• Publications
  • Influence
Random key predistribution schemes for sensor networks
TLDR
The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation. Expand
Practical techniques for searches on encrypted data
TLDR
This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today. Expand
Packet leashes: a defense against wormhole attacks in wireless networks
TLDR
A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes. Expand
Efficient authentication and signing of multicast streams over lossy channels
TLDR
This work proposes two efficient schemes, TESLA and EMSS, for secure lossy multicast streams, and offers sender authentication, strong loss robustness, high scalability and minimal overhead at the cost of loose initial time synchronization and slightly delayed authentication. Expand
The TESLA Broadcast Authentication Protocol
TLDR
The TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol is presented, an efficient protocol with low communication and computation overhead, which scales to large numbers of receivers, and tolerates packet loss. Expand
Distributed detection of node replication attacks in sensor networks
TLDR
It is shown that emergent algorithms represent a promising new approach to sensor network security; moreover, the results naturally extend to other classes of networks in which nodes can be captured, replicated and re-inserted by an adversary. Expand
Ariadne: a secure on-demand routing protocol for ad hoc networks
TLDR
a secure on-demand routing protocol for ad hoc networks that can be used to connect ad-hoc networks to each other without disrupting existing networks. Expand
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
TLDR
This paper presents attacks against routing in ad hoc networks, and the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne, which prevents attackers or compromised nodes from tampering with uncompromising routes consisting of uncompromised nodes. Expand
Deja Vu-A User Study: Using Images for Authentication
TLDR
Deja Vu is a recognition-based authentication system, which authenticates a user through her ability to recognize previously seen images, which is more reliable and easier to use than traditional recall-based schemes, which require the user to precisely recall passwords or PINs. Expand
Advanced and authenticated marking schemes for IP traceback
  • D. Song, A. Perrig
  • Computer Science
  • Proceedings IEEE INFOCOM . Conference on Computer…
  • 22 April 2001
TLDR
Two new schemes are presented, the advanced marking scheme and the authenticated marking scheme, which allow the victim to trace-back the approximate origin of spoofed IP packets and provide efficient authentication of routers' markings such that even a compromised router cannot forge or tamper markings from other uncompromised routers. Expand
...
1
2
3
4
5
...