 - [c217]Alex Davidson, Matthias Frei, Martin Gartner, Hamed Haddadi, Adrian Perrig, Jordi Subirà Nieto, Philipp Winter, François Wirz:
Tango or square dance?: how tightly should we integrate network functionality in browsers? HotNets 2022: 205-212 - [c216]Mathias Blarer, Jonghoon Kwon, Vincent Graf, Adrian Perrig:
Consent Routing: Towards Bilaterally Trusted Communication Paths. ICDCS 2022: 1247-1257 - [c215]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
Model-based insights on the performance, fairness, and stability of BBR. IMC 2022: 519-537 - [c214]Seyedali Tabaeiaghdaei, Adrian Perrig:
Data-Plane Energy Efficiency of a Next-Generation Internet Architecture. ISCC 2022: 1-8 - [c213]Marc Wyss, Giacomo Giuliari, Markus Legner, Adrian Perrig:
DoCile: Taming Denial-of-Capability Attacks in Inter-Domain Communications. IWQoS 2022: 1-10 - [c212]Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig:
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. NDSS 2022 - [c211]Fabio Streun, Joel Wanner, Adrian Perrig:
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing. NDSS 2022 - [c210]Marc Frei, Jonghoon Kwon, Seyedali Tabaeiaghdaei, Marc Wyss, Christoph Lenzen, Adrian Perrig:
G-SINC: Global Synchronization Infrastructure for Network Clocks. SRDS 2022: 133-145 - [c209]Jean-Pierre Smith, Luca Dolfi, Prateek Mittal, Adrian Perrig:
QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework. USENIX Security Symposium 2022: 771-789 - [c208]Henry Birge-Lee, Joel Wanner, Grace H. Cimaszewski, Jonghoon Kwon, Liang Wang, François Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun:
Creating a Secure Underlay for the Internet. USENIX Security Symposium 2022: 2601-2618 - [i40]Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler:
NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications. CoRR abs/2202.08080 (2022) - [i39]Henry Birge-Lee, Joel Wanner, Grace H. Cimaszewski, Jonghoon Kwon, Liang Wang, François Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun:
Creating a Secure Underlay for the Internet. CoRR abs/2206.06879 (2022) - [i38]Marc Frei, Jonghoon Kwon, Seyedali Tabaeiaghdaei, Marc Wyss, Christoph Lenzen, Adrian Perrig:
G-SINC: Global Synchronization Infrastructure for Network Clocks. CoRR abs/2207.06116 (2022) - [i37]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
Model-Based Insights on the Performance, Fairness, and Stability of BBR. CoRR abs/2208.10103 (2022) - [i36]Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig:
Protecting Critical Inter-Domain Communication through Flyover Reservations. CoRR abs/2208.14892 (2022) - [i35]Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig:
SAGE: Software-based Attestation for GPU Execution. CoRR abs/2209.03125 (2022) - [i34]Alex Davidson, Matthias Frei, Marten Gartner, Hamed Haddadi, Jordi Subirà Nieto, Adrian Perrig, Philipp Winter, François Wirz:
Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers? CoRR abs/2210.04791 (2022) - [i33]Seyedali Tabaeiaghdaei, Simon Scherrer, Adrian Perrig:
Carbon Footprints on Inter-Domain Paths: Uncovering CO2 Tracks on Global Networks. CoRR abs/2211.00347 (2022) - 2021
- [j54]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
An axiomatic perspective on the performance effects of end-host path selection. Perform. Evaluation 151: 102233 (2021) - [j53]Jean-Pierre Smith, Prateek Mittal, Adrian Perrig:
Website Fingerprinting in the Age of QUIC. Proc. Priv. Enhancing Technol. 2021(2): 48-69 (2021) - [c207]Giacomo Giuliari, Dominik Roos, Marc Wyss, Juan Ángel García-Pardo, Markus Legner, Adrian Perrig:
Colibri: a cooperative lightweight inter-domain bandwidth-reservation infrastructure. CoNEXT 2021: 104-118 - [c206]Cyrill Krähenbühl, Seyedali Tabaeiaghdaei, Christelle Gloor, Jonghoon Kwon, Adrian Perrig, David Hausheer, Dominik Roos:
Deployment and scalability of an inter-domain multi-path routing infrastructure. CoNEXT 2021: 126-140 - [c205]Piet De Vaere, Claude Hähni, Franco Monti, Adrian Perrig:
Tableau: Future-Proof Zoning for OT Networks. CRITIS 2021: 207-227 - [c204]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures. DSN 2021: 116-128 - [c203]Arish Sateesan, Jo Vliegen, Simon Scherrer, Hsu-Chun Hsiao, Adrian Perrig, Nele Mentens:
Speed Records in Network Flow Measurement on FPGA. FPL 2021: 219-224 - [c202]Cyrill Krähenbühl, Markus Legner, Silvan Bitterli, Adrian Perrig:
Pervasive Internet-Wide Low-Latency Authentication. ICCCN 2021: 1-9 - [c201]Adrian Perrig:
New Directions for High-throughput and High-security Communication. ICISSP 2021: 5 - [c200]Marc Wyss, Giacomo Giuliari, Markus Legner, Adrian Perrig:
Secure and Scalable QoS for Critical Applications. IWQoS 2021: 1-10 - [c199]Jonghoon Kwon, Claude Hähni, Patrick Bamert, Adrian Perrig:
Mondrian: Comprehensive Inter-domain Network Zoning Architecture. NDSS 2021 - [c198]Supraja Sridhara, François Wirz, Joeri de Ruiter, Caspar Schutijser, Markus Legner, Adrian Perrig:
Global Distributed Secure Mapping of Network Addresses. TAURIN@SIGCOMM 2021: 1-7 - [c197]Tony John, Piet De Vaere, Caspar Schutijser, Adrian Perrig, David Hausheer:
Linc: low-cost inter-domain connectivity for industrial systems. SIGCOMM Posters and Demos 2021: 68-70 - [c196]Giacomo Giuliari, Marc Wyss, Markus Legner, Adrian Perrig:
GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm. SIROCCO 2021: 243-261 - [c195]Simon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele Enrico Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao, Adrian Perrig:
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows. SRDS 2021: 265-276 - [c194]Giacomo Giuliari, Tommaso Ciussani, Adrian Perrig, Ankit Singla:
ICARUS: Attacking low Earth orbit satellite networks. USENIX ATC 2021: 317-331 - [c193]Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler:
ReDMArk: Bypassing RDMA Security Mechanisms. USENIX Security Symposium 2021: 4277-4292 - [i32]Simon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele Enrico Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao, Adrian Perrig:
