| 2009 |
| 41 | EE | David Slater,
Patrick Tague,
Radha Poovendran,
Brian J. Matt:
A coding-theoretic approach for efficient message verification over insecure channels.
WISEC 2009: 151-160 |
| 40 | EE | Patrick Tague,
David Slater,
Jason Rogers,
Radha Poovendran:
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
IEEE Trans. Dependable Sec. Comput. 6(2): 111-123 (2009) |
| 39 | EE | Loukas Lazos,
Radha Poovendran,
James A. Ritcey:
Analytic evaluation of target detection in heterogeneous wireless sensor networks.
TOSN 5(2): (2009) |
| 2008 |
| 38 | | Virgil D. Gligor,
Jean-Pierre Hubaux,
Radha Poovendran:
Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008
ACM 2008 |
| 37 | EE | Basel Alomair,
Krishna Sampigethaya,
Radha Poovendran:
Efficient Generic Forward-Secure Signatures and Proxy Signatures.
EuroPKI 2008: 166-181 |
| 36 | EE | Mingyan Li,
Casey K. Fung,
Krishna Sampigethaya,
Richard Robinson,
Radha Poovendran,
Rainer Falk,
Florian Kohlmayer,
Andreas Koepf:
Public key based authentication for secure integration of sensor data and RFID.
HeterSanet 2008: 61-66 |
| 35 | EE | Patrick Tague,
David Slater,
Jason Rogers,
Radha Poovendran:
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis.
INFOCOM 2008: 161-165 |
| 34 | EE | Weiyao Lin,
Ming-Ting Sun,
Radha Poovendran,
Zhengyou Zhang:
Human activity recognition for video surveillance.
ISCAS 2008: 2737-2740 |
| 33 | EE | Weiyao Lin,
Ming-Ting Sun,
Radha Poovendran,
Zhengyou Zhang:
Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance.
IEEE Trans. Circuits Syst. Video Techn. 18(8): 1128-1139 (2008) |
| 2007 |
| 32 | EE | Basel Alomair,
Loukas Lazos,
Radha Poovendran:
Passive Attacks on a Class of Authentication Protocols for RFID.
ICISC 2007: 102-115 |
| 31 | EE | Mingyan Li,
Iordanis Koutsopoulos,
Radha Poovendran:
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks.
INFOCOM 2007: 1307-1315 |
| 30 | EE | Loukas Lazos,
Radha Poovendran,
James A. Ritcey:
Probabilistic detection of mobile targets in heterogeneous sensor networks.
IPSN 2007: 519-528 |
| 29 | EE | Richard Robinson,
Mingyan Li,
Scott Lintelman,
Krishna Sampigethaya,
Radha Poovendran,
David von Oheimb,
Jens-Uwe Bußer,
Jorge Cuéllar:
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety.
SAFECOMP 2007: 28-39 |
| 28 | EE | Patrick Tague,
Radha Poovendran:
Modeling adaptive node capture attacks in multi-hop wireless networks.
Ad Hoc Networks 5(6): 801-814 (2007) |
| 27 | EE | Krishna Sampigethaya,
Mingyan Li,
Leping Huang,
Radha Poovendran:
AMOEBA: Robust Location Privacy Scheme for VANET.
IEEE Journal on Selected Areas in Communications 25(8): 1569-1589 (2007) |
| 26 | EE | Javier Salido,
Loukas Lazos,
Radha Poovendran:
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach.
IEEE/ACM Trans. Netw. 15(6): 1527-1540 (2007) |
| 25 | EE | Patrick Tague,
Radha Poovendran:
A canonical seed assignment model for key predistribution in wireless sensor networks.
TOSN 3(4): (2007) |
| 24 | EE | Loukas Lazos,
Radha Poovendran:
Power proximity based key management for secure multicast in ad hoc networks.
Wireless Networks 13(1): 127-148 (2007) |
| 23 | EE | Radha Poovendran,
Loukas Lazos:
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks.
