Conference Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme 2015 • 2013 National Conference on Communications, NCC 2013 • 6277-6283 Yavuz F, Zhao J, Yagan O, Gligor V
Preprint Designing Securely and Reliably Connected Wireless Sensor Networks 2015 Zhao J, Yağan O, Gligor V
Conference Establishing software-only root of trust on embedded systems: Facts and fiction 2015 • Lecture Notes in Computer Science • 9379:50-68 Li Y, Cheng Y, Gligor V, Perrig A
Conference Establishing software-only root of trust on embedded systems: Facts and fiction (transcript of discussion) 2015 • Lecture Notes in Computer Science • 9379:69-79 Gligor V
Conference Exact Analysis of <i>k</i>-Connectivity in Secure Sensor Networks with Unreliable Links 2015 • 2015 13TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT) • 191-198 Zhao J, Yagan O, Gligor V
Journal Article Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs 2015 Zhao J, Yağan O, Gligor V
Preprint Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs 2015 Zhao J, Yağan O, Gligor V
Journal Article Network Adversary Attacks against Secure Encryption Schemes 2015 • IEICE Transactions on Communications • E98B(2):267-279 Gligor VD, Parno B, Shin JS
Journal Article On k-connectivity and minimum vertex degree in random s-intersection graphs 2015 • 12th Workshop on Analytic Algorithmics and Combinatorics 2015, ANALCO 2015 • 1-15 Zhao J, Yaʇan O, Gligor V
Conference Optimal strategies for side-channel leakage in FCFS packet schedulers 2015 • IEEE International Symposium on Information Theory - Proceedings • 2515-2519 Shintre S, Gligor V, Barros J
Journal Article Random intersection graphs and their applications in security, wireless communication, and social networks 2015 Zhao J, Yağan O, Gligor V
Preprint Random intersection graphs and their applications in security, wireless communication, and social networks 2015 Zhao J, Yağan O, Gligor V
Journal Article Toward <i>k</i>-Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links 2015 • IEEE Transactions on Information Theory • 61(11):6251-6271 Yavuz F, Zhao J, Yagan O, Gligor V
Conference Trusted Display on Untrusted Commodity Platforms 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 989-1003 Yu M, Gligor VD, Zhou Z
Journal Article Connectivity in Secure Wireless Sensor Networks under Transmission Constraints 2014 • 2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON) • 1294-1301 Zhao J, Yagan O, Gligor V
Conference Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O 2014 • IEEE Symposium on Security and Privacy: Proceedings • 308-323 Zhou Z, Yu M, Gligor VD
Conference Dancing with the adversary: A tale of wimps and giants 2014 • Lecture Notes in Computer Science • 8809:100-115 Gligor V
Conference Dancing with the adversary: A tale of wimps and giants (transcript of discussion) 2014 • Lecture Notes in Computer Science • 8809:116-129 Gligor V
Preprint Exact Analysis of k-Connectivity in Secure Sensor Networks with Unreliable Links 2014 Zhao J, Yağan O, Gligor V
Preprint On $k$-connectivity and minimum vertex degree in random $s$-intersection graphs 2014 Zhao J, Yağan O, Gligor V
Conference On secure and reliable communications in wireless sensor networks: Towards <i>k</i>-connectivity under a random pairwise key predistribution scheme 2014 • IEEE International Symposium on Information Theory - Proceedings • 2381-2385 Yavuz F, Zhao J, Yagan O, Gligor V