Adrian Perrig
#56,792
Most Influential Person Now
Swiss computer engineer
Adrian Perrig's AcademicInfluence.com Rankings
Adrian Perrigcomputer-science Degrees
Computer Science
#2148
World Rank
#2232
Historical Rank
Network Security
#3
World Rank
#3
Historical Rank
Database
#561
World Rank
#588
Historical Rank
Download Badge
Computer Science
Adrian Perrig's Degrees
- PhD Computer Science Carnegie Mellon University
- Masters Computer Science ETH Zurich
- Bachelors Computer Science ETH Zurich
Similar Degrees You Can Earn
Why Is Adrian Perrig Influential?
(Suggest an Edit or Addition)According to Wikipedia, Adrian Perrig is a Swiss computer science researcher and professor at ETH Zurich, leading the Network Security research group. His research focuses on networking and systems security, and specifically on the design of a secure next-generation internet architecture.
Adrian Perrig's Published Works
Published Works
- Practical techniques for searches on encrypted data (2000) (3550)
- Random key predistribution schemes for sensor networks (2003) (3326)
- Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks (2002) (2774)
- Packet leashes: a defense against wormhole attacks in wireless networks (2003) (1815)
- SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks (2002) (1730)
- The Sybil attack in sensor networks: analysis & defenses (2004) (1666)
- SPINS: Security Protocols for Sensor Networks (2001) (1359)
- Efficient authentication and signing of multicast streams over lossy channels (2000) (1118)
- SIA: secure information aggregation in sensor networks (2003) (1037)
- The TESLA Broadcast Authentication Protocol (2002) (1013)
- Deja Vu-A User Study: Using Images for Authentication (2000) (1002)
- Cyber–Physical Security of a Smart Grid Infrastructure (2012) (953)
- Advanced and authenticated marking schemes for IP traceback (2001) (921)
- Rushing attacks and defense in wireless ad hoc network routing protocols (2003) (840)
- Distributed detection of node replication attacks in sensor networks (2005) (834)
- Wormhole attacks in wireless networks (2006) (812)
- Flicker: an execution infrastructure for tcb minimization (2008) (778)
- Efficient and Secure Source Authentication for Multicast (2001) (774)
- SWATT: softWare-based attestation for embedded devices (2004) (735)
- A survey of secure wireless ad hoc routing (2004) (733)
- SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes (2007) (702)
- Designing secure sensor networks (2004) (679)
- Security and Privacy in Sensor Networks (2003) (636)
- Security in wireless sensor networks (2004) (629)
- TrustVisor: Efficient TCB Reduction and Attestation (2010) (619)
- Seeing-is-believing: using camera phones for human-verifiable authentication (2005) (564)
- Challenges in Securing Vehicular Networks (2005) (560)
- Tree-based group key agreement (2004) (556)
- Simple and fault-tolerant key agreement for dynamic collaborative groups (2000) (543)
- Multi-Dimensional Range Query over Encrypted Data (2007) (538)
- PIKE: peer intermediaries for key establishment in sensor networks (2005) (486)
- Pi: a path identification mechanism to defend against DDoS attacks (2003) (480)
- ACE: An Emergent Algorithm for Highly Uniform Cluster Formation (2004) (478)
- Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems (2005) (461)
- Challenges for Securing Cyber Physical Systems (2009) (443)
- An inquiry into the nature and causes of the wealth of internet miscreants (2007) (441)
- SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks (2004) (432)
- MiniSec: A Secure Sensor Network Communication Architecture (2007) (431)
- Secure hierarchical in-network aggregation in sensor networks (2006) (424)
- ELK, a new protocol for efficient large-group key distribution (2001) (414)
- ACCessory: password inference using accelerometers on smartphones (2012) (389)
- The BiBa one-time signature and broadcast authentication protocol (2001) (354)
- Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing (2008) (308)
- Key infection: smart trust for smart dust (2004) (304)
- TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs (2009) (300)
- BIND: a fine-grained attestation service for secure distributed systems (2005) (282)
- Hash Visualization: a New Technique to improve Real-World Security (1999) (273)
- SCUBA: Secure Code Update By Attestation in sensor networks (2006) (263)
- Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis (2001) (261)
- Secure wireless communications: Secret keys through multipath (2008) (255)
- FIT: fast Internet traceback (2005) (252)
- Portcullis: protecting connection setup from denial-of-capability attacks (2007) (236)
- Communication-Efficient Group Key Agreement (2001) (235)
- SPV: secure path vector routing for securing BGP (2004) (230)
- Flexible, extensible, and efficient VANET authentication (2009) (226)
- Phoolproof Phishing Prevention (2006) (225)
- On the distribution and revocation of cryptographic keys in sensor networks (2005) (224)
- StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense (2006) (213)
- Group key agreement efficient in communication (2004) (192)
- VIPER: verifying the integrity of PERipherals' firmware (2011) (185)
- ACComplice: Location inference using accelerometers on smartphones (2012) (184)
- Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction (2005) (181)
- Bootstrapping Trust in Commodity Computers (2010) (179)
- SCION: Scalability, Control, and Isolation on Next-Generation Networks (2011) (174)
- Wormhole Detection in Wireless Ad Hoc Networks (2002) (170)
- The Coremelt Attack (2009) (169)
- Detection of denial-of-message attacks on sensor network broadcasts (2005) (161)
- Use Your Illusion: secure authentication usable anywhere (2008) (160)
- Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure (2013) (156)
- SAKE: Software attestation for key establishment in sensor networks (2008) (147)
- Efficient Security Mechanisms for Routing Protocolsa (2003) (144)
- Taming IP packet flooding attacks (2004) (141)
- Secure broadcast communication in wired and wireless networks (2002) (138)
- Opportunistic Use of Content Addressable Storage for Distributed File Systems (2003) (136)
- Secure sensor network routing: a clean-slate approach (2006) (133)
- ARPKI: Attack Resilient Public-Key Infrastructure (2014) (133)
- Efficient Constructions for One-Way Hash Chains (2005) (120)
- Pervasive Personal Computing in an Internet Suspend/Resume System (2007) (119)
- Seven cardinal properties of sensor network broadcast authentication (2006) (117)
- Using Clustering Information for Sensor Network Localization (2005) (111)
- CLAMP: Practical Prevention of Large-Scale Data Leaks (2009) (110)
- Distillation Codes and Applications to DoS Resistant Multicast Authentication (2004) (109)
- HORNET: High-speed Onion Routing at the Network Layer (2015) (107)
- SPATE: Small-Group PKI-Less Authenticated Trust Establishment (2009) (106)
- Key distribution techniques for sensor networks (2004) (104)
- Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication (1999) (103)
- MiniBox: A Two-Way Sandbox for x86 Native Code (2014) (98)
- Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes (2007) (96)
- PsyBoG: A scalable botnet detection method for large-scale DNS traffic (2016) (93)
- GAnGS: gather, authenticate 'n group securely (2008) (91)
- VANET-based approach for parking space availability (2007) (90)
- Flooding-resilient broadcast authentication for VANETs (2011) (89)
- TESLA Broadcast Authentication (2003) (87)
- PoliCert: Secure and Flexible TLS Certificate Management (2014) (84)
- Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols (2000) (84)
- NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs ∗ (2005) (82)
- Bootstrapping Trust in Modern Computers (2011) (82)
- Packet-dropping adversary identification for data plane security (2008) (81)
- Lightweight source authentication and path validation (2014) (81)
- OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms (2013) (78)
- Safe Passage for Passwords and Other Sensitive Data (2009) (77)
- Bump in the Ether: A Framework for Securing Sensitive User Input (2006) (76)
- LAP: Lightweight Anonymity and Privacy (2012) (75)
- Efficient gossip protocols for verifying the consistency of Certificate logs (2015) (74)
- Modeling adoptability of secure BGP protocols (2006) (73)
- Fleet: defending SDNs from malicious administrators (2014) (70)
- Modeling adoptability of secure BGP protocol (2006) (69)
- How low can you go?: recommendations for hardware-supported minimal TCB code execution (2008) (69)
- AGVI - Automatic Generation, Verification, and Implementation of Security Protocols (2001) (69)
- Turtles all the way down: research challenges in user-based attestation (2007) (63)
- Minimal TCB Code Execution (2007) (63)
- SBAP: Software-Based Attestation for Peripherals (2010) (63)
- Challenges in Access Right Assignment for Secure Home Networks (2010) (62)
- VANET alert endorsement using multi-source filters (2010) (61)
- Privacy-Preserving Relationship Path Discovery in Social Networks (2009) (60)
- SCION: A Secure Internet Architecture (2017) (58)
- Towards verifiable resource accounting for outsourced computation (2013) (58)
- A First Step Towards the Automatic Generation of Security Protocols (2000) (57)
- Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs (2007) (57)
- A Study of User-Friendly Hash Comparison Schemes (2009) (57)
- SafeSlinger: easy-to-use and secure public-key exchange (2013) (57)
- Towards a More Functional and Secure Network Infrastructure (2003) (55)
- XIA: architecting a more trustworthy and evolvable internet (2014) (55)
- SIBRA: Scalable Internet Bandwidth Reservation Architecture (2015) (52)
- Secure Broadcast Communication (2003) (51)
- Intrusion Detection for Encrypted Web Accesses (2007) (51)
- SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks (2008) (50)
- Remote detection of virtual machine monitors with fuzzy benchmarking (2008) (50)
- A Clean-Slate Design for the Next-Generation Secure Internet (2006) (48)
- StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks (2003) (48)
- Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems (2012) (46)
- An Execution Infrastructure for TCB Minimization (2007) (45)
- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup (2007) (45)
- Jamming-Resilient Multipath Routing (2012) (45)
- BASE: an incrementally deployable mechanism for viable IP spoofing prevention (2007) (45)
- Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms (2012) (44)
- Efficient TCB Reduction and Attestation (2009) (43)
- Secure and Efficient Capability-Based Power Management in the Smart Grid (2011) (42)
- SDNsec: Forwarding Accountability for the SDN Data Plane (2016) (42)
- CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms (2012) (42)
- Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure (2016) (41)
- The SCION internet architecture (2017) (40)
- TESLA: Multicast Source Authentication Transform (2000) (40)
- OverDoSe: A Generic DDoS Protection Service Using an Overlay Network (2006) (39)
- Internet backbones in space (2020) (38)
- Efficient and secure threshold-based event validation for VANETs (2011) (37)
- Minimal TCB Code Execution (Extended Abstract) (2007) (37)
- OMAP: One-Way Memory Attestation Protocol for Smart Meters (2011) (36)
- Mobile user location-specific encryption (MULE): using your office as your password (2010) (36)
- Efficient security primitives derived from a secure aggregation algorithm (2008) (35)
- XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms (2011) (35)
- TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer (2018) (34)
- SafeSlinger: An Easy-to-use and Secure Approach for Human Trust Establishment (2012) (33)
- Secure and Scalable Fault Localization under Dynamic Traffic Patterns (2012) (33)
- Proceedings of the 2nd ACM workshop on Wireless security (2003) (32)
- Externally verifiable code execution (2006) (32)
- Lockdown: A Safe and Practical Environment for Security Applications (CMU-CyLab-09-011) (2009) (31)
- Don't Sweat Your Privacy Using Humidity to Detect Human Presence (2007) (30)
- Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005) (2011) (30)
- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture (2010) (30)
- SAM: a flexible and secure auction architecture using trusted hardware (2001) (30)
- Lightweight source authentication and path validation (2015) (30)
- PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem (2016) (30)
- KISS: "Key It Simple and Secure" Corporate Key Management (2013) (28)
- APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks (2013) (28)
- Network fault localization with small TCB (2011) (27)
- Networking in Heaven as on Earth (2018) (27)
- Mechanisms to Provide Integrity in SCADA and PCS devices ∗ (2008) (26)
- Rapid Trust Establishment for Pervasive Personal Computing (2007) (26)
- BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure (2018) (26)
- Towards Sound Detection of Virtual Machines (2008) (25)
- Mechanized Network Origin and Path Authenticity Proofs (2014) (25)
- User Recognition by Keystroke Latency Pattern Analysis (1997) (25)
- ShortMAC: Efficient Data-Plane Fault Localization (2012) (24)
- Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption∗ (2006) (24)
- An incrementally deployable anti-spoofing mechanism for software-defined networks (2015) (23)
- A Copyright Protection Environment for Digital Images (1997) (23)
- Access right assignment mechanisms for secure home networks (2011) (22)
- Refutation of "On the Difficulty of Software-Based Attestation o f Embedded Devices" (2010) (22)
- SNAPP: stateless network-authenticated path pinning (2008) (22)
- SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security (2018) (22)
- (R)Evolutionary Bootstrapping of a Global PKI for Securing BGP (2006) (22)
- SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory (2012) (22)
- Using FIRE & ICE for Detecting and Recovering Compromised Nodes in Sensor Networks (2004) (22)
- STRIDE: sanctuary trail -- refuge from internet DDoS entrapment (2013) (21)
- Toward a Taxonomy and Attacker Model for Secure Routing Protocols (2017) (21)
- Proceedings of the 2010 ACM workshop on Cloud computing security workshop (2010) (21)
- Bounds and Improvements for BiBa Signature Schemes (2002) (20)
- DFL: Secure and Practical Fault Localization for Datacenter Networks (2014) (20)
- Correlation-Resilient Path Selection in Multi-Path Routing (2010) (20)
- Reducing the trusted computing base for applications on commodity systems (2009) (19)
- PISKES: Pragmatic Internet-Scale Key-Establishment System (2020) (19)
- Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration (2006) (19)
- Control-plane isolation and recovery for a secure SDN architecture (2016) (18)
- PFS: Probabilistic filter scheduling against distributed denial-of-service attacks (2011) (18)
- Website Fingerprinting in the Age of QUIC (2021) (18)
- Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (2015) (18)
- EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet (2020) (18)
- SCIONLAB: A Next-Generation Internet Testbed (2020) (18)
- ReDMArk: Bypassing RDMA Security Mechanisms (2021) (18)
- Authentication Challenges in a Global Environment (2017) (17)
- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (2013) (17)
- sRDMA - Efficient NIC-based Authentication and Encryption for Remote Direct Memory Access (2020) (17)
- PsyBoG: Power spectral density analysis for detecting botnet groups (2014) (17)
- Adding Path Awareness to the Internet Architecture (2018) (16)
- Deployment challenges in log-based PKI enhancements (2015) (16)
- RITM: Revocation in the Middle (2016) (16)
- CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks (2016) (15)
- SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust (2019) (15)
- FastPass: Providing First-Packet Delivery (2006) (14)
- SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks (2015) (14)
- Deployment and scalability of an inter-domain multi-path routing infrastructure (2021) (14)
- Source Accountability with Domain-brokered Privacy (2016) (14)
- Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles (2014) (14)
- PRISM: Enabling Personal Verification of Code Integrity, Untampered Execution, and Trusted I/O on Legacy Systems or Human-Verifiable Code Execution (2007) (14)
- Using Software-based Attestation for Verifying Embedded Systems in Cars (2004) (13)
- OTO: online trust oracle for user-centric trust establishment (2012) (13)
- FAIR: Forwarding Accountability for Internet Reputability (2015) (13)
- Transparency Instead of Neutrality (2015) (13)
- The Case for In-Network Replay Suppression (2017) (13)
- A software primitive for externally-verifiable untampered execution and its applications to securing computing systems (2009) (13)
- Bounding Packet Dropping and Injection Attacks in Sensor Networks (2007) (12)
- High-Speed Inter-Domain Fault Localization (2016) (12)
- Mind your manners: socially appropriate wireless key establishment for groups (2008) (11)
- 1 CASA : A Framework for Context-Aware Scalable Authentication (2013) (11)
- Designing user studies for security applications: a case study with wireless network configuration (2009) (11)
- ICARUS: Attacking low Earth orbit satellite networks (2021) (10)
- CRAFT: a new secure congestion control architecture (2010) (9)
- LSM-Based Secure System Monitoring Using Kernel Protection Schemes (2010) (9)
- Modeling Data-Plane Power Consumption of Future Internet Architectures (2016) (9)
- Securing Wireless Sensor Networks (2009) (9)
- Evaluating predicates over encrypted data (2008) (9)
- Colibri: a cooperative lightweight inter-domain bandwidth-reservation infrastructure (2021) (9)
- Tumbler: Adaptable link access in the bots-infested Internet (2016) (9)
- Short Paper: On Deployment of DNS-Based Security Enhancements (2017) (9)
- Rapid Trust Establishment for Transient Use of Unmanaged Hardware (2006) (9)
- Reduction of end user errors in the design of scalable, secure communication (2008) (9)
- Help Me Help You: Using Trustworthy Host-Based Information in the Network (CMU-CyLab-09-016) (2009) (9)
- Accountability in future internet architectures (2014) (9)
- MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles (CMU-CyLab-14-006) (2014) (9)
- Lightweight Protection of Group Content Distribution (2015) (8)
- Secure Distributed Data Aggregation (2011) (8)
- Short paper: Jamming-resilient multipath routing leveraging availability-based correlation (2011) (8)
- Retroactive Packet Sampling for Traffic Receipts (2019) (8)
- GeoPKI: Converting Spatial Trust into Certificate Trust (2012) (8)
- Designing a Global Authentication Infrastructure (2015) (8)
- SAFES: Sand-boxed Architecture for Frequent Environment Self-measurement (2018) (8)
- Street-Level Trust Semantics for Attribute Authentication (2012) (7)
- Brief announcement: towards a secure indirection infrastructure (2004) (7)
- Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes (2010) (7)
- A Trustable Reputation Scheme Based on Private Relationships (2009) (7)
- Dependable connection setup for network capabilities (2010) (7)
- Internet Kill Switches Demystified (2017) (7)
- The Complete Guide to SCION: From Design Principles to Formal Verification (2022) (7)
- Source-Based Path Selection: The Data Plane Perspective (2015) (7)
- Communication based on per-packet One-Time Addresses (2016) (7)
- Efficient TCB Reduction and Attestation (CMU-CyLab-09-003) (2009) (6)
- ECO-DNS: Expected Consistency Optimization for DNS (2015) (6)
- Don’t Talk to Zombies: Mitigating DDoS Attacks via Attestation (CMU-CyLab-09-009) (2009) (6)
- Using trustworthy host-based information in the network (2012) (6)
- Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure (CMU-CyLab-12-016) (2012) (6)
- Mobile encryption for laptop data protection (MELP) (2012) (6)
- Secure and Scalable QoS for Critical Applications (2021) (6)
- Security Configuration for Non-Experts: A Case Study in Wireless Network Configuration (2009) (6)
- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (2013) (5)
- Secure and efficient network fault localization (2012) (5)
- Roots of Trust (2011) (5)
- Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network (2020) (5)
- Bypassing Network Flooding Attacks using FastPass (2006) (5)
- Security in wireless sensor networks - eScholarship (2004) (5)
- Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture (2018) (5)
- Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102) (2015) (5)
- Countermeasures against Government-Scale Monetary Forgery (2008) (5)
- Broadcast Data Authentication Concepts for Future SBAS Services (2020) (5)
- Towards Sustainable Evolution for the TLS Public-Key Infrastructure (2018) (5)
- RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication (CMU-CyLab-11-014) (2011) (4)
- Speed Records in Network Flow Measurement on FPGA (2021) (4)
- On a First Step to the Automatic Generation of Security Protocols (1999) (4)
- Deadline-Aware Multipath Communication: An Optimization Problem (2017) (4)
- CASTLE: CA signing in a touch-less environment (2016) (4)
- Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows (2021) (4)
- QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework (2022) (4)
- Ho-Po Key: Leveraging Physical Constraints on Human Motion to Authentically Exchange Information in a Group (CMU-CyLab-11-004) (2010) (4)
- SVLAN: Secure & Scalable Network Virtualization (2020) (4)
- Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks (2008) (4)
- Securing User-Controlled Routing Infrastructures (2008) (3)
- Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks (2008) (3)
- Securing VANETs: industry approaches and current research directions (2009) (3)
- Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures (2021) (3)
- Centaur: A Hybrid Approach for Reliable Policy-Based Routing (2009) (3)
- Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference (2013) (3)
- Retroactive Packet Sampling for Traffic Receipts (2019) (3)
- Configuration File Formats (2017) (3)
- Bootstrapping Real-world Deployment of Future Internet Architectures (2015) (3)
- Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures (2021) (3)
- Empowering Ordinary Consumers to Securely Configure their Mobile Devices and Wireless Networks (2005) (3)
- Sensor Network Security (2003) (3)
- Colibri (2021) (3)
- Chapter 28. Security and Privacy for Sensor Networks (2010) (3)
- Hopper (2022) (3)
- Incentivizing Stable Path Selection in Future Internet Architectures (2020) (3)
- WIRELESS SENSOR NETWORKS DESIGNING SECURE SENSOR NETWORKS (2)
- Mental Trapdoors for User Authentication on Small Mobile Devices (2007) (2)
- Liam: An Architectural Framework for Decentralized IoT Networks (2019) (2)
- Proxy Certificates: The Missing Link in the Web's Chain of Trust (2019) (2)
- Usable key agreement in home networks (2009) (2)
- Bootstrapping privacy services in today's internet (2019) (2)
- A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems (2011) (2)
- Network Transparency for Better Internet Security (2019) (2)
- Carbon Footprints on Inter-Domain Paths: Uncovering CO2 Tracks on Global Networks (2022) (2)
- Global Distributed Secure Mapping of Network Addresses (2021) (2)
- Trusted Computing Technologies for Embedded Systems and Sensor Networks (2007) (2)
- GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm (2021) (2)
- Availability-Oriented Path Selection in Multi-Path Routing (2007) (2)
- Flexible, Extensible, and Efficient VANET Authentication (CMU-CyLab-08-010) (2008) (2)
- A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds (2015) (2)
- Authenticated communication and computation in known-topology networks with a trusted authority (2009) (2)
- N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures (2022) (2)
- A Distributed Stealthy Coordination Mechanism for Worm Synchronization (2006) (2)
- A Paged Domain Name System for Query Privacy (2017) (2)
- Linc: low-cost inter-domain connectivity for industrial systems (2021) (2)
- Coordination of anti-spoofing mechanisms in partial deployments (2016) (2)
- Secure wireless networking (2009) (2)
- New Directions for User Authentication : Reflex instead of Reflection (2010) (2)
