BibTeX records: Mark Luk

download as .bib file

@article{DBLP:journals/adhoc/SeshadriLP11,
  author       = {Arvind Seshadri and
                  Mark Luk and
                  Adrian Perrig},
  title        = {{SAKE:} Software attestation for key establishment in sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {9},
  number       = {6},
  pages        = {1059--1067},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.adhoc.2010.08.011},
  doi          = {10.1016/J.ADHOC.2010.08.011},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/SeshadriLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/SeshadriLP08,
  author       = {Arvind Seshadri and
                  Mark Luk and
                  Adrian Perrig},
  editor       = {Sotiris E. Nikoletseas and
                  Bogdan S. Chlebus and
                  David B. Johnson and
                  Bhaskar Krishnamachari},
  title        = {{SAKE:} Software Attestation for Key Establishment in Sensor Networks},
  booktitle    = {Distributed Computing in Sensor Systems, 4th {IEEE} International
                  Conference, {DCOSS} 2008, Santorini Island, Greece, June 11-14, 2008,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5067},
  pages        = {372--385},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69170-9\_25},
  doi          = {10.1007/978-3-540-69170-9\_25},
  timestamp    = {Mon, 01 Jul 2019 18:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dcoss/SeshadriLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FranklinLMSPD08,
  author       = {Jason Franklin and
                  Mark Luk and
                  Jonathan M. McCune and
                  Arvind Seshadri and
                  Adrian Perrig and
                  Leendert van Doorn},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Towards Sound Detection of Virtual Machines},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {89--116},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_5},
  doi          = {10.1007/978-0-387-68768-1\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FranklinLMSPD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/LukMPG07,
  author       = {Mark Luk and
                  Ghita Mezzour and
                  Adrian Perrig and
                  Virgil D. Gligor},
  editor       = {Tarek F. Abdelzaher and
                  Leonidas J. Guibas and
                  Matt Welsh},
  title        = {MiniSec: a secure sensor network communication architecture},
  booktitle    = {Proceedings of the 6th International Conference on Information Processing
                  in Sensor Networks, {IPSN} 2007, Cambridge, Massachusetts, USA, April
                  25-27, 2007},
  pages        = {479--488},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1236360.1236421},
  doi          = {10.1145/1236360.1236421},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ipsn/LukMPG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/StuderLP07,
  author       = {Ahren Studer and
                  Mark Luk and
                  Adrian Perrig},
  title        = {Efficient mechanisms to provide convoy member and vehicle sequence
                  authentication in VANETs},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {422--432},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550363},
  doi          = {10.1109/SECCOM.2007.4550363},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/StuderLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/KuoLNP07,
  author       = {Cynthia Kuo and
                  Mark Luk and
                  Rohit Negi and
                  Adrian Perrig},
  editor       = {Sanjay Jha},
  title        = {Message-in-a-bottle: user-friendly and secure key deployment for sensor
                  nodes},
  booktitle    = {Proceedings of the 5th International Conference on Embedded Networked
                  Sensor Systems, SenSys 2007, Sydney, NSW, Australia, November 6-9,
                  2007},
  pages        = {233--246},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1322263.1322286},
  doi          = {10.1145/1322263.1322286},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/KuoLNP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/SeshadriLQP07,
  author       = {Arvind Seshadri and
                  Mark Luk and
                  Ning Qu and
                  Adrian Perrig},
  editor       = {Thomas C. Bressoud and
                  M. Frans Kaashoek},
  title        = {SecVisor: a tiny hypervisor to provide lifetime kernel code integrity
                  for commodity OSes},
  booktitle    = {Proceedings of the 21st {ACM} Symposium on Operating Systems Principles
                  2007, {SOSP} 2007, Stevenson, Washington, USA, October 14-17, 2007},
  pages        = {335--350},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1294261.1294294},
  doi          = {10.1145/1294261.1294294},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/SeshadriLQP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SeshadriLPDK07,
  author       = {Arvind Seshadri and
                  Mark Luk and
                  Adrian Perrig and
                  Leendert van Doorn and
                  Pradeep K. Khosla},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution
                  on Legacy Systems},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {253--289},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_12},
  doi          = {10.1007/978-0-387-44599-1\_12},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/SeshadriLPDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/SeshadriLPDK06,
  author       = {Arvind Seshadri and
                  Mark Luk and
                  Adrian Perrig and
                  Leendert van Doorn and
                  Pradeep K. Khosla},
  title        = {Externally verifiable code execution},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {9},
  pages        = {45--49},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151030.1151054},
  doi          = {10.1145/1151030.1151054},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/SeshadriLPDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ParnoLGP06,
  author       = {Bryan Parno and
                  Mark Luk and
                  Evan Gaustad and
                  Adrian Perrig},
  editor       = {Christophe Diot and
                  Mostafa H. Ammar},
  title        = {Secure sensor network routing: a clean-slate approach},
  booktitle    = {Proceedings of the 2006 {ACM} Conference on Emerging Network Experiment
                  and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006},
  pages        = {11},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1368436.1368452},
  doi          = {10.1145/1368436.1368452},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/ParnoLGP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/LukPW06,
  author       = {Mark Luk and
                  Adrian Perrig and
                  Bram Whillock},
  editor       = {Sencun Zhu and
                  Donggang Liu},
  title        = {Seven cardinal properties of sensor network broadcast authentication},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {147--156},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180345.1180364},
  doi          = {10.1145/1180345.1180364},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/LukPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/SeshadriLPDK06,
  author       = {Arvind Seshadri and
                  Mark Luk and
                  Adrian Perrig and
                  Leendert van Doorn and
                  Pradeep K. Khosla},
  editor       = {Radha Poovendran and
                  Ari Juels},
  title        = {{SCUBA:} Secure Code Update By Attestation in sensor networks},
  booktitle    = {Proceedings of the 2006 {ACM} Workshop on Wireless Security, Los Angeles,
                  California, USA, September 29, 2006},
  pages        = {85--94},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161289.1161306},
  doi          = {10.1145/1161289.1161306},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/SeshadriLPDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/ChanLP05,
  author       = {Haowen Chan and
                  Mark Luk and
                  Adrian Perrig},
  editor       = {Viktor K. Prasanna and
                  S. Sitharama Iyengar and
                  Paul G. Spirakis and
                  Matt Welsh},
  title        = {Using Clustering Information for Sensor Network Localization},
  booktitle    = {Distributed Computing in Sensor Systems, First {IEEE} International
                  Conference, {DCOSS} 2005, Marina del Rey, CA, USA, June 30 - July
                  1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3560},
  pages        = {109--125},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502593\_11},
  doi          = {10.1007/11502593\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dcoss/ChanLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/SeshadriLSPDK05,
  author       = {Arvind Seshadri and
                  Mark Luk and
                  Elaine Shi and
                  Adrian Perrig and
                  Leendert van Doorn and
                  Pradeep K. Khosla},
  editor       = {Andrew Herbert and
                  Kenneth P. Birman},
  title        = {Pioneer: verifying code integrity and enforcing untampered code execution
                  on legacy systems},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Operating Systems Principles
                  2005, {SOSP} 2005, Brighton, UK, October 23-26, 2005},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1095810.1095812},
  doi          = {10.1145/1095810.1095812},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/SeshadriLSPDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics