Search results for: Radha Poovendran
Automatica > 2018 > 95 > C > 446-454
IEEE Transactions on Power Systems > 2018 > 33 > 1 > 502 - 513
IEEE Control Systems > 2017 > 37 > 6 > 52 - 74
IEEE Transactions on Automatic Control > 2017 > 62 > 10 > 5055 - 5068
IEEE Transactions on Cognitive Communications and Networking > 2017 > 3 > 2 > 242 - 254
IEEE/ACM Transactions on Networking > 2017 > 25 > 2 > 1206 - 1219
2016 IEEE 55th Conference on Decision and Control (CDC) > 4122 - 4129
2016 IEEE 55th Conference on Decision and Control (CDC) > 2587 - 2594
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Cryptanalysis – II > 102-115
Lecture Notes in Computer Science > Information and Communications Security > Session 2A. Authentication > 186-202
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Symmetric Key Cryptography > 292-310
Lecture Notes in Computer Science > Selected Areas in Cryptography > Security Protocols and Applications > 101-116
Lecture Notes in Computer Science > Decision and Game Theory for Security > Security and Trust in Social Networks > 151-162