Follow
Aravind Iyer
Aravind Iyer
Samsung, General Motors, Purdue, IIT Bombay
Verified email at iitbombay.org
Title
Cited by
Cited by
Year
What is the right model for wireless channel interference?
A Iyer, C Rosenberg, A Karnik
Proceedings of the 3rd international conference on Quality of service in …, 2006
4182006
An address-light, integrated MAC and routing protocol for wireless sensor networks
S Kulkarni, A Iyer, C Rosenberg
IEEE/ACM Transactions on networking 14 (4), 793-806, 2006
1552006
Threat mitigation in a vehicle-to-vehicle communication network
BR Bellur, D Bhattacharya, AV Iyer
US Patent 8,819,414, 2014
1322014
Flooding-resilient broadcast authentication for vanets
HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1212011
Throughput-optimal configuration of fixed wireless networks
A Karnik, A Iyer, C Rosenberg
IEEE/ACM Transactions On Networking 16 (5), 1161-1174, 2008
872008
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
852010
Electronic device using framework interface for communication
KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ...
US Patent App. 14/281,355, 2014
722014
Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks
BR Bellur, AV Iyer, D Bhattacharya
US Patent 8,904,183, 2014
472014
Secure V2V communications: Performance impact of computational overheads
A Iyer, A Kherani, A Rao, A Karnik
IEEE INFOCOM Workshops 2008, 1-6, 2008
392008
Throughput-lifetime trade-offs in multihop wireless networks under an SINR-based interference model
J Luo, A Iyer, C Rosenberg
IEEE Transactions on Mobile Computing 10 (3), 419-433, 2010
382010
A taxonomy-based approach to design of large-scale sensor networks
A Iyer, SS Kulkarni, V Mhatre, CP Rosenberg
Wireless Sensor Networks and Applications, 3-33, 2008
332008
Batch verification of ECDSA signatures
S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer
Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012
302012
Understanding the key performance issues with MAC protocols for multi‐hop wireless networks
A Iyer, C Rosenberg
Wireless Communications and Mobile Computing 6 (6), 745-760, 2006
292006
Lightweight geographic trajectory authentication via one-time signatures
BR Bellur, AV Iyer
US Patent App. 12/413,741, 2009
232009
Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
AV Iyer, D Bhattacharya
US Patent 8,452,969, 2013
222013
Framework for packet processing for secure V2V applications on resource-constrained platforms
AV Iyer, AR Karnik, BR Bellur
US Patent 8,704,679, 2014
152014
Design of high throughput scheduled mesh networks: A case for directional antennas
SN Muthaiah, A Iyer, A Karnik, C Rosenberg
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 5080-5085, 2007
152007
Electronic device using logical channels for communication
KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ...
US Patent App. 14/281,206, 2014
142014
Active queue management using adaptive RED
R Verma, A Iyer, A Karandikar
Journal of Communications and Networks 5 (3), 275-281, 2003
132003
New algorithms for batch verification of standard ECDSA signatures
S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer
Journal of Cryptographic Engineering 4, 237-258, 2014
122014
The system can't perform the operation now. Try again later.
Articles 1–20