Alex Reznik
Alex Reznik
HPE
Verified email at hpe.com
Title
Cited by
Cited by
Year
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
S Mathur, W Trappe, N Mandayam, C Ye, A Reznik
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
7462008
Information-theoretically secret key generation for fading wireless channels
C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam
IEEE Transactions on Information Forensics and Security 5 (2), 240-254, 2010
4262010
Extracting secrecy from jointly Gaussian random variables
C Ye, A Reznik, Y Shah
2006 IEEE International Symposium on Information Theory, 2593-2597, 2006
1902006
Degraded Gaussian multirelay channel: Capacity and optimal power allocation
A Reznik, SR Kulkarni, S Verdú
IEEE Transactions on Information Theory 50 (12), 3037-3046, 2004
1702004
Mobile edge cloud system: Architectures, challenges, and approaches
H Liu, F Eldarrat, H Alqahtani, A Reznik, X De Foy, Y Zhang
IEEE Systems Journal 12 (3), 2495-2508, 2017
1602017
Developing a standard for TV white space coexistence: Technical challenges and solution approaches
T Baykas, M Kasslin, M Cummings, H Kang, J Kwak, R Paine, A Reznik, ...
IEEE Wireless Communications 19 (1), 10-22, 2012
1502012
On the effective weights of pseudocodewords for codes defined on graphs with cycles
GD Forney, R Koetter, FR Kschischang, A Reznik
Codes, systems, and graphical models, 101-112, 2001
1452001
Distributed mobility management: a standards landscape
JC Zuniga, CJ Bernardos, A De La Oliva, T Melia, R Costa, A Reznik
IEEE Communications Magazine 51 (3), 80-87, 2013
1052013
Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks]
S Mathur, A Reznik, C Ye, R Mukherjee, A Rahman, Y Shah, W Trappe, ...
IEEE Wireless Communications 17 (5), 63-70, 2010
942010
Joint caching and pricing strategies for popular content in information centric networks
M Hajimirsadeghi, NB Mandayam, A Reznik
IEEE Journal on Selected Areas in Communications 35 (3), 654-667, 2017
922017
Secret key generation for a pairwise independent network model
S Nitinawarat, C Ye, A Barg, P Narayan, A Reznik
IEEE Transactions on Information Theory 56 (12), 6482-6489, 2010
892010
A transport protocol for content-centric networking with explicit congestion control
F Zhang, Y Zhang, A Reznik, H Liu, C Qian, C Xu
2014 23rd international conference on computer communication and networks …, 2014
802014
Developing software for multi-access edge computing
D Sabella, V Sukhomlinov, L Trang, S Kekki, P Paglierani, R Rossbach, ...
ETSI white paper 20, 1-38, 2019
792019
On the secrecy capabilities of ITU channels
C Ye, A Reznik, G Sternberg, Y Shah
2007 IEEE 66th Vehicular Technology Conference, 2030-2034, 2007
782007
Group secret key generation algorithms
C Ye, A Reznik
2007 IEEE International Symposium on Information Theory, 2596-2600, 2007
592007
Capacity and optimal resource allocation in the degraded Gaussian relay channel with multiple relays
A Reznik, SR Kulkarni, S Verdú
PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND …, 2002
542002
Broadcast-relay channel: capacity region bounds
A Reznik, SR Kulkarni, S Verdú
Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 …, 2005
482005
PHY-authentication protocol for spoofing detection in wireless networks
L Xiao, A Reznik, W Trappe, C Ye, Y Shah, L Greenstein, N Mandayam
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
452010
A" Small World" Approach to Heterogeneous Networks
A Reznik, SR Kulkarni, S Verdu
Communications in Information & Systems 3 (4), 325-348, 2003
332003
Cloud RAN and MEC: A perfect pairing
A Reznik, LMC Murillo, Y Fang, W Featherstone, M Filippou, F Fontes, ...
ETSI White paper, 1-24, 2018
322018
The system can't perform the operation now. Try again later.
Articles 1–20