Sanjeev Setia
Sanjeev Setia
Department of Computer Science, George Mason University
Verified email at gmu.edu - Homepage
Title
Cited by
Cited by
Year
LEAP+ Efficient security mechanisms for large-scale distributed sensor networks
S Zhu, S Setia, S Jajodia
ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006
24942006
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
7682004
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
S Zhu, S Xu, S Setia, S Jajodia
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
4572003
Kronos: A scalable group re-keying approach for secure multicast
S Setia, S Koussih, S Jajodia, E Harder
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 215-228, 2000
3902000
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
S Zhu, S Xu, S Setia, S Jajodia
23rd International Conference on Distributed Computing Systems Workshops …, 2003
1882003
Secure data aggregation in wireless sensor networks
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 7 (3), 1040-1052, 2012
1692012
Efficient distributed detection of node replication attacks in sensor networks
B Zhu, VGK Addada, S Setia, S Jajodia, S Roy
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
1572007
Availability and utility of idle memory in workstation clusters
A Acharya, S Setia
Proceedings of the 1999 ACM SIGMETRICS international conference on …, 1999
1541999
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
S Zhu, S Setia, S Xu, S Jajodia
Journal of Computer Security 14 (4), 301-325, 2006
1422006
Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact
S Roy, M Conti, S Setia, S Jajodia
IEEE Transactions on Information Forensics and Security 9 (4), 681-694, 2014
1252014
Localized multicast: efficient and distributed replica detection in large-scale sensor networks
B Zhu, S Setia, S Jajodia, S Roy, L Wang
IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010
1242010
Performance analysis of job scheduling policies in parallel supercomputing environments
VK Naik, MS Squillante, SK Setia
Proceedings of the 1993 ACM/IEEE conference on Supercomputing, 824-833, 1993
1031993
A fault-tolerant algorithm for replicated data management
S Rangarajan, S Setia, SK Tripathi
IEEE Transactions on parallel and distributed systems 6 (12), 1271-1282, 1995
931995
CORD: Energy-efficient reliable bulk data dissemination in sensor networks
L Huang, S Setia
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 574-582, 2008
852008
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
ACM Transactions on Sensor Networks (TOSN) 3 (3), 14-es, 2007
782007
Attack-resilient hierarchical data aggregation in sensor networks
S Roy, S Setia, S Jajodia
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
672006
Securing MAODV: attacks and countermeasures.
S Roy, VGK Addada, S Setia, S Jajodia
SECON, 521-532, 2005
672005
A comparative performance analysis of reliable group rekey transport protocols for secure multicast
S Setia, S Zhu, S Jajodia
Performance Evaluation 49 (1-4), 21-41, 2002
652002
Dodo: A user-level system for exploiting idle memory in workstation clusters
S Koussih, A Acharya, S Setia
Proceedings. The Eighth International Symposium on High Performance …, 1999
631999
Performance optimizations for group key management schemes
S Zhu, S Setia, S Jajodia
23rd International Conference on Distributed Computing Systems, 2003 …, 2003
612003
The system can't perform the operation now. Try again later.
Articles 1–20