aperrig

Prof. Dr. Adrian Perrig

CAB F 85.1
Universit├Ątstrasse 6
8092 Z├╝rich

Phone: +41 44 632 99 69
E-Mail: adrian.perrig@inf.ethz.ch



Publications

2017


PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer 
 [bibtex]
Chen Chen, Adrian Perrig.
In Proceedings on Privacy Enhancing Technologies (PoPETs) 2017.


2016


Communication Based on Per-Packet One-Time Addresses 
 [bibtex]
Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig.
In Proceedings of the IEEE Conference on Network Protocols (ICNP) 2016.

Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure 
 [bibtex] [doi]
David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski.
In IEEE Transactions on Dependable and Secure Computing (TDSC) 2016. (to appear)
Research Area: Public Key Infrastructures

SDNsec: Forwarding Accountability for the SDN Data Plane 
 [bibtex]
Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig.
Technical report, ETH Zurich 2016.

On the Implementation of Path-Based Dynamic Pricing in Edge-Directed Routing 
 [bibtex]
Jumpei Urakawa, Cristina Basescu, Kohei Sugiyama, Christos Pappas, Akira Yamada, Ayumu Kubota, Adrian Perrig.
In Proceedings of the IEEE Asia-Pacific Conference on Communications (APCC) 2016.

SDNsec: Forwarding Accountability for the SDN Data Plane 
 [bibtex]
Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig.
In Proceedings of the IEEE International Conference on Computer Communication and Networks (ICCCN) 2016.

RITM: Revocation in the Middle 
 [bibtex] [doi]
Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig.
In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS) 2016. (Best Paper Award)
Research Area: Public Key Infrastructures

CICADAS: Congesting the Internet with Coordinated And Decentralized Pulsating Attacks 
 [bibtex]
Yu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, Vyas Sekar.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2016.

High-Speed Inter-domain Fault Localization 
 [bibtex]
Cristina Basescu, Yue-Hsun Lin, Haoming Zhang, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2016.

PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem 
 [bibtex] [doi]
Pawel Szalachowski, Laurent Chuat, Adrian Perrig.
In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P) 2016.
Research Area: Public Key Infrastructures

SIBRA: Scalable Internet Bandwidth Reservation Architecture 
 [bibtex]
Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2016.
Research Area: Distributed Denial of Service Defenses


2015


On Building Onion Routing into Future Internet Architectures 
 [bibtex]
Daniele E. Asoni, Chen Chen, David Barrera, Adrian Perrig.
In IFIP WG 11.4 International Workshop (iNetSec). Revised Selected Papers (Dogan Kesdogan, Jan Camenisch, eds.) Springer LNCS 2015.

HORNET: High-speed Onion Routing at the Network Layer 
 [bibtex]
Chen Chen, Daniele E. Asoni, David Barrera, George Danezis, Adrian Perrig.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2015.
Research Area: High-speed Anonymous Communication

Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs 
 [bibtex] [doi]
Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri.
In Proceedings of the IEEE Conference on Communications and Network Security (CNS) 2015.
Research Area: Public Key Infrastructures

SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks 
 [bibtex]
David Barrera, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig.
In arXiv e-prints 2015. (arXiv:1508.01651)
Research Area: SCION

ECO-DNS: Expected Consistency Optimization for DNS 
 [bibtex]
Chen Chen, Stephanos Matsumoto, Adrian Perrig.
In Proceedings of the IEEE International Conference on Distributed Computing System (ICDCS) 2015.

Source-Based Path Selection: The Data Plane Perspective 
 [bibtex]
Taeho Lee, Christos Pappas, Cristina Basescu, Jun Han, Torsten Hoefler, Adrian Perrig.
In Proceedings of the ACM Conference on Future Internet Technologies (CFI) 2015.

Deployment Challenges in Log-Based PKI Enhancements 
 [bibtex]
Stephanos Matsumoto, Pawel Szalachowski, Adrian Perrig.
In Proceedings of the Eighth European Workshop on System Security (EuroSec) 2015.
Research Area: Public Key Infrastructures

Lightweight Protection of Group Content Distribution 
 [bibtex] [doi]
Pawel Szalachowski, Adrian Perrig.
In Proceedings of the ASIACCS Workshop on IoT Privacy, Trust, and Security (IoTPTS) 2015.

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction 
 [bibtex]
Yanlin Li, Yueqiang Cheng, Virgil Gligor, Adrian Perrig.
In Proceedings of International Workshop on Security Protocols (SPW) 2015.

Transparency Instead of Neutrality 
 [bibtex]
Christos Pappas, Katerina Argyraki, Stefan Bechtold, Adrian Perrig.
In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets) 2015.

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds 
 [bibtex]
Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig.
In Proceedings of the IEEE International Conference on Network Protocols (ICNP) 2015.
Research Area: Distributed Denial of Service Defenses

FAIR: Forwarding Accountability for Internet Reputability 
 [bibtex]
Christos Pappas, Raphael M. Reischuk, Adrian Perrig.
In Proceedings of the IEEE International Conference on Network Protocols (ICNP) 2015.
Research Area: Distributed Denial of Service Defenses

Forwarding Accountability: A Challenging Necessity of the Future Data Plane 
 [bibtex]
Christos Pappas, Raphael M. Reischuk, Adrian Perrig.
In Post-proceedings of the IFIP WG 11.4 Workshop on Open Research Problems in Network Security (iNetSec) 2015.
Research Area: Distributed Denial of Service Defenses


2014


ARPKI: Attack Resilient Public-Key Infrastructure 
 [bibtex] [doi]
David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2014.
Research Area: Public Key Infrastructures

PoliCert: Secure and Flexible TLS Certificate Management 
 [bibtex] [doi]
Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2014.
Research Area: Public Key Infrastructures

Mechanized Network Origin and Path Authenticity Proofs 
 [bibtex] [doi]
Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig.
In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) 2014.

Accountability in Future Internet Architectures 
 [bibtex]
Stefan Bechtold, Adrian Perrig.
In Communications of the ACM volume 57(9) 2014.

Fleet: defending SDNs from malicious administrators 
 [bibtex]
Stephanos Matsumoto, Samuel Hitz, Adrian Perrig.
In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking (HotSDN) 2014.

Lightweight Source Authentication and Path Validation 
 [bibtex] [doi]
Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig.
In Proceedings of ACM SIGCOMM 2014.

MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles 
 [bibtex]
Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai.
In Proceedings of ACM conference on Security and Privacy in Wireless & Mobile Networks (WiSec) 2014. (Short paper)

MiniBox: A Two-Way Sandbox for x86 Native Code 
 [bibtex]
Yanlin Li, Jonathan M. McCune, James Newsome, Adrian Perrig, Brandon Baker, Will Drewry.
In Proceedings of the USENIX Annual Technical Conference (USENIX ATC) 2014.

MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles 
 [bibtex]
Jun Han, Yue-Hsun Lin, Adrian Perrig, Fan Bai.
Technical report, Carnegie Mellon University 2014.

MiniBox: A Two-Way Sandbox for x86 Native Code 
 [bibtex]
Yanlin Li, Adrian Perrig, Jonathan M. McCune, James Newsome, Brandon Baker, Will Drewry.
Technical report, Carnegie Mellon University 2014.


2013


OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms 
 [bibtex]
Emmanuel Owusu, Jorge Guajardo, Jonathan McCune, Jim Newsome, Adrian Perrig, Amit Vasudevan.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2013.

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange 
 [bibtex]
Michael Farb, Yue-Hsun Lin, Tiffany Hyun-Jin Kim, Jonathan M. McCune, Adrian Perrig.
In Proceedings of ACM Annual International Conference on Mobile Computing and Networking (MobiCom) 2013.

KISS: "Key it Simple and Secure" Corporate Key Management 
 [bibtex]
Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor.
In Proceedings of International Conference on Trust and Trustworthy Computing (TRUST) 2013.

STRIDE: Sanctuary Trail -- Refuge from Internet DDoS Entrapment 
 [bibtex]
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Xin Zhang, Sangjae Yoo, Virgil Gligor, Adrian Perrig.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2013.
Research Area: Distributed Denial of Service Defenses

Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure 
 [bibtex]
Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil Gligor.
In Proceedings of International World Wide Web Conference (WWW) 2013.
Research Area: Public Key Infrastructures

Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference 
 [bibtex]
Tiffany Hyun-Jin Kim, Virgil Gligor, Jorge Guajardo, Jason Hong, Adrian Perrig.
In Proceedings of Workshop on Usable Security (USEC) 2013.

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication 
 [bibtex]
Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong, Adrian Perrig.
In Proceedings of Financial Cryptography and Data Security 2013.

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets 
 [bibtex]
Jun Zhao, Virgil Gligor, Adrian Perrig, James Newsome.
In Proceedings of International Workshop on Security Protocols 2013.

Towards Verifiable Resource Accounting for Outsourced Computation 
 [bibtex]
Chen Chen, Petros Maniatis, Adrian Perrig, Amit Vasudevan, Vyas Sekar.
In Proceedings of International Conference on Virtual Execution Environments (VEE) 2013.


