Journal Article Analysis of complex contagions in random multiplex networks 2012 • Physical Review E • 86(3): Yagan O, Gligor V
Conference Building Verifiable Trusted Path on Commodity x86 Computers 2012 • IEEE Symposium on Security and Privacy: Proceedings • 616-630 Zhou Z, Gligor VD, Newsome J, McCune JM
Conference CCS 2012 program chairs' welcome 2012 • Proceedings of the ACM Conference on Computer and Communications Security Gligor V, Danezis G
Conference Discovering Records of Private VoIP Calls without Wiretapping 2012 • 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012) Jong C-H, Gligor VD
Conference Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms 2012 • Lecture Notes in Computer Science • 7344:34-54 Vasudevan A, Parno B, Qu N, Gligor VD, Perrig A
Conference Street-Level Trust Semantics for Attribute Authentication 2012 • Lecture Notes in Computer Science • 7622:96-115 Kim TH-J, Gligor V, Perrig A
Conference Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion) 2012 • Lecture Notes in Computer Science • 7622:116-125 Gligor V
Journal Article Two-server password-only authenticated key exchange 2012 • Journal of Computer and System Sciences • 78(2):651-669 Katz J, MacKenzie P, Taban G, Gligor V
Conference A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems 2011 • Proceedings - International Conference on Computer Communications and Networks, ICCCN • 1:1-6 Kim TH-J, Gligor V, Perrig A
Journal Article DefAT: Dependable Connection Setup for Network Capabilities 2011 Lee SB, Gligor VD, Perrig A
Journal Article FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks 2011 Lee SB, Gligor VD
Journal Article FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks 2011 Lee SB, Gligor VD
Conference Handling New Adversaries in Wireless Ad-Hoc Networks 2011 • Lecture Notes in Computer Science • 6615:118-+ Bahari SF, Gligor VD
Conference Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion) 2011 • Lecture Notes in Computer Science • 6615:120-125 Gligor VD
Conference Network Fault Localization with Small TCB 2011 • Proceedings - International Conference on Network Protocols, ICNP Zhang X, Zhou Z, Hasker G, Perrig A, Gligor V
Conference Towards a Theory of Trust in Networks of Humans and Computers 2011 • Lecture Notes in Computer Science • 7114:223-242 Gligor V, Wing JM
Conference Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion) 2011 • Lecture Notes in Computer Science • 7114:243-257 Gligor V
Conference Dependable Connection Setup for Network Capabilities 2010 • Proceedings of the International Conference on Dependable Systems and Networks • 301-310 Lee SB, Gligor VD, Perrig A
Journal Article Distributed Immune Systems for Wireless Network Information Assurance 2010 Baras J, Berenstein C, Ephremides A, Gligor V, Liu R, Papadopoulos H, Roussopoulos N, Wu M
Journal Article Editorial 2010 • IEEE Transactions on Dependable and Secure Computing • 7(1):1-3 Gligor V