Follow
Andrei Gurtov
Andrei Gurtov
Professor, Linköping university
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
The NewReno modification to TCP's fast recovery algorithm
S Floyd, T Henderson, A Gurtov
21672004
Rfc3782: The newreno modification to tcp's fast recovery algorithm
S Floyd, T Henderson, A Gurtov
RFC Editor, 2004
512*2004
Security in software defined networks: A survey
I Ahmad, S Namal, M Ylianttila, A Gurtov
IEEE Communications Surveys & Tutorials 17 (4), 2317-2346, 2015
4942015
Overview of 5G security challenges and solutions
I Ahmad, T Kumar, M Liyanage, J Okwuibe, M Ylianttila, A Gurtov
IEEE Communications Standards Magazine 2 (1), 36-43, 2018
3382018
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014
2362014
Security for 5G and beyond
I Ahmad, S Shahabuddin, T Kumar, J Okwuibe, A Gurtov, M Ylianttila
IEEE Communications Surveys & Tutorials 21 (4), 3682-3722, 2019
2302019
TCP over second (2.5 G) and third (3G) generation wireless networks
H Inamura, G Montenegro, R Ludwig, A Gurtov, F Khafizov
2302003
The quest for privacy in the internet of things
P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos
IEEE Cloud Computing 3 (2), 36-45, 2016
2012016
Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks
P Nikander, A Gurtov, TR Henderson
IEEE communications surveys & tutorials 12 (2), 186-204, 2010
1862010
Lightweight and secure session-key establishment scheme in smart home environments
P Kumar, A Gurtov, J Iinatti, M Ylianttila, M Sain
IEEE Sensors Journal 16 (1), 254-264, 2015
1822015
Modeling wireless links for transport protocols
A Gurtov, S Floyd
ACM SIGCOMM Computer Communication Review 34 (2), 85-96, 2004
1792004
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
International Journal of Distributed Sensor Networks 10 (7), 357430, 2014
1532014
Host identity protocol (HIP): towards the secure mobile internet
A Gurtov
John Wiley & Sons, 2008
1532008
5G security: Analysis of threats and solutions
I Ahmad, T Kumar, M Liyanage, J Okwuibe, M Ylianttila, A Gurtov
2017 IEEE Conference on Standards for Communications and Networking (CSCN …, 2017
1492017
Responding to spurious timeouts in TCP
A Gurtov, R Ludwig
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
1382003
Anonymous secure framework in connected smart home environments
P Kumar, A Braeken, A Gurtov, J Iinatti, PH Ha
IEEE Transactions on Information Forensics and Security 12 (4), 968-979, 2017
1362017
Deployment of Smart Spaces in Internet of Things: Overview of the design challenges
DG Korzun, SI Balandin, AV Gurtov
Internet of Things, Smart Spaces, and Next Generation Networking, 48-59, 2013
1232013
A comprehensive guide to 5G security
M Liyanage, I Ahmad, AB Abro, A Gurtov, M Ylianttila
John Wiley & Sons, 2018
1212018
Seawind: a Wireless Network Emulator.
M Kojo, AV Gurtov, J Manner, P Sarolahti, TO Alanko, KEE Raatikainen
MMB, 151-166, 2001
1202001
Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
IEEE Access 3, 1503-1511, 2015
1192015
The system can't perform the operation now. Try again later.
Articles 1–20