What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Adrian Perrig
Google Scholar
110
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Low-Cost and Robust Global Time Synchronization.
Marc Wyss
Marc Frei
Jonghoon Kwon
Adrian Perrig
2025
conf/uss
BGP Vortex: Update Message Floods Can Create Internet Instabilities.
Felix Stöger
Henry Birge-Lee
Giacomo Giuliari
Jordi Subirà Nieto
Adrian Perrig
2024
conf/uss
CAMP: Compositional Amplification Attacks against DNS.
Huayi Duan
Marco Bearzi
Jodok Vieli
David A. Basin
Adrian Perrig
Si Liu
Bernhard Tellenbach
2024
conf/uss
Zero-setup Intermediate-rate Communication Guarantees in a Global Internet.
Marc Wyss
Adrian Perrig
2024
conf/asiaccs
The SA4P Framework: Sensing and Actuation as a Privilege.
Piet De Vaere
Felix Stöger
Adrian Perrig
Gene Tsudik
2024
conf/asiaccs
An Empirical Study of Consensus Protocols' DoS Resilience.
Giacomo Giuliari
Alberto Sonnino
Marc Frei
Fabio Streun
Lefteris Kokoris-Kogias
Adrian Perrig
2023
conf/uss
Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia.
Piet De Vaere
Adrian Perrig
2023
conf/uss
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks.
Cyrill Krähenbühl
Marc Wyss
David A. Basin
Vincent Lenders
Adrian Perrig
Martin Strohmeier
2023
conf/uss
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System.
Jonghoon Kwon
Jeonggyu Song
Junbeom Hur
Adrian Perrig
2023
conf/fc
Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking.
Felix Stöger
Anxin Zhou
Huayi Duan
Adrian Perrig
2022
conf/ccs
Protecting Critical Inter-Domain Communication through Flyover Reservations.
Marc Wyss
Giacomo Giuliari
Jonas Mohler
Adrian Perrig
2022
conf/ccs
NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications.
Konstantin Taranov
Benjamin Rothenberger
Daniele De Sensi
Adrian Perrig
Torsten Hoefler
2022
conf/uss
QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework.
Jean-Pierre Smith
Luca Dolfi
Prateek Mittal
Adrian Perrig
2022
conf/uss
Creating a Secure Underlay for the Internet.
Henry Birge-Lee
Joel Wanner
Grace H. Cimaszewski
Jonghoon Kwon
Liang Wang
François Wirz
Prateek Mittal
Adrian Perrig
Yixin Sun
2022
conf/asiaccs
Hopper: Per-Device Nano Segmentation for the Industrial IoT.
Piet De Vaere
Andrea Tulimiero
Adrian Perrig
2022
conf/ndss
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing.
Fabio Streun
Joel Wanner
Adrian Perrig
2022
conf/ndss
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure.
Laurent Chuat
Cyrill Krähenbühl
Prateek Mittal
Adrian Perrig
2021
journals/popets
Website Fingerprinting in the Age of QUIC.
Jean-Pierre Smith
Prateek Mittal
Adrian Perrig
2021
conf/uss
ReDMArk: Bypassing RDMA Security Mechanisms.
Benjamin Rothenberger
Konstantin Taranov
Adrian Perrig
Torsten Hoefler
2021
conf/ndss
Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
Jonghoon Kwon
Claude Hähni
Patrick Bamert
Adrian Perrig
2021
conf/dsn
Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures.
Simon Scherrer
Markus Legner
Adrian Perrig
Stefan Schmid
2020
conf/ccs
Global Communication Guarantees in the Presence of Adversaries.
Adrian Perrig
2020
conf/ccs
PISKES: Pragmatic Internet-Scale Key-Establishment System.
Benjamin Rothenberger
Dominik Roos
Markus Legner
Adrian Perrig
2020
conf/uss
EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet.
Markus Legner
Tobias Klenze
Marc Wyss
Christoph Sprenger
Adrian Perrig
2020
conf/eurosp
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust.
Laurent Chuat
AbdelRahman Abdou
Ralf Sasse
Christoph Sprenger
David A. Basin
Adrian Perrig
2020
conf/ndss
SVLAN: Secure & Scalable Network Virtualization.
Jonghoon Kwon
Taeho Lee
Claude Hähni
Adrian Perrig
2018
conf/ccs
Towards Sustainable Evolution for the TLS Public-Key Infrastructure.
Taeho Lee
Christos Pappas
Pawel Szalachowski
Adrian Perrig
2018
conf/eurosp
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Chen Chen
Daniele Enrico Asoni
Adrian Perrig
David Barrera
George Danezis
Carmela Troncoso
2018
conf/cans
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
Hao Wu
Hsu-Chun Hsiao
Daniele Enrico Asoni
Simon Scherrer
Adrian Perrig
Yih-Chun Hu
2017
journals/popets
PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer.
Chen Chen
Adrian Perrig
2017
conf/ccs
The Case for In-Network Replay Suppression.
Taeho Lee
Christos Pappas
Adrian Perrig
Virgil D. Gligor
Yih-Chun Hu
2017
conf/fc
Short Paper: On Deployment of DNS-Based Security Enhancements.
Pawel Szalachowski
Adrian Perrig
2017
conf/dsn
Deadline-Aware Multipath Communication: An Optimization Problem.
Laurent Chuat
Adrian Perrig
Yih-Chun Hu
2017
conf/cans
A Paged Domain Name System for Query Privacy.
Daniele Enrico Asoni
Samuel Hitz
Adrian Perrig
2016
conf/ccs
DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?
Ercan Ucan
Raphael M. Reischuk
Adrian Perrig
2016
conf/ccs
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks.
Yu-Ming Ke
Chih-Wei Chen
Hsu-Chun Hsiao
Adrian Perrig
Vyas Sekar
2016
conf/sp
High-Speed Inter-Domain Fault Localization.
Cristina Basescu
Yue-Hsun Lin
Haoming Zhang
Adrian Perrig
2016
conf/eurosp
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem.
Pawel Szalachowski
Laurent Chuat
Adrian Perrig
2016
conf/ndss
SIBRA: Scalable Internet Bandwidth Reservation Architecture.
Cristina Basescu
Raphael M. Reischuk
Pawel Szalachowski
Adrian Perrig
Yao Zhang
Hsu-Chun Hsiao
Ayumu Kubota
Jumpei Urakawa
2016
conf/acsac
CASTLE: CA signing in a touch-less environment.
Stephanos Matsumoto
Samuel Steffen
Adrian Perrig
2015
conf/ccs
HORNET: High-speed Onion Routing at the Network Layer.
Chen Chen
Daniele Enrico Asoni
David Barrera
George Danezis
Adrian Perrig
2015
conf/ccs
Lightweight Protection of Group Content Distribution.
Pawel Szalachowski
Adrian Perrig
2015
conf/cns
Efficient gossip protocols for verifying the consistency of Certificate logs.
Laurent Chuat
Pawel Szalachowski
Adrian Perrig
Ben Laurie
Eran Messeri
2014
conf/ccs
Mechanized Network Origin and Path Authenticity Proofs.
Fuyuan Zhang
Limin Jia
Cristina Basescu
Tiffany Hyun-Jin Kim
Yih-Chun Hu
Adrian Perrig
2014
conf/ccs
ARPKI: Attack Resilient Public-Key Infrastructure.
David A. Basin
Cas Cremers
Tiffany Hyun-Jin Kim
Adrian Perrig
Ralf Sasse
Pawel Szalachowski
2014
conf/ccs
PoliCert: Secure and Flexible TLS Certificate Management.
Pawel Szalachowski
Stephanos Matsumoto
Adrian Perrig
2014
conf/ccs
Exciting Security Research Opportunity: Next-generation Internet.
