According to our database1, Yogendra Shah authored at least 21 papers between 2006 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Golay Code Based Bit Mismatch Mitigation for Wireless Channel Impulse Response Based Secrecy Generation.
IEEE Access, 2019
Dynamic Authorization for 5G Systems.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018
Certificate and signature free anonymity for V2V communications.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
Network slice selection, assignment and routing within 5G Networks.
Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking, 2016
Multi-factor Authentication as a Service.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015
Tree-formed verification data for trusted platforms.
Computers & Security, 2013
Seamless authentication across heterogeneous networks using Generic Bootstrapping systems.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Seamless authentication and mobility across heterogeneous networks using federated identity systems.
Proceedings of the IEEE International Conference on Communications, 2013
Smart OpenID: A Smart Card Based OpenID Protocol.
Proceedings of the Information Security and Privacy Research, 2012
Scalable Trust Assessment and Remediation of Wireless Devices.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
Exploiting the physical layer for enhanced security.
IEEE Wireless Commun., 2010
Information-theoretically secret key generation for fading wireless channels.
IEEE Trans. Information Forensics and Security, 2010
Trusted Platform Validation and Management.
Secure Operations on Tree-Formed Verification Data
Tree-formed Verification Data for Trusted Platforms
Trusted Computing enhanced OpenID.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
PHY-Authentication Protocol for Spoofing Detection in Wireless Networks.
Proceedings of the Global Communications Conference, 2010
Information-theoretically Secret Key Generation for Fading Wireless Channels
Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
On the Secrecy Capabilities of ITU Channels.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007
Extracting Secrecy from Jointly Gaussian Random Variables.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006