Preprint Designing Securely and Reliably Connected Wireless Sensor Networks 2015 Zhao J, Yağan O, Gligor V
Conference Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction 2015 • Lecture Notes in Computer Science • 9379:50-68 Li Y, Cheng Y, Gligor V, Perrig A
Conference Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion) 2015 • Lecture Notes in Computer Science • 9379:69-79 Gligor V
Conference Exact Analysis of <i>k</i>-Connectivity in Secure Sensor Networks with Unreliable Links 2015 • 2015 13TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT) • 191-198 Zhao J, Yagan O, Gligor V
Journal Article Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs 2015 Zhao J, Yağan O, Gligor V
Preprint Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs 2015 Zhao J, Yağan O, Gligor V
Journal Article Network Adversary Attacks against Secure Encryption Schemes 2015 • IEICE Transactions on Communications • E98B(2):267-279 Gligor VD, Parno B, Shin JS
Journal Article On k -Connectivity and Minimum Vertex Degree in Random s -Intersection Graphs 2015 1-15 Zhao J, Yağan O, Gligor V
Conference Optimal strategies for side-channel leakage in FCFS packet schedulers 2015 • IEEE International Symposium on Information Theory - Proceedings • 2515-2519 Shintre S, Gligor V, Barros J
Journal Article Random intersection graphs and their applications in security, wireless communication, and social networks 2015 Zhao J, Yağan O, Gligor V
Preprint Random intersection graphs and their applications in security, wireless communication, and social networks 2015 Zhao J, Yağan O, Gligor V
Journal Article Toward <i>k</i>-Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links 2015 • IEEE Transactions on Information Theory • 61(11):6251-6271 Yavuz F, Zhao J, Yagan O, Gligor V
Conference Trusted Display on Untrusted Commodity Platforms 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 989-1003 Yu M, Gligor VD, Zhou Z
Journal Article Connectivity in Secure Wireless Sensor Networks under Transmission Constraints 2014 • 2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON) • 1294-1301 Zhao J, Yagan O, Gligor V
Conference Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O 2014 • IEEE Symposium on Security and Privacy: Proceedings • 308-323 Zhou Z, Yu M, Gligor VD
Conference Dancing with the Adversary: A Tale of Wimps and Giants 2014 • Lecture Notes in Computer Science • 8809:100-115 Gligor V
Conference Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion) 2014 • Lecture Notes in Computer Science • 8809:116-129 Gligor V
Preprint Exact Analysis of k-Connectivity in Secure Sensor Networks with Unreliable Links 2014 Zhao J, Yağan O, Gligor V
Preprint On $k$-connectivity and minimum vertex degree in random $s$-intersection graphs 2014 Zhao J, Yağan O, Gligor V
Conference On secure and reliable communications in wireless sensor networks: Towards <i>k</i>-connectivity under a random pairwise key predistribution scheme 2014 • IEEE International Symposium on Information Theory - Proceedings • 2381-2385 Yavuz F, Zhao J, Yagan O, Gligor V
Journal Article On the Strengths of Connectivity and Robustness in General Random Intersection Graphs 2014 • Proceedings of the ... IEEE Conference on Decision & Control / IEEE Control Systems Society. IEEE Conference on Decision & Control • 3661-3668 Zhao J, Yagan O, Gligor V