Folgen
Aravind Iyer
Aravind Iyer
Samsung, General Motors, Purdue, IIT Bombay
Bestätigte E-Mail-Adresse bei iitbombay.org
Titel
Zitiert von
Zitiert von
Jahr
What is the right model for wireless channel interference?
A Iyer, C Rosenberg, A Karnik
Proceedings of the 3rd international conference on Quality of service in …, 2006
3952006
An address-light, integrated MAC and routing protocol for wireless sensor networks
S Kulkarni, A Iyer, C Rosenberg
IEEE/ACM Transactions on networking 14 (4), 793-806, 2006
1442006
Threat mitigation in a vehicle-to-vehicle communication network
BR Bellur, D Bhattacharya, AV Iyer
US Patent 8,819,414, 2014
1222014
Flooding-resilient broadcast authentication for vanets
HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1172011
Throughput-optimal configuration of fixed wireless networks
A Karnik, A Iyer, C Rosenberg
IEEE/ACM Transactions On Networking 16 (5), 1161-1174, 2008
862008
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
792010
Electronic device using framework interface for communication
KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ...
US Patent App. 14/281,355, 2014
682014
Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks
BR Bellur, AV Iyer, D Bhattacharya
US Patent 8,904,183, 2014
372014
Throughput-lifetime trade-offs in multihop wireless networks under an SINR-based interference model
J Luo, A Iyer, C Rosenberg
IEEE Transactions on Mobile Computing 10 (3), 419-433, 2010
352010
A taxonomy-based approach to design of large-scale sensor networks
A Iyer, SS Kulkarni, V Mhatre, CP Rosenberg
Wireless Sensor Networks and Applications, 3-33, 2008
342008
Secure V2V communications: Performance impact of computational overheads
A Iyer, A Kherani, A Rao, A Karnik
IEEE INFOCOM Workshops 2008, 1-6, 2008
322008
Batch verification of ECDSA signatures
S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer
International Conference on Cryptology in Africa, 1-18, 2012
292012
Understanding the key performance issues with MAC protocols for multi‐hop wireless networks
A Iyer, C Rosenberg
Wireless Communications and Mobile Computing 6 (6), 745-760, 2006
282006
Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
AV Iyer, D Bhattacharya
US Patent 8,452,969, 2013
212013
Lightweight geographic trajectory authentication via one-time signatures
BR Bellur, AV Iyer
US Patent App. 12/413,741, 2009
162009
Design of high throughput scheduled mesh networks: A case for directional antennas
SN Muthaiah, A Iyer, A Karnik, C Rosenberg
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 5080-5085, 2007
152007
Framework for packet processing for secure V2V applications on resource-constrained platforms
AV Iyer, AR Karnik, BR Bellur
US Patent 8,704,679, 2014
142014
New algorithms for batch verification of standard ECDSA signatures
S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer
Journal of Cryptographic Engineering 4 (4), 237-258, 2014
102014
Routing dependent node density requirements for connectivity in multi-hop wireless networks
SS Kulkarni, A Iyer, C Rosenberg, D Kofman
IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 5, 2890-2896, 2004
102004
Active queue management using adaptive RED
R Verma, A Iyer, A Karandikar
Journal of Communications and Networks 5 (3), 275-281, 2003
102003
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20