Adrian Perrig
2014
conf/wisec
Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles.
Jun Han
Yue-Hsun Lin
Adrian Perrig
Fan Bai
2013
journals/compsec
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks.
Dongwon Seo
Heejo Lee
Adrian Perrig
2013
conf/ccs
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
Emmanuel Owusu
Jorge Guajardo
Jonathan M. McCune
James Newsome
Adrian Perrig
Amit Vasudevan
2013
conf/ccs
STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Sangjae Yoo
Xin Zhang
Soo Bum Lee
Virgil D. Gligor
Adrian Perrig
2013
conf/fc
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Tiffany Hyun-Jin Kim
Virgil D. Gligor
Jorge Guajardo
Jason I. Hong
Adrian Perrig
2013
conf/fc
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Tiffany Hyun-Jin Kim
Akira Yamada
Virgil D. Gligor
Jason I. Hong
Adrian Perrig
2012
conf/ccs
OTO: online trust oracle for user-centric trust establishment.
Tiffany Hyun-Jin Kim
Payas Gupta
Jun Han
Emmanuel Owusu
Jason I. Hong
Adrian Perrig
Debin Gao
2012
conf/ccs
CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Amit Vasudevan
Jonathan M. McCune
James Newsome
Adrian Perrig
Leendert van Doorn
2012
conf/sp
LAP: Lightweight Anonymity and Privacy.
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Adrian Perrig
Akira Yamada
Samuel C. Nelson
Marco Gruteser
Wei Meng
2012
conf/sp
Secure and Scalable Fault Localization under Dynamic Traffic Patterns.
Xin Zhang
Chang Lan
Adrian Perrig
2012
conf/ndss
ShortMAC: Efficient Data-Plane Fault Localization.
Xin Zhang
Zongwei Zhou
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Adrian Perrig
Patrick Tague
2011
conf/ccs
VIPER: verifying the integrity of PERipherals' firmware.
Yanlin Li
Jonathan M. McCune
Adrian Perrig
2011
conf/sp
SCION: Scalability, Control, and Isolation on Next-Generation Networks.
Xin Zhang
Hsu-Chun Hsiao
Geoffrey Hasker
Haowen Chan
Adrian Perrig
David G. Andersen
2011
conf/wisec
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation.
Hossen Asiful Mustafa
Xin Zhang
Zhenhua Liu
Wenyuan Xu
Adrian Perrig
2011
conf/wisec
Efficient and secure threshold-based event validation for VANETs.
Hsu-Chun Hsiao
Ahren Studer
Rituik Dubey
Elaine Shi
Adrian Perrig
2010
conf/ccs
CRAFT: a new secure congestion control architecture.
Dongho Kim
Jerry T. Chiang
Yih-Chun Hu
Adrian Perrig
P. R. Kumar
2010
conf/uss
Challenges in Access Right Assignment for Secure Home Networks.
Tiffany Hyun-Jin Kim
Lujo Bauer
James Newsome
Adrian Perrig
Jesse Walker
2010
conf/sp
Bootstrapping Trust in Commodity Computers.
Bryan Parno
Jonathan M. McCune
Adrian Perrig
2010
conf/sp
TrustVisor: Efficient TCB Reduction and Attestation.
Jonathan M. McCune
Yanlin Li
Ning Qu
Zongwei Zhou
Anupam Datta
Virgil D. Gligor
Adrian Perrig
2010
conf/sp
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes.
Haowen Chan
Adrian Perrig
2010
conf/dsn
Dependable connection setup for network capabilities.
Soo Bum Lee
Virgil D. Gligor
Adrian Perrig
2010
conf/wisec
Mobile user location-specific encryption (MULE): using your office as your password.
Ahren Studer
Adrian Perrig
2009
conf/sp
CLAMP: Practical Prevention of Large-Scale Data Leaks.
