Conference Minimal TCB code execution 2007 • IEEE Symposium on Security and Privacy: Proceedings • 267-272 McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A
Conference Portcullis: Protecting connection setup from denial-of-capability attacks 2007 • Computer Communication Review • 37(4):289-300 Parno B, Wendlandt D, Shi E, Perrig A, Maggs B, Hu Y-C
Conference Portcullis: Protecting connection setup from denial-of-capability attacks 2007 • ACM SIGCOMM 2007: Conference on Computer Communications • 289-300 Parno B, Wendlandt D, Shi E, Perrig A, Maggs B, Hu YC
Conference Phoolproof phishing prevention 2006 • Lecture Notes in Computer Science • 4107:1-19 Parno B, Kuo C, Perrig A
Conference Secure sensor network routing: A cleanslate approach 2006 • Proceedings of CoNEXT'06 - 2nd Conference on Future Networking Technologies Parno B, Luk M, Gaustad E, Perrig A
Conference Distributed detection of node replication attacks in sensor networks 2005 • IEEE Symposium on Security and Privacy: Proceedings • 49-63 Parno B, Perrig A, Gligor V
Journal Article Defending a P2P digital preservation system 2004 • IEEE Transactions on Dependable and Secure Computing • 1(4):209-222 Parno B, Roussopoulos M