2012


OTO: Online Trust Oracle for User-Centric Trust Establishment 
 [bibtex]
Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig, Debin Gao.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2012.

Using Trustworthy Host-Based Information in the Network 
 [bibtex]
Bryan Parno, Zongwei Zhou, Adrian Perrig.
In Proceedings of ACM Workshop on Scalable Trusted Computing (STC) 2012.

Transparent Key Integrity (TKI): A Proposal for a Public-Key Validation Infrastructure 
 [bibtex]
Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil Gligor.
Technical report, Carnegie Mellon University 2012.

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems 
 [bibtex]
Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig, Scott Shenker, Ion Stoica.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2012.

Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms 
 [bibtex]
Amit Vasudevan, Bryan Parno, Ning Qu, Virgil Gligor, Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (TRUST) 2012.

Secure and Scalable Network Fault Localization under Dynamic Traffic Patterns 
 [bibtex]
Xin Zhang, Chang Lan, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2012.

CARMA: A Hardware Tamper-Resistant Isolated Execution Environment on Commodity x86 Platforms 
 [bibtex]
Amit Vasudevan, Jonathan McCune, James Newsome, Adrian Perrig, Leendert van Doorn.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2012.

LAP: Lightweight Anonymity and Privacy 
 [bibtex]
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng.
In Proceedings of IEEE Symposium on Security and Privacy 2012.

Street-Level Trust Semantics for Attribute Authentication 
 [bibtex]
Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig.
In Proceedings of International Workshop on Security Protocols 2012.

ACCessory: Keystroke Inference using Accelerometers on Smartphones 
 [bibtex]
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, Joy Zhang.
In Procceedings of Workshop on Mobile Computing Systems and Applications (HotMobile) 2012.

Cyber-Physical Security of a Smart Grid Infrastructure 
 [bibtex]
Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, Bruno Sinopoli.
In Proceedings of the IEEE volume 100(1) 2012.

ACComplice: Location Inference using Accelerometers on Smartphones 
 [bibtex]
Jun Han, Emmanuel Owusu, Thanh-Le Nguyen, Adrian Perrig, Joy Zhang.
In Proceedings of International Conference on Communication Systems and Networks (COMSNETS) 2012.

GeoPKI: Converting Spatial Trust into Certificate Trust 
 [bibtex]
Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig.
In Proceedings of European PKI Workshop (EuroPKI) 2012.

ShortMAC: Efficient Data Plane Fault Localization 
 [bibtex]
Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Adrian Perrig, Patrick Tague.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2012.


2011


Bootstrapping Trust in Modern Computers 
 [bibtex]
Bryan Parno, Jonathan M. McCune, Adrian Perrig.
SpringerBriefs in Computer Science 2011.

PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks 
 [bibtex]
Dongwon Seo, Heejo Lee, Adrian Perrig.
In Proceedings of IEEE Conference on Local Computer Networks (LCN) 2011.

A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems 
 [bibtex]
Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig.
In Proceedings of IEEE International Conference on Computer Communications and Networks (ICCCN) 2011.

Short Paper: Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation 
 [bibtex]
Hossen Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WiSec) 2011.

Efficient and Secure Threshold-based Event Validation for VANETs 
 [bibtex]
Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WiSec) 2011.

SCION: Scalability, Control, and Isolation On Next-Generation Networks 
 [bibtex]
Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, David G. Andersen.
In Proceedings of IEEE Symposium on Security and Privacy 2011.
Research Area: SCION

OMAP:One-way Memory Attestation Protocol for Smart Meters [bibtex]
Kyungsub Song, Dongwon Seo, Haemin Park, Heejo Lee, Adrian Perrig.
In The International Workshop on Smart Grid Security and Communications (SGSC) 2011.

Secure and Efficient Capability-based Power Management in the Smart Grid [bibtex]
Dongwon Seo, Heejo Lee, Adrian Perrig.
In The International Workshop on Smart Grid Security and Communications (SGSC) 2011.

Access Right Assignment Mechanisms for Secure Home Networks 
 [bibtex]
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker.
In Journal of Communications and Networks volume 13(2) 2011.

XTRec: Secure Real-time Execution Trace Recording on Commodity Platforms 
 [bibtex]
Amit Vasudevan, Ning Qu, Adrian Perrig.
In Proceedings of IEEE Hawaii International Conference in System Sciences (HICSS) 2011.

Network Fault Localization with Small TCB 
 [bibtex]
Xin Zhang, Zongwei Zhou, Geoff Hasker, Adrian Perrig, Virgil Gligor.
In Proceedings of IEEE International Conference on Network Protocols (ICNP) 2011.

