The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Radha Poovendran: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Radha Poovendran, John S. Baras
    An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:624-638 [Conf]
  2. Radha Poovendran, Peter J. Keleher, John S. Baras
    A Decision-Process Analysis of Implicit Coscheduling. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2000, pp:115-120 [Conf]
  3. Loukas Lazos, Radha Poovendran, Srdjan Capkun
    Rope: robust position estimation in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:324-331 [Conf]
  4. Loukas Lazos, Radha Poovendran, James A. Ritcey
    Probabilistic detection of mobile targets in heterogeneous sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2007, pp:519-528 [Conf]
  5. Mingyan Li, Radha Poovendran
    Broadcast Enforced Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:101-116 [Conf]
  6. Radha Poovendran
    Information assurance in manets and wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:32- [Conf]
  7. Intae Kang, Radha Poovendran
    Iterated Local Optimization for Minimum Energy Broadcast. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2005, pp:332-341 [Conf]
  8. Loukas Lazos, Radha Poovendran
    Coverage in heterogeneous sensor networks. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2006, pp:306-315 [Conf]
  9. Patrick Tague, Radha Poovendran
    A general probabilistic model for improving key assignment in wireless networks. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2006, pp:251-259 [Conf]
  10. Loukas Lazos, Radha Poovendran
    SeRLoc: secure range-independent localization for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:21-30 [Conf]
  11. Loukas Lazos, Javier Salido, Radha Poovendran
    VP3: using vertex path and power proximity for energy efficient key distribution. [Citation Graph (0, 0)][DBLP]
    VTC Fall (2), 2004, pp:1228-1232 [Conf]
  12. Krishna Sampigethaya, Radha Poovendran
    A framework and taxonomy for comparison of electronic voting schemes. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:137-153 [Journal]
  13. Mingyan Li, Radha Poovendran, David A. McGrew
    Minimizing center key storage in hybrid one-way function based group key management with communication constraints. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:93, n:4, pp:191-198 [Journal]
  14. Intae Kang, Radha Poovendran
    Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2005, v:10, n:6, pp:879-896 [Journal]
  15. Mingyan Li, Radha Poovendran
    Disenrollment with perfect forward secrecy in threshold schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:4, pp:1676-1682 [Journal]
  16. Radha Poovendran, John S. Baras
    An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:7, pp:2824-2834 [Journal]
  17. Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu
    Key management and distribution for secure multimedia multicast. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2003, v:5, n:4, pp:544-557 [Journal]
  18. Loukas Lazos, Radha Poovendran
    SeRLoc: Robust localization for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2005, v:1, n:1, pp:73-100 [Journal]
  19. Loukas Lazos, Radha Poovendran
    Stochastic coverage in heterogeneous sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2006, v:2, n:3, pp:325-358 [Journal]
  20. Basel Alomair, Loukas Lazos, Radha Poovendran
    Passive Attacks on a Class of Authentication Protocols for RFID. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:102-115 [Conf]
  21. Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran
    Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1307-1315 [Conf]
  22. Richard Robinson, Mingyan Li, Scott Lintelman, Krishna Sampigethaya, Radha Poovendran, David von Oheimb, Jens-Uwe Bußer, Jorge Cuéllar
    Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2007, pp:28-39 [Conf]
  23. Patrick Tague, Radha Poovendran
    Modeling adaptive node capture attacks in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:6, pp:801-814 [Journal]
  24. Patrick Tague, Radha Poovendran
    A canonical seed assignment model for key predistribution in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2007, v:3, n:4, pp:- [Journal]
  25. Radha Poovendran, Loukas Lazos
    A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2007, v:13, n:1, pp:27-59 [Journal]
  26. Loukas Lazos, Radha Poovendran
    Power proximity based key management for secure multicast in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2007, v:13, n:1, pp:127-148 [Journal]

  27. Efficient Generic Forward-Secure Signatures and Proxy Signatures. [Citation Graph (, )][DBLP]


  28. Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. [Citation Graph (, )][DBLP]


  29. Human activity recognition for video surveillance. [Citation Graph (, )][DBLP]


  30. Public key based authentication for secure integration of sensor data and RFID. [Citation Graph (, )][DBLP]


  31. Swing & swap: user-centric approaches towards maximizing location privacy. [Citation Graph (, )][DBLP]


  32. A coding-theoretic approach for efficient message verification over insecure channels. [Citation Graph (, )][DBLP]


  33. A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  34. Throughput optimization for multipath unicast routing under probabilistic jamming. [Citation Graph (, )][DBLP]


  35. Spatial-Temporal Access Control for E-health Services. [Citation Graph (, )][DBLP]


  36. On the Authentication of RFID Systems with Bitwise Operations. [Citation Graph (, )][DBLP]


Search in 0.061secs, Finished in 0.064secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002