Follow
Alex Reznik
Alex Reznik
Dell
Verified email at dell.com
Title
Cited by
Cited by
Year
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
S Mathur, W Trappe, N Mandayam, C Ye, A Reznik
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
9032008
Information-theoretically secret key generation for fading wireless channels
C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam
IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010
4942010
Mobile edge cloud system: Architectures, challenges, and approaches
H Liu, F Eldarrat, H Alqahtani, A Reznik, X De Foy, Y Zhang
IEEE Systems Journal 12 (3), 2495-2508, 2017
2322017
Extracting secrecy from jointly Gaussian random variables
C Ye, A Reznik, Y Shah
2006 IEEE International Symposium on Information Theory, 2593-2597, 2006
2192006
Degraded Gaussian multirelay channel: Capacity and optimal power allocation
A Reznik, SR Kulkarni, S Verdú
IEEE Transactions on Information Theory 50 (12), 3037-3046, 2004
1762004
Developing a standard for TV white space coexistence: Technical challenges and solution approaches
T Baykas, M Kasslin, M Cummings, H Kang, J Kwak, R Paine, A Reznik, ...
IEEE Wireless Communications 19 (1), 10-22, 2012
1732012
Developing software for multi-access edge computing
D Sabella, V Sukhomlinov, L Trang, S Kekki, P Paglierani, R Rossbach, ...
ETSI white paper 20, 1-38, 2019
1522019
On the effective weights of pseudocodewords for codes defined on graphs with cycles
GD Forney, R Koetter, FR Kschischang, A Reznik
Codes, systems, and graphical models, 101-112, 2001
1472001
Joint caching and pricing strategies for popular content in information centric networks
M Hajimirsadeghi, NB Mandayam, A Reznik
IEEE Journal on Selected Areas in Communications 35 (3), 654-667, 2017
1242017
Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks]
S Mathur, A Reznik, C Ye, R Mukherjee, A Rahman, Y Shah, W Trappe, ...
IEEE Wireless Communications 17 (5), 63-70, 2010
1122010
Distributed mobility management: a standards landscape
JC Zuniga, CJ Bernardos, A De La Oliva, T Melia, R Costa, A Reznik
IEEE Communications Magazine 51 (3), 80-87, 2013
1102013
Secret key generation for a pairwise independent network model
S Nitinawarat, C Ye, A Barg, P Narayan, A Reznik
IEEE Transactions on Information Theory 56 (12), 6482-6489, 2010
1002010
A transport protocol for content-centric networking with explicit congestion control
F Zhang, Y Zhang, A Reznik, H Liu, C Qian, C Xu
2014 23rd international conference on computer communication and networks …, 2014
942014
On the secrecy capabilities of ITU channels
C Ye, A Reznik, G Sternberg, Y Shah
2007 IEEE 66th Vehicular Technology Conference, 2030-2034, 2007
862007
Group secret key generation algorithms
C Ye, A Reznik
2007 IEEE International Symposium on Information Theory, 2596-2600, 2007
702007
Multi-access edge computing: An overview of ETSI MEC ISG
F Giust, X Costa-Perez, A Reznik
IEEE 5G Tech Focus 1 (4), 4, 2017
662017
Cloud RAN and MEC: A perfect pairing
A Reznik, LMC Murillo, F Fontes, C Turyagyenda, C Wehner, Z Zheng
ETSI MEC, 2018
602018
Capacity and optimal resource allocation in the degraded Gaussian relay channel with multiple relays
A Reznik, SR Kulkarni, S Verdú
PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND …, 2002
552002
PHY-authentication protocol for spoofing detection in wireless networks
L Xiao, A Reznik, W Trappe, C Ye, Y Shah, L Greenstein, N Mandayam
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
542010
Broadcast-relay channel: capacity region bounds
A Reznik, SR Kulkarni, S Verdú
Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 …, 2005
482005
The system can't perform the operation now. Try again later.
Articles 1–20