Peter Kruus
Peter Kruus
The Johns Hopkins Applied Physics Laboratory
Verified email at jhuapl.edu - Homepage
Title
Cited by
Cited by
Year
Constraints and Approaches for Distributed Sensor Network Security. dated September 1, 2000
DW Carman, PS Kruus, BJ Matt
NAI Labs Technical Report No. 00-010, 2001
969*2001
Constraints and approaches for distributed sensor network security (final)
DW Carman, PS Kruus, BJ Matt
DARPA Project report,(Cryptographic Technologies Group, Trusted Information …, 2000
9572000
TinyPK: securing sensor networks with public key technology
R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
8802004
A survey of multicast security issues and architectures
PS Kruus
NAVAL RESEARCH LAB WASHINGTON DC, 1998
751998
Techniques and issues in multicast security
PS Kruus, JP Macker
NAVAL RESEARCH LAB WASHINGTON DC, 1998
701998
Policy-based security management for large dynamic groups: An overview of the DCCM project
PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ...
discex, 0064, 2000
612000
System and method for key distribution in a hierarchical tree
PT Dinsmore, M Heyman, P Kruus, AT Sherman
US Patent 7,043,024, 2006
552006
A survey of steganography techniques for image files
P Kruus, C Scace, M Heyman, M Mundy
Advanced Security Research Journal.[On line] 5 (1), 41-52, 2003
512003
In-band wormholes and countermeasures in OLSR networks
P Kruus, D Sterne, R Gopaul, M Heyman, B Rivera, P Budulas, B Luu, ...
Securecomm and Workshops, 2006, 1-11, 2006
422006
System and method for measuring staleness of attestation during booting between a first and second device by generating a first and second time and calculating a difference …
DC Challener, PS Kruus
US Patent 8,667,263, 2014
272014
System and method for reusable efficient key distribution
PT Dinsmore, M Heyman, P Kruus, AT Sherman
US Patent 7,590,247, 2009
202009
Countering false accusations and collusion in the detection of in-band wormholes
D Sterne, G Lawler, R Gopaul, B Rivera, K Marcus, P Kruus
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
152007
Apparatus and Method for Preventing Access by Malware to Locally Backed Up Data
DC Challener, PS Kruus, RA Fink, JF Farlow
US Patent App. 15/255,551, 2017
112017
A communications security architecture and cryptographic mechanisms for distributed sensor networks
D Carman, B Matt, D Balenson, P Kruus
DARPA SensIT Workshop, 1999
111999
Key management in distributed sensor networking
D Carman, B Matt, P Kruus, D Balenson, D Branstad
DARPA Sensor IT Workshop, 2000
72000
Creating and maintaining a good intrusion detection hierarchy in dynamic ad hoc networks
A McAuley, K Manousakis, D Sterne, R Gopaul, P Kruus
Military Communications Conference, 2006. MILCOM 2006. IEEE, 1-6, 2006
62006
Gravitational analysis of the in-band wormhole phenomenon
R Gopaul, P Kruus, D Sterne, B Rivera
ARMY RESEARCH LAB ADELPHI MD, 2006
42006
Dynamic cryptographic context management (DCCM)
DM Balenson, P Dismore, M Heyman, PS Kruus, C Scace
TRUSTED INFORMATION SYSTEMS INC GLENWOOD MD, 2000
32000
Environmentally protected data storage container
PS Kruus, MD Heyman
US Patent App. 12/152,823, 2009
22009
On reporting of the time of attestation measurements
P Kruus, D Challener
Military Communications Conference, MILCOM 2015-2015 IEEE, 354-359, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20