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows. CoRR abs/2102.01397 (2021) - [i31]Giacomo Giuliari, Marc Wyss, Markus Legner, Adrian Perrig:
GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm. CoRR abs/2102.10314 (2021) - [i30]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures. CoRR abs/2104.02346 (2021) - [i29]Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig:
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. CoRR abs/2108.08581 (2021) - [i28]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
An Axiomatic Perspective on the Performance Effects of End-Host Path Selection. CoRR abs/2109.02510 (2021) - 2020
- [j52]Giacomo Giuliari, Tobias Klenze, Markus Legner, David A. Basin, Adrian Perrig, Ankit Singla:
Internet backbones in space. Comput. Commun. Rev. 50(1): 25-37 (2020) - [j51]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
Incentivizing stable path selection in future Internet architectures. Perform. Evaluation 144: 102137 (2020) - [j50]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
Incentivizing Stable Path Selection in Future Internet Architectures. SIGMETRICS Perform. Evaluation Rev. 48(3): 12-13 (2020) - [c192]Adrian Perrig:
Global Communication Guarantees in the Presence of Adversaries. AsiaCCS 2020: 4-5 - [c191]Benjamin Rothenberger, Dominik Roos, Markus Legner, Adrian Perrig:
PISKES: Pragmatic Internet-Scale Key-Establishment System. AsiaCCS 2020: 73-86 - [c190]Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust. EuroS&P 2020: 624-638 - [c189]Jonghoon Kwon, Juan A. García-Pardo, Markus Legner, François Wirz, Matthias Frei, David Hausheer, Adrian Perrig:
SCIONLAB: A Next-Generation Internet Testbed. ICNP 2020: 1-12 - [c188]Jonghoon Kwon, Taeho Lee, Claude Hähni, Adrian Perrig:
SVLAN: Secure & Scalable Network Virtualization. NDSS 2020 - [c187]Simon Scherrer, Adrian Perrig, Stefan Schmid:
The Value of Information in Selfish Routing. SIROCCO 2020: 366-384 - [c186]Joel Wanner, Laurent Chuat, Adrian Perrig:
A Formally Verified Protocol for Log Replication with Byzantine Fault Tolerance. SRDS 2020: 101-112 - [c185]Konstantin Taranov, Benjamin Rothenberger, Adrian Perrig, Torsten Hoefler:
sRDMA - Efficient NIC-based Authentication and Encryption for Remote Direct Memory Access. USENIX ATC 2020: 691-704 - [c184]Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig:
EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet. USENIX Security Symposium 2020: 541-558 - [i27]Simon Scherrer, Adrian Perrig, Stefan Schmid:
The Value of Information in Selfish Routing. CoRR abs/2005.05191 (2020) - [i26]Joel Wanner, Laurent Chuat, Adrian Perrig:
A Formally Verified Protocol for Log Replication with Byzantine Fault Tolerance. CoRR abs/2009.10664 (2020) - [i25]Simon Scherrer, Markus Legner, Adrian Perrig, Stefan Schmid:
Incentivizing Stable Path Selection in Future Internet Architectures. CoRR abs/2009.12105 (2020)
2010 – 2019
- 2019
- [j49]Pavlos Nikolopoulos, Christos Pappas, Katerina J. Argyraki, Adrian Perrig:
Retroactive Packet Sampling for Traffic Receipts. Proc. ACM Meas. Anal. Comput. Syst. 3(1): 19:1-19:39 (2019) - [j48]Christos Pappas, Taeho Lee, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig:
Network Transparency for Better Internet Security. IEEE/ACM Trans. Netw. 27(5): 2028-2042 (2019) - [c183]Piet De Vaere, Adrian Perrig:
Liam: An Architectural Framework for Decentralized IoT Networks. MASS 2019: 416-427 - [c182]Pavlos Nikolopoulos, Christos Pappas, Katerina J. Argyraki, Adrian Perrig:
Retroactive Packet Sampling for Traffic Receipts. SIGMETRICS (Abstracts) 2019: 17-18 - [c181]Laurent Chuat, Sarah Plocher, Adrian Perrig:
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come. Security Protocols Workshop 2019: 203-212 - [i24]Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
Proxy Certificates: The Missing Link in the Web's Chain of Trust. CoRR abs/1906.10775 (2019) - [i23]Laurent Chuat, Sarah Plocher, Adrian Perrig:
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come. CoRR abs/1907.12398 (2019) - 2018
- [j47]Taeho Lee, Christos Pappas, Adrian Perrig:
Bootstrapping privacy services in today's internet. Comput. Commun. Rev. 48(5): 21-30 (2018) - [j46]Brian Trammell, Jean-Pierre Smith, Adrian Perrig:
Adding Path Awareness to the Internet Architecture. IEEE Internet Comput. 22(2): 96-102 (2018) - [j45]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. IEEE Trans. Dependable Secur. Comput. 15(3): 393-408 (2018) - [c180]Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. CANS 2018: 89-108 - [c179]Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig:
Towards Sustainable Evolution for the TLS Public-Key Infrastructure. AsiaCCS 2018: 637-649 - [c178]Daniele Enrico Asoni, Takayuki Sasaki, Adrian Perrig:
Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture. CIC 2018: 176-187 - [c177]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. EuroS&P 2018: 137-152 - [c176]Tobias Klenze, Giacomo Giuliari, Christos Pappas, Adrian Perrig, David A. Basin:
Networking in Heaven as on Earth. HotNets 2018: 22-28 - [c175]Lukasz Dykcik, Laurent Chuat, Pawel Szalachowski, Adrian Perrig:
BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure. ICDM Workshops 2018: 105-114 - [i22]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer. CoRR abs/1802.08415 (2018) - [i21]Hao Wu, Hsu-Chun Hsiao, Daniele Enrico Asoni, Simon Scherrer, Adrian Perrig, Yih-Chun Hu:
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report). CoRR abs/1807.05652 (2018) - [i20]Lukasz Dykcik, Laurent Chuat, Pawel Szalachowski, Adrian Perrig:
BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure. CoRR abs/1809.09544 (2018) - [i19]Phillipa Gill, Adrian Perrig, Matthias Wählisch:
Secure Routing for the Internet (Dagstuhl Seminar 18242). Dagstuhl Reports 8(6): 40-62 (2018) - 2017
- [b3]Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat:
