Adrian Perrig
Orcid: 0000-0002-5280-5412Affiliations:
- ETH Zürich, Switzerland
According to our database1,
Adrian Perrig
authored at least 319 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2016, "For contributions in protocols for network and system security".
IEEE Fellow
IEEE Fellow 2022, "for contributions to network and system security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements.
ACM Trans. Priv. Secur., November, 2024
CoRR, 2024
Charting Censorship Resilience & Global Internet Reachability: A Quantitative Approach.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024
Proceedings of the IFIP Networking Conference, 2024
Charting Censorship Resilience and Global Internet Reachability: A Quantitative Approach.
Proceedings of the IFIP Networking Conference, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Perform. Evaluation, November, 2023
CoRR, 2023
CoRR, 2023
Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia.
Proceedings of the 32nd USENIX Security Symposium, 2023
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 USENIX Annual Technical Conference, 2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion).
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the ACM SIGCOMM 2023 Conference, 2023
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023
Proceedings of the IFIP Networking Conference, 2023
Proceedings of the IFIP Networking Conference, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Proceedings of the 14th ACM International Conference on Future Energy Systems, 2023
2022
Information Security and Cryptography, Springer, ISBN: 978-3-031-05288-0, 2022
SN Comput. Sci., 2022
CoRR, 2022
Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers?
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Tango or square dance?: how tightly should we integrate network functionality in browsers?
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Perform. Evaluation, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 2021 USENIX Annual Technical Conference, 2021
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the Structural Information and Communication Complexity, 2021
Proceedings of the TAURIN'21: Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, 2021
Proceedings of the SIGCOMM '21: ACM SIGCOMM 2021 Conference, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
New Directions for High-throughput and High-security Communication.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the Critical Information Infrastructures Security, 2021
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021
Colibri: a cooperative lightweight inter-domain bandwidth-reservation infrastructure.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021
2020
Perform. Evaluation, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
sRDMA - Efficient NIC-based Authentication and Encryption for Remote Direct Memory Access.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the Structural Information and Communication Complexity, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proc. ACM Meas. Anal. Comput. Syst., 2019
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019
2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report).
CoRR, 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
Information Security and Cryptography, Springer, ISBN: 978-3-319-67079-9, 2017
Proc. Priv. Enhancing Technol., 2017
Comput. Commun. Rev., 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
J. Commun. Networks, 2016
Comput. Networks, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Dagstuhl Reports, 2015
SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks.
CoRR, 2015
Comput. Commun., 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015
Proceedings of the Eighth European Workshop on System Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 10th International Conference on Future Internet, 2015
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE/ACM Trans. Netw., 2014
Comput. Commun. Rev., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks.
Comput. Secur., 2013
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure.
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the Security Protocols XXI, 2013
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 2012 Workshop on Mobile Computing Systems and Applications, 2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Springer Briefs in Computer Science 10, Springer, ISBN: 978-1-4614-1460-5, 2011
J. Commun. Networks, 2011
Ad Hoc Networks, 2011
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
IEEE Trans. Mob. Comput., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the ARES 2010, 2010
2009
SEAR: a secure efficient <i>ad hoc</i> on demand routing protocol for wireless networks.
Secur. Commun. Networks, 2009
Int. J. Secur. Networks, 2009
Designing user studies for security applications: a case study with wireless network configuration.
Int. J. Secur. Networks, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Combining TLS and TPMs to Achieve Device and User Authentication for Wi-Fi and WiMAX Citywide Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
<i>Perspectives: </i> Improving SSH-style Host Authentication with Multi-Path Probing.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008
Proceedings of the IEEE International Conference on Acoustics, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
How low can you go?: recommendations for hardware-supported minimal TCB code execution.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
2007
Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems.
Proceedings of the Malware Detection, 2007
IEEE Pervasive Comput., 2007
IEEE Internet Comput., 2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007
Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense.
IEEE J. Sel. Areas Commun., 2006
Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration.
Interactions, 2006
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
Security in sensor networks: industry trends, present and future research directions.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
Proceedings of the 2006 USENIX Annual Technical Conference, 2006
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.
RFC, June, 2005
Wirel. Networks, 2005
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the Distributed Computing in Sensor Systems, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004
Proceedings of the Wireless Sensor Networks, First European Workshop, 2004
2003
Ad Hoc Networks, 2003
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003
Proceedings of the Network and Distributed System Security Symposium, 2003
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
Springer, ISBN: 978-0-7923-7650-7, 2003
2002
2001
J. Comput. Secur., 2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Communication-Efficient Group Key Agreement.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Network and Distributed System Security Symposium, 2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001
Proceedings of the CCS 2001, 2001
Proceedings of the Computer Aided Verification, 13th International Conference, 2001
2000
Proceedings of the 9th USENIX Security Symposium, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
Proceedings of the CCS 2000, 2000
1997
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997