Preprint On the strengths of connectivity and robustness in general random intersection graphs 2014 Zhao J, Yağan O, Gligor V
Journal Article On the Strengths of Connectivity and Robustness in General Random Intersection Graphs 2014 • Proceedings of the ... IEEE Conference on Decision & Control / IEEE Control Systems Society. IEEE Conference on Decision & Control • 3661-3668 Zhao J, Yagan O, Gligor V
Conference On Topological Properties of Wireless Sensor Networks under the <i>q</i>-Composite Key Predistribution Scheme with On/Off Channels 2014 • IEEE International Symposium on Information Theory - Proceedings • 1131-1135 Zhao J, Yagan O, Gligor V
Preprint On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels 2014 Zhao J, Yağan O, Gligor V
Journal Article Results on Vertex Degree and K-Connectivity in Uniform S-Intersection Graphs 2014 Zhao J, Yagan O, Gligor V
Conference Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures 2014 • Proceedings of the ACM Conference on Computer and Communications Security • 321-333 Kang MS, Gligor VD
Conference Security limitations of virtualization and how to overcome them 2014 • Lecture Notes in Computer Science • 7061:233-251 Gligor V
Conference Security limitations of virtualization and how to overcome them (transcript of discussion) 2014 • Lecture Notes in Computer Science • 7061:252-265 Gligor V
Preprint Towards $k$-connectivity of the random graph induced by a pairwise key predistribution scheme with unreliable links 2014 Yavuz F, Zhao J, Yağan O, Gligor V
Journal Article A New Privacy-Enhanced Matchmaking Protocol 2013 • IEICE Transactions on Communications • E96B(8):2049-2059 Shin JS, Gligor VD
Conference Accountable key infrastructure (AKI): A proposal for a public-key validation infrastructure 2013 • WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web • 679-689 Kim THJ, Huang LS, Perrig A, Jackson C, Gligor V
Chapter Brief Encounters with a Random Key Graph 2013 • Lecture Notes in Computer Science • 7028:162-170 Gligor VD
Chapter Brief Encounters with a Random Key Graph 2013 • Lecture Notes in Computer Science • 7028:157-161 Gligor VD, Perrig A, Zhao J
Conference Brief encounters with a random key graph 2013 • Lecture Notes in Computer Science • 7028 LNCS:157-161 Gligor VD, Perrig A, Zhao J
Conference Brief encounters with a random key graph (transcript of discussion) 2013 • Lecture Notes in Computer Science • 7028 LNCS:162-170 Gligor VD
Conference CCS 2013 program chairs' welcome 2013 • Proceedings of the ACM Conference on Computer and Communications Security Gligor V, Yung M
Conference CoDef: Collaborative Defense Against Large-Scale Link-Flooding Attacks 2013 • PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13) • 417-427 Lee SB, Kang MS, Gligor VD
Conference GeoPKI: Converting spatial trust into certificate trust 2013 • Lecture Notes in Computer Science • 7868 LNCS:128-144 Kim THJ, Gligor V, Perrig A
Conference KISS: "Key It Simple and Secure" corporate key management 2013 • Lecture Notes in Computer Science • 7904 LNCS:1-18 Zhou Z, Han J, Lin YH, Perrig A, Gligor V
Conference ReDABLS: Revisiting device attestation with bounded leakage of secrets 2013 • Lecture Notes in Computer Science • 8263 LNCS:94-114 Zhao J, Gligor V, Perrig A, Newsome J
Conference ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (transcript of discussion) 2013 • Lecture Notes in Computer Science • 8263 LNCS:115-122 Gligor V
Conference RelationGram: Tie-strength visualization for user-controlled online identity authentication 2013 • Lecture Notes in Computer Science • 7859 LNCS:69-77 Kim THJ, Yamada A, Gligor V, Hong J, Perrig A
Conference Secure <i>k</i>-Connectivity in Wireless Sensor Networks under an On/Off Channel Model 2013 • IEEE International Symposium on Information Theory - Proceedings • 2790-+ Zhao J, Yagan O, Gligor V
Conference Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference 2013 • Lecture Notes in Computer Science • 7862:112-130 Kim TH-J, Gligor V, Guajardo J, Hong J, Perrig A
Conference STRIDE: Sanctuary trail - Refuge from internet DDoS entrapment 2013 • ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security • 415-426 Hsiao HC, Kim THJ, Yoo S, Zhang X, Lee SB, Gligor V, Perrig A