Author: Adrian Perrig
Publications
Co-authors
Productive Colleagues
Publications
Surie, Ajay, Perrig, Adrian, Satyanarayanan, Mahadev, Farber, David J. (2007): Rapid Trust Establishment for Pervasive Personal Computing. In IEEE Pervasive Computing, 6 (4) pp. 24-30. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.84
Satyanarayanan, Mahadev, Gilbert, Benjamin, Toups, Matt, Tolia, Niraj, Surie, Ajay, O\'Hallaron, David R., Wolbach, Adam, Harkes, Jan, Perrig, Adrian, Farber, David J., Kozuch, Michael, Helfrich, Casey, Nath, Partho, Lagar-Cavilla, H. Andrés (2007): Pervasive Personal Computing in an Internet Suspend/Resume System. In IEEE Internet Computing, 11 (2) pp. 16-25. https://doi.ieeecomputersociety.org/10.1109/MIC.2007.46
Kuo, Cynthia, Perrig, Adrian, Walker, Jesse (2006): Designing an evaluation method for security user interfaces: lessons from studying secure . In Interactions, 13 (3) pp. 28-31.
Seshadri, Arvind, Luk, Mark, Perrig, Adrian, Doorn, Leendert van, Khosla, Pradeep K. (2006): Externally verifiable code execution. In Communications of the ACM, 49 (9) pp. 45-49. https://dl.acm.org/doi/10.1145/1151054
Perrig, Adrian, Stankovic, John A., Wagner, David (2004): Security in wireless sensor networks. In Communications of the ACM, 47 (6) pp. 53-57. https://dl.acm.org/doi/10.1145/990680.990707
Chan, Haowen, Perrig, Adrian (2003): Security and Privacy in Sensor Networks. In IEEE Computer, 36 (10) pp. 103-105. https://csdl.computer.org/comp/mags/co/2003/10/rx103abs.htm
Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. https://doi.acm.org/10.1145/1408664.1408670