- Pervasive Internet-Wide Low-Latency Authentication (2021) (1)
- Bump in the Ether: Mobile Phones as Proxies for Sensitive Input (2005) (1)
- Creating a Secure Underlay for the Internet (2022) (1)
- Tango or square dance?: how tightly should we integrate network functionality in browsers? (2022) (1)
- The Value of Information in Selfish Routing (2020) (1)
- Mondrian: Comprehensive Inter-domain Network Zoning Architecture (2021) (1)
- Model-based insights on the performance, fairness, and stability of BBR (2022) (1)
- Challenges in Bootstrapping Trust in Secure Hardware (2011) (1)
- Revised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 8267 (2013) (1)
- Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (2019) (1)
- An Axiomatic Perspective on the Performance Effects of End-Host Path Selection (2021) (1)
- UAS: Universal anti-spoofing by incorporating existing mechanisms (2013) (1)
- Validating the Process (2011) (1)
- The SCION Internet Architecture An Internet Architecture for the 21 st Century (2017) (1)
- CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report) (2018) (1)
- Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003 (2003) (1)
- Data-Plane Energy Efficiency of a Next-Generation Internet Architecture (2022) (1)
- Monetary Forgery in the Digital Age: Will Physical-Digital Cash Be a Solution? (2012) (1)
- DoCile: Taming Denial-of-Capability Attacks in Inter-Domain Communications (2022) (1)
- On Building Onion Routing into Future Internet Architectures (2015) (1)
- Forwarding Accountability: A Challenging Necessity of the Future Data Plane (2015) (1)
- Security in sensor networks: industry trends, present and future research directions (2006) (1)
- Information security applications : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers (2014) (1)
- TrueNet : Efficient Fault Localization with Small TCB (2011) (1)
- The SCION Architecture (2017) (1)
- SVLAN: Secure & Scalable Network Virtualization. (2020) (1)
- Trust and Trustworthy Computing : 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings (2011) (1)
- F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure (2021) (1)
- A Formally Verified Protocol for Log Replication with Byzantine Fault Tolerance (2020) (1)
- Procédés et appareil pour chemin sécurisé vérifiable par l'utilisateur en présence d'un logiciel malveillant (2010) (0)
- Packet and Message Formats (2017) (0)
- Rendering Wormhole Attacks Trivial using the Scalability Features of a Geocasting Protocol (2016) (0)
- SAGE: Software-based Attestation for GPU Execution (2022) (0)
- Ubiquitous Secure Communication in a Future Internet Architecture (2022) (0)
- Privacy-preserving Path Discovery in Social Networks (0)
- Exciting Security Research Opportunity: Next-generation Internet (2014) (0)
- Performance Analysis of Trust Based AODV for Wireless Sensor Networks (2020) (0)
- Designing Robust and Resilient Tactical MANETs (2014) (0)
- Denial of Services & Counter Measurements (2004) (0)
- Estimation based Efficient and Resilient Hierarchical In-Network Data Aggregation Scheme for Wireless Sensor Network (2016) (0)
- Security Attacks and Defensive Measures for Routing Mechanisms in MANETs – A Survey (2017) (0)
- Security Attacks and Defensive Measures for Routing Mechanisms in MANETs – A Survey (2017) (0)
- Global Communication Guarantees in the Presence of Adversaries (2020) (0)
- DefAT: Dependable Connection Setup for Network Capabilities (CMU-CyLab-11-018) (2011) (0)
- Session details: Security (2011) (0)
- Bayesian Sketches for Volume Estimation in Data Streams (2022) (0)
- Remote Attestation for HDD Files Using Kernel Protection Mechanism (2010) (0)
- Verifiable Cloud Outsourcing for Network Func9ons (+ Verifiable Resource Accoun9ng for Cloud Services) Vnfo Joint with Seyed Fayazbakhsh, Mike Reiter Vra Joint With (0)
- Systèmes et procédés permettant de conserver une intégrité et une confidentialité dans des plates-formes informatiques non sécurisées (2014) (0)
- Deployment and Operation (2017) (0)
- Designing Robust and Resilient Tactical MANETs Report Title (2015) (0)
