Aravind Iyer
Aravind Iyer
Samsung, General Motors, Purdue, IIT Bombay
Verified email at
Cited by
Cited by
What is the right model for wireless channel interference?
A Iyer, C Rosenberg, A Karnik
Proceedings of the 3rd international conference on Quality of service in …, 2006
An address-light, integrated MAC and routing protocol for wireless sensor networks
S Kulkarni, A Iyer, C Rosenberg
IEEE/ACM Transactions on networking 14 (4), 793-806, 2006
Threat mitigation in a vehicle-to-vehicle communication network
BR Bellur, D Bhattacharya, AV Iyer
US Patent 8,819,414, 2014
Flooding-resilient broadcast authentication for vanets
HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the 17th annual international conference on Mobile computing …, 2011
Throughput-optimal configuration of fixed wireless networks
A Karnik, A Iyer, C Rosenberg
IEEE/ACM Transactions On Networking 16 (5), 1161-1174, 2008
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
Electronic device using framework interface for communication
KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ...
US Patent App. 14/281,355, 2014
Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks
BR Bellur, AV Iyer, D Bhattacharya
US Patent 8,904,183, 2014
Throughput-lifetime trade-offs in multihop wireless networks under an SINR-based interference model
J Luo, A Iyer, C Rosenberg
IEEE Transactions on Mobile Computing 10 (3), 419-433, 2010
Secure V2V communications: Performance impact of computational overheads
A Iyer, A Kherani, A Rao, A Karnik
IEEE INFOCOM Workshops 2008, 1-6, 2008
A taxonomy-based approach to design of large-scale sensor networks
A Iyer, SS Kulkarni, V Mhatre, CP Rosenberg
Wireless Sensor Networks and Applications, 3-33, 2008
Batch verification of ECDSA signatures
S Karati, A Das, D Roychowdhury, B Bellur, D Bhattacharya, A Iyer
Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012
Understanding the key performance issues with MAC protocols for multi‐hop wireless networks
A Iyer, C Rosenberg
Wireless Communications and Mobile Computing 6 (6), 745-760, 2006
Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
AV Iyer, D Bhattacharya
US Patent 8,452,969, 2013
Lightweight geographic trajectory authentication via one-time signatures
BR Bellur, AV Iyer
US Patent App. 12/413,741, 2009
Design of high throughput scheduled mesh networks: A case for directional antennas
SN Muthaiah, A Iyer, A Karnik, C Rosenberg
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 5080-5085, 2007
Framework for packet processing for secure V2V applications on resource-constrained platforms
AV Iyer, AR Karnik, BR Bellur
US Patent 8,704,679, 2014
Method for efficient message verification on resource-constrained platforms for real-time tracking applications
AR Karnik, AV Iyer, BR Bellur
US Patent 9,106,611, 2015
Electronic device using logical channels for communication
KS Cho, A Iyer, M Anjanappa, RK Patro, PTSHV Vadlapudi, SH Seo, ...
US Patent App. 14/281,206, 2014
Active queue management using adaptive RED
R Verma, A Iyer, A Karandikar
Journal of Communications and Networks 5 (3), 275-281, 2003
The system can't perform the operation now. Try again later.
Articles 1–20