T. Charles Clancy

According to our database1, T. Charles Clancy authored at least 194 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Deep Learning for Wireless Communications.
Proceedings of the Development and Analysis of Deep Learning Architectures, 2020

Resilient intrusion detection system for cloud containers.
Int. J. Commun. Networks Distributed Syst., 2020

Deep Learning for Wireless Communications.
CoRR, 2020

2019
An Optimal Strategy for Determining True Bidding Values in Secure Spectrum Auctions.
IEEE Syst. J., 2019

A Delay Optimal Multiclass Packet Scheduler for General M2M Uplink.
IEEE Syst. J., 2019

Intelligent Knowledge Distribution: Constrained-Action POMDPs for Resource-Aware Multi-Agent Communication.
CoRR, 2019

Post-quantum cryptography and 5G security: tutorial.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

An Auction-Based Resource Leasing Mechanism for Under-Utilized Spectrum: Invited Paper.
Proceedings of the 2019 International Conference on Wireless Networks and Mobile Communications, 2019

Application-Aware Resource Allocation based on Channel Information for Cellular Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Performance Trade-offs in IoT Uplink Networks under Secrecy Constraints.
Proceedings of the 30th IEEE International Symposium on Personal, 2019

2018
Robust Resource Allocation With Joint Carrier Aggregation in Multi-Carrier Cellular Networks.
IEEE Trans. Cogn. Commun. Netw., 2018

Antifragile Communications.
IEEE Syst. J., 2018

Over-the-Air Deep Learning Based Radio Signal Classification.
IEEE J. Sel. Top. Signal Process., 2018

So you want to be an elite hacker? finding your career in cyber operations.
XRDS, 2018

Analysis of Pilot-Spoofing Attack in MISO-OFDM System Over Correlated Fading Channel.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Constrained-Action POMDPs for Multi-Agent Intelligent Knowledge Distribution.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

Learning a Physical Layer Scheme for the MIMO Interference Channel.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Jammer Blind Estimation of a Third-Party OFDM Channel.
Proceedings of the IEEE Global Communications Conference, 2018

Novel anomaly detection and classification schemes for Machine-to-Machine uplink.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
Flow Optimization in Data Centers With Clos Networks in Support of Cloud Applications.
IEEE Trans. Netw. Serv. Manag., 2017

Application-Aware Resource Allocation of Hybrid Traffic in Cellular Networks.
IEEE Trans. Cogn. Commun. Netw., 2017

On the Latency and Energy Efficiency of Distributed Storage Systems.
IEEE Trans. Cloud Comput., 2017

Spectral Coexistence of MIMO Radar and MIMO Cellular System.
IEEE Trans. Aerosp. Electron. Syst., 2017

FSK-Based Reactive Jammer Piggybacking.
IEEE Commun. Lett., 2017

Learning Approximate Neural Estimators for Wireless Channel State Information.
CoRR, 2017

Deep Learning Based MIMO Communications.
CoRR, 2017

Learning approximate neural estimators for wireless channel state information.
Proceedings of the 27th IEEE International Workshop on Machine Learning for Signal Processing, 2017

Secure power scheduling auction for smart grids using homomorphic encryption.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

Physical layer deep learning of encodings for the MIMO fading channel.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

Learning robust general radio signal detection using computer vision methods.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Equalization attacks against OFDM: analysis and countermeasures.
Wirel. Commun. Mob. Comput., 2016

Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security.
Wirel. Commun. Mob. Comput., 2016

The BER analysis of OFDMA and SC-FDMA under pilot-assisted channel estimation and pilot jamming in rayleigh slow-fading channel.
Wirel. Commun. Mob. Comput., 2016

Toward Optimal Secure Distributed Storage Systems With Exact Repair.
IEEE Trans. Inf. Theory, 2016

Radar interference into LTE base stations in the 3.5 GHz band.
Phys. Commun., 2016

A Communications Jamming Taxonomy.
IEEE Secur. Priv., 2016

Towards an Application-Aware Resource Scheduling With Carrier Aggregation in Cellular Systems.
IEEE Commun. Lett., 2016

A Survey of Automatic Protocol Reverse Engineering Tools.
ACM Comput. Surv., 2016

Semi-Supervised Radio Signal Identification.
CoRR, 2016

A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem.
CoRR, 2016

Recurrent Neural Radio Anomaly Detection.
CoRR, 2016

Deep Reinforcement Learning Radio Control and Signal Detection with KeRLym, a Gym RL Agent.
CoRR, 2016

A Delay Optimal MAC and Packet Scheduler for Heterogeneous M2M Uplink.
CoRR, 2016

An Online Delay Efficient Multi-Class Packet Scheduler for Heterogeneous M2M Uplink Traffic.
CoRR, 2016

