According to our database1, Rajan Shankaran authored at least 40 papers between 1997 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Joint Power Control and Resource Allocation Mode Selection for Safety-Related V2X Communication.
IEEE Trans. Vehicular Technology, 2019
Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices.
IEEE J. Biomedical and Health Informatics, 2019
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations.
IEEE Access, 2019
Resource Allocation for Underlay D2D Communication With Proportional Fairness.
IEEE Trans. Vehicular Technology, 2018
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018
Joint Autonomous Resource Selection and Scheduled Resource Allocation for D2D-Based V2X Communication.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Joint Distributed and Centralized Resource Scheduling for D2D-Based V2X Communication.
Proceedings of the IEEE Global Communications Conference, 2018
Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks.
IEEE J. Biomedical and Health Informatics, 2017
Joint mode selection and proportional fair scheduling for D2D communication.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
Classifying high dimensional data by interactive visual analysis.
J. Vis. Lang. Comput., 2016
Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016
Special issue on trust and security in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2015
Encryption for Implantable Medical Devices Using Modified One-Time Pads.
IEEE Access, 2015
A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015
An Improved Binary Sequence Generation for Securing Wireless Body Area Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014
Securing wireless medical implants using an ECG-based secret data sharing scheme.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
A non-key based security scheme supporting emergency treatment of wireless implants.
Proceedings of the IEEE International Conference on Communications, 2014
A Visual Approach for Classification Based on Data Projection.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012
Interactive Visual Classification of Multivariate Data.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012
A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
A trust management architecture for hierarchical wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Critical Issues in Trust Management for Mobile Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009
Securing Session Initiation Protocol in Voice over IP Domain.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Security for cluster based ad hoc networks.
Computer Communications, 2004
Securing the Ad-Hoc On-demand Distance Vector Protocol.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
A secure multicast support framework for Mobile IP.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002
Secure Distributed Location Management Scheme for Mobile Hosts.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001
A Distributed Location Management Scheme for Mobile Hosts.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001
Integrating Network Services for Virtual Teams.
Proceedings of the ICEIS 2001, 2001
On the design of secure ATM networks.
Computer Communications, 1999
Secure Multicast Extensions for Mobile Networks.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999
Secure Signaling and Access Control for ATM Networks.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
Security services and public key infrastructure for ATM networks.
Proceedings of the 22nd IEEE Conference on Local Computer Networks (LCN '97), 1997
Security Issues in Asynchronous Transfer Mode.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997