On the effectiveness of secret key extraction from wireless signal strength in real environments S Jana, SN Premnath, M Clark, SK Kasera, N Patwari, SV Krishnamurthy Proceedings of the 15th annual international conference on Mobile computing …, 2009 | 641 | 2009 |
Secret key extraction from wireless signal strength in real environments SN Premnath, S Jana, J Croft, PL Gowda, M Clark, SK Kasera, N Patwari, ... IEEE Transactions on mobile Computing 12 (5), 917-930, 2012 | 353 | 2012 |
Security and privacy in the internet-of-things under time-and-budget-limited adversary model SN Premnath, ZJ Haas IEEE Wireless Communications Letters 4 (3), 277-280, 2015 | 54 | 2015 |
Secret key extraction using Bluetooth wireless signal strength measurements SN Premnath, PL Gowda, SK Kasera, N Patwari, R Ricci 2014 Eleventh Annual IEEE International Conference on Sensing, Communication …, 2014 | 52 | 2014 |
Beyond OFDM: Best-effort dynamic spectrum access using filterbank multicarrier SN Premnath, D Wasden, SK Kasera, N Patwari, B Farhang-Boroujeny IEEE/ACM Transactions on Networking 21 (3), 869-882, 2012 | 49 | 2012 |
Efficient high-rate secret key extraction in wireless sensor networks using collaboration SN Premnath, J Croft, N Patwari, SK Kasera ACM Transactions on Sensor Networks (TOSN) 11 (1), 2014 | 35 | 2014 |
Method And Devices For Non-Intrusive Malware Detection For The Internet Of Things (IOT) SN Premnath, SM Das, R Gupta US Patent App. 14/924,763, 2017 | 34 | 2017 |
System and method for a practical, secure and verifiable cloud computing for mobile systems SN Premnath, ZJ Haas US Patent 9,736,128, 2017 | 21 | 2017 |
Detecting media access control (MAC) address spoofing in a wi-fi network using channel correlation SN Premnath, SA Ahmadzadeh, SM Das US Patent 10,979,906, 2021 | 15 | 2021 |
A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems SN Premnath, ZJ Haas MobiSPC 2014, Eleventh International Conference on Mobile Systems and …, 2014 | 13 | 2014 |
Methods and Systems for Intelligently Detecting Malware and Attacks on Client Computing Devices and Corporate Networks SN Premnath, SM Das, R Gupta US Patent App. 15/135,855, 2017 | 10 | 2017 |
Battery-Draining-Denial-of-Service Attack on Bluetooth Devices SN Premnath, SK Kasera University of Utah, 2008 | 10 | 2008 |
Secret key extraction in mimo-like sensor networks using wireless signal strength SN Premnath, SK Kasera, N Patwari ACM SIGMOBILE Mobile Computing and Communications Review 14 (1), 7-9, 2010 | 9 | 2010 |
Wake lock aware system wide job scheduling for energy efficiency on mobile devices SN Premnath, SAK Gathala, SM Das US Patent 10,095,305, 2018 | 7 | 2018 |
Detecting A Rogue Access Point Using Network-Independent Machine Learning Models SN Premnath, SA Ahmadzadeh, SM Das US Patent App. 15/408,629, 2018 | 7 | 2018 |
Through-wall person localization using transceivers in motion P Hillyard, D Maas, S Premnath, N Patwari, S Kasera arXiv preprint arXiv:1511.06703, 2015 | 6 | 2015 |
Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation SN Premnath, Y Chen, SM Das, N Islam US Patent App. 15/240,721, 2018 | 5 | 2018 |
Replay attack protection with small state for use in secure group communication SN Premnath, V Kolesnikov US Patent 8,631,491, 2014 | 3 | 2014 |
Supporting Privacy of Computations in Mobile Big Data Systems SN Premnath, ZJ Haas Future Internet 8 (2), 2016 | 2 | 2016 |
Efficient dynamic spectrum access in vehicular networks using filterbank multicarrier SN Premnath, SK Kasera, B Farhang-Boroujeny, N Patwari Proceedings of the 1st International Conference on Wireless Technologies for …, 2011 | 1 | 2011 |