Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Radha Poovendran
2010 – today
- 2013
[j38]Kui Ren, Haojin Zhu, Zhu Han, Radha Poovendran: Security in cognitive radio networks [Guest Editorial]. IEEE Network 27(3): 2 (2013)
[j37]Tamara Bonaci, Phillip Lee, Linda Bushnell, Radha Poovendran: A convex optimization approach for clone detection in wireless sensor networks. Pervasive and Mobile Computing 9(4): 528-545 (2013)
[j36]Krishna Sampigethaya, Radha Poovendran: Aviation Cyber-Physical Systems: Foundations for Future Aircraft and Air Transport. Proceedings of the IEEE 101(8): 1834-1855 (2013)
[j35]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran: Toward a Statistical Framework for Source Anonymity in Sensor Networks. IEEE Trans. Mob. Comput. 12(2): 248-260 (2013)
[c63]Chouchang Yang, Basel Alomair, Radha Poovendran: Optimized relay-route assignment for anonymity in wireless networks. ISIT 2013: 76-80
[i3]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran: Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach. CoRR abs/1306.4949 (2013)- 2012
[j34]Radha Poovendran, Krishna Sampigethaya, Sandeep K. S. Gupta, Insup Lee, K. Venkatesh Prasad, David Corman, James L. Paunicka: Special Issue on Cyber-Physical Systems [Scanning the Issue]. Proceedings of the IEEE 100(1): 6-12 (2012)
[j33]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran: Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification. IEEE Trans. Parallel Distrib. Syst. 23(8): 1536-1550 (2012)
[c62]Chouchang Yang, Basel Alomair, Radha Poovendran: Multipath flow allocation in anonymous wireless networks with dependent sources. Allerton Conference 2012: 1395-1400
[c61]Andrew Clark, Linda Bushnell, Radha Poovendran: A passivity-based framework for composing attacks on networked control systems. Allerton Conference 2012: 1814-1821
[c60]Mauro Conti, Radha Poovendran, Marco Secchiero: FakeBook: Detecting Fake Profiles in On-Line Social Networks. ASONAM 2012: 1071-1078
[c59]Andrew Clark, Linda Bushnell, Radha Poovendran: On leader selection for performance and controllability in multi-agent systems. CDC 2012: 86-93
[c58]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran: Leader selection in multi-agent systems for smooth convergence via fast mixing. CDC 2012: 818-824
[c57]Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar: Deceptive routing games. CDC 2012: 2704-2711
[c56]Andrew Clark, Quanyan Zhu, Radha Poovendran, Tamer Basar: Deceptive Routing in Relay Networks. GameSec 2012: 171-185
[c55]Chouchang Yang, Basel Alomair, Radha Poovendran: Optimized flow allocation for anonymous communication in multipath wireless networks. ISIT 2012: 219-223
[c54]Andrew Clark, Linda Bushnell, Radha Poovendran: Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach. WiOpt 2012: 111-115
[c53]Sajal K. Das, Krishna Sampigethaya, Guevara Noubir, Radha Poovendran: Message from the workshop chairs. WOWMOM 2012: 1
[i2]Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar: SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks. CoRR abs/1207.5844 (2012)
[i1]Andrew Clark, Linda Bushnell, Radha Poovendran: A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems. CoRR abs/1208.0946 (2012)- 2011
[j32]Basel Alomair, Loukas Lazos, Radha Poovendran: Securing low-cost RFID systems: An unconditionally secure approach. Journal of Computer Security 19(2): 229-257 (2011)
[j31]Krishna Sampigethaya, Radha Poovendran, Sudhakar Shetty, Terry Davis, Chuck Royalty: Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond. Proceedings of the IEEE 99(11): 2040-2055 (2011)
[j30]Patrick Tague, Sidharth Nabar, James A. Ritcey, Radha Poovendran: Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Netw. 19(1): 184-194 (2011)
[c52]Sidharth Nabar, Ayan Banerjee, Sandeep K. S. Gupta, Radha Poovendran: GeM-REM: Generative Model-Driven Resource Efficient ECG Monitoring in Body Sensor Networks. BSN 2011: 1-6
[c51]Andrew Clark, Radha Poovendran: A submodular optimization framework for leader selection in linear multi-agent systems. CDC-ECE 2011: 3614-3621
[c50]Krishna Sampigethaya, Radha Poovendran: Security and privacy of future aircraft wireless communications with offboard systems. COMSNETS 2011: 1-6
[c49]Andrew Clark, Radha Poovendran: Maximizing Influence in Competitive Environments: A Game-Theoretic Approach. GameSec 2011: 151-162
[c48]He Wu, Sidharth Nabar, Radha Poovendran: An energy framework for the network simulator 3 (NS-3). SimuTools 2011: 222-230
[c47]Sidharth Nabar, Ayan Banerjee, Sandeep K. S. Gupta, Radha Poovendran: Resource-efficient and reliable long term wireless monitoring of the photoplethysmographic signal. Wireless Health 2011: 9
[c46]Ayan Banerjee, Sidharth Nabar, Sandeep K. S. Gupta, Radha Poovendran: Energy-efficient long term physiological monitoring. Wireless Health 2011: 17
[c45]Tamara Bonaci, Phillip Lee, Linda Bushnell, Radha Poovendran: Distributed clone detection in wireless sensor networks: An optimization approach. WOWMOM 2011: 1-6- 2010
[j29]Basel Alomair, Radha Poovendran: Privacy versus scalability in radio frequency identification systems. Computer Communications 33(18): 2155-2163 (2010)
[j28]Basel Alomair, Andrew Clark, Radha Poovendran: The power of primes: security of authentication based on a universal hash-function family. J. Mathematical Cryptology 4(2): 121-148 (2010)
[j27]Radha Poovendran: Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View]. Proceedings of the IEEE 98(8): 1363-1366 (2010)
[j26]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang: Group Event Detection With a Varying Number of Group Members for Video Surveillance. IEEE Trans. Circuits Syst. Video Techn. 20(8): 1057-1067 (2010)
[j25]Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran: Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 9(8): 1119-1133 (2010)
[c44]Sidharth Nabar, Jeffrey Walling, Radha Poovendran: Minimizing Energy Consumption in Body Sensor Networks via Convex Optimization. BSN 2010: 62-67
[c43]Tamara Bonaci, Linda Bushnell, Radha Poovendran: Node capture attacks in wireless sensor networks: A system theoretic approach. CDC 2010: 6765-6772
[c42]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran: Scalable RFID systems: a privacy-preserving protocol with constant-time identification. DSN 2010: 1-10
[c41]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran: Statistical Framework for Source Anonymity in Sensor Networks. GLOBECOM 2010: 1-6
[c40]Basel Alomair, Radha Poovendran: Efficient Authentication for Mobile and Pervasive Computing. ICICS 2010: 186-202
[c39]Basel Alomair, Radha Poovendran: $\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels. ICISC 2010: 292-310
[c38]Apaporn Boonyarattaphan, Yan Bai, Sam Chung, Radha Poovendran: Spatial-Temporal Access Control for E-health Services. NAS 2010: 269-276
[c37]Andrew Clark, Radha Poovendran: A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks. WCNC 2010: 1-6
[c36]Sidharth Nabar, Ayan Banerjee, Sandeep K. S. Gupta, Radha Poovendran: Evaluation of body sensor network platforms: a design space and benchmarking analysis. Wireless Health 2010: 118-127
2000 – 2009
- 2009
[j24]Adrian Perrig, Wade Trappe, Virgil D. Gligor, Radha Poovendran, Heejo Lee: Secure wireless networking. Journal of Communications and Networks 11(6): 323-327 (2009)
[j23]Basel Alomair, Radha Poovendran: Information Theoretically Secure Encryption with Almost Free Authentication. J. UCS 15(15): 2937-2956 (2009)
[j22]David Slater, Radha Poovendran, Patrick Tague, Brian J. Matt: Tradeoffs between jamming resilience and communication efficiency in key establishment. Mobile Computing and Communications Review 13(1): 14-25 (2009)
[j21]Patrick Tague, David Slater, Jason Rogers, Radha Poovendran: Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. IEEE Trans. Dependable Sec. Comput. 6(2): 111-123 (2009)
[j20]Patrick Tague, Mingyan Li, Radha Poovendran: Mitigation of Control Channel Jamming under Node Capture Attacks. IEEE Trans. Mob. Comput. 8(9): 1221-1234 (2009)
[j19]Loukas Lazos, Radha Poovendran, James A. Ritcey: Analytic evaluation of target detection in heterogeneous wireless sensor networks. TOSN 5(2) (2009)
[j18]Loukas Lazos, Radha Poovendran, James A. Ritcey: Detection of mobile targets on the plane and in space using heterogeneous sensor networks. Wireless Networks 15(5): 667-690 (2009)
[c35]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang: Group Event Detection for Video Surveillance. ISCAS 2009: 2830-2833
[c34]Basel Alomair, Radha Poovendran: Unconditionally Secure Authenticated Encryption with Shorter Keys. WOSIS 2009: 5-15
[c33]David Slater, Patrick Tague, Radha Poovendran, Brian J. Matt: A coding-theoretic approach for efficient message verification over insecure channels. WISEC 2009: 151-160- 2008
[j17]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang: Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance. IEEE Trans. Circuits Syst. Video Techn. 18(8): 1128-1139 (2008)
[c32]Basel Alomair, Krishna Sampigethaya, Radha Poovendran: Efficient Generic Forward-Secure Signatures and Proxy Signatures. EuroPKI 2008: 166-181
[c31]Patrick Tague, David Slater, Jason Rogers, Radha Poovendran: Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. INFOCOM 2008: 161-165
[c30]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang: Human activity recognition for video surveillance. ISCAS 2008: 2737-2740
[c29]Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf: Public key based authentication for secure integration of sensor data and RFID. HeterSanet 2008: 61-66
[c28]Basel Alomair, Radha Poovendran: On the Authentication of RFID Systems with Bitwise Operations. NTMS 2008: 1-6
[c27]Patrick Tague, Sidharth Nabar, James A. Ritcey, David Slater, Radha Poovendran: Throughput optimization for multipath unicast routing under probabilistic jamming. PIMRC 2008: 1-5
[c26]Patrick Tague, David Slater, Radha Poovendran, Guevara Noubir: Linear programming models for jamming attacks on network traffic flows. WiOpt 2008: 207-216
[e4]Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran (Eds.): Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM 2008, ISBN 978-1-59593-814-5- 2007
[j16]Patrick Tague, Radha Poovendran: Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks 5(6): 801-814 (2007)
[j15]Krishna Sampigethaya, Mingyan Li, Leping Huang, Radha Poovendran: AMOEBA: Robust Location Privacy Scheme for VANET. IEEE Journal on Selected Areas in Communications 25(8): 1569-1589 (2007)
[j14]Javier Salido, Loukas Lazos, Radha Poovendran: Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach. IEEE/ACM Trans. Netw. 15(6): 1527-1540 (2007)
[j13]Patrick Tague, Radha Poovendran: A canonical seed assignment model for key predistribution in wireless sensor networks. TOSN 3(4) (2007)
[j12]Radha Poovendran, Loukas Lazos: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks 13(1): 27-59 (2007)
[j11]Loukas Lazos, Radha Poovendran: Power proximity based key management for secure multicast in ad hoc networks. Wireless Networks 13(1): 127-148 (2007)
[c25]Basel Alomair, Loukas Lazos, Radha Poovendran: Passive Attacks on a Class of Authentication Protocols for RFID. ICISC 2007: 102-115
[c24]Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran: Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. INFOCOM 2007: 1307-1315
[c23]Loukas Lazos, Radha Poovendran, James A. Ritcey: Probabilistic detection of mobile targets in heterogeneous sensor networks. IPSN 2007: 519-528
[c22]Patrick Tague, Mingyan Li, Radha Poovendran: Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution. PIMRC 2007: 1-5
[c21]Richard Robinson, Mingyan Li, Scott Lintelman, Krishna Sampigethaya, Radha Poovendran, David von Oheimb, Jens-Uwe Bußer, Jorge Cuéllar: Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety. SAFECOMP 2007: 28-39
[c20]Loukas Lazos, Radha Poovendran, James A. Ritcey: On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets. WiOpt 2007: 1-10
[p2]Loukas Lazos, Radha Poovendran: Secure Localization for Wireless Sensor Networks using Range-Independent Methods. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 185-214
[p1]Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, Paul F. Syverson: Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 279-298
[e3]Radha Poovendran, Sumit Roy, Cliff Wang (Eds.): Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security 30, Springer 2007, ISBN 978-0-387-32721-1- 2006