Bryan Parno
Jonathan M. McCune
Dan Wendlandt
David G. Andersen
Adrian Perrig
2009
conf/esorics
The Coremelt Attack.
Ahren Studer
Adrian Perrig
2009
conf/ndss
Safe Passage for Passwords and Other Sensitive Data.
Jonathan M. McCune
Adrian Perrig
Michael K. Reiter
2009
conf/acsac
A Study of User-Friendly Hash Comparison Schemes.
Hsu-Chun Hsiao
Yue-Hsun Lin
Ahren Studer
Cassandra Studer
King-Hang Wang
Hiroaki Kikuchi
Adrian Perrig
Hung-Min Sun
Bo-Yin Yang
2009
conf/cans
Building Secure Networked Systems with Code Attestation.
Adrian Perrig
2009
conf/cans
Privacy-Preserving Relationship Path Discovery in Social Networks.
Ghita Mezzour
Adrian Perrig
Virgil D. Gligor
Panos Papadimitratos
2008
conf/ccs
Efficient security primitives derived from a secure aggregation algorithm.
Haowen Chan
Adrian Perrig
2008
conf/ccs
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
Qing Li
Yih-Chun Hu
Meiyuan Zhao
Adrian Perrig
Jesse Walker
Wade Trappe
2008
conf/ccs
SNAPP: stateless network-authenticated path pinning.
Bryan Parno
Adrian Perrig
Dave G. Andersen
2008
conf/sec
Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks.
Po-Yuan Teng
Shih-I Huang
Adrian Perrig
2008
conf/fc
Countermeasures against Government-Scale Monetary Forgery.
Alessandro Acquisti
Nicolas Christin
Bryan Parno
Adrian Perrig
2008
conf/soups
Use Your Illusion: secure authentication usable anywhere.
Eiji Hayashi
Rachna Dhamija
Nicolas Christin
Adrian Perrig
2008
conf/wisec
Mind your manners: socially appropriate wireless key establishment for groups.
Cynthia Kuo
Ahren Studer
Adrian Perrig
2007
conf/ccs
An inquiry into the nature and causes of the wealth of internet miscreants.
Jason Franklin
Adrian Perrig
Vern Paxson
Stefan Savage
2007
conf/ccs
BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
Heejo Lee
Minjin Kwon
Geoffrey Hasker
Adrian Perrig
2007
conf/uss
Turtles All the Way Down: Research Challenges in User-Based Attestation.
Jonathan M. McCune
Adrian Perrig
Arvind Seshadri
Leendert van Doorn
2007
conf/fc
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
Cynthia Kuo
Jesse Walker
Adrian Perrig
2007
conf/sp
Minimal TCB Code Execution.
Jonathan M. McCune
Bryan Parno
Adrian Perrig
Michael K. Reiter
Arvind Seshadri
2007
conf/sp
Multi-Dimensional Range Query over Encrypted Data.
Elaine Shi
John Bethencourt
T.-H. Hubert Chan
Dawn Xiaodong Song
Adrian Perrig
2006
conf/ccs
Secure hierarchical in-network aggregation in sensor networks.
Haowen Chan
Adrian Perrig
Dawn Xiaodong Song
2006
conf/fc
Phoolproof Phishing Prevention.
Bryan Parno
Cynthia Kuo
Adrian Perrig
2005
conf/sp
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
Jonathan M. McCune
Adrian Perrig
Michael K. Reiter
2005
conf/sp
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
Elaine Shi
Adrian Perrig
Leendert van Doorn
2005
conf/sp
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Jonathan M. McCune
Elaine Shi
Adrian Perrig
Michael K. Reiter
2005
conf/sp
Distributed Detection of Node Replication Attacks in Sensor Networks.
Bryan Parno
Adrian Perrig
Virgil D. Gligor
2005
conf/acns
Efficient Constructions for One-Way Hash Chains.
