Conference Network Fault Localization with Small TCB 2011 • Proceedings - International Conference on Network Protocols, ICNP Zhang X, Zhou Z, Hasker G, Perrig A, Gligor V
Conference Towards a theory of trust in networks of humans and computers 2011 • Lecture Notes in Computer Science • 7114 LNCS:223-242 Gligor V, Wing JM
Conference Towards a theory of trust in networks of humans and computers (transcript of discussion) 2011 • Lecture Notes in Computer Science • 7114 LNCS:243-257 Gligor V
Conference Dependable Connection Setup for Network Capabilities 2010 • Proceedings of the International Conference on Dependable Systems and Networks • 301-310 Lee SB, Gligor VD, Perrig A
Journal Article Distributed Immune Systems for Wireless Network Information Assurance 2010 Baras J, Berenstein C, Ephremides A, Gligor V, Liu R, Papadopoulos H, Roussopoulos N, Wu M
Conference FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks 2010 • Distributed Computing Systems Lee SB, Gligor VD
Journal Article IEEE Transactions on Dependable and Secure Computing: Editorial 2010 • IEEE Transactions on Dependable and Secure Computing • 7(1):1 Gligor V
Conference TrustVisor: Efficient TCB Reduction and Attestation 2010 • IEEE Symposium on Security and Privacy: Proceedings • 143-158 McCune JM, Li Y, Qu N, Zhou Z, Datta A, Gligor V, Perrig A
Journal Article IEEE Transactions on Dependable and Secure Computing: Editorial 2009 • IEEE Transactions on Dependable and Secure Computing • 6(1):1-3 Gligor VD
Conference Privacy-preserving integrity-assured data aggregation in sensor networks 2009 • Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009 • 3:168-175 Taban G, Gligor D
Conference Privacy-preserving relationship path discovery in social networks 2009 • Lecture Notes in Computer Science • 5888 LNCS:189-208 Mezzour G, Perrig A, Gligor V, Papadimitratos P
Journal Article Secure Wireless Networking 2009 • Journal of Communications and Networks • 11(6):533-537 Perrig A, Trappe W, Gligor V, Poovendran R, Lee H
Conference A New Privacy-Enhanced Matchmaking Protocol 2008 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008 Shin JS, Gligor VD
Journal Article Editorial: Dependability and security 2008 • IEEE Transactions on Dependable and Secure Computing • 5(1):1-3 Iyer RK, Gligor VD, Kalbarczyk ZT, Kanoun K, Katzenbeisser S, Mukherjee S, Shieh S, Zorian Y
Conference Efficient Handling of Adversary Attacks in Aggregation Applications 2008 • Lecture Notes in Computer Science • 5283:66-+ Taban G, Gligor VD
Chapter Efficient Handling of Adversary Attacks in Aggregation Applications 2008 • Lecture Notes in Computer Science • 5283:66-81 Taban G, Gligor VD
Journal Article IEEE Transactions on Dependable an Secure Computing: Editorial 2008 • IEEE Transactions on Dependable and Secure Computing • 5(1):4-5 Gligor VD, Meadows C, Suri N
Conference On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks 2008 1238-1246 Raya M, Papadimitratos P, Gligor VD, Hubaux J-P
Conference On data-centric trust establishment in ephemeral ad hoc networks 2008 • IEEE Infocom. Proceedings • 1912-+ Raya M, Papadimitratos P, Gligor VD, Hubaux J-P
Conference Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08: Forward 2008 • Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08 Abe M, Gligor V
Chapter Surviving insider attacks: A call for system experiments 2008 • Advances in Information Security • 39:153-+ Gligor VD, Chandersekaran CS
Conference Welcome to WiSec 2008 2008 • WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security Gligor V
Journal Article EIC editorial 2007 • IEEE Transactions on Mobile Computing • 6(2):145-147 Vaidya NH, Almeroth KC, Chuah MC, Gligor VD, Liu M, Lu S, Nandagopal T, Sen A, Tseng YC, Wolfson O