Popular related searches


Author: Adrian Perrig


Publication period start: 2003
Number of co-authors: 25


Number of publications with favourite co-authors
Ajay Surie
Mahadev Satyanarayanan
David J. Farber

Productive Colleagues

Most productive colleagues in number of publications
John A. Stankovic
David Wagner
Mahadev Satyanarayanan


Surie, Ajay, Perrig, Adrian, Satyanarayanan, Mahadev, Farber, David J. (2007): Rapid Trust Establishment for Pervasive Personal Computing. In IEEE Pervasive Computing, 6 (4) pp. 24-30. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.84

Satyanarayanan, Mahadev, Gilbert, Benjamin, Toups, Matt, Tolia, Niraj, Surie, Ajay, O\'Hallaron, David R., Wolbach, Adam, Harkes, Jan, Perrig, Adrian, Farber, David J., Kozuch, Michael, Helfrich, Casey, Nath, Partho, Lagar-Cavilla, H. Andrés (2007): Pervasive Personal Computing in an Internet Suspend/Resume System. In IEEE Internet Computing, 11 (2) pp. 16-25. https://doi.ieeecomputersociety.org/10.1109/MIC.2007.46

Kuo, Cynthia, Perrig, Adrian, Walker, Jesse (2006): Designing an evaluation method for security user interfaces: lessons from studying secure . In Interactions, 13 (3) pp. 28-31.

Seshadri, Arvind, Luk, Mark, Perrig, Adrian, Doorn, Leendert van, Khosla, Pradeep K. (2006): Externally verifiable code execution. In Communications of the ACM, 49 (9) pp. 45-49. https://dl.acm.org/doi/10.1145/1151054

Perrig, Adrian, Stankovic, John A., Wagner, David (2004): Security in wireless sensor networks. In Communications of the ACM, 47 (6) pp. 53-57. https://dl.acm.org/doi/10.1145/990680.990707

Chan, Haowen, Perrig, Adrian (2003): Security and Privacy in Sensor Networks. In IEEE Computer, 36 (10) pp. 103-105. https://csdl.computer.org/comp/mags/co/2003/10/rx103abs.htm

Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. https://doi.acm.org/10.1145/1408664.1408670