Sputtr.com | Alternative Search Engine

Perrig

SPINS: Security Protocols for Sensor Networks

SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar Department of Electrical Engineering and Computer Sciences University of California, Berkeley perrig, szewczyk, vwen, culler, tygar@cs.berkeley.edu ABSTRACT As sensor networks edge ...

Phoolproof Phishing Prevention

Phoolproof Phishing Prevention Bryan Parno Cynthia Kuo Adrian Perrig Carnegie Mellon University Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Work-ingGroup (APWG) received almost 14,000 unique phishing reports in August 2005, a 56%jumpoverthe number of reports in ...

Towards a More Functional and Secure Network Infrastructure

Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU UC Berkeley Report No. UCB/CSD-03-1242 Computer Science Division (EECS) University of California Berkeley, California 94720 This research was ...

IN THE SUPREME COURT OF CALIFORNIA

1 Filed 7/24/08 (this opn. should follow S148029, also filed 7/24/08) IN THE SUPREME COURT OF CALIFORNIA THE PEOPLE,)) Plaintiff and Respondent, )) S042224 v.

Seeing-Is-Believing: Using Camera Phones for Human-Veriable ...

Seeing-Is-Believing: Using Camera Phones for Human-Veriable Authentication Jonathan M. McCune Adrian Perrig Michael K. Reiter Carnegie Mellon University

Flicker: An Execution Infrastructure f or TCB Minimization

Flicker: An Execution Infrastructure f or TCB Minimization JonathanM. McCune y Bryan Par no y Adrian Perrig y Michael K. Reiter yz Hiroshi Isozaki yx{y Carnegie Mellon University z University of North Carolina at Chapel Hill x Toshiba Corporation ABSTRACT We present Flicker, an infrastructure ...

Defenses against Distributed Denial of Service Attacks

1 Adrian Perrig, Dawn Song, Avi Yaar CMU Defenses against Distributed Denial of Service Attacks Internet Threat: DDoS Attacks Denial of Service (DoS) attack: consumption (exhaustion) of resources to deny access to others Distributed Denial of Service (DDoS) attack is a coordinated DoS with many ...

Flow in a Pelton Turbine Bucket: Numerical and Experimental ...

Alexandre Perrig François Avellan Jean-Louis Kueny Mohamed Farhat Laboratory for Hydraulic Machines, Ecole Polytechnique Fédéralede Lausanne (EPFL), CH-1015 Lausanne, Switzerland Etienne Parkinson VATECHHydroLtd., Rue des 2Gares, 6, CH-1800 Vevey, Switzerland Flow in a Pelton Turbine Bucket ...

CSC 774 Advanced Network Security

A. Perrig, "The Bi Ba One-Time Signature and Broadcast Authentication Protocol, " in Proceedings of the ACM Conference on Computer and Communications Security , November 2001.

Using Clustering Information for Sensor Network Localization⋆

Using Clustering Information for Sensor Network Localization ⋆ Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University {haowenchan,mluk, perrig}@cmu.edu Abstract.