2022 - Research.com Computer Science in Switzerland Leader Award
2016 - ACM Fellow For contributions in protocols for network and system security.
2012 - ACM Senior Member
2006 - Fellow of Alfred P. Sloan Foundation
Adrian Perrig spends much of his time researching Computer network, Computer security, Wireless sensor network, Distributed computing and Authentication. His Computer network study incorporates themes from Wireless ad hoc network and Vehicular ad hoc network. Adrian Perrig interconnects The Internet, Denial-of-service attack and Server in the investigation of issues within Computer security.
His Wireless sensor network study combines topics from a wide range of disciplines, such as News aggregator, Sensor node, Key distribution in wireless sensor networks, Node and Secure multi-party computation. His work deals with themes such as Key distribution, Network topology, Key and Packet loss, which intersect with Distributed computing. The concepts of his Authentication study are interwoven with issues in Overhead, Broadcast communication network, Cryptography and Public-key cryptography.
Adrian Perrig focuses on Computer security, Computer network, The Internet, Distributed computing and Network packet. His study in Internet privacy extends to Computer security with its themes. Adrian Perrig has included themes like Denial-of-service attack and Cryptography in his Computer network study.
His The Internet research includes elements of Network architecture, Scalability and Flooding. His Distributed computing research includes themes of Link-state routing protocol, Wireless Routing Protocol, Multipath routing and Dynamic Source Routing. His Wireless sensor network study integrates concerns from other disciplines, such as Sensor node, Key distribution in wireless sensor networks and Node.
Adrian Perrig mainly focuses on Computer network, The Internet, Network packet, Computer security and Path. His studies in Computer network integrate themes in fields like Domain Name System and Anonymity. His study in the fields of Denial-of-service attack and Internet architecture under the domain of The Internet overlaps with other disciplines such as Flexibility.
The various areas that Adrian Perrig examines in his Network packet study include Set and Network transparency. As part of his studies on Computer security, he often connects relevant areas like Scalability. Adrian Perrig combines subjects such as GNSS augmentation, GNSS applications, Global Positioning System and Cryptography with his study of Authentication.
His primary areas of study are Computer network, The Internet, Computer security, World Wide Web and Public key infrastructure. His research integrates issues of Enhanced Data Rates for GSM Evolution and Anonymity in his study of Computer network. His The Internet research focuses on subjects like Network architecture, which are linked to Lightweight Extensible Authentication Protocol and Authentication protocol.
His study in Public-key cryptography and Authentication falls within the category of Computer security. His work deals with themes such as Key management, Cryptography, Denial-of-service attack and Domain Name System, which intersect with Public-key cryptography. He works mostly in the field of Network packet, limiting it down to topics relating to Replay attack and, in certain cases, Distributed computing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
SPINS: security protocols for sensor networks
Adrian Perrig;Robert Szewczyk;J. D. Tygar;Victor Wen.
Wireless Networks (2002)
Ariadne: a secure on-demand routing protocol for ad hoc networks
Yih-Chun Hu;Adrian Perrig;David B. Johnson.
Wireless Networks (2005)
Random key predistribution schemes for sensor networks
Haowen Chan;A. Perrig;D. Song.
ieee symposium on security and privacy (2003)
SPINS: security protocols for sensor networks
Adrian Perrig;Robert Szewczyk;Victor Wen;David Culler.
acm/ieee international conference on mobile computing and networking (2001)
Practical techniques for searches on encrypted data
Dawn Xiaoding Song;D. Wagner;A. Perrig.
ieee symposium on security and privacy (2000)
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
Yih Chun Hu;David B. Johnson;Adrian Perrig.
ad hoc networks (2003)
Packet leashes: a defense against wormhole attacks in wireless networks
Y.-C. Hu;A. Perrig;D.B. Johnson.
international conference on computer communications (2003)
Security in wireless sensor networks
Adrian Perrig;John Stankovic;David Wagner.
Communications of The ACM (2004)
The Sybil attack in sensor networks: analysis & defenses
James Newsome;Elaine Shi;Dawn Song;Adrian Perrig.
information processing in sensor networks (2004)
Efficient authentication and signing of multicast streams over lossy channels
A. Perrig;R. Canetti;J.D. Tygar;Dawn Song.
ieee symposium on security and privacy (2000)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Google (United States)
Carnegie Mellon University
University of California, Berkeley
University of Illinois at Urbana-Champaign
University of California, Berkeley
Carnegie Mellon University
Duke University
University of California, San Diego
Rice University
Carnegie Mellon University
University of Göttingen
Microsoft (United States)
King's College London
United States Naval Research Laboratory
Columbia University
Technical University of Denmark
Grenoble Alpes University
National Museum of Natural History
Plant & Food Research
University of Pisa
National Institutes of Health
New York University
University of Fukui
Karolinska Institute
University of Montreal
Commonwealth Scientific and Industrial Research Organisation