Rajan Shankaran

According to our database1, Rajan Shankaran authored at least 40 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Joint Power Control and Resource Allocation Mode Selection for Safety-Related V2X Communication.
IEEE Trans. Vehicular Technology, 2019

Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices.
IEEE J. Biomedical and Health Informatics, 2019

Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations.
IEEE Access, 2019

2018
Resource Allocation for Underlay D2D Communication With Proportional Fairness.
IEEE Trans. Vehicular Technology, 2018

A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018

Joint Autonomous Resource Selection and Scheduled Resource Allocation for D2D-Based V2X Communication.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Joint Distributed and Centralized Resource Scheduling for D2D-Based V2X Communication.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks.
IEEE J. Biomedical and Health Informatics, 2017

Joint mode selection and proportional fair scheduling for D2D communication.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

2016
Classifying high dimensional data by interactive visual analysis.
J. Vis. Lang. Comput., 2016

Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

2015
Special issue on trust and security in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2015

Encryption for Implantable Medical Devices Using Modified One-Time Pads.
IEEE Access, 2015

A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

An Improved Binary Sequence Generation for Securing Wireless Body Area Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

2014
An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Securing wireless medical implants using an ECG-based secret data sharing scheme.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

A non-key based security scheme supporting emergency treatment of wireless implants.
Proceedings of the IEEE International Conference on Communications, 2014

2012
A Visual Approach for Classification Based on Data Projection.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

Interactive Visual Classification of Multivariate Data.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

2010
A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A trust management architecture for hierarchical wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Critical Issues in Trust Management for Mobile Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

Securing Session Initiation Protocol in Voice over IP Domain.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2004
Security for cluster based ad hoc networks.
Computer Communications, 2004

Securing the Ad-Hoc On-demand Distance Vector Protocol.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
A secure multicast support framework for Mobile IP.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

2002
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

2001
Secure Distributed Location Management Scheme for Mobile Hosts.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

A Distributed Location Management Scheme for Mobile Hosts.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

Integrating Network Services for Virtual Teams.
Proceedings of the ICEIS 2001, 2001

1999
On the design of secure ATM networks.
Computer Communications, 1999

Secure Multicast Extensions for Mobile Networks.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

1998
Secure Signaling and Access Control for ATM Networks.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
Security services and public key infrastructure for ATM networks.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997

Security Issues in Asynchronous Transfer Mode.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997


  Loading...