SCION: A Secure Internet Architecture. Information Security and Cryptography, Springer 2017, ISBN 978-3-319-67079-9, pp. 3-386 - [j44]David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk, Pawel Szalachowski:
The SCION internet architecture. Commun. ACM 60(6): 56-65 (2017) - [j43]Matthias Hollick, Cristina Nita-Rotaru, Panagiotis Papadimitratos, Adrian Perrig, Stefan Schmid:
Toward a Taxonomy and Attacker Model for Secure Routing Protocols. Comput. Commun. Rev. 47(1): 43-48 (2017) - [j42]Chen Chen, Adrian Perrig:
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer. Proc. Priv. Enhancing Technol. 2017(1): 100-117 (2017) - [j41]Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:
Authentication Challenges in a Global Environment. ACM Trans. Priv. Secur. 20(1): 1:1-1:34 (2017) - [c174]Daniele Enrico Asoni, Samuel Hitz, Adrian Perrig:
A Paged Domain Name System for Query Privacy. CANS 2017: 250-273 - [c173]Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu:
The Case for In-Network Replay Suppression. AsiaCCS 2017: 862-873 - [c172]Laurent Chuat, Adrian Perrig, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. DSN 2017: 487-498 - [c171]Benjamin Rothenberger, Daniele Enrico Asoni, David Barrera, Adrian Perrig:
Internet Kill Switches Demystified. EUROSEC 2017: 5:1-5:6 - [c170]Pawel Szalachowski, Adrian Perrig:
Short Paper: On Deployment of DNS-Based Security Enhancements. Financial Cryptography 2017: 424-433 - [i18]Pawel Szalachowski, Adrian Perrig:
Short Paper: On Deployment of DNS-based Security Enhancements. CoRR abs/1702.05311 (2017) - [i17]Laurent Chuat, Adrian Perrig, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. CoRR abs/1706.05867 (2017) - 2016
- [j40]Jonghoon Kwon, Jehyun Lee, Heejo Lee, Adrian Perrig:
PsyBoG: A scalable botnet detection method for large-scale DNS traffic. Comput. Networks 97: 48-73 (2016) - [j39]Yao Zhang, Xiaoyou Wang, Adrian Perrig, Zhiming Zheng:
Tumbler: Adaptable link access in the bots-infested Internet. Comput. Networks 105: 180-193 (2016) - [j38]Hyok An, Heejo Lee, Adrian Perrig:
Coordination of anti-spoofing mechanisms in partial deployments. J. Commun. Networks 18(6): 948-961 (2016) - [c169]Stephanos Matsumoto, Samuel Steffen, Adrian Perrig:
CASTLE: CA signing in a touch-less environment. ACSAC 2016: 546-557 - [c168]Jumpei Urakawa, Cristina Basescu, Kohei Sugiyama, Christos Pappas, Akira Yamada, Ayumu Kubota, Adrian Perrig:
On the implementation of path-based dynamic pricing in edge-directed routing. APCC 2016: 254-260 - [c167]Yu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, Vyas Sekar:
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks. AsiaCCS 2016: 699-710 - [c166]Ercan Ucan, Raphael M. Reischuk, Adrian Perrig:
DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet? CCS 2016: 1838-1840 - [c165]Chen Chen, David Barrera, Adrian Perrig:
Modeling Data-Plane Power Consumption of Future Internet Architectures. CIC 2016: 149-158 - [c164]Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig:
Source Accountability with Domain-brokered Privacy. CoNEXT 2016: 345-358 - [c163]Pawel Szalachowski, Laurent Chuat, Adrian Perrig:
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. EuroS&P 2016: 407-422 - [c162]Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig:
SDNsec: Forwarding Accountability for the SDN Data Plane. ICCCN 2016: 1-10 - [c161]Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig:
RITM: Revocation in the Middle. ICDCS 2016: 189-200 - [c160]Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig:
Communication based on per-packet One-Time Addresses. ICNP 2016: 1-10 - [c159]Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa:
SIBRA: Scalable Internet Bandwidth Reservation Architecture. NDSS 2016 - [c158]Takayuki Sasaki, Adrian Perrig, Daniele Enrico Asoni:
Control-plane isolation and recovery for a secure SDN architecture. NetSoft 2016: 459-464 - [c157]Cristina Basescu, Yue-Hsun Lin, Haoming Zhang, Adrian Perrig:
High-Speed Inter-Domain Fault Localization. IEEE Symposium on Security and Privacy 2016: 859-877 - [i16]Pawel Szalachowski, Laurent Chuat, Adrian Perrig:
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. CoRR abs/1601.03874 (2016) - [i15]Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig:
RITM: Revocation in the Middle. CoRR abs/1604.08490 (2016) - [i14]Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig:
SDNsec: Forwarding Accountability for the SDN Data Plane. CoRR abs/1605.01944 (2016) - [i13]Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig:
Source Accountability with Domain-brokered Privacy. CoRR abs/1610.00461 (2016) - [i12]Chen Chen, David Barrera, Adrian Perrig:
Modeling Data-Plane Power Consumption of Future Internet Architectures. CoRR abs/1610.01511 (2016) - 2015
- [j37]Jonghoon Kwon, Dongwon Seo, Minjin Kwon, Heejo Lee, Adrian Perrig, Hyogon Kim:
An incrementally deployable anti-spoofing mechanism for software-defined networks. Comput. Commun. 64: 1-20 (2015) - [c156]Pawel Szalachowski, Adrian Perrig:
Lightweight Protection of Group Content Distribution. IoTPTS@AsiaCCS 2015: 35-42 - [c155]Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig:
HORNET: High-speed Onion Routing at the Network Layer. CCS 2015: 1441-1454 - [c154]Taeho Lee, Christos Pappas, Cristina Basescu, Jun Han, Torsten Hoefler, Adrian Perrig:
Source-Based Path Selection: The Data Plane Perspective. CFI 2015: 41-45 - [c153]Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri:
Efficient gossip protocols for verifying the consistency of Certificate logs. CNS 2015: 415-423 - [c152]Stephanos Matsumoto, Pawel Szalachowski, Adrian Perrig:
Deployment challenges in log-based PKI enhancements. EUROSEC 2015: 1:1-1:7 - [c151]Christos Pappas, Katerina J. Argyraki, Stefan Bechtold, Adrian Perrig:
Transparency Instead of Neutrality. HotNets 2015: 22:1-22:7 - [c150]Chen Chen, Stephanos Matsumoto, Adrian Perrig:
ECO-DNS: Expected Consistency Optimization for DNS. ICDCS 2015: 256-267 - [c149]Christos Pappas, Raphael M. Reischuk, Adrian Perrig:
