Search

Your search keyword '"Perrig, Adrian"' showing total 973 results

Search Constraints

Start Over You searched for: Author "Perrig, Adrian" Remove constraint Author: "Perrig, Adrian"
973 results on '"Perrig, Adrian"'

Search Results

1. Protocols to Code: Formal Verification of a Next-Generation Internet Router

2. GLIDS: A Global Latency Information Dissemination System

3. Charting Censorship Resilience and Global Internet Reachability: A Quantitative Approach

4. Inter-Domain Routing with Extensible Criteria

5. Hummingbird: Fast, Flexible, and Fair Inter-Domain Bandwidth Reservations

6. ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks

7. Quality Competition Among Internet Service Providers

8. FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks

9. Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking

10. Carbon-Intelligent Global Routing in Path-Aware Networks

11. Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers?

12. SAGE: Software-based Attestation for GPU Execution

13. Protecting Critical Inter-Domain Communication through Flyover Reservations

14. Model-Based Insights on the Performance, Fairness, and Stability of BBR

15. G-SINC: Global Synchronization Infrastructure for Network Clocks

16. Creating a Secure Underlay for the Internet

17. NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications

18. Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing

19. An Axiomatic Perspective on the Performance Effects of End-Host Path Selection

20. F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure

21. Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures

22. GMA: A Pareto Optimal Distributed Resource-Allocation Algorithm

23. Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows

24. Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion)

25. Determining an Economic Value of High Assurance for Commodity Software Security

26. Trusted Introductions for Secure Messaging

28. Key Management

29. Incentivizing Stable Path Selection in Future Internet Architectures

30. A Formally Verified Protocol for Log Replication with Byzantine Fault Tolerance

31. The Value of Information in Selfish Routing

32. Current Status and Plans

33. Related Work

34. Design-Level Verification

35. Code-Level Verification

36. Host Structure

37. PILA: Pervasive Internet-Wide Low-Latency Authentication

38. Motivation for Formal Verification

39. RHINE: Secure and Reliable Internet Naming Service

40. Green Networking with SCION

41. SCIONLAB Research Testbed

42. F-PKI: A Flexible End-Entity Public-Key Infrastructure

43. Use Cases and Applications

44. Deployment and Operation

45. Monitoring and Filtering

46. Cryptography

47. Data Plane

48. Extensions for the Control Plane

49. Extensions for the Data Plane

50. Availability Guarantees

Catalog

Books, media, physical & digital resources