Остановите войну!
for scientists:
default search action
Vijay Sivaraman
- > Home > Persons > Vijay Sivaraman
Publications
- 2017
- [c71]Mohammad Hossein Chinaei, Diethelm Ostry, Vijay Sivaraman:
A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems. CANS 2017: 436-455 - [c65]Mohammad Hossein Chinaei, Vijay Sivaraman, Diethelm Ostry:
An experimental study of secret key generation for passive Wi-Fi wearable devices. WoWMoM 2017: 1-9 - 2016
- [j31]Vijay Sivaraman, Arun Vishwanath, Diethelm Ostry, Marina Thottan:
Greening Router Line-Cards via Dynamic Management of Packet Memory. IEEE J. Sel. Areas Commun. 34(12): 3843-3853 (2016) - 2014
- [j23]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring. Future Gener. Comput. Syst. 35: 80-90 (2014) - [j22]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay K. Jha:
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints. IEEE Trans. Inf. Forensics Secur. 9(12): 2193-2204 (2014) - [j21]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices. IEEE Trans. Mob. Comput. 13(12): 2763-2776 (2014) - 2013
- [c40]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha:
Securing data provenance in body area networks using lightweight wireless link fingerprints. TrustED@CCS 2013: 65-72 - [c34]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha:
Securing data provenance in body area networks using lightweight wireless link fingerprints. SenSys 2013: 85:1-85:2 - 2012
- [c31]Linjia Yao, Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Decorrelating secret bit extraction via channel hopping in body area networks. PIMRC 2012: 1454-1459 - [c30]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Authentication of lossy data in body-sensor networks for healthcare monitoring. SECON 2012: 470-478 - [c28]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Zero reconciliation secret key generation for body-worn health monitoring devices. WISEC 2012: 39-50 - 2011
- [j15]Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, Antoni Junior Hianto, Sanjay K. Jha:
Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [c27]Linjia Yao, Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Improving secret key generation performance for on-body devices. BODYNETS 2011: 19-22 - 2010
- [j13]Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry:
Secure key loss recovery for network broadcast in single-hop wireless sensor networks. Ad Hoc Networks 8(6): 668-679 (2010) - [c24]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks. EUC 2010: 644-650 - 2009
- [j7]Vijay Sivaraman, Hossam A. ElGindy, David Moreland, Diethelm Ostry:
Packet pacing in small buffer optical packet switched networks. IEEE/ACM Trans. Netw. 17(4): 1066-1079 (2009) - 2008
- [c11]Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry:
A key loss recovery scheme for secure broadcasts in wireless sensor networks. PIMRC 2008: 1-5 - [c10]Hailun Tan, Sanjay K. Jha, Diethelm Ostry, John Zic, Vijay Sivaraman:
Secure multi-hop network programming with multiple one-way key chains. WISEC 2008: 183-193 - 2007
- [c8]Jaleel Shaheen, Diethelm Ostry, Vijay Sivaraman, Sanjay K. Jha:
Confidential and Secure Broadcast in Wireless Sensor Networks. PIMRC 2007: 1-5 - 2006
- [c6]Vijay Sivaraman, Hossam A. ElGindy, David Moreland, Diethelm Ostry:
Packet Pacing in Short Buffer Optical Packet Switched Networks. INFOCOM 2006
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-02 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint