Adrian Perrig

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
2003
Publication period end
2008
Number of co-authors
25

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. http://doi.acm.org/10.1145/1408664.1408670

Surie, Ajay, Perrig, Adrian, Satyanarayanan, Mahadev, Farber, David J. (2007): Rapid Trust Establishment for Pervasive Personal Computing. In IEEE Pervasive Computing, 6 (4) pp. 24-30. http://doi.ieeecomputersociety.org/10.1109/MPRV.2007.84

Satyanarayanan, Mahadev, Gilbert, Benjamin, Toups, Matt, Tolia, Niraj, Surie, Ajay, O\'Hallaron, David R., Wolbach, Adam, Harkes, Jan, Perrig, Adrian, Farber, David J., Kozuch, Michael, Helfrich, Casey, Nath, Partho, Lagar-Cavilla, H. Andrés (2007): Pervasive Personal Computing in an Internet Suspend/Resume System. In IEEE Internet Computing, 11 (2) pp. 16-25. http://doi.ieeecomputersociety.org/10.1109/MIC.2007.46

Kuo, Cynthia, Perrig, Adrian, Walker, Jesse (2006): Designing an evaluation method for security user interfaces: lessons from studying secure . In Interactions, 13 (3) pp. 28-31.

Seshadri, Arvind, Luk, Mark, Perrig, Adrian, Doorn, Leendert van, Khosla, Pradeep K. (2006): Externally verifiable code execution. In Communications of the ACM, 49 (9) pp. 45-49. http://doi.acm.org/10.1145/1151054

Perrig, Adrian, Stankovic, John A., Wagner, David (2004): Security in wireless sensor networks. In Communications of the ACM, 47 (6) pp. 53-57. http://doi.acm.org/10.1145/990680.990707

Chan, Haowen, Perrig, Adrian (2003): Security and Privacy in Sensor Networks. In IEEE Computer, 36 (10) pp. 103-105. http://csdl.computer.org/comp/mags/co/2003/10/rx103abs.htm