VIPER: Verifying the Integrity of Peripherals' Firmware 
 [bibtex]
Yanlin Li, Jonathan M. McCune, Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2011.

RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication 
 [bibtex]
Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong, Adrian Perrig.
Technical report, Carnegie Mellon University 2011.

Flooding-Resilient Broadcast Authentication for VANETs 
 [bibtex]
Hsu-Chun Hsiao, Ahren Studer, Chen Chen, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer.
In In Proceedings of ACM Annual International Conference on Mobile Computing and Networking (MobiCom) 2011.

Secure Distributed Data Aggregation 
 [bibtex]
Haowen Chan, Hsu-Chun Hsiao, Adrian Perrig, Dawn Song.
In Journal of Foundations and Trends in Databases volume 3(3) 2011.


2010


Ho-Po Key: Leveraging Physical Constraints on Human Motion to Authentically Exchange Information in a Group 
 [bibtex]
Ghita Mezzour, Ahren Studer, Michael Farb, Jason Lee, Jonathan McCune, Hsu-Chun Hsiao, Adrian Perrig.
Technical report, Carnegie Mellon University 2010.

Correlation-Resilient Path Selection in Multi-Path Routing 
 [bibtex]
Xin Zhang, Adrian Perrig.
In Proceedings of IEEE Global Communications Conference (Globecom) 2010.

VANET Alert Endorsement Using Multi-Source Filters 
 [bibtex]
Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer.
In Proceedings of ACM International Workshop on Vehicular Ad Hoc Networks (VANET) 2010.

Challenges in Access Right Assignment for Secure Home Networks 
 [bibtex]
Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker.
In Proceedings of USENIX Workshop on Hot Topics in Security (HotSec) 2010.

SBAP: Software-Based Attestation for Peripherals 
 [bibtex]
Yanlin Li, Jonathan M. McCune, Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (Trust) 2010.

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture 
 [bibtex]
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig.
In Proceedings of International Conference on Trust and Trustworthy Computing (Trust) 2010.

TrustVisor: Efficient TCB Reduction and Attestation 
 [bibtex]
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010.

Bootstrapping Trust in Commodity Computers 
 [bibtex]
Bryan Parno, Jonathan M. McCune, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010.

Round-Effcient Broadcast Authentication Protocols for Fixed Topology Classes 
 [bibtex]
Haowen Chan, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2010.

Refutation of ``On the Difficulty of Software-Based Attestation of Embedded Devices'' 
 [bibtex]
Adrian Perrig, Leendert van Doorn.
2010.

Mobile User Location-specific Encryption (MULE): Using Your Office as Your Password 
 [bibtex]
Ahren Studer, Adrian Perrig.
In Proceedings of ACM Conference on Wireless Network Security (WISEC) 2010.

SPATE: Small-Group PKI-Less Authenticated Trust Establishment 
 [bibtex] [doi]
Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Li-Hsiang Kuo, Jason Lee, Jonathan M. McCune, King-Hang Wang, Maxwell Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang.
In IEEE Transactions on Mobile Computing IEEE Computer Society 2010.

Dependable Connection Setup for Network Capabilities 
 [bibtex]
Soo Bum Lee, Virgil Gligor, Adrian Perrig.
In Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2010.


2009


Flexible, Extensible, and Efficient VANET Authentication 
 [bibtex]
Ahren Studer, Fan Bai, Bhargav Bellur, Adrian Perrig.
In Journal of Communications and Networks volume 11(6) 2009.

Privacy-Preserving Relationship Path Discovery in Social Networks 
 [bibtex]
Ghita Mezzour, Adrian Perrig, Virgil Gligor, Panos Papadimitratos.
In Proceedings of International Conference on Cryptology and Network Security (CANS) 2009.

A Study of User-Friendly Hash Comparison Schemes 
 [bibtex]
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang.
In Proceedings of Computer Security Applications Conference (ACSAC) 2009.

The Coremelt Attack 
 [bibtex]
Ahren Studer, Adrian Perrig.
In Proceedings of European Symposium on Research in Computer Security (ESORICS) 2009.

SPATE: Small-group PKI-less Authenticated Trust Establishment 
 [bibtex]
Yue-Hsun Lin, Ahren Studer, Hsu-Chin Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang.
In Proceedings of Annual International Conference on Mobile Systems, Applications and Services (MobiSys) 2009.

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs 
 [bibtex]
Ahren Studer, Elaine Shi, Fan Bai, Adrian Perrig.
In Proceedings of IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON) 2009.

Centaur: A Hybrid Approach for Reliable Policy-Based Routing 
 [bibtex]
Xin Zhang, Adrian Perrig, Hui Zhang.
In Proceedings of International Conference on Distributed Computing Systems (ICDCS) 2009.

CLAMP: Practical Prevention of Large-Scale Data Leaks 
 [bibtex]
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2009.

Safe Passage for Passwords and Other Sensitive Data 
 [bibtex]
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter.
In Proceedings of Symposium on Network and Distributed Systems Security (NDSS) 2009.

Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication 
 [bibtex]
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter.
In International Journal of Security and Networks Special Issue on Secure Spontaneous Interaction volume 4(1--2) 2009.


2008


Packet-dropping Adversary Identification for Data Plane Security 
 [bibtex]
Xin Zhang, Abhishek Jain, Adrian Perrig.
In Proceedings of ACM SIGCOMM International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2008.

Flexible, Extensible, and Efficient VANET Authentication 
 [bibtex]
Ahren Studer, Fan Bai, Bhargav Bellur, Adrian Perrig.
In Proceedings of Embedded Security in Cars Workshop (ESCAR) 2008.

Efficient Security Primitives Derived from a Secure Aggregation Algorithm 
 [bibtex]
Haowen Chan, Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2008.

GAnGS: Gather Authenticate 'n Group Securely 
 [bibtex]
Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu.
In Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom) 2008.

SAKE: Software Attestation for Key Establishment in Sensor Networks 
 [bibtex]
Arvind Seshadri, Mark Luk, Adrian Perrig.
In Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS) 2008.

Mechanisms to Provide Integrity in SCADA and PCS devices 
 [bibtex]
Aakash Shah, Adrian Perrig, Bruno Sinopoli.
In Proceedings of International Workshop on Cyber-Physical Systems Challenges and Applications (CPS-CA) 2008.

Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing 
 [bibtex]
Dan Wendlandt, David G. Andersen, Adrian Perrig.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2008.

Remote Detection of Virtual Machine Monitors with Fuzzy Benchmarking 
 [bibtex]
Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn.
In ACM SIGOPS Operating System Review (Special Issue on Computer Forensics) 2008.

Flicker: An Execution Infrastructure for TCB Minimization 
 [bibtex]
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki.
In Proceedings of ACM European Conference in Computer Systems (EuroSys) 2008.

SNAPP: Stateless Network-Authenticated Path Pinning 
 [bibtex]
Bryan Parno, Adrian Perrig, David G. Andersen.
In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2008.

Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups 
 [bibtex]
Cynthia Kuo, Ahren Studer, Adrian Perrig.
In Proceedings of First ACM Conference on Wireless Network Security (WiSec '08) 2008.

How Low Can You Go? Recommendations for Hardware-Supported Minimal TCB Code Execution 
 [bibtex]
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri.
In Proceedings of ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2008.

Countermeasures against Government-Scale Monetary Forgery 
 [bibtex]
Alessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig.
In Proceedings of Financial Cryptography and Data Security 12th International Conference 2008.

Securing User-controlled Routing Infrastructures 
 [bibtex]
Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica.
In IEEE/ACM Transactions on Networking volume 16(3) 2008.


2007


An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants 
 [bibtex]
Jason Franklin, Vern Paxson, Adrian Perrig, Stefan Savage.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2007.

Efficient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs 
 [bibtex]
Ahren Studer, Mark Luk, Adrian Perrig.
In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm) 2007.

Don't Sweat Your Privacy: Using Humidity to Detect Human Presence 
 [bibtex]
Jun Han, Abhishek Jain, Mark Luk, Adrian Perrig.
In Proceedings of International Workshop on Privacy in UbiComp (UbiPriv) 2007.

Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks 
 [bibtex]
Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs, Yih-Chun Hu.
In Proceedings of ACM SIGCOMM 2007.

Turtles All The Way Down: Research Challenges in User-Based Attestation 
 [bibtex]
Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn.
In Proceedings of Workshop on Hot Topics in Security (HotSec) 2007.

Minimal TCB Code Execution (Extended Abstract) 
 [bibtex]
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri.
In Proceedings of IEEE Symposium on Security and Privacy 2007.

Multi-Dimensional Range Query over Encrypted Data 
 [bibtex]
Elaine Shi, John Bethencourt, Hubert Chan, Dawn Song, Adrian Perrig.
In IEEE Symposium on Security and Privacy 2007.

MiniSec: A Secure Sensor Network Communication Architecture 
 [bibtex]
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil Gligor.
In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2007.

BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention 
 [bibtex]
Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig.
In Proceedings of ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS) 2007.

