Radha Poovendran - Publications

Affiliations: 
University of Washington, Seattle, Seattle, WA 
Area:
Electronics and Electrical Engineering, Computer Science

122 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Clark A, Alomair B, Bushnell L, Poovendran R. On the Structure and Computation of Random Walk Times in Finite Graphs Ieee Transactions On Automatic Control. 64: 4470-4483. DOI: 10.1109/Tac.2019.2895299  0.659
2018 Clark A, Lee P, Alomair B, Bushnell L, Poovendran R. Combinatorial Algorithms for Control of Biological Regulatory Networks Ieee Transactions On Control of Network Systems. 5: 748-759. DOI: 10.1109/Tcns.2017.2781366  0.749
2018 Lee P, Clark A, Alomair B, Bushnell L, Poovendran R. Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach Ieee Transactions On Control of Network Systems. 5: 583-596. DOI: 10.1109/Tcns.2016.2633791  0.704
2017 Clark A, Alomair B, Bushnell L, Poovendran R. Input Selection for Performance and Controllability of Structured Linear Descriptor Systems Siam Journal On Control and Optimization. 55: 457-485. DOI: 10.1137/140999888  0.728
2017 Ambrosin M, Conti M, Gaspari FD, Poovendran R. LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking Ieee Acm Transactions On Networking. 25: 1206-1219. DOI: 10.1109/Tnet.2016.2626287  0.464
2017 Ying X, Roy S, Poovendran R. Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Mapping Ieee Transactions On Cognitive Communications and Networking. 3: 242-254. DOI: 10.1109/Tccn.2017.2701812  0.329
2017 Clark A, Alomair B, Bushnell L, Poovendran R. Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework Ieee Transactions On Automatic Control. 62: 5055-5068. DOI: 10.1109/Tac.2017.2680739  0.736
2017 Clark A, Alomair B, Bushnell L, Poovendran R. Submodularity in Input Node Selection for Networked Linear Systems: Efficient Algorithms for Performance and Controllability Ieee Control Systems Magazine. 37: 52-74. DOI: 10.1109/Mcs.2017.2743518  0.733
2016 Lee P, Clark A, Alomair B, Bushnell L, Poovendran R. A host takeover game model for competing malware Proceedings of the Ieee Conference On Decision and Control. 2016: 4523-4530. DOI: 10.1109/CDC.2015.7402926  0.669
2016 Clark A, Alomair B, Bushnell L, Poovendran R. Input selection for disturbance rejection in networked cyber-physical systems Proceedings of the Ieee Conference On Decision and Control. 2016: 954-961. DOI: 10.1109/CDC.2015.7401996  0.691
2015 Ambrosin M, Conti M, De Gaspari F, Poovendran R. LineSwitch: Efficiently managing switch flow in Software-Defined Networking while effectively tackling DoS attacks Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 639-644. DOI: 10.1145/2714576.2714612  0.371
2015 Clark A, Alomair B, Bushnell L, Poovendran R. Scalable and distributed submodular maximization with matroid constraints 2015 13th International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2015. 435-442. DOI: 10.1109/WIOPT.2015.7151103  0.682
2015 Lee P, Clark A, Alomair B, Bushnell L, Poovendran R. Jamming-based adversarial control of network flow allocation: A passivity approach Proceedings of the American Control Conference. 2015: 4710-4716. DOI: 10.1109/ACC.2015.7172071  0.726
2015 Lee P, Clark A, Alomair B, Bushnell L, Poovendran R. Passivity-based distributed strategies for stochastic stackelberg security games Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9406: 113-129. DOI: 10.1007/978-3-319-25594-1_7  0.71
2015 Clark A, Sun K, Bushnell L, Poovendran R. A game-theoretic approach to IP address randomization in decoy-based cyber defense Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9406: 3-21. DOI: 10.1007/978-3-319-25594-1-1  0.315
2014 Lee P, Saleh O, Alomair B, Bushnell L, Poovendran R. Graph-based verification and misbehavior detection in multi-agent networks Hicons 2014 - Proceedings of the 3rd International Conference On High Confidence Networked Systems (Part of Cps Week). 77-84. DOI: 10.1145/2566468.2566477  0.707
2014 Clark A, Alomair B, Bushnell L, Poovendran R. Distributed online submodular maximization in resource-constrained networks 2014 12th International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2014. 397-404. DOI: 10.1109/WIOPT.2014.6850325  0.731
2014 Cao Z, Li K, Li X, McDaniel P, Poovendran R, Wang G, Xiang Y. Guest editors' introduction: Special issue on trust, security, and privacy in parallel and distributed systems Ieee Transactions On Parallel and Distributed Systems. 25: 279-282. DOI: 10.1109/Tpds.2014.4  0.399
2014 Alomair B, Poovendran R. Efficient authentication for mobile and pervasive computing Ieee Transactions On Mobile Computing. 13: 469-481. DOI: 10.1109/Tmc.2012.252  0.735
2014 Alomair B, Poovendran R. ε-MACs: Toward more secure and more efficient constructions of secure channels Ieee Transactions On Computers. 63: 204-217. DOI: 10.1109/TC.2012.176  0.704
2014 Lee P, Clark A, Bushnell L, Poovendran R. A passivity framework for modeling and mitigating wormhole attacks on networked control systems Ieee Transactions On Automatic Control. 59: 3224-3237. DOI: 10.1109/Tac.2014.2351871  0.498
2014 Clark A, Alomair B, Bushnell L, Poovendran R. Minimizing convergence error in multi-agent systems via leader selection: A supermodular optimization approach Ieee Transactions On Automatic Control. 59: 1480-1494. DOI: 10.1109/Tac.2014.2303236  0.708
2014 Clark A, Bushnell L, Poovendran R. A supermodular optimization framework for leader selection under link noise in linear multi-agent systems Ieee Transactions On Automatic Control. 59: 283-296. DOI: 10.1109/Tac.2013.2281473  0.407
2013 Venkatasubramanian KK, Nabar S, Gupta SKS, Poovendran R. Cyber physical security solutions for pervasive health monitoring systems User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications. 1: 447-465. DOI: 10.4018/978-1-4666-2770-3.ch022  0.606
2013 Alomair B, Clark A, Cuellar J, Poovendran R. Toward a statistical framework for source anonymity in sensor networks Ieee Transactions On Mobile Computing. 12: 248-260. DOI: 10.1109/Tmc.2011.267  0.743
2013 Ren K, Zhu H, Han Z, Poovendran R. Security in cognitive radio networks [Guest Editorial] Ieee Network. 27: 2-3. DOI: 10.1109/Mnet.2013.6523800  0.301
2013 Yang C, Alomair B, Poovendran R. Optimized relay-route assignment for anonymity in wireless networks Ieee International Symposium On Information Theory - Proceedings. 76-80. DOI: 10.1109/ISIT.2013.6620191  0.751
2013 Clark A, Sun K, Poovendran R. Effectiveness of IP address randomization in decoy-based moving target defense Proceedings of the Ieee Conference On Decision and Control. 678-685. DOI: 10.1109/CDC.2013.6759960  0.363
2013 Bonaci T, Lee P, Bushnell L, Poovendran R. A convex optimization approach for clone detection in wireless sensor networks Pervasive and Mobile Computing. 9: 528-545. DOI: 10.1016/J.Pmcj.2012.04.003  0.461
2013 Lee P, Clark A, Bushnell L, Poovendran R. Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach Lecture Notes in Control and Information Sciences. 449: 161-175. DOI: 10.1007/978-3-319-01159-2_9  0.411
2013 Clark A, Zhu Q, Poovendran R, Basar T. An impact-aware defense against Stuxnet Proceedings of the American Control Conference. 4140-4147.  0.341
2012 Yang C, Alomair B, Poovendran R. Optimized flow allocation for anonymous communication in multipath wireless networks Ieee International Symposium On Information Theory - Proceedings. 219-223. DOI: 10.1109/ISIT.2012.6283842  0.745
2012 Zhu Q, Clark A, Poovendran R, Basar T. Deceptive routing games Proceedings of the Ieee Conference On Decision and Control. 2704-2711. DOI: 10.1109/CDC.2012.6426515  0.39
2012 Clark A, Alomair B, Bushnell L, Poovendran R. Leader selection in multi-agent systems for smooth convergence via fast mixing Proceedings of the Ieee Conference On Decision and Control. 818-824. DOI: 10.1109/CDC.2012.6426323  0.731
2012 Clark A, Bushnell L, Poovendran R. A passivity-based framework for composing attacks on networked control systems 2012 50th Annual Allerton Conference On Communication, Control, and Computing, Allerton 2012. 1814-1821. DOI: 10.1109/Allerton.2012.6483442  0.412
2012 Yang C, Alomair B, Poovendran R. Multipath flow allocation in anonymous wireless networks with dependent sources 2012 50th Annual Allerton Conference On Communication, Control, and Computing, Allerton 2012. 1395-1400. DOI: 10.1109/Allerton.2012.6483381  0.73
2012 Clark A, Zhu Q, Poovendran R, Başar T. Deceptive routing in relay networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7638: 171-185. DOI: 10.1007/978-3-642-34266-0_10  0.385
2011 Wu H, Nabar S, Poovendran R. An energy framework for the network simulator 3 (ns-3) Simutools 2011 - 4th International Icst Conference On Simulation Tools and Techniques. 222-230. DOI: 10.4108/icst.simutools.2011.245584  0.662
2011 Alomair B, Lazos L, Poovendran R. Securing low-cost RFID systems: An unconditionally secure approach Journal of Computer Security. 19: 229-257. DOI: 10.3233/Jcs-2010-0406  0.726
2011 Banerjee A, Nabar S, Gupta SK, Poovendran R. Energy-efficient long term physiological monitoring Proceedings - Wireless Health 2011, Wh'11. DOI: 10.1145/2077546.2077566  0.574
2011 Nabar S, Banerjee A, Gupta SKS, Poovendran R. Resource-efficient and reliable long term wireless monitoring of the photoplethysmographic signal Proceedings - Wireless Health 2011, Wh'11. DOI: 10.1145/2077546.2077556  0.606
2011 Bonaci T, Lee P, Bushnell L, Poovendran R. Distributed clone detection in wireless sensor networks: An optimization approach 2011 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom 2011 - Digital Proceedings. DOI: 10.1109/WoWMoM.2011.5986169  0.378
2011 Tague P, Nabar S, Ritcey JA, Poovendran R. Jamming-aware traffic allocation for multiple-path routing using portfolio selection Ieee/Acm Transactions On Networking. 19: 184-194. DOI: 10.1109/Tnet.2010.2057515  0.812
2011 Alomair B, Poovendran R. ε-MACs: Towards more secure and more efficient constructions of secure channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 292-310. DOI: 10.1109/Tc.2012.176  0.719
2011 Clark A, Poovendran R. A submodular optimization framework for leader selection in linear multi-agent systems Proceedings of the Ieee Conference On Decision and Control. 3614-3621. DOI: 10.1109/CDC.2011.6160248  0.31
2011 Nabar S, Banerjee A, Gupta SKS, Poovendran R. GeM-REM: Generative model-driven resource efficient ECG monitoring in body sensor networks Proceedings - 2011 International Conference On Body Sensor Networks, Bsn 2011. 1-6. DOI: 10.1109/BSN.2011.29  0.656
2011 Trappe W, Baliga A, Poovendran R. Opening up the last frontiers for securing the future wireless internet Emerging Wireless Technologies and the Future Mobile Internet. 242-282. DOI: 10.1017/CBO9780511921117.010  0.373
2010 Alomair B, Clark A, Poovendran R. The power of primes: Security of authentication based on a universal hash-function family Journal of Mathematical Cryptology. 4: 121-148. DOI: 10.1515/Jmc.2010.005  0.672
2010 Nabar S, Banerjee A, Gupta SKS, Poovendran R. Evaluation of body sensor network platforms: A design space and benchmarking analysis Proceedings - Wireless Health 2010, Wh'10. 118-127. DOI: 10.1145/1921081.1921096  0.637
2010 Clark A, Poovendran R. A metric for quantifying key exposure vulnerability in wireless sensor networks Ieee Wireless Communications and Networking Conference, Wcnc. DOI: 10.1109/WCNC.2010.5506138  0.405
2010 Alomair B, Clark A, Cuellar J, Poovendran R. Scalable RFID systems: A privacy-preserving protocol with constant-time identification Proceedings of the International Conference On Dependable Systems and Networks. 1-10. DOI: 10.1109/Tpds.2011.290  0.708
2010 Li M, Koutsopoulos I, Poovendran R. Optimal jamming attack strategies and network defense policies in wireless sensor networks Ieee Transactions On Mobile Computing. 9: 1119-1133. DOI: 10.1109/Tmc.2010.75  0.52
2010 Clark A, Hardy R, Poovendran R. A joint performance-vulnerability metric framework for designing ad hoc routing protocols Proceedings - Ieee Military Communications Conference Milcom. 930-935. DOI: 10.1109/MILCOM.2010.5679587  0.439
2010 Alomair B, Clark A, Cuellar J, Poovendran R. Statistical framework for source anonymity in sensor networks Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2010.5684248  0.686
2010 Bonaci T, Bushnell L, Poovendran R. Node capture attacks in wireless sensor networks: A system theoretic approach Proceedings of the Ieee Conference On Decision and Control. 6765-6772. DOI: 10.1109/CDC.2010.5717499  0.421
2010 Nabar S, Walling J, Poovendran R. Minimizing energy consumption in body sensor networks via convex optimization 2010 International Conference On Body Sensor Networks, Bsn 2010. 62-67. DOI: 10.1109/BSN.2010.19  0.679
2010 Alomair B, Poovendran R. Privacy versus scalability in radio frequency identification systems Computer Communications. 33: 2155-2163. DOI: 10.1016/J.Comcom.2010.08.006  0.693
2010 Alomair B, Poovendran R. Information theoretically secure encryption with almost free authentication Journal of Universal Computer Science. 15: 2937-2956.  0.695
2009 Slater D, Poovendran R, Tague P, Matt BJ. Tradeoffs between jamming resilience and communication efficiency in key establishment Mobile Computing and Communications Review. 13: 14-25. DOI: 10.1145/1558590.1558593  0.723
2009 Slater D, Tague P, Poovendran R, Matt BJ. A coding-theoretic approach for efficient message verification over insecure channels Proceedings of the 2nd Acm Conference On Wireless Network Security, Wisec'09. 151-160. DOI: 10.1145/1514274.1514297  0.692
2009 Lazos L, Poovendran R, Ritcey JA. Analytic evaluation of target detection in heterogeneous wireless sensor networks Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1498915.1498924  0.389
2009 Tague P, Li M, Poovendran R. Mitigation of control channel jamming under node capture attacks Ieee Transactions On Mobile Computing. 8: 1221-1234. DOI: 10.1109/Tmc.2009.33  0.691
2009 Tague P, Slater D, Rogers J, Poovendran R. Evaluating the vulnerability of network traffic using joint security and routing analysis Ieee Transactions On Dependable and Secure Computing. 6: 111-123. DOI: 10.1109/Tdsc.2008.60  0.763
2009 Perrig A, Trappe W, Gligor V, Poovendran R, Lee H. Secure wireless networking Journal of Communications and Networks. 11: 533-537. DOI: 10.1109/Jcn.2009.6388406  0.394
2009 Lazos L, Poovendran R, Ritcey JA. Detection of mobile targets on the plane and in space using heterogeneous sensor networks Wireless Networks. 15: 667-690. DOI: 10.1007/S11276-007-0092-Z  0.387
2009 Alomair B, Poovendran R. Unconditionally secure authenticated encryption with shorter keys Security in Information Systems - Proceedings of the 7th International Workshop On Security in Information Systems - Wosis 2009 in Conjunction With Iceis 2009. 3-15.  0.704
2009 Sampigethaya K, Poovendran R, Bushnell L. A framework for securing future e-enabled aircraft navigation and surveillance Aiaa Infotech At Aerospace Conference and Exhibit and Aiaa Unmanned...Unlimited Conference 0.323