Wireless Networks 13(1): 27-59 (2007) |
| 2006 |
| 22 | | Radha Poovendran,
Ari Juels:
Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006
ACM 2006 |
| 21 | EE | Mingyan Li,
Krishna Sampigethaya,
Leping Huang,
Radha Poovendran:
Swing & swap: user-centric approaches towards maximizing location privacy.
WPES 2006: 19-28 |
| 20 | | Patrick Tague,
Radha Poovendran:
A general probabilistic model for improving key assignment in wireless networks.
WiOpt 2006: 251-259 |
| 19 | | Loukas Lazos,
Radha Poovendran:
Coverage in heterogeneous sensor networks.
WiOpt 2006: 306-315 |
| 18 | EE | Krishna Sampigethaya,
Radha Poovendran:
A framework and taxonomy for comparison of electronic voting schemes.
Computers & Security 25(2): 137-153 (2006) |
| 17 | EE | Loukas Lazos,
Radha Poovendran:
HiRLoc: high-resolution robust localization for wireless sensor networks.
IEEE Journal on Selected Areas in Communications 24(2): 233-246 (2006) |
| 16 | EE | Mingyan Li,
Radha Poovendran:
Disenrollment with perfect forward secrecy in threshold schemes.
IEEE Transactions on Information Theory 52(4): 1676-1682 (2006) |
| 15 | EE | Loukas Lazos,
Radha Poovendran:
Stochastic coverage in heterogeneous sensor networks.
TOSN 2(3): 325-358 (2006) |
| 2005 |
| 14 | | Markus Jakobsson,
Radha Poovendran:
Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005
ACM 2005 |
| 13 | EE | Loukas Lazos,
Radha Poovendran,
Srdjan Capkun:
Rope: robust position estimation in wireless sensor networks.
IPSN 2005: 324-331 |
| 12 | EE | Radha Poovendran:
Information assurance in manets and wireless sensor networks.
SASN 2005: 32 |
| 11 | EE | Intae Kang,
Radha Poovendran:
Iterated Local Optimization for Minimum Energy Broadcast.
WiOpt 2005: 332-341 |
| 10 | EE | Mingyan Li,
Radha Poovendran,
David A. McGrew:
Minimizing center key storage in hybrid one-way function based group key management with communication constraints.
Inf. Process. Lett. 93(4): 191-198 (2005) |
| 9 | EE | Intae Kang,
Radha Poovendran:
Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks.
MONET 10(6): 879-896 (2005) |
| 8 | EE | Loukas Lazos,
Radha Poovendran:
SeRLoc: Robust localization for wireless sensor networks.
TOSN 1(1): 73-100 (2005) |
| 2004 |
| 7 | EE | Loukas Lazos,
Javier Salido,
Radha Poovendran:
VP3: using vertex path and power proximity for energy efficient key distribution.
VTC Fall (2) 2004: 1228-1232 |
| 6 | EE | Loukas Lazos,
Radha Poovendran:
SeRLoc: secure range-independent localization for wireless sensor networks.
Workshop on Wireless Security 2004: 21-30 |
| 2003 |
| 5 | EE | Mingyan Li,
Radha Poovendran:
Broadcast Enforced Threshold Schemes with Disenrollment.
Selected Areas in Cryptography 2003: 101-116 |
| 4 | EE | Wade Trappe,
Jie Song,
Radha Poovendran,
K. J. Ray Liu:
Key management and distribution for secure multimedia multicast.
IEEE Transactions on Multimedia 5(4): 544-557 (2003) |
| 2001 |
| 3 | | Radha Poovendran,
John S. Baras:
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes.
IEEE Transactions on Information Theory 47(7): 2824-2834 (2001) |
| 2000 |
| 2 | EE | Radha Poovendran,
Peter J. Keleher,
John S. Baras:
A Decision-Process Analysis of Implicit Coscheduling.
IPDPS 2000: 115-120 |
| 1999 |
| 1 | EE | Radha Poovendran,
John S. Baras:
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
CRYPTO 1999: 624-638 |