Conference FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks 2010 • Distributed Computing Systems Lee SB, Gligor VD
Conference TrustVisor: Efficient TCB Reduction and Attestation 2010 • IEEE Symposium on Security and Privacy: Proceedings • 143-158 McCune JM, Li Y, Qu N, Zhou Z, Datta A, Gligor V, Perrig A
Journal Article Editorial 2009 • IEEE Transactions on Dependable and Secure Computing • 6(1):1-3 Gligor VD
Conference Privacy-preserving Integrity-assured Data Aggregation in Sensor Networks 2009 168-175 Taban G, Gligor VD
Conference Privacy-Preserving Relationship Path Discovery in Social Networks 2009 • Lecture Notes in Computer Science • 5888:189-208 Mezzour G, Perrig A, Gligor V, Papadimitratos P
Journal Article Secure Wireless Networking 2009 • Journal of Communications and Networks • 11(6):533-537 Perrig A, Trappe W, Gligor V, Poovendran R, Lee H
Conference A New Privacy-Enhanced Matchmaking Protocol 2008 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008 Shin JS, Gligor VD
Journal Article Editorial 2008 • IEEE Transactions on Dependable and Secure Computing • 5(1):4-5 Gligor V
Journal Article Editorial: Dependability and Security 2008 • IEEE Transactions on Dependable and Secure Computing • 5(1):1-3 Gligor V
Chapter Efficient Handling of Adversary Attacks in Aggregation Applications 2008 • Lecture Notes in Computer Science • 5283:66-81 Taban G, Gligor VD
Conference Efficient Handling of Adversary Attacks in Aggregation Applications 2008 • Lecture Notes in Computer Science • 5283:66-+ Taban G, Gligor VD
Conference On data-centric trust establishment in ephemeral ad hoc networks 2008 • IEEE Infocom. Proceedings • 1912-+ Raya M, Papadimitratos P, Gligor VD, Hubaux J-P
Conference On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks 2008 1238-1246 Raya M, Papadimitratos P, Gligor VD, Hubaux J-P
Chapter Surviving insider attacks: A call for system experiments 2008 • Advances in Information Security • 39:153-+ Gligor VD, Chandersekaran CS
Conference Welcome to WiSec 2008 2008 • WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security Gligor V
Conference FMSE'07 - Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering: Foreword 2007 • FMSE'07 - Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering Gligor V, Mantel H
Conference MiniSec: A Secure Sensor Network Communication Architecture 2007 479-488 Luk M, Mezzour G, Perrig A, Gligor V
Conference On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) 2007 • Lecture Notes in Computer Science • 4631:276-283 Gligor V
Conference Accountable privacy 2006 • Lecture Notes in Computer Science • 3957 LNCS:83-105 Burmester M, Desmedt Y, Wright RN, Yasinsac A, Blaze M, Aura T, Christianson B, Gligor V, Anderson R, Serjantov A, Danezis G, Crispo B, Clayton R, Eronen P
Conference Controlling who tracks me 2006 • Lecture Notes in Computer Science • 3957 LNCS:151-162 Bohm D, Lamming M, Mayo RN, Morgan J, Zhang K, Blaze M, Roe M, Clayton R, Christianson B, Aura T, Stajano F, Danezis G, Mitchell C, Lomas M, Gligor V, Bond M