Seguir
Aravind Iyer
Aravind Iyer
Samsung, General Motors, Purdue, IIT Bombay
Dirección de correo verificada de iitbombay.org
Título
Citado por
Citado por
Año
What is the right model for wireless channel interference?
A Iyer, C Rosenberg, A Karnik
Proceedings of the 3rd international conference on Quality of service in …, 2006
4182006
An address-light, integrated MAC and routing protocol for wireless sensor networks
S Kulkarni, A Iyer, C Rosenberg
IEEE/ACM Transactions on networking 14 (4), 793-806, 2006
1552006
Threat mitigation in a vehicle-to-vehicle communication network
BR Bellur, D Bhattacharya, AV Iyer
US Patent 8,819,414, 2014
1322014
Flooding-resilient broadcast authentication for vanets
HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1212011
Throughput-optimal configuration of fixed wireless networks
A Karnik, A Iyer, C Rosenberg
IEEE/ACM Transactions On Networking 16 (5), 1161-1174, 2008
882008
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
852010
Electronic device using framework interface for communication
KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ...
US Patent App. 14/281,355, 2014
722014
Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks
BR Bellur, AV Iyer, D Bhattacharya
US Patent 8,904,183, 2014
482014
Secure V2V communications: Performance impact of computational overheads
A Iyer, A Kherani, A Rao, A Karnik
IEEE INFOCOM Workshops 2008, 1-6, 2008
392008
Throughput-lifetime trade-offs in multihop wireless networks under an SINR-based interference model
J Luo, A Iyer, C Rosenberg
IEEE Transactions on Mobile Computing 10 (3), 419-433, 2010
382010
A taxonomy-based approach to design of large-scale sensor networks
A Iyer, SS Kulkarni, V Mhatre, CP Rosenberg
Wireless Sensor Networks and Applications, 3-33, 2008
332008
Batch verification of ECDSA signatures
S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer
Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012
302012
Understanding the key performance issues with MAC protocols for multi‐hop wireless networks
A Iyer, C Rosenberg
Wireless Communications and Mobile Computing 6 (6), 745-760, 2006
292006
Lightweight geographic trajectory authentication via one-time signatures
BR Bellur, AV Iyer
US Patent App. 12/413,741, 2009
232009
Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
AV Iyer, D Bhattacharya
US Patent 8,452,969, 2013
222013
Framework for packet processing for secure V2V applications on resource-constrained platforms
AV Iyer, AR Karnik, BR Bellur
US Patent 8,704,679, 2014
152014
Design of high throughput scheduled mesh networks: A case for directional antennas
SN Muthaiah, A Iyer, A Karnik, C Rosenberg
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 5080-5085, 2007
152007
Electronic device using logical channels for communication
KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ...
US Patent App. 14/281,206, 2014
142014
Active queue management using adaptive RED
R Verma, A Iyer, A Karandikar
Journal of Communications and Networks 5 (3), 275-281, 2003
132003
New algorithms for batch verification of standard ECDSA signatures
S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer
Journal of Cryptographic Engineering 4, 237-258, 2014
122014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20