Yih-Chun Hu
Markus Jakobsson
Adrian Perrig
2004
conf/sp
SWATT: SoftWare-based ATTestation for Embedded Devices.
Arvind Seshadri
Adrian Perrig
Leendert van Doorn
Pradeep K. Khosla
2004
conf/sp
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks.
Abraham Yaar
Adrian Perrig
Dawn Xiaodong Song
2004
conf/ndss
Distillation Codes and Applications to DoS Resistant Multicast Authentication.
Chris Karlof
Naveen Sastry
Yaping Li
Adrian Perrig
J. D. Tygar
2003
conf/sp
Random Key Predistribution Schemes for Sensor Networks.
Haowen Chan
Adrian Perrig
Dawn Xiaodong Song
2003
conf/sp
Pi: A Path Identification Mechanism to Defend against DDoS Attack.
Abraham Yaar
Adrian Perrig
Dawn Xiaodong Song
2003
conf/ndss
Efficient Security Mechanisms for Routing Protocolsa.
Yih-Chun Hu
Adrian Perrig
David B. Johnson
2001
conf/ccs
The BiBa one-time signature and broadcast authentication protocol.
Adrian Perrig
2001
conf/sec
Communication-Efficient Group Key Agreement.
Yongdae Kim
Adrian Perrig
Gene Tsudik
2001
conf/sp
ELK, A New Protocol for Efficient Large-Group Key Distribution.
Adrian Perrig
Dawn Xiaodong Song
J. D. Tygar
2001
conf/ndss
Efficient and Secure Source Authentication for Multicast.
Adrian Perrig
Ran Canetti
Dawn Xiaodong Song
J. D. Tygar
2000
conf/ccs
Simple and fault-tolerant key agreement for dynamic collaborative groups.
Yongdae Kim
Adrian Perrig
Gene Tsudik
2000
conf/uss
Deja Vu-A User Study: Using Images for Authentication.
Rachna Dhamija
Adrian Perrig
2000
conf/sp
Practical Techniques for Searches on Encrypted Data.
Dawn Xiaodong Song
David A. Wagner
Adrian Perrig
2000
conf/sp
Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
Adrian Perrig
Ran Canetti
J. D. Tygar
Dawn Xiaodong Song
2000
conf/ndss
A First Step Towards the Automatic Generation of Security Protocols.
Adrian Perrig
Dawn Xiaodong Song
Coauthors
AbdelRahman Abdou
(1)
Abraham Yaar
(2)
Adrian Perrig
(110)
Ahren Studer
(5)
Akira Yamada
(2)
Alberto Sonnino
(1)
Alessandro Acquisti
(1)
Amit Vasudevan
(2)
Andrea Tulimiero
(1)
Anupam Datta
(1)
Anxin Zhou
(1)
Arvind Seshadri
(3)
Ayumu Kubota
(1)
Ben Laurie
(1)
Benjamin Rothenberger
(3)
Bernhard Tellenbach
(1)
Bo-Yin Yang
(1)
Bryan Parno
(7)
Carmela Troncoso
(1)
Cas Cremers
(1)
Cassandra Studer
(1)
Chang Lan
(1)
Chen Chen
(3)
Chih-Wei Chen
(1)
Chris Karlof
(1)
Christoph Sprenger
(2)
Christos Pappas
(2)
Claude Hähni
(2)
Cristina Basescu
(3)
Cynthia Kuo
(3)
Cyrill Krähenbühl
(2)
Dan Wendlandt
(1)
Daniele De Sensi
(1)
Daniele Enrico Asoni
(4)
Dave G. Andersen
(1)
David A. Basin
(4)
David A. Wagner
(1)
David B. Johnson
(1)
David Barrera
(2)
David G. Andersen
(2)
Dawn Xiaodong Song
(10)
Debin Gao
(1)
Dominik Roos
(1)
Dongho Kim
(1)
Dongwon Seo
(1)
Eiji Hayashi
(1)
Elaine Shi
(4)
Emmanuel Owusu
(2)
Eran Messeri
(1)
Ercan Ucan
(1)
Fabio Streun
(2)
Fan Bai
(1)
Felix Stöger
(3)
François Wirz
(1)
Fuyuan Zhang
(1)
Gene Tsudik
(3)
Geoffrey Hasker
(2)
George Danezis
(2)
Ghita Mezzour
(1)
Giacomo Giuliari
(3)
Grace H. Cimaszewski
(1)
Hao Wu
(1)
Haoming Zhang
(1)
Haowen Chan
(5)
Heejo Lee
(2)
Henry Birge-Lee
(2)
Hiroaki Kikuchi
(1)
Hossen Asiful Mustafa
(1)
Hsu-Chun Hsiao
(9)
Huayi Duan
(2)
Hung-Min Sun
(1)
J. D. Tygar
(4)
James Newsome
(3)
Jason Franklin
(1)
Jason I. Hong
(3)
Jean-Pierre Smith
(2)
Jeonggyu Song
(1)
Jerry T. Chiang
(1)
Jesse Walker
(3)
Jodok Vieli
(1)
Joel Wanner
(2)
John Bethencourt
(1)
Jonas Mohler
(1)
Jonathan M. McCune
(11)
Jonghoon Kwon
(5)
Jordi Subirà Nieto
(1)
Jorge Guajardo
(2)
Jumpei Urakawa
(1)
Jun Han
(2)
Junbeom Hur
(1)
King-Hang Wang
(1)
Konstantin Taranov
(2)
Laurent Chuat
(5)
Leendert van Doorn
(4)
Lefteris Kokoris-Kogias
(1)
Liang Wang
(1)
Limin Jia
(1)
Luca Dolfi
(1)
Lujo Bauer
(1)
Marc Frei
(2)
Marc Wyss
(5)
Marco Bearzi
(1)
Marco Gruteser
(1)
Markus Jakobsson
(1)
Markus Legner
(3)
Martin Strohmeier
(1)
Meiyuan Zhao
(1)
Michael K. Reiter
(4)
Minjin Kwon
(1)
Naveen Sastry
(1)
Nicolas Christin
(2)
Ning Qu
(1)
P. R. Kumar
(1)
Panos Papadimitratos
(1)
Patrick Bamert
(1)
Patrick Tague
(1)
Pawel Szalachowski
(8)
Payas Gupta
(1)
Piet De Vaere
(3)
Po-Yuan Teng
(1)
Pradeep K. Khosla
(1)
Prateek Mittal
(4)
Qing Li
(1)
Rachna Dhamija
(2)
Ralf Sasse
(2)
Ran Canetti
(2)
Raphael M. Reischuk
(2)
Rituik Dubey
(1)
Samuel C. Nelson
(1)
Samuel Hitz
(1)
Samuel Steffen
(1)
Sangjae Yoo
(1)
Shih-I Huang
(1)
Si Liu
(1)
Simon Scherrer
(2)
Soo Bum Lee
(2)
Stefan Savage
(1)
Stefan Schmid
(1)
Stephanos Matsumoto
(2)
T.-H. Hubert Chan
(1)
Taeho Lee
(3)
Tiffany Hyun-Jin Kim
(9)
Tobias Klenze
(1)
Torsten Hoefler
(2)
Vern Paxson
(1)
Vincent Lenders
(1)
Virgil D. Gligor
(8)
Vyas Sekar
(1)
Wade Trappe
(1)
Wei Meng
(1)
Wenyuan Xu
(1)
Xin Zhang
(5)
Yanlin Li
(2)
Yao Zhang
(1)
Yaping Li
(1)
Yih-Chun Hu
(8)
Yixin Sun
(1)
Yongdae Kim
(2)
Yu-Ming Ke
(1)
Yue-Hsun Lin
(3)
Zhenhua Liu
(1)
Zongwei Zhou
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to