Conference The Crossfire Attack 2013 • IEEE Symposium on Security and Privacy: Proceedings • 127-141 Kang MS, Lee SB, Gligor VD
Conference A new security testing method and its application to the Secure Xenix kernel 2012 • IEEE Symposium on Security and Privacy: Proceedings • 40-58 Gligor VD, Chandersekaran CS, Cheng W, Jiang WD, Johri A, Luckenbaugh GL, Reich LE
Conference A note on the denial-of-service problem 2012 • IEEE Symposium on Security and Privacy: Proceedings • 139-149 Gligor VD
Journal Article Analysis of complex contagions in random multiplex networks 2012 • Physical Review E • 86(3): Yagan O, Gligor V
Conference Analysis of the Hardware Verification of the Honeywell SCOMP 2012 • IEEE Symposium on Security and Privacy: Proceedings • 1985(1985):32-43 Gligor VD
Conference Building Verifiable Trusted Path on Commodity x86 Computers 2012 • IEEE Symposium on Security and Privacy: Proceedings • 616-630 Zhou Z, Gligor VD, Newsome J, McCune JM
Conference CCS 2012 program chairs' welcome 2012 • Proceedings of the ACM Conference on Computer and Communications Security Gligor V, Danezis G
Conference Discovering Records of Private VoIP Calls without Wiretapping 2012 • 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012) Jong C-H, Gligor VD
Conference Lockdown: Towards a safe and practical architecture for security applications on commodity platforms 2012 • Lecture Notes in Computer Science • 7344 LNCS:34-54 Vasudevan A, Parno B, Qu N, Gligor VD, Perrig A
Conference On the design and the implementation of Secure Xenix workstations 2012 • IEEE Symposium on Security and Privacy: Proceedings • 102-117 Gligor VD, Burch EL, Chandersekaran GS, Chapman RS, Dotterer LJ, Hecht MS, Jiang WD, Luckenbaugh GL, Vasudevan N
Conference Preface 2012 • IEEE Symposium on Security and Privacy: Proceedings • 1985(1985):iv Millen JK, Gligor VD
Conference Preface 2012 • IEEE Symposium on Security and Privacy: Proceedings • IV Gligor VD, Bailey D
Conference Private communication detection: A stochastic approach 2012 • WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks • 75-86 Jong CH, Gligor VD
Conference Street-level trust semantics for attribute authentication 2012 • Lecture Notes in Computer Science • 7622 LNCS:96-115 Kim THJ, Gligor V, Perrig A
Conference Street-level trust semantics for attribute authentication (Transcript of discussion) 2012 • Lecture Notes in Computer Science • 7622 LNCS:116-125 Gligor V
Journal Article Two-server password-only authenticated key exchange 2012 • Journal of Computer and System Sciences • 78(2):651-669 Katz J, MacKenzie P, Taban G, Gligor V
Conference A picture is worth a thousand words: Improving usability and robustness of online recommendation systems 2011 • Proceedings - International Conference on Computer Communications and Networks, ICCCN Kim THJ, Gligor V, Perrig A
Journal Article DefAT: Dependable Connection Setup for Network Capabilities 2011 Lee SB, Gligor VD, Perrig A
Journal Article FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks 2011 Lee SB, Gligor VD
Journal Article FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks 2011 Lee SB, Gligor VD
Conference Handling New Adversaries in Wireless Ad-Hoc Networks 2011 • Lecture Notes in Computer Science • 6615:118-+ Bahari SF, Gligor VD
Conference Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion) 2011 • Lecture Notes in Computer Science • 6615:120-125 Gligor VD