2009 Alomair B, Sampigethaya K, Clark A, Poovendran R. Towards trustworthy cryptographic protection of airplane information assets Aiaa Infotech At Aerospace Conference and Exhibit and Aiaa Unmanned...Unlimited Conference 0.712
2009 Slater D, Tague P, Poovendran R, Li M. A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks Aiaa Infotech At Aerospace Conference and Exhibit and Aiaa Unmanned...Unlimited Conference 0.714
2008 Tague P, Slater D, Poovendran R, Noubir G. Linear programming models for jamming attacks on network traffic flows Proceedings of the 6th International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2008. 207-216. DOI: 10.1109/WIOPT.2008.4586066  0.665
2008 Tague P, Nabar S, Ritcey JA, Slater D, Poovendran R. Throughput optimization for multipath unicast routing under probabilistic jamming Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. DOI: 10.1109/PIMRC.2008.4699741  0.792
2008 Alomair B, Poovendran R. On the authentication of RFID systems with bitwise operations Proceedings of New Technologies, Mobility and Security Conference and Workshops, Ntms 2008. DOI: 10.1109/NTMS.2008.ECP.74  0.693
2008 Tague P, Slater D, Rogers J, Poovendran R. Vulnerability of network traffic under node capture attacks using circuit theoretic analysis Proceedings - Ieee Infocom. 664-672. DOI: 10.1109/INFOCOM.2007.41  0.729
2008 Tague P, Poovendran R. Modeling node capture attacks in wireless sensor networks 46th Annual Allerton Conference On Communication, Control, and Computing. 1221-1224. DOI: 10.1109/ALLERTON.2008.4797699  0.716
2008 Alomair B, Sampigethaya K, Poovendran R. Efficient generic forward-secure signatures and proxy signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5057: 166-181. DOI: 10.1007/978-3-540-69485-4_12  0.68
2008 Sampigethaya K, Poovendran R, Bushnell L. Security of future eEnabled aircraft ad hoc networks 8th Aiaa Aviation Technology, Integration and Operations (Atio) Conference 0.351
2007 Tague P, Poovendran R. A canonical seed assignment model for key predistribution in wireless sensor networks Acm Transactions On Sensor Networks. 3. DOI: 10.1145/1281492.1281494  0.752
2007 Salido J, Lazos L, Poovendran R. Energy and bandwidth-efficient key distribution in wireless Ad Hoc networks: A cross-layer approach Ieee/Acm Transactions On Networking. 15: 1527-1540. DOI: 10.1109/Tnet.2007.902696  0.461
2007 Tague P, Li M, Poovendran R. Probabilistic mitigation of control channel jamming via random key distribution Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. DOI: 10.1109/PIMRC.2007.4394778  0.639
2007 Sampigethaya K, Li M, Poovendran R, Robinson R, Bushnell L, Lintelman S. Secure wireless collection and distribution of commercial airplane health data Aiaa/Ieee Digital Avionics Systems Conference - Proceedings. DOI: 10.1109/Maes.2009.5208555  0.485
2007 Sampigethaya K, Li M, Huang L, Poovendran R. AMOEBA: Robust location privacy scheme for VANET Ieee Journal On Selected Areas in Communications. 25: 1569-1589. DOI: 10.1109/Jsac.2007.071007  0.45
2007 Li M, Koutsopoulos I, Poovendran R. Optimal jamming attacks and network defense policies in wireless sensor networks Proceedings - Ieee Infocom. 1307-1315. DOI: 10.1109/INFCOM.2007.155  0.425
2007 Tague P, Poovendran R. Modeling adaptive node capture attacks in multi-hop wireless networks Ad Hoc Networks. 5: 801-814. DOI: 10.1016/j.adhoc.2007.01.002  0.699
2007 Lazos L, Poovendran R. Power proximity based key management for secure multicast in ad hoc networks Wireless Networks. 13: 127-148. DOI: 10.1007/S11276-006-6057-9  0.504
2007 Poovendran R, Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Networks. 13: 27-59. DOI: 10.1007/S11276-006-3723-X  0.519
2007 Lazos L, Poovendran R. Secure localization for wireless sensor networks using range-independent methods Advances in Information Security. 30: 185-214.  0.323
2007 Alomair B, Lazos L, Poovendran R. Passive attacks on a class of authentication protocols for RFID Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4817: 102-115.  0.654
2007 Poovendran R, Wang C, Roy S. Secure localization and time synchronization for wireless sensor and Ad Hoc networks Advances in Information Security. 30.  0.327
2007 Robinson RV, Sampigethaya K, Li M, Lintelman S, Poovendran R, Von Oheimb D. Challenges for IT infrastructure supporting secure network-enabled commercial airplane operations Collection of Technical Papers - 2007 Aiaa Infotech At Aerospace Conference. 2: 1845-1851.  0.395
2007 Meadows C, Poovendran R, Pavlovic D, Chang LW, Syverson P. Distance bounding protocols: Authentication logic analysis and collusion attacks Advances in Information Security. 30: 279-298.  0.4
2007 Robinson RV, Li M, Lintelman SA, Sampigethaya K, Poovendran R, Von Oheimb D, Bußer JU. Impact of public key enabled applications on the operation and maintenance of commercial airplanes Collection of Technical Papers - 7th Aiaa Aviation Technology, Integration, and Operations Conference. 1: 750-759.  0.304
2007 Robinson R, Li M, Lintelman S, Sampigethaya K, Poovendran R, Von Oheimb D, Bußer JU, Cuellar J. Electronic distribution of airplane software and the impact of information security on airplane safety Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4680: 28-39.  0.303
2006 Li M, Sampigethaya K, Huang L, Poovendran R. Swing & swap: User-centric approaches towards maximizing location privacy Proceedings of the Acm Conference On Computer and Communications Security. 19-28. DOI: 10.1145/1179601.1179605  0.327
2006 Lazos L, Poovendran R. Stochastic coverage in heterogeneous sensor networks Acm Transactions On Sensor Networks. 2: 325-358. DOI: 10.1145/1167935.1167937  0.406
2006 Tague P, Poovendran R. A general probabilistic model for improving key assignment in wireless networks 2006 4th International Symposium On Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Wiopt 2006. DOI: 10.1109/WIOPT.2006.1666460  0.733
2006 Li M, Poovendran R. Disenrollment with perfect forward secrecy in threshold schemes Ieee Transactions On Information Theory. 52: 1676-1682. DOI: 10.1109/Tit.2006.871050  0.362
2006 Lazos L, Poovendran R. HiRLoc: High-resolution robust localization for wireless sensor networks Ieee Journal On Selected Areas in Communications. 24: 233-246. DOI: 10.1109/Jsac.2005.861381  0.483
2006 Anjum F, Ghosh AK, Golmie N, Kolodzy P, Poovendran R, Shorey R. Guest editorial security in wireless ad hoc networks Ieee Journal On Selected Areas in Communications. 24: 217-218. DOI: 10.1109/Jsac.2005.861070  0.45
2006 Sampigethaya K, Poovendran R. A survey on mix networks and their secure applications Proceedings of the Ieee. 94: 2142-2180. DOI: 10.1109/JPROC.2006.889687  0.354
2006 Sampigethaya K, Poovendran R. A framework and taxonomy for comparison of electronic voting schemes Computers and Security. 25: 137-153. DOI: 10.1016/J.Cose.2005.11.003  0.335
2005 Poovendran R. Information assurance in manets and wireless sensor networks Sasn'05 - Proceedings of the 2005 Acm Workshop On Security of Ad Hoc and Sensor Networks. 2005: 32. DOI: 10.1145/1102219.1102220  0.408
2005 Lazos L, Poovendran R. SeRLoc: Robust localization for wireless sensor networks Acm Transactions On Sensor Networks. 1: 73-100. DOI: 10.1145/1077391.1077395  0.487
2005 Kang I, Poovendran R. Scalable power-efficient broadcast over densely deployed wireless ad hoc networks Ieee Wireless Communications and Networking Conference, Wcnc. 4: 2063-2068. DOI: 10.1109/WCNC.2005.1424836  0.628