FAIR: Forwarding Accountability for Internet Reputability. ICNP 2015: 189-200 - [c148]Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig:
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds. ICNP 2015: 212-223 - [c147]Christos Pappas, Raphael M. Reischuk, Adrian Perrig:
Forwarding Accountability: A Challenging Necessity of the Future Data Plane. iNetSeC 2015: 3-10 - [c146]Daniele Enrico Asoni, Chen Chen, David Barrera, Adrian Perrig:
On Building Onion Routing into Future Internet Architectures. iNetSeC 2015: 71-81 - [c145]Yanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig:
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction. Security Protocols Workshop 2015: 50-68 - [i11]Christos Pappas, Raphael M. Reischuk, Adrian Perrig:
FAIR: Forwarding Accountability for Internet Reputability. CoRR abs/1501.07586 (2015) - [i10]Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:
Designing a Global Authentication Infrastructure. CoRR abs/1506.03392 (2015) - [i9]Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig:
HORNET: High-speed Onion Routing at the Network Layer. CoRR abs/1507.05724 (2015) - [i8]David Barrera, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig:
SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks. CoRR abs/1508.01651 (2015) - [i7]Taeho Lee, Pawel Szalachowski, David Barrera, Adrian Perrig, Heejo Lee, David Watrin:
Bootstrapping Real-world Deployment of Future Internet Architectures. CoRR abs/1508.02240 (2015) - [i6]Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig:
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds. CoRR abs/1509.02268 (2015) - [i5]Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa:
SIBRA: Scalable Internet Bandwidth Reservation Architecture. CoRR abs/1510.02696 (2015) - [i4]Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri:
Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs. CoRR abs/1511.01514 (2015) - [i3]Amir Herzberg, Matthias Hollick, Adrian Perrig:
Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102). Dagstuhl Reports 5(3): 28-40 (2015) - 2014
- [j36]Stefan Bechtold, Adrian Perrig:
Accountability in future internet architectures. Commun. ACM 57(9): 21-23 (2014) - [j35]David Naylor, Matthew K. Mukerjee, Patrick Agyapong, Robert Grandl, Ruogu Kang, Michel Machado, Stephanie Brown, Cody Doucette, Hsu-Chun Hsiao, Dongsu Han, Tiffany Hyun-Jin Kim, Hyeontaek Lim, Carol Ovon, Dong Zhou, Soo Bum Lee, Yue-Hsun Lin, H. Colleen Stuart, Daniel Paul Barrett, Aditya Akella, David G. Andersen, John W. Byers, Laura Dabbish, Michael Kaminsky, Sara B. Kiesler, Jon M. Peha, Adrian Perrig, Srinivasan Seshan, Marvin A. Sirbu, Peter Steenkiste:
XIA: architecting a more trustworthy and evolvable internet. Comput. Commun. Rev. 44(3): 50-57 (2014) - [j34]Xin Zhang, Fanfu Zhou, Xinyu Zhu, Haiyang Sun, Adrian Perrig, Athanasios V. Vasilakos, Haibing Guan:
DFL: Secure and Practical Fault Localization for Datacenter Networks. IEEE/ACM Trans. Netw. 22(4): 1218-1231 (2014) - [c144]Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig:
Mechanized Network Origin and Path Authenticity Proofs. CCS 2014: 346-357 - [c143]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
ARPKI: Attack Resilient Public-Key Infrastructure. CCS 2014: 382-393 - [c142]Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig:
PoliCert: Secure and Flexible TLS Certificate Management. CCS 2014: 406-417 - [c141]Adrian Perrig:
Exciting Security Research Opportunity: Next-generation Internet. CCS 2014: 702 - [c140]Jonghoon Kwon, Jeongsik Kim, Jehyun Lee, Heejo Lee, Adrian Perrig:
PsyBoG: Power spectral density analysis for detecting botnet groups. MALWARE 2014: 85-92 - [c139]Stephanos Matsumoto, Samuel Hitz, Adrian Perrig:
Fleet: defending SDNs from malicious administrators. HotSDN 2014: 103-108 - [c138]Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig:
Lightweight source authentication and path validation. SIGCOMM 2014: 271-282 - [c137]Yanlin Li, Jonathan M. McCune, James Newsome, Adrian Perrig, Brandon Baker, Will Drewry:
MiniBox: A Two-Way Sandbox for x86 Native Code. USENIX ATC 2014: 409-420 - [c136]Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai:
Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles. WISEC 2014: 51-56 - [e5]Yongdae Kim, Heejo Lee, Adrian Perrig:
Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8267, Springer 2014, ISBN 978-3-319-05148-2 [contents] - 2013
- [j33]Dongwon Seo, Heejo Lee, Adrian Perrig:
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks. Comput. Secur. 39: 366-385 (2013) - [c135]Emmanuel Owusu, Jorge Guajardo, Jonathan M. McCune, James Newsome, Adrian Perrig, Amit Vasudevan:
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms. CCS 2013: 13-24 - [c134]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
STRIDE: sanctuary trail - refuge from internet DDoS entrapment. AsiaCCS 2013: 415-426 - [c133]Tiffany Hyun-Jin Kim, Akira Yamada, Virgil D. Gligor, Jason I. Hong, Adrian Perrig:
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. Financial Cryptography 2013: 69-77 - [c132]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Jorge Guajardo, Jason I. Hong, Adrian Perrig:
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference. Financial Cryptography Workshops 2013: 112-130 - [c131]Hyok An, Heejo Lee, Adrian Perrig:
UAS: Universal anti-spoofing by incorporating existing mechanisms. LCN 2013: 316-319 - [c130]Michael W. Farb, Yue-Hsun Lin, Tiffany Hyun-Jin Kim, Jonathan M. McCune, Adrian Perrig:
SafeSlinger: easy-to-use and secure public-key exchange. MobiCom 2013: 417-428 - [c129]Jun Zhao, Virgil D. Gligor, Adrian Perrig, James Newsome:
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets. Security Protocols Workshop 2013: 94-114 - [c128]Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil D. Gligor:
KISS: "Key It Simple and Secure" Corporate Key Management. TRUST 2013: 1-18 - [c127]Chen Chen, Petros Maniatis, Adrian Perrig, Amit Vasudevan, Vyas Sekar:
Towards verifiable resource accounting for outsourced computation. VEE 2013: 167-178 - [c126]Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil D. Gligor:
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. WWW 2013: 679-690 - 2012
- [j32]Yung-Wei Kao, Xin Zhang, Ahren Studer, Adrian Perrig:
Mobile encryption for laptop data protection (MELP). IET Inf. Secur. 6(4): 291-298 (2012) - [j31]Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, Bruno Sinopoli:
Cyber-Physical Security of a Smart Grid Infrastructure. Proc. IEEE 100(1): 195-209 (2012) - [j30]Hossen Asiful Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig:
Jamming-Resilient Multipath Routing. IEEE Trans. Dependable Secur. Comput. 9(6): 852-864 (2012) - [c125]Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn:
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. AsiaCCS 2012: 48-49 - [c124]Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason I. Hong, Adrian Perrig, Debin Gao:
OTO: online trust oracle for user-centric trust establishment. CCS 2012: 391-403 - [c123]Jun Han, Emmanuel Owusu, Le T. Nguyen, Adrian Perrig, Joy Zhang:
ACComplice: Location inference using accelerometers on smartphones. COMSNETS 2012: 1-9 - [c122]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
GeoPKI: Converting Spatial Trust into Certificate Trust. EuroPKI 2012: 128-144 - [c121]Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague:
ShortMAC: Efficient Data-Plane Fault Localization. NDSS 2012 - [c120]Xin Zhang, Chang Lan, Adrian Perrig:
Secure and Scalable Fault Localization under Dynamic Traffic Patterns. IEEE Symposium on Security and Privacy 2012: 317-331 - [c119]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng:
LAP: Lightweight Anonymity and Privacy. IEEE Symposium on Security and Privacy 2012: 506-520 - [c118]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
Street-Level Trust Semantics for Attribute Authentication. Security Protocols Workshop 2012: 96-115 - [c117]Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig:
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms. TRUST 2012: 34-54 - [c116]Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig, Scott Shenker, Ion Stoica:
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. USENIX ATC 2012: 165-182 - [c115]Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, Joy Zhang:
ACCessory: password inference using accelerometers on smartphones. HotMobile 2012: 9 - 2011
- [b2]Bryan Parno, Jonathan M. McCune, Adrian Perrig:
Bootstrapping Trust in Modern Computers. Springer Briefs in Computer Science 10, Springer 2011, ISBN 978-1-4614-1459-9, pp. i-xv, 1-101 - [j29]Arvind Seshadri, Mark Luk, Adrian Perrig:
SAKE: Software attestation for key establishment in sensor networks. Ad Hoc Networks 9(6): 1059-1067 (2011) - [j28]Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn Song:
Secure Distributed Data Aggregation. Found. Trends Databases 3(3): 149-201 (2011) - [j27]Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker:
Access right assignment mechanisms for secure home networks. J. Commun. Networks 13(2): 175-186 (2011) - [c114]Yanlin Li, Jonathan M. McCune, Adrian Perrig:
VIPER: verifying the integrity of PERipherals' firmware. CCS 2011: 3-16 - [c113]Amit Vasudevan, Ning Qu, Adrian Perrig:
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms. HICSS 2011: 1-10 - [c112]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems. ICCCN 2011: 1-6 - [c111]Xin Zhang, Zongwei Zhou, Geoffrey Hasker, Adrian Perrig, Virgil D. Gligor:
Network fault localization with small TCB. ICNP 2011: 143-154 - [c110]Dongwon Seo, Heejo Lee, Adrian Perrig:
PFS: Probabilistic filter scheduling against distributed denial-of-service attacks. LCN 2011: 9-17 - [c109]Hsu-Chun Hsiao, Ahren Studer, Chen Chen, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer:
Flooding-resilient broadcast authentication for VANETs. MobiCom 2011: 193-204 - [c108]Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David G. Andersen:
SCION: Scalability, Control, and Isolation on Next-Generation Networks. IEEE Symposium on Security and Privacy 2011: 212-227 - [c107]Hossen Asiful Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig:
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation. WISEC 2011: 41-46 - [c106]Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig:
Efficient and secure threshold-based event validation for VANETs. WISEC 2011: 163-174 - [e4]Jonathan M. McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, M. Angela Sasse, Yolanta Beres:
Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings. Lecture Notes in Computer Science 6740, Springer 2011, ISBN 978-3-642-21598-8 [contents] - 2010
- [j26]Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Eric Li-Hsiang Kuo, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Adrian Perrig, Bo-Yin Yang, Hung-Min Sun, Phen-Lan Lin, Jason Lee:
SPATE: Small-Group PKI-Less Authenticated Trust Establishment. IEEE Trans. Mob. Comput. 9(12): 1666-1681 (2010) - [c105]Takamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig:
LSM-Based Secure System Monitoring Using Kernel Protection Schemes. ARES 2010: 591-596 - [c104]Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian Perrig, P. R. Kumar:
CRAFT: a new secure congestion control architecture. CCS 2010: 705-707 - [c103]Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
Dependable connection setup for network capabilities. DSN 2010: 301-310 - [c102]Xin Zhang, Adrian Perrig:
Correlation-Resilient Path Selection in Multi-Path Routing. GLOBECOM 2010: 1-6 - [c101]Keisuke Takemori, Adrian Perrig, Ning Qu, Yutaka Miyake:
Remote Attestation for HDD Files Using Kernel Protection Mechanism. ICC 2010: 1-6 - [c100]Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer:
VANET alert endorsement using multi-source filters. Vehicular Ad Hoc Networks 2010: 51-60 - [c99]Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig:
TrustVisor: Efficient TCB Reduction and Attestation. IEEE Symposium on Security and Privacy 2010: 143-158 - [c98]Haowen Chan, Adrian Perrig:
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes. IEEE Symposium on Security and Privacy 2010: 257-272 - [c97]Bryan Parno, Jonathan M. McCune, Adrian Perrig:
Bootstrapping Trust in Commodity Computers. IEEE Symposium on Security and Privacy 2010: 414-429 - [c96]Yanlin Li, Jonathan M. McCune, Adrian Perrig:
SBAP: Software-Based Attestation for Peripherals. TRUST 2010: 16-29 - [c95]Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig:
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture. TRUST 2010: 141-165 - [c94]Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker:
Challenges in Access Right Assignment for Secure Home Networks. HotSec 2010 - [c93]Ahren Studer, Adrian Perrig:
Mobile user location-specific encryption (MULE): using your office as your password. WISEC 2010: 151-162 - [e3]Adrian Perrig, Radu Sion:
Proceedings of the 2nd ACM Cloud Computing Security Workshop, CCSW 2010, Chicago, IL, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0089-6 [contents]
2000 – 2009
- 2009
- [j25]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: using camera phones for human-verifiable authentication. Int. J. Secur. Networks 4(1/2): 43-56 (2009) - [j24]Cynthia Kuo, Adrian Perrig, Jesse Walker:
Designing user studies for security applications: a case study with wireless network configuration. Int. J. Secur. Networks 4(1/2): 101-109 (2009) - [j23]Adrian Perrig, Wade Trappe, Virgil D. Gligor, Radha Poovendran, Heejo Lee:
Secure wireless networking. J. Commun. Networks 11(6): 323-327 (2009) - [j22]Ahren Studer, Fan Bai, Bhargav Bellur, Adrian Perrig:
Flexible, extensible, and efficient VANET authentication. J. Commun. Networks 11(6): 574-588 (2009) - [j21]Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Secur. Commun. Networks 2(4): 325-340 (2009) - [c92]Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
A Study of User-Friendly Hash Comparison Schemes. ACSAC 2009: 105-114 - [c91]Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun:
A Trustable Reputation Scheme Based on Private Relationships. ASONAM 2009: 19-24 - [c90]Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos:
Privacy-Preserving Relationship Path Discovery in Social Networks. CANS 2009: 189-208 - [c89]Adrian Perrig:
Building Secure Networked Systems with Code Attestation. CANS 2009: 278 - [c88]Ahren Studer, Adrian Perrig:
The Coremelt Attack. ESORICS 2009: 37-52 - [c87]Xin Zhang, Adrian Perrig, Hui Zhang:
Centaur: A Hybrid Approach for Reliable Policy-Based Routing. ICDCS 2009: 76-84 - [c86]Adrian Perrig:
Securing VANETs: industry approaches and current research directions. Vehicular Ad Hoc Networks 2009: 1-2 - [c85]Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang:
SPATE: small-group PKI-less authenticated trust establishment. MobiSys 2009: 1-14 - [c84]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Safe Passage for Passwords and Other Sensitive Data. NDSS 2009 - [c83]Ahren Studer, Elaine Shi, Fan Bai, Adrian Perrig:
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. SECON 2009: 1-9 - [c82]Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig:
CLAMP: Practical Prevention of Large-Scale Data Leaks. SP 2009: 154-169 - [c81]Virgil D. Gligor, Adrian Perrig, Jun Zhao:
Brief Encounters with a Random Key Graph. Security Protocols Workshop 2009: 157-161 - 2008
- [j20]Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica:
Securing user-controlled routing infrastructures. IEEE/ACM Trans. Netw. 16(3): 549-561 (2008) - [c80]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25 - [c79]Bryan Parno, Adrian Perrig, Dave G. Andersen:
SNAPP: stateless network-authenticated path pinning. AsiaCCS 2008: 168-178 - [c78]Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. AsiaCCS 2008: 201-204 - [c77]Haowen Chan, Adrian Perrig:
Efficient security primitives derived from a secure aggregation algorithm. CCS 2008: 521-534 - [c76]Xin Zhang, Abhishek Jain, Adrian Perrig:
Packet-dropping adversary identification for data plane security. CoNEXT 2008: 24 - [c75]Arvind Seshadri, Mark Luk, Adrian Perrig:
SAKE: Software Attestation for Key Establishment in Sensor Networks. DCOSS 2008: 372-385 - [c74]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki:
Flicker: an execution infrastructure for tcb minimization. EuroSys 2008: 315-328 - [c73]Alessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig:
Countermeasures against Government-Scale Monetary Forgery. Financial Cryptography 2008: 262-266 - [c72]Akbar M. Sayeed, Adrian Perrig:
Secure wireless communications: Secret keys through multipath. ICASSP 2008: 3013-3016 - [c71]Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu:
GAnGS: gather, authenticate 'n group securely. MobiCom 2008: 92-103 - [c70]Po-Yuan Teng, Shih-I Huang, Adrian Perrig:
Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. SEC 2008: 705-709 - [c69]Eiji Hayashi, Rachna Dhamija, Nicolas Christin, Adrian Perrig:
Use Your Illusion: secure authentication usable anywhere. SOUPS 2008: 35-45 - [c68]Dan Wendlandt, David G. Andersen, Adrian Perrig:
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. USENIX ATC 2008: 321-334 - [c67]Yu-Tso Chen, Ahren Studer, Adrian Perrig:
Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks. WCNC 2008: 2804-2809 - [c66]Cynthia Kuo, Ahren Studer, Adrian Perrig:
Mind your manners: socially appropriate wireless key establishment for groups. WISEC 2008: 125-130 - [p3]Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn:
Towards Sound Detection of Virtual Machines. Botnet Detection 2008: 89-116 - 2007
- [j19]Mahadev Satyanarayanan, Benjamin Gilbert, Matt Toups, Niraj Tolia, Ajay Surie, David R. O'Hallaron, Adam Wolbach, Jan Harkes, Adrian Perrig, David J. Farber, Michael Kozuch, Casey Helfrich, Partho Nath, H. Andrés Lagar-Cavilla:
Pervasive Personal Computing in an Internet Suspend/Resume System. IEEE Internet Comput. 11(2): 16-25 (2007) - [j18]Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song:
SIA: Secure information aggregation in sensor networks. J. Comput. Secur. 15(1): 69-102 (2007) - [j17]Ajay Surie, Adrian Perrig, Mahadev Satyanarayanan, David J. Farber:
Rapid Trust Establishment for Pervasive Personal Computing. IEEE Pervasive Comput. 6(4): 24-30 (2007) - [c65]Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig:
Intrusion Detection for Encrypted Web Accesses. AINA Workshops (1) 2007: 569-576 - [c64]Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig:
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. AsiaCCS 2007: 20-31 - [c63]Jason Franklin, Adrian Perrig, Vern Paxson, Stefan Savage:
An inquiry into the nature and causes of the wealth of internet miscreants. CCS 2007: 375-388 - [c62]Cynthia Kuo, Jesse Walker, Adrian Perrig:
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. Financial Cryptography 2007: 325-340 - [c61]Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor:
MiniSec: a secure sensor network communication architecture. IPSN 2007: 479-488 - [c60]Ramu Panayappan, Jayini Mukul Trivedi, Ahren Studer, Adrian Perrig:
VANET-based approach for parking space availability. Vehicular Ad Hoc Networks 2007: 75-76 - [c59]Ahren Studer, Mark Luk, Adrian Perrig:
Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs. SecureComm 2007: 422-432 - [c58]Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig:
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes. SenSys 2007: 233-246 - [c57]Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu:
Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300 - [c56]Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig:
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. SOSP 2007: 335-350 - [c55]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
Minimal TCB Code Execution. S&P 2007: 267-272 - [c54]Elaine Shi, John Bethencourt, T.-H. Hubert Chan, Dawn Xiaodong Song, Adrian Perrig:
Multi-Dimensional Range Query over Encrypted Data. S&P 2007: 350-364 - [c53]Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn:
Turtles All the Way Down: Research Challenges in User-Based Attestation. HotSec 2007 - [p2]Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. Malware Detection 2007: 253-289 - 2006
- [j16]Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
Externally verifiable code execution. Commun. ACM 49(9): 45-49 (2006) - [j15]Cynthia Kuo, Adrian Perrig, Jesse Walker:
Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration. Interactions 13(3): 28-31 (2006) - [j14]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2): 370-380 (2006) - [j13]Abraham Yaar, Adrian Perrig, Dawn Song:
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE J. Sel. Areas Commun. 24(10): 1853-1863 (2006) - [c52]Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
Secure hierarchical in-network aggregation in sensor networks. CCS 2006: 278-287 - [c51]Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig:
Secure sensor network routing: a clean-slate approach. CoNEXT 2006: 11 - [c50]Bryan Parno, Cynthia Kuo, Adrian Perrig:
Phoolproof Phishing Prevention. Financial Cryptography 2006: 1-19 - [c49]Yih-Chun Hu, David A. McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt:
(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP. HotNets 2006 - [c48]Adrian Perrig:
Security in sensor networks: industry trends, present and future research directions. IPSN 2006: 1 - [c47]Mark Luk, Adrian Perrig, Bram Whillock:
Seven cardinal properties of sensor network broadcast authentication. SASN 2006: 147-156 - [c46]Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig:
A Distributed Stealthy Coordination Mechanism for Worm Synchronization. SecureComm 2006: 1-8 - [c45]Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang:
Modeling adoptability of secure BGP protocol. SIGCOMM 2006: 279-290 - [c44]Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang:
Modeling adoptability of secure BGP protocols. SIGMETRICS/Performance 2006: 389-390 - [c43]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Bump in the Ether: A Framework for Securing Sensitive User Input. USENIX ATC, General Track 2006: 185-198 - [c42]Adrian Perrig:
Security in sensor networks: industry trends, present and future research directions. Workshop on Wireless Security 2006: 53 - [c41]Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
SCUBA: Secure Code Update By Attestation in sensor networks. Workshop on Wireless Security 2006: 85-94 - 2005
- [j12]Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan:
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Trans. Dependable Secur. Comput. 2(3): 233-247 (2005) - [j11]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wirel. Networks 11(1-2): 21-38 (2005) - [c40]Yih-Chun Hu, Markus Jakobsson, Adrian Perrig:
Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441 - [c39]Haowen Chan, Mark Luk, Adrian Perrig:
Using Clustering Information for Sensor Network Localization. DCOSS 2005: 109-125 - [c38]Haowen Chan, Adrian Perrig:
PIKE: peer intermediaries for key establishment in sensor networks. INFOCOM 2005: 524-535 - [c37]Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song:
FIT: fast Internet traceback. INFOCOM 2005: 1395-1406 - [c36]Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. SOSP 2005: 1-16 - [c35]Bryan Parno, Adrian Perrig, Virgil D. Gligor:
Distributed Detection of Node Replication Attacks in Sensor Networks. S&P 2005: 49-63 - [c34]Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter:
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. S&P 2005: 64-78 - [c33]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. S&P 2005: 110-124 - [c32]Elaine Shi, Adrian Perrig, Leendert van Doorn:
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. S&P 2005: 154-168 - [i2]Adrian Perrig, Dawn Song, Ran Canetti, J. D. Tygar, Bob Briscoe:
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction. RFC 4082: 1-22 (2005) - 2004
- [j10]Adrian Perrig, John A. Stankovic, David A. Wagner:
Security in wireless sensor networks. Commun. ACM 47(6): 53-57 (2004) - [j9]Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica:
