Aravind Iyer
Aravind Iyer
Samsung, General Motors, Purdue, IIT Bombay
Verified email at iitbombay.org
Title
Cited by
Cited by
Year
What is the right model for wireless channel interference?
A Iyer, C Rosenberg, A Karnik
IEEE Transactions on Wireless Communications 8 (5), 2662-2671, 2009
3862009
An address-light, integrated MAC and routing protocol for wireless sensor networks
S Kulkarni, A Iyer, C Rosenberg
IEEE/ACM Transactions on networking 14 (4), 793-806, 2006
1372006
Flooding-resilient broadcast authentication for vanets
HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1122011
Threat mitigation in a vehicle-to-vehicle communication network
BR Bellur, D Bhattacharya, AV Iyer
US Patent 8,819,414, 2014
1112014
Throughput-optimal configuration of fixed wireless networks
A Karnik, A Iyer, C Rosenberg
IEEE/ACM Transactions On Networking 16 (5), 1161-1174, 2008
862008
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
692010
Electronic device using framework interface for communication
KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ...
US Patent App. 14/281,355, 2014
672014
Throughput-lifetime trade-offs in multihop wireless networks under an SINR-based interference model
J Luo, A Iyer, C Rosenberg
IEEE Transactions on Mobile Computing 10 (3), 419-433, 2010
342010
Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks
BR Bellur, AV Iyer, D Bhattacharya
US Patent 8,904,183, 2014
332014
Secure V2V communications: Performance impact of computational overheads
A Iyer, A Kherani, A Rao, A Karnik
IEEE INFOCOM Workshops 2008, 1-6, 2008
322008
A taxonomy-based approach to design of large-scale sensor networks
A Iyer, SS Kulkarni, V Mhatre, CP Rosenberg
Wireless Sensor Networks and Applications, 3-33, 2008
312008
Understanding the key performance issues with MAC protocols for multi‐hop wireless networks
A Iyer, C Rosenberg
Wireless Communications and Mobile Computing 6 (6), 745-760, 2006
282006
Batch verification of ECDSA signatures
S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer
International Conference on Cryptology in Africa, 1-18, 2012
252012
Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
AV Iyer, D Bhattacharya
US Patent 8,452,969, 2013
212013
Lightweight geographic trajectory authentication via one-time signatures
BR Bellur, AV Iyer
US Patent App. 12/413,741, 2009
152009
Design of high throughput scheduled mesh networks: A case for directional antennas
SN Muthaiah, A Iyer, A Karnik, C Rosenberg
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 5080-5085, 2007
152007
Framework for packet processing for secure V2V applications on resource-constrained platforms
AV Iyer, AR Karnik, BR Bellur
US Patent 8,704,679, 2014
132014
Routing dependent node density requirements for connectivity in multi-hop wireless networks
SS Kulkarni, A Iyer, C Rosenberg, D Kofman
IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 5, 2890-2896, 2004
102004
Active queue management using adaptive RED
R Verma, A Iyer, A Karandikar
Journal of Communications and Networks 5 (3), 275-281, 2003
102003
A comparative study of video transfer over Bluetooth and 802.11 wireless MAC
A Iyer, UB Desai
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 3, 2053-2057, 2003
102003
The system can't perform the operation now. Try again later.
Articles 1–20