Preprint On the strengths of connectivity and robustness in general random intersection graphs 2014 Zhao J, Yağan O, Gligor V
Conference On Topological Properties of Wireless Sensor Networks under the <i>q</i>-Composite Key Predistribution Scheme with On/Off Channels 2014 • IEEE International Symposium on Information Theory - Proceedings • 1131-1135 Zhao J, Yagan O, Gligor V
Preprint On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels 2014 Zhao J, Yağan O, Gligor V
Journal Article Results on Vertex Degree and K-Connectivity in Uniform S-Intersection Graphs 2014 Zhao J, Yagan O, Gligor V
Conference Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures 2014 • Proceedings of the ACM Conference on Computer and Communications Security • 321-333 Kang MS, Gligor VD
Conference Security Limitations of Virtualization and How to Overcome Them 2014 • Lecture Notes in Computer Science • 7061:233-251 Gligor V
Conference Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion) 2014 • Lecture Notes in Computer Science • 7061:252-265 Gligor V
Preprint Towards $k$-connectivity of the random graph induced by a pairwise key predistribution scheme with unreliable links 2014 Yavuz F, Zhao J, Yağan O, Gligor V
Journal Article A New Privacy-Enhanced Matchmaking Protocol 2013 • IEICE Transactions on Communications • E96B(8):2049-2059 Shin JS, Gligor VD
Conference Accountable key infrastructure (AKI) 2013 679-690 Kim TH-J, Huang L-S, Perrig A, Jackson C, Gligor V
Chapter Brief Encounters with a Random Key Graph 2013 • Lecture Notes in Computer Science • 7028:162-170 Gligor VD
Chapter Brief Encounters with a Random Key Graph 2013 • Lecture Notes in Computer Science • 7028:157-161 Gligor VD, Perrig A, Zhao J
Conference Brief encounters with a random key graph 2013 • Lecture Notes in Computer Science • 7028 LNCS:157-161 Gligor VD, Perrig A, Zhao J
Conference Brief encounters with a random key graph (transcript of discussion) 2013 • Lecture Notes in Computer Science • 7028 LNCS:162-170 Gligor VD
Conference CCS 2013 program chairs' welcome 2013 • Proceedings of the ACM Conference on Computer and Communications Security Gligor V, Yung M
Conference CoDef: Collaborative Defense Against Large-Scale Link-Flooding Attacks 2013 • PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13) • 417-427 Lee SB, Kang MS, Gligor VD
Conference GeoPKI: Converting Spatial Trust into Certificate Trust 2013 • Lecture Notes in Computer Science • 7868:128-144 Kim TH-J, Gligor V, Perrig A
Conference KISS: “Key It Simple and Secure” Corporate Key Management 2013 • Lecture Notes in Computer Science • 7904:1-18 Zhou Z, Han J, Lin Y-H, Perrig A, Gligor V
Conference ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets 2013 • Lecture Notes in Computer Science • 8263:94-114 Zhao J, Gligor V, Perrig A, Newsome J
Conference ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion) 2013 • Lecture Notes in Computer Science • 8263:115-122 Gligor V
Conference RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication 2013 • Lecture Notes in Computer Science • 7859:69-77 Kim TH-J, Yamada A, Gligor V, Hong J, Perrig A
Conference Secure <i>k</i>-Connectivity in Wireless Sensor Networks under an On/Off Channel Model 2013 • IEEE International Symposium on Information Theory - Proceedings • 2790-+ Zhao J, Yagan O, Gligor V
Conference Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference 2013 • Lecture Notes in Computer Science • 7862:112-130 Kim TH-J, Gligor V, Guajardo J, Hong J, Perrig A
Conference The Crossfire Attack 2013 • IEEE Symposium on Security and Privacy: Proceedings • 127-141 Kang MS, Lee SB, Gligor VD