Amiya Nayak
Cited by
Cited by
Decentralized access control with anonymous authentication of data stored in clouds
S Ruj, M Stojmenovic, A Nayak
IEEE transactions on parallel and distributed systems 25 (2), 384-394, 2013
DACC: Distributed access control in clouds
S Ruj, A Nayak, I Stojmenovic
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
Taxonomy and challenges of the integration of RFID and wireless sensor networks
H Liu, M Bolic, A Nayak, I Stojmenovic
IEEE network 22 (6), 26-35, 2008
A survey of communication protocols for automatic meter reading applications
T Khalifa, K Naik, A Nayak
IEEE communications surveys & tutorials 13 (2), 168-182, 2010
Privacy preserving access control with authentication for securing data in clouds
S Ruj, M Stojmenovic, A Nayak
2012 12th IEEE/ACM International symposium on cluster, cloud and grid …, 2012
Intersection-based geographical routing protocol for VANETs: A proposal and analysis
H Saleet, R Langar, K Naik, R Boutaba, A Nayak, N Goel
IEEE transactions on vehicular technology 60 (9), 4560-4574, 2011
Wireless sensor and actuator networks: algorithms and protocols for scalable coordination and data communication
A Nayak, I Stojmenovic
John Wiley & Sons, 2010
DL‐IDS: a deep learning–based intrusion detection framework for securing IoT
Y Otoum, D Liu, A Nayak
Transactions on Emerging Telecommunications Technologies 33 (3), e3803, 2022
On data-centric misbehavior detection in VANETs
S Ruj, MA Cavenaghi, Z Huang, A Nayak, I Stojmenovic
2011 IEEE Vehicular Technology Conference (VTC Fall), 1-5, 2011
Design guidelines for routing protocols in ad hoc and sensor networks with a realistic physical layer
I Stojmenovic, A Nayak, J Kuruvila
IEEE Communications Magazine 43 (3), 101-106, 2005
A decentralized security framework for data aggregation and access control in smart grids
S Ruj, A Nayak
IEEE transactions on smart grid 4 (1), 196-205, 2013
Hop count optimal position-based packet routing algorithms for ad hoc wireless networks with a realistic physical layer
J Kuruvila, A Nayak, I Stojmenovic
IEEE Journal on selected areas in communications 23 (6), 1267-1275, 2005
Byzantine-resilient secure software-defined networks with multiple controllers in cloud
H Li, P Li, S Guo, A Nayak
IEEE Transactions on Cloud Computing 2 (4), 436-447, 2014
A social network approach to trust management in VANETs
Z Huang, S Ruj, MA Cavenaghi, M Stojmenovic, A Nayak
Peer-to-peer networking and applications 7, 229-242, 2014
Anonymous and lightweight authentication for secure vehicular networks
B Ying, A Nayak
IEEE Transactions on Vehicular Technology 66 (12), 10626-10636, 2017
Fault-tolerant algorithms/protocols in wireless sensor networks
H Liu, A Nayak, I Stojmenović
Guide to wireless sensor networks, 261-291, 2009
Characterization of cascading failures in interdependent cyber-physical systems
Z Huang, C Wang, M Stojmenovic, A Nayak
IEEE Transactions on Computers 64 (8), 2158-2168, 2014
As-ids: Anomaly and signature based ids for the internet of things
Y Otoum, A Nayak
Journal of Network and Systems Management 29 (3), 23, 2021
DTSG: Dynamic time-stable geocast routing in vehicular ad hoc networks
H Rahbar, K Naik, A Nayak
2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc …, 2010
Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory
Z Huang, C Wang, S Ruj, M Stojmenovic, A Nayak
2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20