dblp.uni-trier.dewww.uni-trier.de

Radha Poovendran

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
41EEDavid Slater, Patrick Tague, Radha Poovendran, Brian J. Matt: A coding-theoretic approach for efficient message verification over insecure channels. WISEC 2009: 151-160
40EEPatrick Tague, David Slater, Jason Rogers, Radha Poovendran: Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. IEEE Trans. Dependable Sec. Comput. 6(2): 111-123 (2009)
39EELoukas Lazos, Radha Poovendran, James A. Ritcey: Analytic evaluation of target detection in heterogeneous wireless sensor networks. TOSN 5(2): (2009)
2008
38 Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 ACM 2008
37EEBasel Alomair, Krishna Sampigethaya, Radha Poovendran: Efficient Generic Forward-Secure Signatures and Proxy Signatures. EuroPKI 2008: 166-181
36EEMingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf: Public key based authentication for secure integration of sensor data and RFID. HeterSanet 2008: 61-66
35EEPatrick Tague, David Slater, Jason Rogers, Radha Poovendran: Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. INFOCOM 2008: 161-165
34EEWeiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang: Human activity recognition for video surveillance. ISCAS 2008: 2737-2740
33EEWeiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang: Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance. IEEE Trans. Circuits Syst. Video Techn. 18(8): 1128-1139 (2008)
2007
32EEBasel Alomair, Loukas Lazos, Radha Poovendran: Passive Attacks on a Class of Authentication Protocols for RFID. ICISC 2007: 102-115
31EEMingyan Li, Iordanis Koutsopoulos, Radha Poovendran: Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. INFOCOM 2007: 1307-1315
30EELoukas Lazos, Radha Poovendran, James A. Ritcey: Probabilistic detection of mobile targets in heterogeneous sensor networks. IPSN 2007: 519-528
29EERichard Robinson, Mingyan Li, Scott Lintelman, Krishna Sampigethaya, Radha Poovendran, David von Oheimb, Jens-Uwe Bußer, Jorge Cuéllar: Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety. SAFECOMP 2007: 28-39
28EEPatrick Tague, Radha Poovendran: Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks 5(6): 801-814 (2007)
27EEKrishna Sampigethaya, Mingyan Li, Leping Huang, Radha Poovendran: AMOEBA: Robust Location Privacy Scheme for VANET. IEEE Journal on Selected Areas in Communications 25(8): 1569-1589 (2007)
26EEJavier Salido, Loukas Lazos, Radha Poovendran: Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach. IEEE/ACM Trans. Netw. 15(6): 1527-1540 (2007)
25EEPatrick Tague, Radha Poovendran: A canonical seed assignment model for key predistribution in wireless sensor networks. TOSN 3(4): (2007)
24EELoukas Lazos, Radha Poovendran: Power proximity based key management for secure multicast in ad hoc networks. Wireless Networks 13(1): 127-148 (2007)
23EERadha Poovendran, Loukas Lazos: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks 13(1): 27-59 (2007)
2006
22 Radha Poovendran, Ari Juels: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006 ACM 2006
21EEMingyan Li, Krishna Sampigethaya, Leping Huang, Radha Poovendran: Swing & swap: user-centric approaches towards maximizing location privacy. WPES 2006: 19-28
20 Patrick Tague, Radha Poovendran: A general probabilistic model for improving key assignment in wireless networks. WiOpt 2006: 251-259
19 Loukas Lazos, Radha Poovendran: Coverage in heterogeneous sensor networks. WiOpt 2006: 306-315
18EEKrishna Sampigethaya, Radha Poovendran: A framework and taxonomy for comparison of electronic voting schemes. Computers & Security 25(2): 137-153 (2006)
17EELoukas Lazos, Radha Poovendran: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2): 233-246 (2006)
16EEMingyan Li, Radha Poovendran: Disenrollment with perfect forward secrecy in threshold schemes. IEEE Transactions on Information Theory 52(4): 1676-1682 (2006)
15EELoukas Lazos, Radha Poovendran: Stochastic coverage in heterogeneous sensor networks. TOSN 2(3): 325-358 (2006)
2005
14 Markus Jakobsson, Radha Poovendran: Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005 ACM 2005
13EELoukas Lazos, Radha Poovendran, Srdjan Capkun: Rope: robust position estimation in wireless sensor networks. IPSN 2005: 324-331
12EERadha Poovendran: Information assurance in manets and wireless sensor networks. SASN 2005: 32
11EEIntae Kang, Radha Poovendran: Iterated Local Optimization for Minimum Energy Broadcast. WiOpt 2005: 332-341
10EEMingyan Li, Radha Poovendran, David A. McGrew: Minimizing center key storage in hybrid one-way function based group key management with communication constraints. Inf. Process. Lett. 93(4): 191-198 (2005)
9EEIntae Kang, Radha Poovendran: Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks. MONET 10(6): 879-896 (2005)
8EELoukas Lazos, Radha Poovendran: SeRLoc: Robust localization for wireless sensor networks. TOSN 1(1): 73-100 (2005)
2004
7EELoukas Lazos, Javier Salido, Radha Poovendran: VP3: using vertex path and power proximity for energy efficient key distribution. VTC Fall (2) 2004: 1228-1232
6EELoukas Lazos, Radha Poovendran: SeRLoc: secure range-independent localization for wireless sensor networks. Workshop on Wireless Security 2004: 21-30
2003
5EEMingyan Li, Radha Poovendran: Broadcast Enforced Threshold Schemes with Disenrollment. Selected Areas in Cryptography 2003: 101-116
4EEWade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu: Key management and distribution for secure multimedia multicast. IEEE Transactions on Multimedia 5(4): 544-557 (2003)
2001
3 Radha Poovendran, John S. Baras: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory 47(7): 2824-2834 (2001)
2000
2EERadha Poovendran, Peter J. Keleher, John S. Baras: A Decision-Process Analysis of Implicit Coscheduling. IPDPS 2000: 115-120
1999
1EERadha Poovendran, John S. Baras: An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. CRYPTO 1999: 624-638

Coauthor Index

1Basel Alomair [32] [37]
2John S. Baras [1] [2] [3]
3Jens-Uwe Bußer [29]
4Srdjan Capkun [13]
5Jorge Cuéllar [29]
6Rainer Falk [36]
7Casey K. Fung [36]
8Virgil D. Gligor [38]
9Leping Huang [21] [27]
10Jean-Pierre Hubaux [38]
11Markus Jakobsson [14]
12Ari Juels [22]
13Intae Kang [9] [11]
14Peter J. Keleher [2]
15Andreas Koepf [36]
16Florian Kohlmayer [36]
17Iordanis Koutsopoulos [31]
18Loukas Lazos [6] [7] [8] [13] [15] [17] [19] [23] [24] [26] [30] [32] [39]
19Mingyan Li [5] [10] [16] [21] [27] [29] [31] [36]
20Weiyao Lin [33] [34]
21Scott Lintelman [29]
22K. J. Ray Liu [4]
23Brian J. Matt [41]
24David A. McGrew [10]
25David von Oheimb [29]
26James A. Ritcey [30] [39]
27Richard Robinson [29] [36]
28Jason Rogers [35] [40]
29Javier Salido [7] [26]
30Krishna Sampigethaya [18] [21] [27] [29] [36] [37]
31David Slater [35] [40] [41]
32Jie Song [4]
33Ming-Ting Sun [33] [34]
34Patrick Tague [20] [25] [28] [35] [40] [41]
35Wade Trappe [4]
36Zhengyou Zhang [33] [34]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)