Rohit Negi
First Name: Rohit Last Name: Negi Professional Title: Professor Organization: Carnegie-Mellon University
View ArticleDanda Rawat
First Name: Danda Middle Initial: B Last Name: Rawat Professional Title: Associate Professor Organization: Howard University Contact InformationCity: WASHINGTON Zip Code: 20059
View ArticleKapil Dandekar
First Name: Kapil Last Name: Dandekar Professional Title: Professor, Associate Dean for Research and Graduate Studies Organization: Drexel University
View ArticleM2M technologies: Enablers for a pervasive Internet of Things
Severi, S., Sottile, F., Abreu, G., Pastrone, C., Spirito, M., Berens, F.. 2014. M2M technologies: Enablers for a pervasive Internet of Things. Networks and Communications (EuCNC), 2014 European...
View ArticlePhysical layer authentication based on channel response tracking using...
Van Vaerenbergh, S., González, O., Vía, J., Santamaría, I.. 2014. Physical layer authentication based on channel response tracking using Gaussian processes. Acoustics, Speech and Signal Processing...
View ArticlePhysical layer authentication based on channel response tracking using...
Van Vaerenbergh, S., González, O., Vía, J., Santamaría, I.. 2014. Physical layer authentication based on channel response tracking using Gaussian processes. Acoustics, Speech and Signal Processing...
View Article"An integrated signaling-encryption mechanism to reduce error propagation in...
M. M. Olama, M. M. Matalgah, M. Bobrek. 2015. "An integrated signaling-encryption mechanism to reduce error propagation in wireless communications: performance analyses". 2015 IEEE International...
View ArticleIdentifying interdependencies using attack graph generation methods
Lever, K. E., Kifayat, K., Merabti, M.. 2015. Identifying interdependencies using attack graph generation methods. 2015 11th International Conference on Innovations in Information Technology (IIT)....
View ArticleDINWC2018
The Sixth International Conference on Digital Information, Networking, and Wireless Communications (DINWC2018)Faculty of Engineering, Lebanese University, Beirut, Lebanon April 25-27, 2018...
View ArticleApply a wireless line sensor system to enhance distribution protection schemes
Hao, K., Achanta, S. V., Fowler, J., Keckalo, D.. 2017. Apply a wireless line sensor system to enhance distribution protection schemes. 2017 70th Annual Conference for Protective Relay Engineers...
View ArticleAdaptable Safety and Security in V2X Systems
Villarreal-Vasquez, M., Bhargava, B., Angin, P.. 2017. Adaptable Safety and Security in V2X Systems. 2017 IEEE International Congress on Internet of Things (ICIOT). :17–24.
View ArticleContext-Aware Authorization and Anonymous Authentication in Wireless Body...
Arfaoui, A., Kribeche, A., Boudia, O. R. M., Letaifa, A. Ben, Senouci, S. M., Hamdi, M.. 2018. Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks. 2018 IEEE...
View ArticleAn Improved Cooperative Cell Outage Detection in Self-Healing Het Nets Using...
Broomandi, Fateme, Ghasemi, Abdorasoul. 2019. An Improved Cooperative Cell Outage Detection in Self-Healing Het Nets Using Optimal Cooperative Range. 2019 27th Iranian Conference on Electrical...
View ArticleAsymmetric Physical Layer Encryption for Wireless Communications
Li, Wei, Mclernon, Des, Wong, Kai-Kit, Wang, Shilian, Lei, Jing, Zaidi, Syed Ali Raza. 2019. Asymmetric Physical Layer Encryption for Wireless Communications. IEEE Access. 7:46959–46967.
View ArticleAn Approach to Fault Tolerant Key Generation and Secure Spread Spectrum...
Khan, Samar, Khodke, Priti A., Bhagat, Amol P.. 2018. An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction. 2018 International Conference on Research in Intelligent...
View ArticleSource-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks
Tang, Di, Gu, Jian, Yu, You, Yang, Yuanyuan, Han, Weijia, Ma, Xiao. 2018. Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks. 2018 International Conference on Computing,...
View ArticleUltimate Secrecy in Wireless Communications
Ekşim, A., Demirci, T.. 2019. Ultimate Secrecy in Wireless Communications. 2019 11th International Conference on Electrical and Electronics Engineering (ELECO). :682–686.
View ArticleSecure Communication System Implementation for Robot-based Surveillance...
Rishikesh, Bhattacharya, Ansuman, Thakur, Atul, Banda, Gourinath, Ray, Rajarshi, Halder, Raju. 2021. Secure Communication System Implementation for Robot-based Surveillance Applications. 2021...
View ArticleRealizing Physical Layer Security in Large Wireless Networks using Spectrum...
Bouhafs, Faycal, den Hartog, Frank, Raschella, Alessandro, Mackay, Michael, Shi, Qi, Sinanovic, Sinan. 2020. Realizing Physical Layer Security in Large Wireless Networks using Spectrum...
View Article
More Pages to Explore .....