Conference Identity and location 2006 • Lecture Notes in Computer Science • 3957 LNCS:246-255 Gollmann D, Mayo B, Arkko J, Anderson R, Christianson B, Mitchell C, Gligor V, Roe M
Journal Article Information assurance technology forecast 2005 2006 • IEEE Security and Privacy • 4(1):62-69 Gligor VD, Haigh T, Kemmerer D, Landwehr CE, Lipner S, McLean J
Conference Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks 2006 • Lecture Notes in Computer Science • 4074:1-1 Gligor VD
Conference Message from the Workshop Organizers - TSPUC 2006 2006 xxxi-xxxi Gligor V, Martinelli F, Michiardi P, Molva R
Conference Panel: Authentication in Constrained Environments 2006 • Lecture Notes in Computer Science • 4074:186-191 Burmester M, Gligor V, Kranakis E, Tygar D, Zheng Y
Conference Secure processor consistent with both foreign software protection and user privacy protection 2006 • Lecture Notes in Computer Science • 3957 LNCS:276-290 Hashimoto M, Haruki H, Kawabata T, Popescu B, Gligor V
Conference Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) 2006 • Lecture Notes in Computer Science • 3957:256-266 Gligor V
Conference The dancing bear: A new way of composing ciphers 2006 • Lecture Notes in Computer Science • 3957 LNCS:231-245 Anderson R, Roe M, Gligor V, Lomas M, Christianson B, Mitchell C
Conference Toward a broader view of security protocols 2006 • Lecture Notes in Computer Science • 3957 LNCS:106-132 Blaze M, Mitchell C, Stajano F, Massacci F, Lomas M, Clayton R, Christianson B, Gligor V, Serjantov A, Anderson R
Conference Towards a secure and interoperable DRM architecture 2006 • Proceedings of the ACM Conference on Computer and Communications Security • 69-78 Taban G, Cárdenas AA, Gligor VD
Conference Why Are We Authenticating (Transcript of Discussion) 2006 • Lecture Notes in Computer Science • 3957:291-298 Lomas M
Conference Administering access control in dynamic coalitions 2005 • LISA 2005 - 19th Large Installation System Administration Conference • 249-261 Bobba R, Gavrila S, Gligor V, Khurana H, Koleva R
Conference Distributed Detection of Node Replication Attacks in Sensor Networks 2005 • IEEE Symposium on Security and Privacy: Proceedings • 49-63 Parno B, Perrig A, Gligor V
Journal Article Guaranteeing access in spite of distributed service-flooding attacks 2005 • Lecture Notes in Computer Science • 3364:80-105 Gligor VD
Conference Guaranteeing Access in Spite of Distributed Service-Flooding Attacks 2005 • Lecture Notes in Computer Science • 3364:97-105 Gligor VD
Conference Invited talk emergent properties in ad-hoc networks: A security perspective 2005 • WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security • 55 Gligor VD
Journal Article On the distribution and revocation of cryptographic keys in sensor networks 2005 • IEEE Transactions on Dependable and Secure Computing • 2(3):233-247 Chan HW, Gligor VD, Perrig A, Muralidharan G
Conference Two-Server Password-Only Authenticated Key Exchange 2005 • Lecture Notes in Computer Science • 3531:1-16 Katz J, MacKenzie P, Taban G, Gligor V
Conference A Model for Access Negotiations in Dynamic Coalitions 2004 • Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE • 205-210 Khurana H, Gligor VD
Journal Article On trust establishment in mobile ad-hoc networks 2004 • Lecture Notes in Computer Science • 2845:47-62 Eschenauer L, Gligor VD, Baras J