What is the right model for wireless channel interference? A Iyer, C Rosenberg, A Karnik Proceedings of the 3rd international conference on Quality of service in …, 2006 | 418 | 2006 |
An address-light, integrated MAC and routing protocol for wireless sensor networks S Kulkarni, A Iyer, C Rosenberg IEEE/ACM Transactions on networking 14 (4), 793-806, 2006 | 155 | 2006 |
Threat mitigation in a vehicle-to-vehicle communication network BR Bellur, D Bhattacharya, AV Iyer US Patent 8,819,414, 2014 | 132 | 2014 |
Flooding-resilient broadcast authentication for vanets HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer Proceedings of the 17th annual international conference on Mobile computing …, 2011 | 121 | 2011 |
Throughput-optimal configuration of fixed wireless networks A Karnik, A Iyer, C Rosenberg IEEE/ACM Transactions On Networking 16 (5), 1161-1174, 2008 | 88 | 2008 |
Vanet alert endorsement using multi-source filters THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer Proceedings of the seventh ACM international workshop on VehiculAr …, 2010 | 85 | 2010 |
Electronic device using framework interface for communication KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ... US Patent App. 14/281,355, 2014 | 72 | 2014 |
Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks BR Bellur, AV Iyer, D Bhattacharya US Patent 8,904,183, 2014 | 48 | 2014 |
Throughput-lifetime trade-offs in multihop wireless networks under an SINR-based interference model J Luo, A Iyer, C Rosenberg IEEE Transactions on Mobile Computing 10 (3), 419-433, 2010 | 39 | 2010 |
Secure V2V communications: Performance impact of computational overheads A Iyer, A Kherani, A Rao, A Karnik IEEE INFOCOM Workshops 2008, 1-6, 2008 | 39 | 2008 |
A taxonomy-based approach to design of large-scale sensor networks A Iyer, SS Kulkarni, V Mhatre, CP Rosenberg Wireless Sensor Networks and Applications, 3-33, 2008 | 33 | 2008 |
Batch verification of ECDSA signatures S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012 | 31 | 2012 |
Understanding the key performance issues with MAC protocols for multi‐hop wireless networks A Iyer, C Rosenberg Wireless Communications and Mobile Computing 6 (6), 745-760, 2006 | 29 | 2006 |
Lightweight geographic trajectory authentication via one-time signatures BR Bellur, AV Iyer US Patent App. 12/413,741, 2009 | 23 | 2009 |
Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads AV Iyer, D Bhattacharya US Patent 8,452,969, 2013 | 22 | 2013 |
Framework for packet processing for secure V2V applications on resource-constrained platforms AV Iyer, AR Karnik, BR Bellur US Patent 8,704,679, 2014 | 15 | 2014 |
Design of high throughput scheduled mesh networks: A case for directional antennas SN Muthaiah, A Iyer, A Karnik, C Rosenberg IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 5080-5085, 2007 | 15 | 2007 |
Electronic device using logical channels for communication KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ... US Patent App. 14/281,206, 2014 | 14 | 2014 |
Active queue management using adaptive RED R Verma, A Iyer, A Karandikar Journal of Communications and Networks 5 (3), 275-281, 2003 | 13 | 2003 |
New algorithms for batch verification of standard ECDSA signatures S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer Journal of Cryptographic Engineering 4, 237-258, 2014 | 12 | 2014 |