Networks Research Group
Networks Research Group
Tour
People
Project
Publications
News
Events
Contact
Cryptography
ApproxBC: Blockchain Design Alternatives for Approximation-Tolerant Resource-Constrained Applications
Blockchains are known to provide verifiable tamper-resistant trails of accepted transactions. This guarantee comes at the considerable …
Prasanna Karthik Vairam
,
Gargi Mitra
,
Chester Rebeiro
,
Byrav Ramamurthy
,
Kamakoti Veezhinathan
Cite
DOI
URL
Differentiated network services for data-intensive science using application-aware SDN
Data-intensive science projects rely on scalable, high-performance, fault-tolerant protocols for transferring large-volume data over a …
Deepak Nadig Anantha
,
Byrav Ramamurthy
,
Brian Bockelman
,
David Swanson
Cite
DOI
URL
Simplifying network management using Software Defined Networking and OpenFlow
As the complexity of deployments increases, network managers face two problems that we address in this paper. First, the deployment of …
Adrian Lara
,
Anisha Kolasani
,
Byrav Ramamurthy
Cite
DOI
URL
A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks
Dynamic conferencing refers to a scenario wherein any subset of users in a universe of users form a conference for sharing confidential …
Sarang Deshpande
,
Ajay Todimala
,
Ravi K Balachandran
,
Byrav Ramamurthy
,
Xukai Zou
,
N. v. Vinodchandran
Cite
DOI
URL
A survey of security issues in wireless sensor networks
Yong Wang
,
Garhan Attebury
,
Byrav Ramamurthy
Cite
URL
A balanced key tree approach for dynamic secure group communication
Logical key hierarchy (LKH) is a promising solution to handle group key distribution in secure group communication. Several recent …
G. Hao
,
N.V. Vinodchandran
,
Byrav Ramamurthy
,
X. Zou
Cite
DOI
URL
DGKD: distributed group key distribution with authentication capability
Group key management (GKM) is the most important issue in secure group communication (SGC). The existing GKM protocols fall into three …
P. Adusumilli
,
Xukai Zou
,
B. Ramamurthy
Cite
DOI
URL
CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks
As a result of the growing popularity of wireless networks, in particular ad hoc networks, security over such networks has become very …
R.K. Balachandran
,
B. Ramamurthy
,
Xukai Zou
,
N.V. Vinodchandran
Cite
DOI
URL
A GCD attack resistant CRTHACS for secure group communications
We propose an improved CRTHACS scheme for secure group communications. The scheme resists several GCD attacks which exist in the …
X. Zou
,
B. Ramamurthy
,
S.S. Magliveras
Cite
DOI
URL
Agent based intrusion detection and response system for wireless LANs
Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A …
M.K. Chirumamilla
,
B. Ramamurthy
Cite
DOI
URL
»
Cite
×