Taming IP packet flooding attacks. Comput. Commun. Rev. 34(1): 45-50 (2004) - [j8]Yih-Chun Hu, Adrian Perrig:
A Survey of Secure Wireless Ad Hoc Routing. IEEE Secur. Priv. 2(3): 28-39 (2004) - [j7]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004) - [j6]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) - [j5]Elaine Shi, Adrian Perrig:
Designing secure sensor networks. IEEE Wirel. Commun. 11(6): 38-43 (2004) - [c31]Haowen Chan, Adrian Perrig:
ACE: An Emergent Algorithm for Highly Uniform Cluster Formation. EWSN 2004: 154-171 - [c30]Ross J. Anderson, Haowen Chan, Adrian Perrig:
Key Infection: Smart Trust for Smart Dust. ICNP 2004: 206-215 - [c29]James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig:
The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268 - [c28]Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, J. D. Tygar:
Distillation Codes and Applications to DoS Resistant Multicast Authentication. NDSS 2004 - [c27]Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica:
Brief announcement: towards a secure indirection infrastructure. PODC 2004: 383 - [c26]Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu:
SPV: secure path vector routing for securing BGP. SIGCOMM 2004: 179-192 - [c25]Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song:
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. S&P 2004: 130- - [c24]Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
SWATT: SoftWare-based ATTestation for Embedded Devices. S&P 2004: 272- - [e2]Markus Jakobsson, Adrian Perrig:
Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004. ACM 2004, ISBN 1-58113-925-X [contents] - 2003
- [b1]Adrian Perrig, J. Doug Tygar:
Secure broadcast communication in wired and wireless networks. Springer 2003, ISBN 978-0-7923-7650-7, pp. I-XIX, 1-214 - [j4]Yih-Chun Hu, David B. Johnson, Adrian Perrig:
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1(1): 175-192 (2003) - [j3]Haowen Chan, Adrian Perrig:
Security and Privacy in Sensor Networks. Computer 36(10): 103-105 (2003) - [c23]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. INFOCOM 2003: 1976-1986 - [c22]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Efficient Security Mechanisms for Routing Protocolsa. NDSS 2003 - [c21]Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perrig:
SIA: secure information aggregation in sensor networks. SenSys 2003: 255-265 - [c20]Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song:
Pi: A Path Identification Mechanism to Defend against DDoS Attack. S&P 2003: 93- - [c19]Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
Random Key Predistribution Schemes for Sensor Networks. S&P 2003: 197- - [c18]Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas C. Bressoud, Adrian Perrig:
Opportunistic Use of Content Addressable Storage for Distributed File Systems. USENIX ATC, General Track 2003: 127-140 - [c17]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Rushing attacks and defense in wireless ad hoc network routing protocols. Workshop on Wireless Security 2003: 30-40 - [e1]W. Douglas Maughan, Adrian Perrig:
Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003. ACM 2003, ISBN 1-58113-769-9 [contents] - 2002
- [j2]Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, David E. Culler:
SPINS: Security Protocols for Sensor Networks. Wirel. Networks 8(5): 521-534 (2002) - [c16]Yih-Chun Hu, Adrian Perrig, David B. Johnson:
Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom 2002: 12-23 - [c15]Yih-Chun Hu, David B. Johnson, Adrian Perrig:
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. WMCSA 2002: 3-13 - [i1]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Tree-based Group Key Agreement. IACR Cryptol. ePrint Arch. 2002: 9 (2002) - 2001
- [j1]Dawn Xiaodong Song, Sergey Berezin, Adrian Perrig:
Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis. J. Comput. Secur. 9(1/2): 47-74 (2001) - [c14]Dawn Xiaodong Song, Adrian Perrig, Doantam Phan:
AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. CAV 2001: 241-245 - [c13]Adrian Perrig:
The BiBa one-time signature and broadcast authentication protocol. CCS 2001: 28-37 - [c12]Dawn Xiaodong Song, Adrian Perrig:
Advanced and Authenticated Marking Schemes for IP Traceback. INFOCOM 2001: 878-886 - [c11]Adrian Perrig, Sean W. Smith, Dawn Xiaodong Song, J. D. Tygar:
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware. IPDPS 2001: 170 - [c10]Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar:
SPINS: security protocols for sensor netowrks. MobiCom 2001: 189-199 - [c9]Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar:
Efficient and Secure Source Authentication for Multicast. NDSS 2001 - [c8]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Communication-Efficient Group Key Agreement. SEC 2001: 229-244 - [c7]Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar:
ELK, A New Protocol for Efficient Large-Group Key Distribution. S&P 2001: 247-262 - 2000
- [c6]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Simple and fault-tolerant key agreement for dynamic collaborative groups. CCS 2000: 235-244 - [c5]Adrian Perrig, Dawn Song:
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. CSFW 2000: 64-76 - [c4]Adrian Perrig, Dawn Xiaodong Song:
A First Step Towards the Automatic Generation of Security Protocols. NDSS 2000 - [c3]Dawn Xiaodong Song, David A. Wagner, Adrian Perrig:
Practical Techniques for Searches on Encrypted Data. S&P 2000: 44-55 - [c2]Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
Efficient Authentication and Signing of Multicast Streams over Lossy Channels. S&P 2000: 56-73 - [c1]Rachna Dhamija, Adrian Perrig:
Deja Vu-A User Study: Using Images for Authentication. USENIX Security Symposium 2000
1990 – 1999
- 1997
- [p1]Alexander Herrigel, Adrian Perrig, Joseph Ó Ruanaidh:
A Copyright Protection Environment for Digital Images. Verläßliche IT-Systeme 1997: 1-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint