Adrian Perrig
Adrian Perrig
Professor of Computer Science at ETH Zürich, Adjunct Professor of ECE and EPP at CMU
Verified email at inf.ethz.ch - Homepage
TitleCited byYear
SPINS: Security protocols for sensor networks
A Perrig, R Szewczyk, JD Tygar, V Wen, DE Culler
Wireless networks 8 (5), 521-534, 2002
54402002
Random key predistribution schemes for sensor networks
H Chan, A Perrig, D Song
figshare, 2003
39172003
Ariadne: A secure on-demand routing protocol for ad hoc networks
YC Hu, A Perrig, DB Johnson
Wireless networks 11 (1-2), 21-38, 2005
31702005
Practical techniques for searches on encrypted data
DX Song, D Wagner, A Perrig
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 44-55, 2000
30852000
Packet leashes: a defense against wormhole attacks in wireless networks
YC Hu, A Perrig, DB Johnson
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
2977*2003
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
YC Hu, DB Johnson, A Perrig
Ad hoc networks 1 (1), 175-192, 2003
19392003
Security in wireless sensor networks
A Perrig, J Stankovic, D Wagner
18682004
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Third international symposium on information processing in sensor networks …, 2004
17942004
Efficient authentication and signing of multicast streams over lossy channels
A Perrig, R Canetti, JD Tygar, D Song
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 56-73, 2000
12352000
Advanced and authenticated marking schemes for IP traceback
DX Song, A Perrig
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
12192001
Déjà Vu: a user study. Using Images for Authentication.
R Dhamija, A Perrig
USENIX Security Symposium, 45-58, 2000
11162000
Déjà Vu: A User Study. Using Images for Authentication.
R Dhamija, A Perrig
USENIX Security Symposium, 2000
11092000
The TESLA broadcast authentication protocol
A Perrig, R Canetti, JD Tygar, D Song
Rsa Cryptobytes 5 (2), 2-13, 2002
10982002
SIA: Secure information aggregation in sensor networks
B Przydatek, D Song, A Perrig
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
10122003
Rushing attacks and defense in wireless ad hoc network routing protocols
YC Hu, A Perrig, DB Johnson
Proceedings of the 2nd ACM workshop on Wireless security, 30-40, 2003
9282003
Efficient and secure source authentication for multicast
A Perrig, R Canetti, D Song, JD Tygar
Network and Distributed System Security Symposium, NDSS 1 (2001), 35-46, 2001
8872001
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
IEEE Symposium on Security and Privacy, 2005
8402005
A survey of secure wireless ad hoc routing
H Yih-Chun, A Perrig
IEEE Security & Privacy 2 (3), 28-39, 2004
8122004
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
ACM SIGOPS Operating Systems Review 42 (4), 315-328, 2008
7932008
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
A Seshadri, M Luk, N Qu, A Perrig
ACM SIGOPS Operating Systems Review 41 (6), 335-350, 2007
7892007
The system can't perform the operation now. Try again later.
Articles 1–20