Obserwuj
Vireshwar Kumar
Vireshwar Kumar
Assistant Professor, Department of Computer Science & Engineering, IIT Delhi
Zweryfikowany adres z cse.iitd.ac.in - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Security and enforcement in spectrum sharing
JM Park, JH Reed, AA Beex, TC Clancy, V Kumar, B Bahrak
Proceedings of the IEEE 102 (3), 270-281, 2014
952014
3D printed graphene-based self-powered strain sensors for smart tires in autonomous vehicles
D Maurya, S Khaleghian, R Sriramdas, P Kumar, RA Kishore, MG Kang, ...
Nature communications 11 (1), 5392, 2020
792020
Energy harvesting and strain sensing in smart tire for next generation autonomous vehicles
D Maurya, P Kumar, S Khaleghian, R Sriramdas, MG Kang, RA Kishore, ...
Applied Energy 232, 312-322, 2018
742018
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
14th USENIX Workshop on Offensive Technologies (WOOT), 2020
582020
Blind transmitter authentication for spectrum security and enforcement
V Kumar, JM Park, K Bian
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
492014
Evading Voltage-Based Intrusion Detection on Automotive CAN
R Bhatia, V Kumar, K Serag, ZB Celik, M Payer, D Xu
Network and Distributed System Security (NDSS), 2021
432021
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement
V Kumar, JMJ Park, K Bian
IEEE Transactions on Information Forensics and Security 11 (5), 1027-1038, 2016
342016
Group signatures with probabilistic revocation: A computationally-scalable approach for providing privacy-preserving authentication
V Kumar, H Li, JMJ Park, K Bian, Y Yang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
30*2015
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
272020
PHY-layer authentication by introducing controlled inter symbol interference
V Kumar, JM Park, TC Clancy, K Bian
Communications and Network Security (CNS), 2013 IEEE Conference on, 10-18, 2013
262013
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications
T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian
30th USENIX Security Symposium, 2021
192021
Exposing New Vulnerabilities of Error Handling Mechanism in CAN
K Serag, R Bhatia, V Kumar, ZB Celik, D Xu
30th USENIX Security Symposium, 2021
172021
Direct anonymous attestation with efficient verifier-local revocation for subscription system
V Kumar, H Li, N Luther, P Asokan, JMJ Park, K Bian, MBH Weiss, T Znati
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
13*2018
Cumulative Message Authentication Codes for Resource-Constrained IoT Networks
H Li, V Kumar, JM Park, Y Yang
IEEE Internet of Things Journal 8 (15), 11847-11859, 2021
112021
Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters
V Kumar, H Li, JMJ Park, K Bian
2018 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2018
112018
Cumulative message authentication codes for resource-constrained networks
H Li, V Kumar, JMJ Park, Y Yang
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
92020
Group signatures with probabilistic revocation
J Park, V Kumar
US Patent 10,326,602, 2019
92019
Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing
V Kumar, H Li, JMJ Park, K Bian
IEEE Transactions on Cognitive Communications and Networking 5 (3), 625-636, 2019
92019
Achievable secrecy sum-rate in a fading MAC-WT with power control and without CSI of eavesdropper
SM Shah, V Kumar, V Sharma
Signal Processing and Communications (SPCOM), 2012 International Conference …, 2012
82012
Transmitter authentication using hierarchical modulation in dynamic spectrum sharing
V Kumar, JMJ Park, K Bian
Journal of Network and Computer Applications 91, 52-60, 2017
72017
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20