Radio-telepathy: extracting a secret key from an unauthenticated wireless channel S Mathur, W Trappe, N Mandayam, C Ye, A Reznik Proceedings of the 14th ACM international conference on Mobile computing and …, 2008 | 920 | 2008 |
Information-theoretically secret key generation for fading wireless channels C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010 | 503 | 2010 |
Mobile edge cloud system: Architectures, challenges, and approaches H Liu, F Eldarrat, H Alqahtani, A Reznik, X De Foy, Y Zhang IEEE Systems Journal 12 (3), 2495-2508, 2017 | 238 | 2017 |
Extracting secrecy from jointly Gaussian random variables C Ye, A Reznik, Y Shah 2006 IEEE International Symposium on Information Theory, 2593-2597, 2006 | 225 | 2006 |
Degraded Gaussian multirelay channel: Capacity and optimal power allocation A Reznik, SR Kulkarni, S Verdú IEEE Transactions on Information Theory 50 (12), 3037-3046, 2004 | 177 | 2004 |
Developing a standard for TV white space coexistence: Technical challenges and solution approaches T Baykas, M Kasslin, M Cummings, H Kang, J Kwak, R Paine, A Reznik, ... IEEE Wireless Communications 19 (1), 10-22, 2012 | 174 | 2012 |
Developing software for multi-access edge computing D Sabella, V Sukhomlinov, L Trang, S Kekki, P Paglierani, R Rossbach, ... ETSI white paper 20, 1-38, 2019 | 155 | 2019 |
On the effective weights of pseudocodewords for codes defined on graphs with cycles GD Forney, R Koetter, FR Kschischang, A Reznik Codes, systems, and graphical models, 101-112, 2001 | 149 | 2001 |
Joint caching and pricing strategies for popular content in information centric networks M Hajimirsadeghi, NB Mandayam, A Reznik IEEE Journal on Selected Areas in Communications 35 (3), 654-667, 2017 | 128 | 2017 |
Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks] S Mathur, A Reznik, C Ye, R Mukherjee, A Rahman, Y Shah, W Trappe, ... IEEE Wireless Communications 17 (5), 63-70, 2010 | 114 | 2010 |
Distributed mobility management: a standards landscape JC Zuniga, CJ Bernardos, A De La Oliva, T Melia, R Costa, A Reznik IEEE Communications Magazine 51 (3), 80-87, 2013 | 109 | 2013 |
Secret key generation for a pairwise independent network model S Nitinawarat, C Ye, A Barg, P Narayan, A Reznik IEEE Transactions on Information Theory 56 (12), 6482-6489, 2010 | 100 | 2010 |
A transport protocol for content-centric networking with explicit congestion control F Zhang, Y Zhang, A Reznik, H Liu, C Qian, C Xu 2014 23rd international conference on computer communication and networks …, 2014 | 97 | 2014 |
On the secrecy capabilities of ITU channels C Ye, A Reznik, G Sternberg, Y Shah 2007 IEEE 66th Vehicular Technology Conference, 2030-2034, 2007 | 89 | 2007 |
Group secret key generation algorithms C Ye, A Reznik 2007 IEEE International Symposium on Information Theory, 2596-2600, 2007 | 70 | 2007 |
Multi-access edge computing: An overview of ETSI MEC ISG F Giust, X Costa-Perez, A Reznik IEEE 5G Tech Focus 1 (4), 4, 2017 | 67 | 2017 |
Cloud RAN and MEC: A perfect pairing A Reznik, LMC Murillo, F Fontes, C Turyagyenda, C Wehner, Z Zheng ETSI MEC, 2018 | 58 | 2018 |
PHY-authentication protocol for spoofing detection in wireless networks L Xiao, A Reznik, W Trappe, C Ye, Y Shah, L Greenstein, N Mandayam 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 57 | 2010 |
Capacity and optimal resource allocation in the degraded Gaussian relay channel with multiple relays A Reznik, SR Kulkarni, S Verdú PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND …, 2002 | 55 | 2002 |
Broadcast-relay channel: capacity region bounds A Reznik, SR Kulkarni, S Verdú Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 …, 2005 | 47 | 2005 |