[j10]Krishna Sampigethaya, Radha Poovendran: A framework and taxonomy for comparison of electronic voting schemes. Computers & Security 25(2): 137-153 (2006)
[j9]Loukas Lazos, Radha Poovendran: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2): 233-246 (2006)
[j8]Mingyan Li, Radha Poovendran: Disenrollment with perfect forward secrecy in threshold schemes. IEEE Transactions on Information Theory 52(4): 1676-1682 (2006)
[j7]Loukas Lazos, Radha Poovendran: Stochastic coverage in heterogeneous sensor networks. TOSN 2(3): 325-358 (2006)
[c19]Patrick Tague, Radha Poovendran: A general probabilistic model for improving key assignment in wireless networks. WiOpt 2006: 251-259
[c18]
[c17]Mingyan Li, Krishna Sampigethaya, Leping Huang, Radha Poovendran: Swing & swap: user-centric approaches towards maximizing location privacy. WPES 2006: 19-28
[e2]- 2005
[j6]Mingyan Li, Radha Poovendran, David A. McGrew: Minimizing center key storage in hybrid one-way function based group key management with communication constraints. Inf. Process. Lett. 93(4): 191-198 (2005)
[j5]Intae Kang, Radha Poovendran: Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks. MONET 10(6): 879-896 (2005)
[j4]Loukas Lazos, Radha Poovendran: SeRLoc: Robust localization for wireless sensor networks. TOSN 1(1): 73-100 (2005)
[c16]Siu-Ping Chan, Radha Poovendran, Ming-Ting Sun: A key management scheme in distributed sensor networks using attack probabilities. GLOBECOM 2005: 5
[c15]Loukas Lazos, Radha Poovendran, Srdjan Capkun: Rope: robust position estimation in wireless sensor networks. IPSN 2005: 324-331
[c14]
[c13]Loukas Lazos, Radha Poovendran, Catherine Meadows, Paul F. Syverson, LiWu Chang: Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. WCNC 2005: 1193-1199
[c12]Intae Kang, Radha Poovendran: Scalable power-efficient broadcast over densely deployed wireless ad hoc networks. WCNC 2005: 2063-2068
[c11]Intae Kang, Radha Poovendran: Iterated Local Optimization for Minimum Energy Broadcast. WiOpt 2005: 332-341
[e1]Markus Jakobsson, Radha Poovendran (Eds.): Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005. ACM 2005, ISBN 1-59593-142-2- 2004
[c10]Intae Kang, Radha Poovendran: Broadcast with heterogeneous node capability [wireless ad hoc or sensor networks]. GLOBECOM 2004: 4114-4119
[c9]Loukas Lazos, Radha Poovendran: Cross-layer design for energy-efficient secure multicast communications in ad hoc networks. ICC 2004: 3633-3639
[c8]Loukas Lazos, Javier Salido, Radha Poovendran: VP3: using vertex path and power proximity for energy efficient key distribution. VTC Fall (2) 2004: 1228-1232
[c7]Intae Kang, Radha Poovendran: COBRA: center-oriented broadcast routing algorithms for wireless ad hoc networks. WCNC 2004: 813-818
[c6]Loukas Lazos, Radha Poovendran: SeRLoc: secure range-independent localization for wireless sensor networks. Workshop on Wireless Security 2004: 21-30- 2003
[j3]Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu: Key management and distribution for secure multimedia multicast. IEEE Transactions on Multimedia 5(4): 544-557 (2003)
[c5]Intae Kang, Radha Poovendran: A comparison of power-efficient broadcast routing algorithms. GLOBECOM 2003: 387-392
[c4]Intae Kang, Radha Poovendran: Maximizing static network lifetime of wireless broadcast ad hoc networks. ICC 2003: 2256-2261
[c3]Mingyan Li, Radha Poovendran: Broadcast Enforced Threshold Schemes with Disenrollment. Selected Areas in Cryptography 2003: 101-116- 2002
[j2]Mingyan Li, Radha Poovendran, C. Berenstein: Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters 6(3): 108-110 (2002)- 2001
[j1]Radha Poovendran, John S. Baras: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory 47(7): 2824-2834 (2001)- 2000
[c2]Radha Poovendran, Peter J. Keleher, John S. Baras: A Decision-Process Analysis of Implicit Coscheduling. IPDPS 2000: 115-120
1990 – 1999
- 1999
[c1]Radha Poovendran, John S. Baras: An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. CRYPTO 1999: 624-638
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-15 21:37 CEST by the dblp team



