Sriram Nandha Premnath
Sriram Nandha Premnath
Verified email at
Cited by
Cited by
On the effectiveness of secret key extraction from wireless signal strength in real environments
S Jana, SN Premnath, M Clark, SK Kasera, N Patwari, SV Krishnamurthy
Proceedings of the 15th annual international conference on Mobile computing …, 2009
Secret key extraction from wireless signal strength in real environments
SN Premnath, S Jana, J Croft, PL Gowda, M Clark, SK Kasera, N Patwari, ...
IEEE Transactions on mobile Computing 12 (5), 917-930, 2012
Security and privacy in the internet-of-things under time-and-budget-limited adversary model
SN Premnath, ZJ Haas
IEEE Wireless Communications Letters 4 (3), 277-280, 2015
Beyond OFDM: Best-effort dynamic spectrum access using filterbank multicarrier
SN Premnath, D Wasden, SK Kasera, N Patwari, B Farhang-Boroujeny
IEEE/ACM Transactions on Networking 21 (3), 869-882, 2012
Secret key extraction using Bluetooth wireless signal strength measurements
SN Premnath, PL Gowda, SK Kasera, N Patwari, R Ricci
2014 Eleventh Annual IEEE International Conference on Sensing, Communication …, 2014
Efficient high-rate secret key extraction in wireless sensor networks using collaboration
SN Premnath, J Croft, N Patwari, SK Kasera
ACM Transactions on Sensor Networks (TOSN) 11 (1), 2014
A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems
SN Premnath, ZJ Haas
MobiSPC 2014, Eleventh International Conference on Mobile Systems and …, 2014
Method And Devices For Non-Intrusive Malware Detection For The Internet Of Things (IOT)
SN Premnath, SM Das, R Gupta
US Patent App. 14/924,763, 2017
Battery-Draining-Denial-of-Service Attack on Bluetooth Devices
SN Premnath, SK Kasera
University of Utah, 2008
Secret key extraction in mimo-like sensor networks using wireless signal strength
SN Premnath, SK Kasera, N Patwari
ACM SIGMOBILE Mobile Computing and Communications Review 14 (1), 7-9, 2010
System and method for a practical, secure and verifiable cloud computing for mobile systems
SN Premnath, ZJ Haas
US Patent 9,736,128, 2017
Methods and Systems for Intelligently Detecting Malware and Attacks on Client Computing Devices and Corporate Networks
SN Premnath, SM Das, R Gupta
US Patent App. 15/135,855, 2017
Through-wall person localization using transceivers in motion
P Hillyard, D Maas, S Premnath, N Patwari, S Kasera
arXiv preprint arXiv:1511.06703, 2015
Supporting Privacy of Computations in Mobile Big Data Systems
SN Premnath, ZJ Haas
Future Internet 8 (2), 2016
Detecting Media Access Control (MAC) Address Spoofing in a Wi-Fi Network Using Channel Correlation
SN Premnath, SA Ahmadzadeh, SM Das
US Patent App. 15/484,356, 2018
Detecting A Rogue Access Point Using Network-Independent Machine Learning Models
SN Premnath, SA Ahmadzadeh, SM Das
US Patent App. 15/408,629, 2018
Methods and Systems for Protecting Computing Devices from Non-Benign Software Applications via Collaborative Application Detonation
SN Premnath, Y Chen, SM Das, N Islam
US Patent App. 15/240,721, 2018
Replay attack protection with small state for use in secure group communication
SN Premnath, V Kolesnikov
US Patent 8,631,491, 2014
Efficient dynamic spectrum access in vehicular networks using filterbank multicarrier
SN Premnath, SK Kasera, B Farhang-Boroujeny, N Patwari
Proceedings of the 1st International Conference on Wireless Technologies for …, 2011
Network attack detection using multi-path verification
SA Ahmadzadeh, SM Das, Y Chen, SN Premnath
US Patent 10,447,717, 2019
The system can't perform the operation now. Try again later.
Articles 1–20