Follow
Peter Kruus
Peter Kruus
The Johns Hopkins Applied Physics Laboratory
Verified email at jhuapl.edu
Title
Cited by
Cited by
Year
Constraints and Approaches for Distributed Sensor Network Security. dated September 1, 2000
DW Carman, PS Kruus, BJ Matt
NAI Labs Technical Report No. 00-010, 2001
1029*2001
Constraints and approaches for distributed sensor network security (final)
DW Carman, PS Kruus, BJ Matt
DARPA Project report,(Cryptographic Technologies Group, Trusted Information …, 2000
10212000
TinyPK: securing sensor networks with public key technology
R Watro, D Kong, S Cuti, C Gardiner, C Lynn, P Kruus
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
9552004
A survey of multicast security issues and architectures
PS Kruus
NAVAL RESEARCH LAB WASHINGTON DC, 1998
831998
Techniques and issues in multicast security
PS Kruus, JP Macker
NAVAL RESEARCH LAB WASHINGTON DC, 1998
761998
Policy-based security management for large dynamic groups: An overview of the DCCM project
PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ...
discex, 0064, 2000
632000
A survey of steganography techniques for image files
P Kruus, C Scace, M Heyman, M Mundy
Advanced Security Research Journal.[On line] 5 (1), 41-52, 2003
592003
System and method for key distribution in a hierarchical tree
PT Dinsmore, M Heyman, P Kruus, AT Sherman
US Patent 7,043,024, 2006
582006
In-band wormholes and countermeasures in OLSR networks
P Kruus, D Sterne, R Gopaul, M Heyman, B Rivera, P Budulas, B Luu, ...
Securecomm and Workshops, 2006, 1-11, 2006
412006
System and method for measuring staleness of attestation during booting between a first and second device by generating a first and second time and calculating a difference …
DC Challener, PS Kruus
US Patent 8,667,263, 2014
332014
System and method for reusable efficient key distribution
PT Dinsmore, M Heyman, P Kruus, AT Sherman
US Patent 7,590,247, 2009
202009
Apparatus and Method for Preventing Access by Malware to Locally Backed Up Data
DC Challener, PS Kruus, RA Fink, JF Farlow
US Patent App. 15/255,551, 2017
182017
Countering false accusations and collusion in the detection of in-band wormholes
D Sterne, G Lawler, R Gopaul, B Rivera, K Marcus, P Kruus
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
152007
A communications security architecture and cryptographic mechanisms for distributed sensor networks
D Carman, B Matt, D Balenson, P Kruus
DARPA SensIT Workshop, 1999
111999
Key management in distributed sensor networking
D Carman, B Matt, P Kruus, D Balenson, D Branstad
DARPA Sensor IT Workshop, 2000
72000
Creating and maintaining a good intrusion detection hierarchy in dynamic ad hoc networks
A McAuley, K Manousakis, D Sterne, R Gopaul, P Kruus
Military Communications Conference, 2006. MILCOM 2006. IEEE, 1-6, 2006
52006
Gravitational analysis of the in-band wormhole phenomenon
R Gopaul, P Kruus, D Sterne, B Rivera
ARMY RESEARCH LAB ADELPHI MD, 2006
42006
Environmentally protected data storage container
PS Kruus, MD Heyman
US Patent App. 12/152,823, 2009
32009
Dynamic cryptographic context management (DCCM)
DM Balenson, P Dismore, M Heyman, PS Kruus, C Scace
TRUSTED INFORMATION SYSTEMS INC GLENWOOD MD, 2000
32000
On reporting of the time of attestation measurements
P Kruus, D Challener
Military Communications Conference, MILCOM 2015-2015 IEEE, 354-359, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20