Conference FMSE'07 - Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering: Foreword 2007 • FMSE'07 - Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering Gligor V, Mantel H
Journal Article Guest editorial vehicular networks 2007 • IEEE Journal on Selected Areas in Communications • 25(8):1497-1500 Anjum F, Choi S, Gligor V, Herrtwich RG, Chrysler D, Hubaux JP, Kumar PR, Shorey R, Lea CT
Conference MiniSec: A secure sensor network communication architecture 2007 • IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks • 479-488 Luk M, Mezzour G, Perrig A, Gligor V
Conference MiniSec: A Secure Sensor Network Communication Architecture 2007 479-488 Luk M, Mezzour G, Perrig A, Gligor V
Conference On the evolution of adversary models in security protocols (or know your friend and foe alike) 2007 • Lecture Notes in Computer Science • 4631 LNCS:276-283 Gligor V
Conference On the evolution of adversary models in security protocols: From the beginning to sensor networks 2007 • Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 • 3 Gligor V
Conference Accountable privacy 2006 • Lecture Notes in Computer Science • 3957 LNCS:83-105 Burmester M, Desmedt Y, Wright RN, Yasinsac A, Blaze M, Aura T, Christianson B, Gligor V, Anderson R, Serjantov A, Danezis G, Crispo B, Clayton R, Eronen P
Conference Controlling who tracks me 2006 • Lecture Notes in Computer Science • 3957 LNCS:151-162 Bohm D, Lamming M, Mayo RN, Morgan J, Zhang K, Blaze M, Roe M, Clayton R, Christianson B, Aura T, Stajano F, Danezis G, Mitchell C, Lomas M, Gligor V, Bond M
Conference Emergent properties in ad-hoc networks: A security perspective 2006 • Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 • 2006:1 Gligor VD
Conference Identity and location 2006 • Lecture Notes in Computer Science • 3957 LNCS:246-255 Gollmann D, Mayo B, Arkko J, Anderson R, Christianson B, Mitchell C, Gligor V, Roe M
Journal Article Information assurance technology forecast 2005 2006 • IEEE Security and Privacy • 4(1):62-69 Gligor VD, Haigh T, Kemmerer D, Landwehr CE, Lipner S, McLean J
Conference Keynote: On the security of emergent properties in traditional and ad-hoc networks 2006 • Lecture Notes in Computer Science • 4074 LNCS:1 Gligor VD
Conference Panel: Authentication in constrained environments 2006 • Lecture Notes in Computer Science • 4074 LNCS:186-191 Burmester M, Gligor V, Kranakis E, Tygar D, Zheng Y, De Medeiros B
Conference Second international workshop on Trust, Security and Privacy for Ubiquitous Computing (TSPUC 2006): Message from the workshop organizers 2006 • Proceedings - WoWMoM 2006: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks • 2006: Gligor V, Martinelli F, Michiardi P, Molva R
Conference Secure processor consistent with both foreign software protection and user privacy protection 2006 • Lecture Notes in Computer Science • 3957 LNCS:276-290 Hashimoto M, Haruki H, Kawabata T, Popescu B, Gligor V
Conference Security of emergent properties in ad-hoc networks 2006 • Lecture Notes in Computer Science • 3957 LNCS:256-266 Gligor V, Aura T, Eronen P, Mitchell C, Arkko J, Serjantov A, Anderson R, Lomas M, Stajano F, Burmester M
Conference The dancing bear: A new way of composing ciphers 2006 • Lecture Notes in Computer Science • 3957 LNCS:231-245 Anderson R, Roe M, Gligor V, Lomas M, Christianson B, Mitchell C
Conference Toward a broader view of security protocols 2006 • Lecture Notes in Computer Science • 3957 LNCS:106-132 Blaze M, Mitchell C, Stajano F, Massacci F, Lomas M, Clayton R, Christianson B, Gligor V, Serjantov A, Anderson R
Conference Towards a secure and interoperable DRM architecture 2006 • Proceedings of the ACM Conference on Computer and Communications Security • 69-78 Taban G, Cárdenas AA, Gligor VD
Conference Why are we authenticating 2006 • Lecture Notes in Computer Science • 3957 LNCS:291-298 Lomas M, Malcolm J, Stajano F, Roe M, Eronen P, Clayton R, Matyas V, Anderson R, Danezis G, Christianson B, Aura T, Wheeler D, Massacci F, Popescu B, Mitchell C, Blaze M, Gligor V
Conference Administering access control in dynamic coalitions 2005 • LISA 2005 - 19th Large Installation System Administration Conference • 249-261 Bobba R, Gavrila S, Gligor V, Khurana H, Koleva R
Conference Advances in sensor and ad-hoc network security: Perspective and status 2005 • SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks • 2005:68 Gligor VD
Conference Distributed detection of node replication attacks in sensor networks 2005 • IEEE Symposium on Security and Privacy: Proceedings • 49-63 Parno B, Perrig A, Gligor V