Yogendra Shah

According to our database1, Yogendra Shah authored at least 24 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
High entropy secrecy generation from wireless CIR.
J. Commun. Networks, 2019

Golay Code Based Bit Mismatch Mitigation for Wireless Channel Impulse Response Based Secrecy Generation.
IEEE Access, 2019

2018
Dynamic Authorization for 5G Systems.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018

2017
Certificate and signature free anonymity for V2V communications.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

2016
Network slice selection, assignment and routing within 5G Networks.
Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking, 2016

2015
Multi-factor Authentication as a Service.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

2013
Evolution of trust systems from PCs to mobile devices: Building secured and trusted ecosystems.
IEEE Veh. Technol. Mag., 2013

Tree-formed verification data for trusted platforms.
Comput. Secur., 2013

Seamless authentication across heterogeneous networks using Generic Bootstrapping systems.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Seamless authentication and mobility across heterogeneous networks using federated identity systems.
Proceedings of the IEEE International Conference on Communications, 2013

2012
Smart OpenID: A Smart Card Based OpenID Protocol.
Proceedings of the Information Security and Privacy Research, 2012

Scalable Trust Assessment and Remediation of Wireless Devices.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

2011
Sender Scorecards.
IEEE Veh. Technol. Mag., 2011

2010
Exploiting the physical layer for enhanced security.
IEEE Wirel. Commun., 2010

Information-theoretically secret key generation for fading wireless channels.
IEEE Trans. Inf. Forensics Secur., 2010

Trusted Platform Validation and Management.
Int. J. Dependable Trust. Inf. Syst., 2010

Secure Operations on Tree-Formed Verification Data
CoRR, 2010

Tree-formed Verification Data for Trusted Platforms
CoRR, 2010

Trusted Computing enhanced OpenID.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

PHY-Authentication Protocol for Spoofing Detection in Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2009
Trust in M2M communication.
IEEE Veh. Technol. Mag., 2009

Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

2007
On the Secrecy Capabilities of ITU Channels.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

2006
Extracting Secrecy from Jointly Gaussian Random Variables.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006


  Loading...