PRISM: Enabling Personal Verification of Code Integrity, Untampered Execution, and Trusted I/O on Legacy Systems or Human-Verifiable Code Execution 
 [bibtex]
Jason Franklin, Mark Luk, Arvind Seshadri, Adrian Perrig.
Technical report, CyLab 2007.

Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup 
 [bibtex]
Cynthia Kuo, Jesse Walker, Adrian Perrig.
In Usable Security (USEC) 2007.

Rapid Trust Establishment for Pervasive Personal Computing 
 [bibtex]
Ajay Surie, Adrian Perrig, Mahadev Satyanarayanan, David Farber.
In IEEE Pervasive Computing volume 6(4) 2007.

Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems 
 [bibtex]
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
Chapter in Malware Detection (Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang, eds.) Springer Verlag 2007.

SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes 
 [bibtex]
Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig.
In Proceedings of ACM Conference on Operating Systems Principles (SOSP) 2007.

Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes 
 [bibtex]
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig.
In Proceedings of ACM Conference on Embedded Networked Sensor System (SenSys) 2007.

SIA: Secure Information Aggregation in Sensor Networks 
 [bibtex]
Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Song.
In Journal of Computer Security (Special Issue on Security of Ad Hoc and Sensor Networks) volume 15(1) 2007.


2006


Secure Sensor Network Routing: A Clean-Slate Approach 
 [bibtex]
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig.
In Proceedings of Conference on Future Networking Technologies (CoNEXT) 2006.

(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP 
 [bibtex]
Yih-Chun Hu, David McGrew, Adrian Perrig, Brian Weis, Dan Wendlandt.
In Fifth Workshop on Hot Topics in Networks (HotNets-V) 2006.

Secure Hierarchical In-network Aggregation for Sensor Networks 
 [bibtex]
Haowen Chan, Adrian Perrig, Dawn Song.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2006.

StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense 
 [bibtex]
Abraham Yaar, Adrian Perrig, Dawn Song.
In IEEE Journal on Selected Areas in Communications volume 24(10) 2006.

Seven Cardinal Properties of Sensor Network Broadcast Authentication 
 [bibtex]
Mark Luk, Adrian Perrig, Bram Whillock.
In Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006) 2006.

Modeling Adoptability of Secure BGP Protocols 
 [bibtex]
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang.
In Proceedings of ACM SIGCOMM 2006.

Externally Verifiable Code Execution 
 [bibtex]
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Communications of the ACM volume 49(9) 2006.

SCUBA: Secure Code Update By Attestation in Sensor Networks 
 [bibtex]
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Proceedings of ACM Workshop on Wireless Security (WiSe) 2006.

A Distributed Stealthy Coordination Mechanism for Worm Synchronization 
 [bibtex]
Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig.
In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm) 2006.

Bump in the Ether: A Framework for Securing Sensitive User Input 
 [bibtex]
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2006.

FastPass: Providing First-Packet Delivery 
 [bibtex]
Dan Wendlandt, David G. Andersen, Adrian Perrig.
Technical report, CyLab 2006.

Phoolproof Phishing Prevention 
 [bibtex]
Bryan Parno, Cynthia Kuo, Adrian Perrig.
In Proceedings of International Conference on Financial Cryptography and Data Security (FC) 2006.

Designing an Evaluation Method for Security User Interfaces: Lessons from Studying Secure Wireless Network Configuration 
 [bibtex]
Cynthia Kuo, Adrian Perrig, Jesse Walker.
In ACM Interactions volume 13(3) 2006.

Browser Enhancements for Preventing Phishing Attacks [bibtex]
Cynthia Kuo, Bryan Parno, Adrian Perrig.
Chapter in Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft (Markus Jakobsson, Steven Myers, eds.) Wiley-Interscience 2006.


2005


Challenges in Securing Vehicular Networks 
 [bibtex]
Bryan Parno, Adrian Perrig.
In Proceedings of Workshop on Hot Topics in Networks (HotNets-IV) 2005.

Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems 
 [bibtex]
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Proceedings of ACM Symposium on Operating Systems Principles (SOSP) 2005.

A Clean-Slate Design for the Next-Generation Secure Internet 
 [bibtex]
Steven Bellovin, David Clark, Adrian Perrig, Dawn Song.
Pittsburgh, PA: Report for NSF Global Environment for Network Innovations (GENI) workshop 2005.

Using Clustering Information for Sensor Network Localization 
 [bibtex]
Haowen Chan, Mark Luk, Adrian Perrig.
In Proceedings of IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2005) 2005.

Efficient Constructions for One-way Hash Chains 
 [bibtex]
Yih-Chun Hu, Markus Jakobsson, Adrian Perrig.
In Applied Cryptography and Network Security (ACNS) 2005.

