Virgil D. Gligor
Affiliations:- Carnegie Mellon University, Pittsburgh, PA, USA
According to our database1,
Virgil D. Gligor
authored at least 169 papers
between 1978 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Proceedings of the Security Protocols XXVIII, 2023
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2019
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the Security Protocols XXVI, 2018
2017
IEEE Trans. Inf. Theory, 2017
IEEE Trans. Autom. Control., 2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Proceedings of the Security Protocols XXIV, 2016
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Toward k-Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links.
IEEE Trans. Inf. Theory, 2015
IEEE Trans. Inf. Theory, 2015
IEICE Trans. Commun., 2015
IEEE Secur. Priv., 2015
Random intersection graphs and their applications in security, wireless communication, and social networks.
CoRR, 2015
Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs.
CoRR, 2015
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
On <i>k</i>-Connectivity and Minimum Vertex Degree in Random <i>s</i>-Intersection Graphs.
Proceedings of the Twelfth Workshop on Analytic Algorithmics and Combinatorics, 2015
2014
On asymptotically exact probability of $k$-connectivity in random key graphs intersecting Erdős-Rényi graphs.
CoRR, 2014
Towards $k$-connectivity of the random graph induced by a pairwise key predistribution scheme with unreliable links.
CoRR, 2014
CoRR, 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
On the strengths of connectivity and robustness in general random intersection graphs.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014
2013
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure.
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the Security Protocols XXI, 2013
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
k-Connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On/Off Channel Model
CoRR, 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Security Protocols XX, 2012
Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Security Protocols XIX, 2011
Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the Computer Security, 2008
Position Statement: On the Evolution of Adversary Models in Computer Systems and Networks.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
2007
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007
On the evolution of adversary models in security protocols: from the beginning to sensor networks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).
Proceedings of the Security Protocols, 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005
2004
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004
Proceedings of the Security Protocols, 2004
2003
Proceedings of the Security Protocols, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Security Protocols, 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the Security Protocols, 2001
Proceedings of the Security Protocols, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
Proceedings of the Security Protocols, 2000
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion).
Proceedings of the Security Protocols, 2000
Proceedings of the 14th Conference on Systems Administration (LISA 2000), 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
1998
Proceedings of the Security Protocols, 1998
Proceedings of the Security Protocols, 1998
Application-Oriented Security Policies and Their Composition (Transcript of Discussion).
Proceedings of the Security Protocols, 1998
Proceedings of the Security and Privacy, 1998
1997
IEEE Trans. Knowl. Data Eng., 1997
1996
J. Comput. Secur., 1996
1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
1992
J. Comput. Secur., 1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code.
Proceedings of the Computer Security, 1992
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
IEEE Trans. Software Eng., 1990
IEEE Trans. Software Eng., 1990
IEEE Trans. Parallel Distributed Syst., 1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
1988
A formal specification and verification method for the prevention of denial of service.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
1987
IEEE Trans. Software Eng., 1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
Properties of Multiprocessor Scheduling Algorithms.
Proceedings of the International Conference on Parallel Processing, 1987
A Comparative Analysis of Multiprocessor Scheduling Algorithms.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987
1986
Inf. Syst., 1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
Proceedings of the Second International Conference on Data Engineering, 1986
1985
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985
1984
Concurrency Control Issues in Distributed Heterogeneous Database Management Systems.
Proceedings of the Distributed Data Sharing Systems, 1984
1983
Int. J. Parallel Program., 1983
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983
1982
1980
1979
IEEE Trans. Software Eng., 1979
Proceedings of the 6th Annual Symposium on Computer Architecture, 1979
1978
Representing Data Bases in Segmented Name Spaces.
Proceedings of the International Conference on Databases: Improving Usability and Responiveness, 1978