Follow
Adrian Perrig
Adrian Perrig
Professor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab Fellow
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
SPINS: Security protocols for sensor networks
A Perrig, R Szewczyk, V Wen, D Culler, JD Tygar
Proceedings of the 7th annual international conference on Mobile computing …, 2001
61422001
Practical techniques for searches on encrypted data
DX Song, D Wagner, A Perrig
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000
49922000
Random key predistribution schemes for sensor networks
H Chan, A Perrig, D Song
2003 Symposium on Security and Privacy, 2003., 197-213, 2003
44092003
Ariadne: A secure on-demand routing protocol for ad hoc networks
YC Hu, A Perrig, DB Johnson
Proceedings of the 8th annual international conference on Mobile computing …, 2002
34532002
Packet leashes: a defense against wormhole attacks in wireless networks
YC Hu, A Perrig, DB Johnson
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
26922003
Security in wireless sensor networks
A Perrig, J Stankovic, D Wagner
Communications of the ACM 47 (6), 53-57, 2004
21922004
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Proceedings of the 3rd international symposium on Information processing in …, 2004
21562004
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
YC Hu, DB Johnson, A Perrig
Ad hoc networks 1 (1), 175-192, 2003
21102003
Efficient authentication and signing of multicast streams over lossy channels
A Perrig, R Canetti, JD Tygar, D Song
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000
14442000
TESLA broadcast authentication
A Perrig, JD Tygar, A Perrig, JD Tygar
Secure Broadcast Communication: In Wired and Wireless Networks, 29-53, 2003
13692003
Déjà Vu: a user study. Using Images for Authentication.
R Dhamija, A Perrig
USENIX Security Symposium, 45-58, 2000
13392000
Advanced and authenticated marking schemes for IP traceback
DX Song, A Perrig
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
13212001
Cyber–physical security of a smart grid infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2011
13012011
SIA: Secure information aggregation in sensor networks
B Przydatek, D Song, A Perrig
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
11212003
Rushing attacks and defense in wireless ad hoc network routing protocols
YC Hu, A Perrig, DB Johnson
Proceedings of the 2nd ACM workshop on Wireless security, 30-40, 2003
10532003
Wormhole attacks in wireless networks
YC Hu, A Perrig, DB Johnson
IEEE journal on selected areas in communications 24 (2), 370-380, 2006
10302006
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
9942008
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
A Seshadri, M Luk, N Qu, A Perrig
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
9802007
Efficient and secure source authentication for multicast
A Perrig, R Canetti, D Song, JD Tygar
Network and distributed system security symposium, NDSS 1 (2001), 35-46, 2001
9802001
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005
9722005
The system can't perform the operation now. Try again later.
Articles 1–20