Journal Article Guaranteeing access in spite of distributed service-flooding attacks 2005 • Lecture Notes in Computer Science • 3364:80-105 Gligor VD
Conference Guaranteeing access in spite of distributed service-flooding attacks 2005 • Lecture Notes in Computer Science • 3364 LNCS:97-105 Gligor VD
Conference Invited talk emergent properties in ad-hoc networks: A security perspective 2005 • WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security • 55 Gligor VD
Journal Article On the distribution and revocation of cryptographic keys in sensor networks 2005 • IEEE Transactions on Dependable and Secure Computing • 2(3):233-247 Chan HW, Gligor VD, Perrig A, Muralidharan G
Conference Two-server password-only authenticated key exchange 2005 • Lecture Notes in Computer Science • 3531:1-16 Katz J, MacKenzie P, Taban G, Gligor V
Conference A model for access negotiations in dynamic coalitions 2004 • Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE • 13:205-210 Khurana H, Gligor VD
Journal Article On trust establishment in mobile ad-hoc networks 2004 • Lecture Notes in Computer Science • 2845:47-62 Eschenauer L, Gligor VD, Baras J
Conference Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks 2003 • GLOBECOM - IEEE Global Telecommunications Conference • 3:1511-1515 Bobba RB, Eschenauer L, Gligor V, Arbaugh W
Conference Integrated security services for dynamic coalitions 2003 • Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003 • 2:38-40 Khurana H, Gavrila S, Bobba R, Koleva R, Sonalker A, Dinu E, Gligor V, Baras J
Journal Article Weak key authenticity and the computational completeness of formal encryption 2003 • Lecture Notes in Computer Science • 2729:530-547 Horvitz O, Gligor V
Conference A key-management scheme for distributed sensor networks 2002 • Proceedings of the ACM Conference on Computer and Communications Security • 41-47 Eschenauer L, Gligor VD
Journal Article Fast encryption and authentication: XCBC encryption and XECB authentication modes 2002 • Lecture Notes in Computer Science • 2355:92-108 Gligor VD, Donescu P
Conference Negotiation of access control policies 2002 • Lecture Notes in Computer Science • 2467:202-212 Gligor VD
Journal Article On the negotiation of access control policies 2002 • Lecture Notes in Computer Science • 2467:188-201 Gligor VD, Khurana H, Koleva RK, Bharadwaj VG, Baras JS
Conference Reasoning about joint administration of access policies for coalition resources 2002 • Distributed Computing Systems • 429-438 Khurana H, Gligor V, Linn J
Conference Denial of service – Panel discussion 2001 • Lecture Notes in Computer Science • 2133:194-203 Gligor V, Blaze M, Ioannidis J
Conference Non-interference, who needs it? 2001 • Proceedings of the Computer Security Foundations Workshop • 237-238 Ryan P, Mellon C, McLean J, Millen J, Gligor V
Conference Review and revocation of access privileges distributed with PKI certificates 2001 • Lecture Notes in Computer Science • 2133:100-112 Khurana H, Gligor VD
Conference Review and revocation of access privileges distributed with PKI certificates (Transcript of discussion) 2001 • Lecture Notes in Computer Science • 2133:113-124 Gligor VD
Journal Article Applying Specialization to Improve Survivability of OS Kernels (Immunix Project) 2000 Pu C, Cowan C, Gligor V, Hinton H, Walpole J
Journal Article Integrity-aware PCBC encryption schemes 2000 • Lecture Notes in Computer Science • 1796:153-168 Gligor VD, Donescu P
Conference Integrity-aware PCBC Encryption schemes (Transcript of discussion) 2000 • Lecture Notes in Computer Science • 1796:169-171 Gligor V
Conference SubDomain: Parsimonious server security 2000 • Proceedings of the 14th Conference on Systems Administration, LISA 2000 • 355-367 Cowan C, Beattie S, Kroah-Hartman G, Pu C, Wagle P, Gligor V