Syed Taha Ali
Title
Cited by
Cited by
Year
A Survey of Securing Networks Using Software Defined Networking
ST Ali, V Sivaraman, A Radford, S Jha
IEEE Transactions on Reliability, 2015
1832015
Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices
ST Ali, V Sivaraman, D Ostry
IEEE Transactions on Mobile Computing, 2013
732013
Zero reconciliation secret key generation for body-worn health monitoring devices
ST Ali, V Sivaraman, D Ostry
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
632012
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
ST Ali, V Sivaraman, D Ostry
Future Generation Computer Systems 35, 80-90, 2014
502014
Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion)
ST Ali
Cambridge International Workshop on Security Protocols, 294-306, 2015
492015
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks
ST Ali, V Sivaraman, D Ostry
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International …, 2010
482010
Zombiecoin: Powering next-generation botnets with bitcoin
ST Ali, P McCorry, PHJ Lee, F Hao
International Conference on Financial Cryptography and Data Security, 34-48, 2015
462015
An overview of end-to-end verifiable voting systems
ST Ali, J Murray
Real-World Electronic Voting, 189-234, 2016
452016
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
ST Ali, P McCorry, PHJ Lee, F Hao
International Journal of Information Security 17 (4), 411-422, 2018
392018
Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints
ST Ali, V Sivaraman, D Ostry, S Jha, G Tsudik
IEEE Transactions on Information Forensics and Security, 2014
302014
Decorrelating secret bit extraction via channel hopping in body area networks
L Yao, ST Ali, V Sivaraman, D Ostry
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio …, 2012
232012
Secure lightweight context-driven data logging for bodyworn sensing devices
M Siddiqi, ST All, V Sivaraman
2017 5th International symposium on digital forensic and security (ISDFS), 1-6, 2017
222017
Securing data provenance in body area networks using lightweight wireless link fingerprints
ST Ali, V Sivaraman, D Ostry, S Jha
Proceedings of the 3rd international workshop on Trustworthy embedded …, 2013
172013
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
ST Ali, V Sivaraman, A Dhamdhere, D Ostry
Ad Hoc Networks 8 (6), 668-679, 2010
152010
Improving secret key generation performance for on-body devices.
L Yao, ST Ali, V Sivaraman, D Ostry
BODYNETS, 19-22, 2011
142011
Greening Residential WiFi Networks under Centralized Control
V Sivaraman, J Matthews, C Russell, ST Ali, A Vishwanath
IEEE Transactions on Mobile Computing, 1-1, 0
13*
Why preventing a cryptocurrency exchange heist isn’t good enough
P McCorry, M Möser, ST Ali
Cambridge International Workshop on Security Protocols, 225-233, 2018
112018
The nuts and bolts of micropayments: a survey
ST Ali, D Clarke, P McCorry
arXiv preprint arXiv:1710.02964, 2017
92017
Securing networks using software defined networking: a survey
NEWS WALES
92013
Authentication of lossy data in body-sensor networks for healthcare monitoring
ST Ali, V Sivaraman, D Ostry
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012
92012
The system can't perform the operation now. Try again later.
Articles 1–20