| 10057070 |
Secure access control to an embedded device through a networked computer |
Triveni Prabhu, Reshma Hanamantharaddi Neelaraddi, Niranjan Sathyanarayanarao Krishnarao |
2018-08-21 |
| 9965637 |
Method and device for activating functions of a control device |
Heiko Baur, Sriram Subramanian Neelakantan |
2018-05-08 |
| 9106640 |
Exploiting application characteristics for multiple-authenticator broadcast authentication schemes |
Arzad A. Kherani, Skanda N. Muthaiah |
2015-08-11 |
| 8904183 |
Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks |
Bhargav R. Bellur, Aravind V. Iyer |
2014-12-02 |
| 8819414 |
Threat mitigation in a vehicle-to-vehicle communication network |
Bhargav R. Bellur, Aravind V. Iyer |
2014-08-26 |
| 8799657 |
Method and system of reconstructing a secret code in a vehicle for performing secure operations |
Sugato Chakrabarty, Bhargav R. Bellur |
2014-08-05 |
| 8756430 |
Exploiting application characteristics for multiple-authenticator broadcast authentication schemes |
Arzad A. Kherani, Skanda N. Muthaiah |
2014-06-17 |
| 8627073 |
Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes |
Arzad A. Kherani, Skanda N. Muthaiah |
2014-01-07 |
| 8499155 |
Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period |
Arzad A. Kherani, Skanda N. Muthaiah |
2013-07-30 |
| 8452969 |
Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads |
Aravind V. Iyer |
2013-05-28 |
| 8386790 |
Method of using ECDSA with winternitz one time signature |
Arzad A. Kherani |
2013-02-26 |