Optimal power allocation for LTE users with different modulations.
Proceedings of the Annual IEEE Systems Conference, 2016

An application-aware spectrum sharing approach for commercial use of 3.5 GHz spectrum.
Proceedings of the Annual IEEE Systems Conference, 2016

An online delay efficient packet scheduler for M2M traffic in industrial automation.
Proceedings of the Annual IEEE Systems Conference, 2016

Application-aware resource block and power allocation for LTE.
Proceedings of the Annual IEEE Systems Conference, 2016

Position estimation of robotic mobile nodes in wireless testbed using GENI.
Proceedings of the Annual IEEE Systems Conference, 2016

Unsupervised representation learning of structured radio communication signals.
Proceedings of the First International Workshop on Sensing, 2016

Resource management with anti-jamming capability for cognitive space communication systems.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A Hidden Markov Model approach for automatic closed protocol hop synchronization.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Reactive jammer piggybacking: Achieving antifragile electronic warfare.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A delay efficient multiclass packet scheduler for heterogeneous M2M uplink.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A delay-optimal packet scheduler for M2M uplink.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Learning to communicate: Channel auto-encoders, domain specific regularizers, and attention.
Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology, 2016

An optimal resource allocation with frequency reuse in cellular networks.
Proceedings of the 2016 International Conference on Computing, 2016

Optimal context-aware resource allocation in cellular networks.
Proceedings of the 2016 International Conference on Computing, 2016

Network MIMO with partial cooperation between radar and cellular systems.
Proceedings of the 2016 International Conference on Computing, 2016

A Delay Efficient MAC and Packet Scheduler for Heterogeneous M2M Uplink.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Convolutional Radio Modulation Recognition Networks.
Proceedings of the Engineering Applications of Neural Networks, 2016

Layered caching for heterogeneous storage.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

Radio transformer networks: Attention models for learning to synchronize in wireless systems.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
Dynamic Resource Allocation for Cooperative Spectrum Sharing in LTE Networks.
IEEE Trans. Veh. Technol., 2015

Fundamental Limits of Caching With Secure Delivery.
IEEE Trans. Inf. Forensics Secur., 2015

A Multitier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions.
IEEE Trans. Cogn. Commun. Netw., 2015

QPSK waveform for MIMO radar with spectrum sharing constraints.
Phys. Commun., 2015

Optimal downlink power allocation in cellular networks.
Phys. Commun., 2015

An Efficient Multi-carrier Resource Allocation with User Discrimination Framework for 5G Wireless Systems.
Int. J. Wirel. Inf. Networks, 2015

On singularity attacks in MIMO channels.
Trans. Emerg. Telecommun. Technol., 2015

Radar Precoder Design for Spectral Coexistence with Coordinated Multi-point (CoMP) System.
CoRR, 2015

Coexistence Analysis between Radar and Cellular System in LoS Channel.
CoRR, 2015

3D Channel Modeling between Seaborne MIMO Radar and MIMO Cellular System.
CoRR, 2015

Channel Modeling between Seaborne MIMO Radar and MIMO Cellular System.
CoRR, 2015

A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions.
CoRR, 2015

PHY-Layer Resiliency in OFDM Communications: A Tutorial.
IEEE Commun. Surv. Tutorials, 2015

A price selective centralized algorithm for resource allocation with carrier aggregation in LTE cellular networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Overlapped-MIMO radar waveform design for coexistence with communication systems.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Radar inband and out-of-band interference into LTE macro and small cell uplinks in the 3.5 GHz band.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Spectrum Sharing Approach between Radar and Communication Systems and Its Impact on Radar's Detectable Target Parameters.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Intrusion Detection System for Applications Using Linux Containers.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Load balancing in data center networks with folded-Clos architectures.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Emulated CP jamming and nulling attacks on SC-FDMA and two novel countermeasures.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Improved approximation of storage-rate tradeoff for caching via new outer bounds.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Radar in-band interference effects on macrocell LTE uplink deployments in the U.S. 3.5 GHz band.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

A utility proportional fairness radio resource block allocation in cellular networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Implementing an optimal rate allocation tuned to the user quality of experience.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

An optimal application-aware resource block scheduling in LTE.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

An optimal resource allocation with joint carrier aggregation in 4G-LTE.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Recognizing FM, BPSK and 16-QAM using supervised and unsupervised learning techniques.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014
Retroactive Antijamming for MISO Broadcast Channels.
IEEE Trans. Inf. Theory, 2014

Security and Enforcement in Spectrum Sharing.
Proc. IEEE, 2014

Impact of Radar and Communication Coexistence on Radar's Detectable Target Parameters.
CoRR, 2014

On the Latency of Erasure-Coded Cloud Storage Systems.
CoRR, 2014

Target Detection Performance of Spectrum Sharing MIMO Radars.
CoRR, 2014

On The Impact of Time-Varying Interference-Channel on the Spatial Approach of Spectrum Sharing between S-band Radar and Communication System.
CoRR, 2014

Radar In-Band and Out-of-Band Interference into LTE Macro and Small Cell Uplinks in the 3.5 GHz Band.
CoRR, 2014

Implementing an Optimal Rate Allocation Tuned to the User Quality of Experience.
CoRR, 2014

A Utility Proportional Fairness Resource Allocation in Spectrally Radar-Coexistent Cellular Networks.
CoRR, 2014

Optimal Radio Resource Allocation for Hybrid Traffic in Cellular Networks: Traffic Analysis and Implementation.
CoRR, 2014

Optimal Radio Resource Allocation for Hybrid Traffic in Cellular Networks: Centralized and Distributed Architecture.
CoRR, 2014

Context-Aware Resource Allocation in Cellular Networks.
CoRR, 2014

Accelerating 5G QoE via public-private spectrum sharing.
IEEE Commun. Mag., 2014

A mathematical analysis of cellular interference on the performance of S-band military radar systems.
Proceedings of the 2014 Wireless Telecommunications Symposium, 2014

A hidden Markov model detection of malicious Android applications at runtime.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014

Secure caching with non-uniform demands.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Secure and Tamper Proof Code Management.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Multi-application resource allocation with users discrimination in cellular networks.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Distributed storage systems with secure and exact repair - New results.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014

Learning distributed caching strategies in small cell networks.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

Decentralized caching with secure delivery.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Spectrum sharing between public safety and commercial users in 4G-LTE.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

PHY-layer authentication using hierarchical modulation and duobinary signaling.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Beampattern analysis for MIMO radar and telecommunication system coexistence.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

A utility proportional fairness approach for resource allocation in 4G-LTE.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

On secure distributed storage systems with exact repair.
Proceedings of the IEEE International Conference on Communications, 2014

The closed-form BER expressions of PSK modulation for OFDM and SC-FDMA under jamming and imperfect channel estimation.
Proceedings of the IEEE International Conference on Communications, 2014

A machine learning approach for dynamic spectrum access radio identification.
Proceedings of the IEEE Global Communications Conference, 2014

On the latency of heterogeneous MDS queue.
Proceedings of the IEEE Global Communications Conference, 2014

Resource allocation with carrier aggregation in LTE Advanced cellular system sharing spectrum with S-band radar.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2014

MIMO radar waveform design for coexistence with cellular systems.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2014

Spectrum sharing between S-band radar and LTE cellular system: A spatial approach.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2014

Demonstrated LLC-layer attack and defense strategies for wireless communication systems.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Measuring smart jammer strategy efficacy over the air.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Integration of Dataflow-Based Heterogeneous Multiprocessor Scheduling Techniques in GNU Radio.
J. Signal Process. Syst., 2013

Towards Optimal Secure Distributed Storage Systems with Exact Repair.
CoRR, 2013

Retroactive Anti-Jamming for MISO Broadcast Channels.
CoRR, 2013

Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity.
CoRR, 2013

Protecting physical layer synchronization: mitigating attacks against OFDM acquisition.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

A robust optimal rate allocation algorithm and pricing policy for hybrid traffic in 4G-LTE.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

A resource allocation algorithm for users with multiple applications in 4G-LTE.
Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband, 2013

Utility Proportional Fairness Resource Allocation with Carrier Aggregation in 4G-LTE.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Security Challenges with LTE-Advanced Systems and Military Spectrum.
Proceedings of the 32th IEEE Military Communications Conference, 2013

A neural network approach to category validation of Android applications.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Performance impact of asynchronous off-tone jamming attacks against OFDM.
Proceedings of IEEE International Conference on Communications, 2013

Fine-grained end-to-end network model via vector quantization and hidden Markov processes.
Proceedings of IEEE International Conference on Communications, 2013

Phase warping and differential scrambling attacks against OFDM frequency synchronization.
Proceedings of the IEEE International Conference on Acoustics, 2013

Jamming countermeasures for multi-user MISO broadcast channels - a DoF perspective.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Vulnerability of LTE to hostile interference.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

PHY-layer authentication by introducing controlled inter symbol interference.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Performance impact of pilot tone randomization to mitigate OFDM jamming attacks.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

Interference alignment for MISO broadcast channels under jamming attacks.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Channel-Binding Support for Extensible Authentication Protocol (EAP) Methods.
RFC, July, 2012

Anti-Jamming Games in Multi-Channel Cognitive Radio Networks.
IEEE J. Sel. Areas Commun., 2012

Development of an open-source GSM femtocell and integrated core infrastructure.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Jamming attacks against OFDM timing synchronization and signal acquisition.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Student-t Based Robust Spatio-temporal Prediction.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Efficient jamming attacks on MIMO channels.
Proceedings of IEEE International Conference on Communications, 2012

Performance of pilot jamming on MIMO channels with imperfect synchronization.
Proceedings of IEEE International Conference on Communications, 2012

A projection based approach for radar and telecommunication systems coexistence.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems.
IEEE Trans. Wirel. Commun., 2011

Best-Effort Cooperative Relaying.
IEEE Trans. Wirel. Commun., 2011

Robust Signal Classification Using Unsupervised Learning.
IEEE Trans. Wirel. Commun., 2011

Extrinsic Channel-Like Fingerprinting Overlays Using Subspace Embedding.
IEEE Trans. Inf. Forensics Secur., 2011

An Anti-Jamming Stochastic Game for Cognitive Radio Networks.
IEEE J. Sel. Areas Commun., 2011

Vectorization and mapping of software defined radio applications on heterogeneous multi-processor platforms.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2011

Applying graphics processor acceleration in a software defined radio prototyping environment.
Proceedings of the 22nd IEEE International Symposium on Rapid System Prototyping, 2011

Preemption, fairness, and security dynamics in heterogeneous DSA environments.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Efficient OFDM Denial: Pilot Jamming and Pilot Nulling.
Proceedings of IEEE International Conference on Communications, 2011

An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Physical-layer security challenges of DSA-enabled TD-LTE.
Proceedings of the CogART 2011, 2011

2010
Evolutionary cooperative spectrum sensing game: how to collaborate?
IEEE Trans. Commun., 2010

Best-effort cooperative communication without dedicated relays.
Proceedings of the IEEE International Conference on Acoustics, 2010

Case Study: Security Analysis of a Dynamic Spectrum Access Radio System.
Proceedings of the Global Communications Conference, 2010

Authenticating MIMO Transmissions Using Channel-Like Fingerprinting.
Proceedings of the Global Communications Conference, 2010

2009
Control And Provisioning of Wireless Access Points (CAPWAP) Threat Analysis for IEEE 802.11 Deployments.
RFC, March, 2009

Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method.
RFC, February, 2009

Repeated open spectrum sharing game with cheat-proof strategies.
IEEE Trans. Wirel. Commun., 2009

Primary-prioritized Markov approach for dynamic spectrum allocation.
IEEE Trans. Wirel. Commun., 2009

A scalable collusion-resistant multi-winner cognitive spectrum auction game.
IEEE Trans. Commun., 2009

Dynamic spectrum access using the interference temperature model.
Ann. des Télécommunications, 2009

A demonstration of the meshtest wireless testbed.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Security threats to signal classifiers using self-organizing maps.
Proceedings of the 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2009

2008
Handover Key Management and Re-Authentication Problem Statement.
RFC, March, 2008

Secure handover in enterprise WLANs: capwap, hokey, and IEEE 802.11R.
IEEE Wirel. Commun., 2008

Game theoretical mechanism design methods.
IEEE Signal Process. Mag., 2008

A quantitative evaluation of the MeshTest wireless testbed.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

Delay-tolerant network experiments on the meshtest wireless testbed.
Proceedings of the Third Workshop on Challenged Networks, CHANTS 2008, San Francisco, 2008

On secure communication over wireless erasure networks.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Channel Estimation and Adaptive M-QAM in Cognitive Radio Links.
Proceedings of IEEE International Conference on Communications, 2008

Collusion-Resistant Multi-Winner Spectrum Auction for Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Evolutionary Game Framework for Behavior Dynamics in Cooperative Spectrum Sensing.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Security in Cognitive Radio Networks: Threats and Mitigation.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

Adaption Overhead in Time-Varying Cognitive Radio Channels.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Formalizing the interference temperature model.
Wirel. Commun. Mob. Comput., 2007

Applications of Machine Learning to Cognitive Radio Networks.
IEEE Wirel. Commun., 2007

MeshTest: Laboratory-Based Wireless Testbed for Large Topologies.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Analysis of simple counting protocols for delay-tolerant networks.
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007

Achievable Capacity Under the Interference Temperature Model.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Extensible Authentication Protocol (EAP) Password Authenticated Exchange.
RFC, November, 2006

2004
Proactive key distribution using neighbor graphs.
IEEE Wirel. Commun., 2004

2002
Genus Two Hyperelliptic Curve Coprocessor.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002


  Loading...