Syed Taha Ali
Title
Cited by
Cited by
Year
A Survey of Securing Networks Using Software Defined Networking
ST Ali, V Sivaraman, A Radford, S Jha
IEEE Transactions on Reliability, 2015
1502015
Zero reconciliation secret key generation for body-worn health monitoring devices
ST Ali, V Sivaraman, D Ostry
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
522012
Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices
ST Ali, V Sivaraman, D Ostry
IEEE Transactions on Mobile Computing, 2013
512013
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
ST Ali, V Sivaraman, D Ostry
Future Generation Computer Systems 35, 80-90, 2014
412014
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks
ST Ali, V Sivaraman, D Ostry
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International …, 2010
402010
Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion)
ST Ali
Cambridge International Workshop on Security Protocols, 294-306, 2015
362015
An overview of end-to-end verifiable voting systems
ST Ali, J Murray
Real-world electronic voting: Design, analysis and deployment 173, 2016
312016
ZombieCoin: powering next-generation botnets with bitcoin
ST Ali, P McCorry, PHJ Lee, F Hao
International Conference on Financial Cryptography and Data Security, 34-48, 2015
292015
Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints
ST Ali, V Sivaraman, D Ostry, S Jha, G Tsudik
IEEE Transactions on Information Forensics and Security, 2014
232014
Decorrelating secret bit extraction via channel hopping in body area networks
L Yao, ST Ali, V Sivaraman, D Ostry
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio …, 2012
232012
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
ST Ali, P McCorry, PHJ Lee, F Hao
International Journal of Information Security 17 (4), 411-422, 2018
212018
Securing data provenance in body area networks using lightweight wireless link fingerprints
ST Ali, V Sivaraman, D Ostry, S Jha
Proceedings of the 3rd international workshop on Trustworthy embedded …, 2013
152013
Improving secret key generation performance for on-body devices
L Yao, ST Ali, V Sivaraman, D Ostry
Proceedings of the 6th International Conference on Body Area Networks, 19-22, 2011
122011
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
ST Ali, V Sivaraman, A Dhamdhere, D Ostry
Ad Hoc Networks 8 (6), 668-679, 2010
122010
Greening Residential WiFi Networks under Centralized Control
V Sivaraman, J Matthews, C Russell, ST Ali, A Vishwanath
IEEE Transactions on Mobile Computing, 1-1, 0
12*
Secure lightweight context-driven data logging for bodyworn sensing devices
M Siddiqi, ST All, V Sivaraman
2017 5th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2017
82017
Authentication of lossy data in body-sensor networks for healthcare monitoring
ST Ali, V Sivaraman, D Ostry
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012
82012
The nuts and bolts of micropayments: a survey
ST Ali, D Clarke, P McCorry
arXiv preprint arXiv:1710.02964, 2017
62017
Securing networks using software defined networking: a survey
ST Ali, V Sivaraman, A Radford, S Jha
IEEE Transactions on Reliability 64 (3), 1-12, 2013
52013
Why preventing a cryptocurrency exchange heist isn’t good enough
P McCorry, M Möser, ST Ali
Cambridge International Workshop on Security Protocols, 225-233, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20