- Chapter 1 KEY DISTRIBUTION TECHNIQUES FOR SENSOR NETWORKS (0)
- What Do We Need to Know? Techniques for Recording Platform State (2011) (0)
- Computer Security on the Edge (2007) (0)
- Can We Use Platform Information Locally (2011) (0)
- 1 Browser Enhancements for Preventing Phishing Attacks (2006) (0)
- ELK Key Distribution (2003) (0)
- Secure Routing for the Internet (Dagstuhl Seminar 18242) (2018) (0)
- DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet? (2016) (0)
- Designing a Global Authentication Infrastructure ( extended version ) (2015) (0)
- The design of a digital watermarking application (1997) (0)
- FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks (2023) (0)
- Talk to Zombies : Mitigating DDoS Attacks via (2009) (0)
- Wormhole Detection and Removal Algorithm in Mobile Ad-hoc Networks using Enhanced Cluster based Technique (2018) (0)
- DATA PRIVACY PRESERVING USING KNN CLASSIFICATION OVER ENCRYPTED DATA IN CLOUD Mythily (2016) (0)
- ShortMAC: Efficient Data-Plane Fault Localization (CMU-CyLab-11-007) (2011) (0)
- Consent Routing: Towards Bilaterally Trusted Communication Paths (2022) (0)
- Report from Dagstuhl Seminar 18242 Secure Routing for the Internet (2019) (0)
- On the implementation of path-based dynamic pricing in edge-directed routing (2016) (0)
- Session details: Network architecture 1 (2014) (0)
- MiniSec: ASecureSensorNetwork Communication Architecture (2007) (0)
- Power Efficient Data Fusion Assurance Scheme for Sensor Network using Silent Negative Voting (2016) (0)
- GAnGS: Gather, Authenticate ’n Group Securely (CMU-CyLab-08-007) (2008) (0)
- Hopper: Per-Device Nano Segmentation for the Industrial IoT (2022) (0)
- Using Humidity to Detect Human Presence (2007) (0)
- DefAT: Dependable Connection Setup for Network Capabilities (2011) (0)
- Isolation Domains (ISDs) (2017) (0)
- OPT and DRKey (2017) (0)
- Can We Use Platform Information Remotely (2011) (0)
- Building Secure Networked Systems with Code Attestation (2009) (0)
- New Directions for High-throughput and High-security Communication (2021) (0)
- Protecting Critical Inter-Domain Communication through Flyover Reservations (2022) (0)
- Energy Efficient Star Based Distributed Clone Detection in Wireless Ad-Hoc Network (2017) (0)
- Session details: Network architecture 1 (2015) (0)
- NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications (2022) (0)
- Carbon-Intelligent Global Routing in Path-Aware Networks (2022) (0)
- SDNsec: Forwarding Accountability for Internet Reputability (2016) (0)
- To Carry or To Find ? (2006) (0)
- EMSS, MESS, & HTSS: Signatures for Broadcast (2003) (0)
- CRAFT (2010) (0)
- Proceedings of the 3rd international conference on Trust and trustworthy computing (2010) (0)
- BiBa Broadcast Authentication (2003) (0)
- Retroactive Packet Sampling for Traffic Receipts (2019) (0)
- Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004 (2004) (0)
- Linc (2021) (0)
- Routing and Addressing (2021) (0)
- Tableau: Future-Proof Zoning for OT Networks (2021) (0)
- Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing (2021) (0)
- Implementing Trust Bootstrapping: Open Source Tools (2011) (0)
- G-SINC: Global Synchronization Infrastructure for Network Clocks (2022) (0)
- Human Factors & Usability (2011) (0)
- Public Review for Bootstrapping Privacy Services in Today ’ s Internet (2019) (0)
- Quantifying and Preventing Privacy Threats in Wireless Link Layer Protocols (2007) (0)
- Selfish Aware Context based Reactive Queue Scheduling Mechanism for MANETs (2016) (0)
- Network Fault Localization (2012) (0)
- Effect Mitigation of IoT Attacks in Future Internet Architectures (2017) (0)
- How Do We Make Sense of Platform State (2011) (0)
- Sanctuary Trail: Refuge from Internet DDoS Entrapment (CMU-CyLab-12-013) (2012) (0)
- Number 13 (2017) (0)
- Nevermore (2020) (0)
This paper list is powered by the following services:
Other Resources About Adrian Perrig
What Schools Are Affiliated With Adrian Perrig?
Adrian Perrig is affiliated with the following schools: