2009 |
41 | EE | David Slater,
Patrick Tague,
Radha Poovendran,
Brian J. Matt:
A coding-theoretic approach for efficient message verification over insecure channels.
WISEC 2009: 151-160 |
40 | EE | Patrick Tague,
David Slater,
Jason Rogers,
Radha Poovendran:
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
IEEE Trans. Dependable Sec. Comput. 6(2): 111-123 (2009) |
39 | EE | Loukas Lazos,
Radha Poovendran,
James A. Ritcey:
Analytic evaluation of target detection in heterogeneous wireless sensor networks.
TOSN 5(2): (2009) |
2008 |
38 | | Virgil D. Gligor,
Jean-Pierre Hubaux,
Radha Poovendran:
Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008
ACM 2008 |
37 | EE | Basel Alomair,
Krishna Sampigethaya,
Radha Poovendran:
Efficient Generic Forward-Secure Signatures and Proxy Signatures.
EuroPKI 2008: 166-181 |
36 | EE | Mingyan Li,
Casey K. Fung,
Krishna Sampigethaya,
Richard Robinson,
Radha Poovendran,
Rainer Falk,
Florian Kohlmayer,
Andreas Koepf:
Public key based authentication for secure integration of sensor data and RFID.
HeterSanet 2008: 61-66 |
35 | EE | Patrick Tague,
David Slater,
Jason Rogers,
Radha Poovendran:
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis.
INFOCOM 2008: 161-165 |
34 | EE | Weiyao Lin,
Ming-Ting Sun,
Radha Poovendran,
Zhengyou Zhang:
Human activity recognition for video surveillance.
ISCAS 2008: 2737-2740 |
33 | EE | Weiyao Lin,
Ming-Ting Sun,
Radha Poovendran,
Zhengyou Zhang:
Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance.
IEEE Trans. Circuits Syst. Video Techn. 18(8): 1128-1139 (2008) |
2007 |
32 | EE | Basel Alomair,
Loukas Lazos,
Radha Poovendran:
Passive Attacks on a Class of Authentication Protocols for RFID.
ICISC 2007: 102-115 |
31 | EE | Mingyan Li,
Iordanis Koutsopoulos,
Radha Poovendran:
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks.
INFOCOM 2007: 1307-1315 |
30 | EE | Loukas Lazos,
Radha Poovendran,
James A. Ritcey:
Probabilistic detection of mobile targets in heterogeneous sensor networks.
IPSN 2007: 519-528 |
29 | EE | Richard Robinson,
Mingyan Li,
Scott Lintelman,
Krishna Sampigethaya,
Radha Poovendran,
David von Oheimb,
Jens-Uwe Bußer,
Jorge Cuéllar:
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety.
SAFECOMP 2007: 28-39 |
28 | EE | Patrick Tague,
Radha Poovendran:
Modeling adaptive node capture attacks in multi-hop wireless networks.
Ad Hoc Networks 5(6): 801-814 (2007) |
27 | EE | Krishna Sampigethaya,
Mingyan Li,
Leping Huang,
Radha Poovendran:
AMOEBA: Robust Location Privacy Scheme for VANET.
IEEE Journal on Selected Areas in Communications 25(8): 1569-1589 (2007) |
26 | EE | Javier Salido,
Loukas Lazos,
Radha Poovendran:
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach.
IEEE/ACM Trans. Netw. 15(6): 1527-1540 (2007) |
25 | EE | Patrick Tague,
Radha Poovendran:
A canonical seed assignment model for key predistribution in wireless sensor networks.
TOSN 3(4): (2007) |
24 | EE | Loukas Lazos,
Radha Poovendran:
Power proximity based key management for secure multicast in ad hoc networks.
Wireless Networks 13(1): 127-148 (2007) |
23 | EE | Radha Poovendran,
Loukas Lazos:
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks.
Wireless Networks 13(1): 27-59 (2007) |
2006 |
22 | | Radha Poovendran,
Ari Juels:
Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006
ACM 2006 |
21 | EE | Mingyan Li,
Krishna Sampigethaya,
Leping Huang,
Radha Poovendran:
Swing & swap: user-centric approaches towards maximizing location privacy.
WPES 2006: 19-28 |
20 | | Patrick Tague,
Radha Poovendran:
A general probabilistic model for improving key assignment in wireless networks.
WiOpt 2006: 251-259 |
19 | | Loukas Lazos,
Radha Poovendran:
Coverage in heterogeneous sensor networks.
WiOpt 2006: 306-315 |
18 | EE | Krishna Sampigethaya,
Radha Poovendran:
A framework and taxonomy for comparison of electronic voting schemes.
Computers & Security 25(2): 137-153 (2006) |
17 | EE | Loukas Lazos,
Radha Poovendran:
HiRLoc: high-resolution robust localization for wireless sensor networks.
IEEE Journal on Selected Areas in Communications 24(2): 233-246 (2006) |
16 | EE | Mingyan Li,
Radha Poovendran:
Disenrollment with perfect forward secrecy in threshold schemes.
IEEE Transactions on Information Theory 52(4): 1676-1682 (2006) |
15 | EE | Loukas Lazos,
Radha Poovendran:
Stochastic coverage in heterogeneous sensor networks.
TOSN 2(3): 325-358 (2006) |
2005 |
14 | | Markus Jakobsson,
Radha Poovendran:
Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005
ACM 2005 |
13 | EE | Loukas Lazos,
Radha Poovendran,
Srdjan Capkun:
Rope: robust position estimation in wireless sensor networks.
IPSN 2005: 324-331 |
12 | EE | Radha Poovendran:
Information assurance in manets and wireless sensor networks.
SASN 2005: 32 |
11 | EE | Intae Kang,
Radha Poovendran:
Iterated Local Optimization for Minimum Energy Broadcast.
WiOpt 2005: 332-341 |
10 | EE | Mingyan Li,
Radha Poovendran,
David A. McGrew:
Minimizing center key storage in hybrid one-way function based group key management with communication constraints.
Inf. Process. Lett. 93(4): 191-198 (2005) |
9 | EE | Intae Kang,
Radha Poovendran:
Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks.
MONET 10(6): 879-896 (2005) |
8 | EE | Loukas Lazos,
Radha Poovendran:
SeRLoc: Robust localization for wireless sensor networks.
TOSN 1(1): 73-100 (2005) |
2004 |
7 | EE | Loukas Lazos,
Javier Salido,
Radha Poovendran:
VP3: using vertex path and power proximity for energy efficient key distribution.
VTC Fall (2) 2004: 1228-1232 |
6 | EE | Loukas Lazos,
Radha Poovendran:
SeRLoc: secure range-independent localization for wireless sensor networks.
Workshop on Wireless Security 2004: 21-30 |
2003 |
5 | EE | Mingyan Li,
Radha Poovendran:
Broadcast Enforced Threshold Schemes with Disenrollment.
Selected Areas in Cryptography 2003: 101-116 |
4 | EE | Wade Trappe,
Jie Song,
Radha Poovendran,
K. J. Ray Liu:
Key management and distribution for secure multimedia multicast.
IEEE Transactions on Multimedia 5(4): 544-557 (2003) |
2001 |
3 | | Radha Poovendran,
John S. Baras:
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes.
IEEE Transactions on Information Theory 47(7): 2824-2834 (2001) |
2000 |
2 | EE | Radha Poovendran,
Peter J. Keleher,
John S. Baras:
A Decision-Process Analysis of Implicit Coscheduling.
IPDPS 2000: 115-120 |
1999 |
1 | EE | Radha Poovendran,
John S. Baras:
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
CRYPTO 1999: 624-638 |