BIND: A Fine-grained Attestation Service for Secure Distributed Systems 
 [bibtex]
Elaine Shi, Adrian Perrig, Leendert Van Doorn.
In Proceedings of IEEE Symposium on Security and Privacy 2005.

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts 
 [bibtex]
Jonathan McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter.
In Proceedings of IEEE Symposium on Security and Privacy 2005.

Distributed Detection of Node Replication Attacks in Sensor Networks 
 [bibtex]
Bryan Parno, Adrian Perrig, Virgil Gligor.
In Proceedings of IEEE Symposium on Security and Privacy 2005.

Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication 
 [bibtex]
Jonathan M. McCune, Adrian Perrig, Michael K. Reiter.
In Proceedings of IEEE Symposium on Security and Privacy 2005.

NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs 
 [bibtex]
Andrew Biggadike, Daniel Ferullo, Geoffrey Wilson, Adrian Perrig.
In Proceedings of ACM SIGCOMM ASIA Workshop 2005.

FIT: Fast Internet Traceback 
 [bibtex]
Avi Yaar, Adrian Perrig, Dawn Song.
In Proceedings of IEEE Infocom 2005.

PIKE: Peer Intermediaries for Key Establishment in Sensor Networks 
 [bibtex]
Haowen Chan, Adrian Perrig.
In Proceedings of IEEE Infocom 2005.

FANFARE for the Common Flow 
 [bibtex]
Elaine Shi, Bryan Parno, Adrian Perrig, Yih-Chun Hun, Bruce Maggs.
Technical report, CyLab 2005.

Empowering Ordinary Consumers to Securely Configure their Mobile Devices and Wireless Networks [bibtex]
Cynthia Kuo, Vincent Goh, Adrian Tang, Adrian Perrig, Jesse Walker.
Technical report, CyLab 2005.

Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks 
 [bibtex]
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Wireless Networks Journal volume 11(1) 2005.

On the Distribution and Revocation of Cryptographic Keys in Sensor Networks 
 [bibtex]
Haowen Chan, Virgil Gligor, Adrian Perrig, Gautam Muralidharan.
In IEEE Transactions on Dependable and Secure Computing (TDSC) volume 2(3) 2005.


2004


Designing Secure Sensor Networks 
 [bibtex]
Elaine Shi, Adrian Perrig.
In Wireless Communication Magazine volume 11(6) 2004.

Using SWATT for Verifying Embedded Systems in Cars 
 [bibtex]
Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Proceedings of Embedded Security in Cars Workshop (ESCAR) 2004.

Key Infection: Smart Trust for Smart Dust 
 [bibtex]
Ross Anderson, Haowen Chan, Adrian Perrig.
In Proceedings of IEEE International Conference on Network Protocols (ICNP) 2004.

SPV: Secure Path Vector Routing for Securing BGP 
 [bibtex]
Yih-Chun Hu, Adrian Perrig, Marvin Sirbu.
In Proceedings of ACM SIGCOMM 2004.

SWATT: Software-based Attestation for Embedded Devices 
 [bibtex]
Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep Khosla.
In Proceedings of IEEE Symposium on Security and Privacy 2004.

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks 
 [bibtex]
Avi Yaar, Adrian Perrig, Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2004.

The Sybil Attack in Sensor Networks: Analysis and Defenses 
 [bibtex]
James Newsome, Runting Shi, Dawn Song, Adrian Perrig.
In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2004.

ACE: An Emergent Algorithm for Highly Uniform Cluster Formation 
 [bibtex]
Haowen Chan, Adrian Perrig.
In Proceedings of European Workshop on Wireless Sensor Networks (EWSN) 2004.

A Survey of Secure Wireless Ad Hoc Routing 
 [bibtex]
Yih-Chun Hu, Adrian Perrig.
In IEEE Security & Privacy volume 2(3) 2004.

Taming IP Packet Flooding Attacks [bibtex]
Daniel Adkins, Karthik Lakshminarayanan, Adrian Perrig, Ion Stoica.
In ACM SIGCOMM Computer Communication Review volume 34(1) 2004.


2003


SIA: Secure Information Aggregation in Sensor Networks 
 [bibtex]
Bartosz Przydatek, Dawn Song, Adrian Perrig.
In Proceedings of ACM SenSys 2003.

Taming IP Packet Flooding Attacks 
 [bibtex]
Daniel Adkins, Karthik Lakshminarayanan, Adrian Perrig, Ion Stoica.
In Proceedings of Workshop on Hot Topics in Networks (HotNets-II) 2003.

Security and Privacy in Sensor Networks 
 [bibtex]
Haowen Chan, Adrian Perrig.
In IEEE Computer Magazine 2003.

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols 
 [bibtex]
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Proceedings of ACM Workshop on Wireless Security (WiSe) 2003.

Opportunistic Use of Content Addressable Storage for Distributed File Systems 
 [bibtex]
Niraj Tolia, Michael Kozuch, Mahadev Satyanarayanan, Brad Karp, Thomas Bressoud, Adrian Perrig.
In Proceedings of USENIX Annual Technical Conference (USENIX ATC) 2003.

Pi: A Path Identification Mechanism to Defend against DDoS Attacks 
 [bibtex]
Avi Yaar, Adrian Perrig, Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2003.

Random Key Predistribution Schemes for Sensor Networks 
 [bibtex]
Haowen Chan, Adrian Perrig, Dawn Song.
In Proceedings of IEEE Symposium on Security and Privacy 2003.

Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks 
 [bibtex]
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Proceedings of IEEE Infocomm 2003.

Efficient Security Mechanisms for Routing Protocols 
 [bibtex]
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2003.

SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks 
 [bibtex]
Yih-Chun Hu, David B. Johnson, Adrian Perrig.
In Journal of Ad Hoc Networks volume 1(1) 2003.


2002


Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks 
 [bibtex]
Yih-Chun Hu, Adrian Perrig, David B. Johnson.
In Proceedings of ACM International Conference on Mobile Computing and Networking (Mobicom) 2002.

SPINS: Security Protocols for Sensor Networks 
 [bibtex]
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar.
In Journal of Wireless Networks volume 8(5) 2002.

Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks 
 [bibtex]
Yih-Chun Hu, David B. Johnson, Adrian Perrig.
In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) 2002.

The TESLA Broadcast Authentication Protocol 
 [bibtex]
Adrian Perrig, Ran Canetti, J.D. Tygar, Dawn Song.
In RSA CryptoBytes volume 5(Summer) 2002.


2001


The BiBa One-Time Signature and Broadcast Authentication Protocol 
 [bibtex]
Adrian Perrig.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2001.

SPINS: Security Protocols for Sensor Networks 
 [bibtex]
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar.
In Seventh Annual International Conference on Mobile Computing and Networks (MobiCom) 2001.

AGVI --- Automatic Generation, Verification, and Implementation of Security Protocols 
 [bibtex]
Dawn Song, Adrian Perrig, Doantam Phan.
In Proceedings of Conference on Computer Aided Verification (CAV) 2001.

Communication-Efficient Group Key Agreement 
 [bibtex]
Yongdae Kim, Adrian Perrig, Gene Tsudik.
In International Federation for Information Processing (IFIP SEC) 2001.

ELK, a New Protocol for Efficient Large-Group Key Distribution 
 [bibtex]
Adrian Perrig, Dawn Song, Doug Tygar.
In Proceedings of IEEE Symposium on Security and Privacy 2001.

SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware 
 [bibtex]
Adrian Perrig, Sean Smith, Dawn Song, J.D. Tygar.
In First International Workshop on Internet Computing and E-Commerce (ICEC'01) 2001.

Efficient and Secure Source Authentication for Multicast 
 [bibtex]
Adrian Perrig, Ran Canetti, Dawn Song, J.D. Tygar.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2001.


2000


Déjà Vu: A User Study, Using Images for Authentication 
 [bibtex]
Rachna Dhamija, Adrian Perrig.
In Proceedings of USENIX Security Symposium 2000.

Practical Techniques for Searches on Encrypted Data 
 [bibtex]
Dawn Xiaodong Song, David Wagner, Adrian Perrig.
In Proceedings of IEEE Symposium on Security and Privacy 2000.

Efficient Authentication and Signing of Multicast Streams over Lossy Channels 
 [bibtex]
Adrian Perrig, Ran Canetti, J.D. Tygar, Dawn Xiaodong Song.
In IEEE Symposium on Security and Privacy 2000.

A First Step towards the Automatic Generation of Security Protocols 
 [bibtex]
Adrian Perrig, Dawn Song.
In Proceedings of Symposium on Network and Distributed System Security (NDSS) 2000.

Simple and fault-tolerant key agreement for dynamic collaborative groups 
 [bibtex]
Yongdae Kim, Adrian Perrig, Gene Tsudik.
In Proceedings of ACM Conference on Computer and Communications Security (CCS) 2000.


1999


Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication 
 [bibtex]
Adrian Perrig.
In Proceedings of International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC) 1999.

Hash Visualization: A New Technique to Improve Real-World Security 
 [bibtex]
Adrian Perrig, Dawn Song.
In Proceedings of International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC) 1999.