Adrian Perrig
Adrian Perrig
Professor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab Fellow
Verified email at - Homepage
Cited by
Cited by
SPINS: Security protocols for sensor networks
A Perrig, R Szewczyk, JD Tygar, V Wen, DE Culler
Wireless networks 8 (5), 521-534, 2002
Practical techniques for searches on encrypted data
DX Song, D Wagner, A Perrig
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000
Random key predistribution schemes for sensor networks
H Chan, A Perrig, D Song
2003 Symposium on Security and Privacy, 2003., 197-213, 2003
Ariadne: A secure on-demand routing protocol for ad hoc networks
YC Hu, A Perrig, DB Johnson
Proceedings of the 8th annual international conference on Mobile computing …, 2002
Packet leashes: a defense against wormhole attacks in wireless networks
YC Hu, A Perrig, DB Johnson
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
Security in wireless sensor networks
A Perrig, J Stankovic, D Wagner
Communications of the ACM 47 (6), 53-57, 2004
The sybil attack in sensor networks: analysis & defenses
J Newsome, E Shi, D Song, A Perrig
Third international symposium on information processing in sensor networks …, 2004
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
YC Hu, DB Johnson, A Perrig
Ad hoc networks 1 (1), 175-192, 2003
Efficient authentication and signing of multicast streams over lossy channels
A Perrig, R Canetti, JD Tygar, D Song
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000
TESLA broadcast authentication
A Perrig, JD Tygar
Secure Broadcast Communication, 29-53, 2003
Advanced and authenticated marking schemes for IP traceback
DX Song, A Perrig
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
Déjà Vu: a user study. Using Images for Authentication.
R Dhamija, A Perrig
USENIX Security Symposium, 45-58, 2000
Cyber–physical security of a smart grid infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2011
SIA: Secure information aggregation in sensor networks
B Przydatek, D Song, A Perrig
Proceedings of the 1st international conference on Embedded networked sensor …, 2003
Rushing attacks and defense in wireless ad hoc network routing protocols
YC Hu, A Perrig, DB Johnson
Proceedings of the 2nd ACM workshop on Wireless security, 30-40, 2003
Wormhole attacks in wireless networks
YC Hu, A Perrig, DB Johnson
IEEE journal on selected areas in communications 24 (2), 370-380, 2006
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
A Seshadri, M Luk, N Qu, A Perrig
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007
Efficient and secure source authentication for multicast
A Perrig, R Canetti, D Song, JD Tygar
Network and Distributed System Security Symposium, NDSS 1 (2001), 35-46, 2001
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005
The system can't perform the operation now. Try again later.
Articles 1–20