2013 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For pioneering work and leadership in the area of computer and network security
Computer security, Computer network, Distributed computing, Wireless sensor network and Cryptography are his primary areas of study. When carried out as part of a general Computer security research project, his work on Authorization is frequently linked to work in Battlefield, therefore connecting diverse disciplines of study. Many of his research projects under Computer network are closely connected to Energy consumption with Energy consumption, tying the diverse disciplines of science together.
Virgil D. Gligor has researched Distributed computing in several fields, including Scalability, State and Concurrency control. Virgil D. Gligor combines subjects such as Key management, Key distribution in wireless sensor networks, Communications protocol, Node and Revocation with his study of Wireless sensor network. His work deals with themes such as Probabilistic logic and Node, which intersect with Key distribution in wireless sensor networks.
His scientific interests lie mostly in Computer security, Computer network, Distributed computing, Access control and Cryptography. In his study, Mobile ad hoc network is strongly linked to Wireless ad hoc network, which falls under the umbrella field of Computer security. His study in Computer network focuses on Wireless sensor network and Node.
His research investigates the connection between Wireless sensor network and topics such as Key distribution in wireless sensor networks that intersect with issues in Key management. His work in the fields of Role-based access control overlaps with other areas such as Negotiation. His Cryptography research is multidisciplinary, incorporating elements of Theoretical computer science and Encryption.
Virgil D. Gligor mainly focuses on Computer security, Computer network, Wireless ad hoc network, Wireless sensor network and Adversary. His research in Computer security focuses on subjects like The Internet, which are connected to Hacker, Network security, Credential and Data science. His Computer network study typically links adjacent topics like Set.
His work in Wireless sensor network addresses issues such as Key distribution in wireless sensor networks, which are connected to fields such as Key management, Key distribution and Revocation. His studies in Authentication integrate themes in fields like Dimension, Cryptography and Principal. His biological study spans a wide range of topics, including Network topology and Distributed computing.
Virgil D. Gligor mainly investigates Computer security, Wireless ad hoc network, Computer network, Node and Wireless sensor network. He interconnects Revocation and Set in the investigation of issues within Computer security. His Node research is multidisciplinary, relying on both Replication, Distributed computing, Multicast, Network topology and Key.
His Key research is multidisciplinary, incorporating perspectives in Sensor node and Key distribution in wireless sensor networks. In Wireless sensor network, Virgil D. Gligor works on issues like Data security, which are connected to Cryptography and Authentication. In the field of Cryptography, his study on Wide Mouth Frog protocol overlaps with subjects such as Energy consumption.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A key-management scheme for distributed sensor networks
Laurent Eschenauer;Virgil D. Gligor.
computer and communications security (2002)
Distributed detection of node replication attacks in sensor networks
B. Parno;A. Perrig;V. Gligor.
ieee symposium on security and privacy (2005)
MiniSec: a secure sensor network communication architecture
Mark Luk;Ghita Mezzour;Adrian Perrig;Virgil Gligor.
information processing in sensor networks (2007)
On Trust Establishment in Mobile Ad-Hoc Networks
Laurent Eschenauer;Virgil D. Gligor;John S. Baras.
international workshop on security (2002)
Method for automatic permission management in role-based access control systems
Serban Gavrila;Virgil Gligor.
On the formal definition of separation-of-duty policies and their composition
V.D. Gligor;S.I. Gavrila;D. Ferraiolo.
ieee symposium on security and privacy (1998)
On the distribution and revocation of cryptographic keys in sensor networks
Haowen Chan;V.D. Gligor;A. Perrig;G. Muralidharan.
IEEE Transactions on Dependable and Secure Computing (2005)
Securing Vehicular Communications - Assumptions, Requirements, and Principles
Panagiotis Papadimitratos;Virgil Gligor;Jean-Pierre Hubaux.
Workshop on Embedded Security in Cars (ESCAR) 2006 (2006)
Block encryption method and schemes for data confidentiality and integrity protection
Virgil Dorin Gligor;Pompiliu Donescu.
A Guide to Understanding Covert Channel Analysis of Trusted Systems
Shiuh-Pyng Shieh;V. D Gligor.
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: