Sriram Nandha Premnath
Sriram Nandha Premnath
Verified email at
Cited by
Cited by
On the effectiveness of secret key extraction from wireless signal strength in real environments
S Jana, SN Premnath, M Clark, SK Kasera, N Patwari, SV Krishnamurthy
Proceedings of the 15th annual international conference on Mobile computing …, 2009
Secret key extraction from wireless signal strength in real environments
SN Premnath, S Jana, J Croft, PL Gowda, M Clark, SK Kasera, N Patwari, ...
IEEE Transactions on mobile Computing 12 (5), 917-930, 2012
Security and privacy in the internet-of-things under time-and-budget-limited adversary model
SN Premnath, ZJ Haas
IEEE Wireless Communications Letters 4 (3), 277-280, 2015
Beyond OFDM: Best-effort dynamic spectrum access using filterbank multicarrier
SN Premnath, D Wasden, SK Kasera, N Patwari, B Farhang-Boroujeny
IEEE/ACM Transactions on Networking 21 (3), 869-882, 2012
Efficient high-rate secret key extraction in wireless sensor networks using collaboration
SN Premnath, J Croft, N Patwari, SK Kasera
ACM Transactions on Sensor Networks (TOSN) 11 (1), 2014
Secret key extraction using Bluetooth wireless signal strength measurements
SN Premnath, PL Gowda, SK Kasera, N Patwari, R Ricci
2014 Eleventh Annual IEEE International Conference on Sensing, Communication …, 2014
A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems
SN Premnath, ZJ Haas
MobiSPC 2014, Eleventh International Conference on Mobile Systems and …, 2014
Method And Devices For Non-Intrusive Malware Detection For The Internet Of Things (IOT)
SN Premnath, SM Das, R Gupta
US Patent App. 14/924,763, 2017
Battery-Draining-Denial-of-Service Attack on Bluetooth Devices
SN Premnath, SK Kasera
University of Utah, 2008
Secret key extraction in mimo-like sensor networks using wireless signal strength
SN Premnath, SK Kasera, N Patwari
ACM SIGMOBILE Mobile Computing and Communications Review 14 (1), 7-9, 2010
System and method for a practical, secure and verifiable cloud computing for mobile systems
SN Premnath, ZJ Haas
US Patent 9,736,128, 2017
Through-wall person localization using transceivers in motion
P Hillyard, D Maas, S Premnath, N Patwari, S Kasera
arXiv preprint arXiv:1511.06703, 2015
Methods and Systems for Intelligently Detecting Malware and Attacks on Client Computing Devices and Corporate Networks
SN Premnath, SM Das, R Gupta
US Patent App. 15/135,855, 2017
Supporting Privacy of Computations in Mobile Big Data Systems
SN Premnath, ZJ Haas
Future Internet 8 (2), 2016
Detecting A Rogue Access Point Using Network-Independent Machine Learning Models
SN Premnath, SA Ahmadzadeh, SM Das
US Patent App. 15/408,629, 2018
Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation
SN Premnath, Y Chen, SM Das, N Islam
US Patent App. 15/240,721, 2018
Replay attack protection with small state for use in secure group communication
SN Premnath, V Kolesnikov
US Patent 8,631,491, 2014
Efficient dynamic spectrum access in vehicular networks using filterbank multicarrier
SN Premnath, SK Kasera, B Farhang-Boroujeny, N Patwari
Proceedings of the 1st International Conference on Wireless Technologies for …, 2011
Network attack detection using multi-path verification
SA Ahmadzadeh, SM Das, Y Chen, SN Premnath
US Patent 10,447,717, 2019
Method To Detect A Summoning Attack By A Rogue WiFi Access Point
K Hart, SN Premnath, SP Mondal, D Sule, P Garg
US Patent App. 15/878,074, 2019
The system can't perform the operation now. Try again later.
Articles 1–20