2005 Lazos L, Poovendran R, Meadows C, Syverson P, Chang LW. Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach Ieee Wireless Communications and Networking Conference, Wcnc. 2: 1193-1199. DOI: 10.1109/WCNC.2005.1424678  0.387
2005 Lazos L, Poovendran R, Čapkun S. ROPE: Robust position estimation in wireless sensor networks 2005 4th International Symposium On Information Processing in Sensor Networks, Ipsn 2005. 2005: 324-331. DOI: 10.1109/IPSN.2005.1440942  0.326
2005 Chan SP, Poovendran R, Sun MT. A key management scheme in distributed sensor networks using attack probabilities Globecom - Ieee Global Telecommunications Conference. 2: 1007-1011. DOI: 10.1109/GLOCOM.2005.1577788  0.38
2005 Li M, Poovendran R, McGrew DA. Minimizing center key storage in hybrid one-way function based group key management with communication constraints Information Processing Letters. 93: 191-198. DOI: 10.1016/J.Ipl.2004.10.012  0.354
2005 Kang I, Poovendran R. Maximizing network lifetime of broadcasting over wireless stationary ad hoc networks Mobile Networks and Applications. 10: 879-896. DOI: 10.1007/S11036-005-4445-5  0.654
2005 Kang I, Poovendran R. Iterated local optimization for minimum energy broadcast Proceedings - Wiopt 2005: Third International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks. 2005: 332-341.  0.571
2004 Kang I, Poovendran R. Broadcast with heterogeneous node capability Globecom - Ieee Global Telecommunications Conference. 6: 4114-4119.  0.62
2004 Kang I, Poovendran R. COBRA: Center-oriented broadcast routing algorithms for wireless ad hoc networks 2004 Ieee Wireless Communications and Networking Conference, Wcnc 2004. 2: 813-818.  0.618
2004 Kang I, Poovendran R. Design issues on broadcast routing algorithms using realistic cost-effective smart antenna models Ieee Vehicular Technology Conference. 59: 2121-2125.  0.579
2004 Lazos L, Poovendran R. Cross-layer design for energy-efficient secure multicast communications in ad hoc networks Ieee International Conference On Communications. 6: 3633-3639.  0.342
2004 Lazos L, Salido J, Poovendran R. VP3: Using vertex path and power proximity for energy efficient key distribution Ieee Vehicular Technology Conference. 60: 1228-1232.  0.346
2003 Trappe W, Song J, Poovendran R, Liu KJR. Key Management and Distribution for Secure Multimedia Multicast Ieee Transactions On Multimedia. 5: 544-557. DOI: 10.1109/Tmm.2003.813279  0.302
2003 Lazos L, Poovendran R. Energy-aware secure multicast communication in ad-hoc networks using geographic location information Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 4: 201-204.  0.352
2003 Kang I, Poovendran R. Maximizing static network lifetime of wireless broadcast adhoc networks Ieee International Conference On Communications. 3: 2256-2261.  0.634
2003 Kang I, Poovendran R. A Comparison of Power-Efficient Broadcast Routing Algorithms Globecom - Ieee Global Telecommunications Conference. 1: 387-392.  0.556
2003 Kang I, Poovendran R. S-GPBE: A Power-Efficient Broadcast Routing Algorithm Using Sectored Antenna Proceedings of the Iasted International Conference On Wireless and Optical Communications. 3: 34-39.  0.496
2003 Kang I, Poovendran R. A novel power-efficient broadcast routing algorithm exploiting broadcast efficiency Ieee Vehicular Technology Conference. 58: 2926-2930.  0.504
2002 Kang I, Poovendran R. On the lifetime extension of energy-efficient multihop broadcast networks Proceedings of the International Joint Conference On Neural Networks. 1: 365-370.  0.624
2001 Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes Ieee Transactions On Information Theory. 47: 2824-2834. DOI: 10.1109/18.959263  0.578
Show low-probability matches.