关注
Andrei Gurtov
Andrei Gurtov
Professor, Linköping university
在 acm.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
The NewReno modification to TCP's fast recovery algorithm
S Floyd, T Henderson, A Gurtov
21972004
Security in software defined networks: A survey
I Ahmad, S Namal, M Ylianttila, A Gurtov
IEEE Communications Surveys & Tutorials 17 (4), 2317-2346, 2015
5502015
Rfc3782: The newreno modification to tcp's fast recovery algorithm
S Floyd, T Henderson, A Gurtov
RFC Editor, 2004
548*2004
Overview of 5G security challenges and solutions
I Ahmad, T Kumar, M Liyanage, J Okwuibe, M Ylianttila, A Gurtov
IEEE Communications Standards Magazine 2 (1), 36-43, 2018
3892018
Security for 5G and beyond
I Ahmad, S Shahabuddin, T Kumar, J Okwuibe, A Gurtov, M Ylianttila
IEEE Communications Surveys & Tutorials 21 (4), 3682-3722, 2019
2872019
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014
2622014
TCP over second (2.5 G) and third (3G) generation wireless networks
H Inamura, G Montenegro, R Ludwig, A Gurtov, F Khafizov
2302003
The quest for privacy in the internet of things
P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos
IEEE Cloud Computing 3 (2), 36-45, 2016
2202016
Lightweight and secure session-key establishment scheme in smart home environments
P Kumar, A Gurtov, J Iinatti, M Ylianttila, M Sain
IEEE Sensors Journal 16 (1), 254-264, 2015
1932015
Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks
P Nikander, A Gurtov, TR Henderson
IEEE Communications Surveys & Tutorials 12 (2), 186-204, 2010
1892010
Modeling wireless links for transport protocols
A Gurtov, S Floyd
ACM SIGCOMM Computer Communication Review 34 (2), 85-96, 2004
1772004
5G security: Analysis of threats and solutions
I Ahmad, T Kumar, M Liyanage, J Okwuibe, M Ylianttila, A Gurtov
2017 IEEE Conference on Standards for Communications and Networking (CSCN …, 2017
1722017
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
International Journal of Distributed Sensor Networks 10 (7), 357430, 2014
1652014
Host identity protocol (HIP): towards the secure mobile internet
A Gurtov
John Wiley & Sons, 2008
1552008
Anonymous secure framework in connected smart home environments
P Kumar, A Braeken, A Gurtov, J Iinatti, PH Ha
IEEE transactions on information forensics and security 12 (4), 968-979, 2017
1472017
Responding to spurious timeouts in TCP
A Gurtov, R Ludwig
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
1402003
A comprehensive guide to 5G security
M Liyanage, I Ahmad, AB Abro, A Gurtov, M Ylianttila
John Wiley & Sons, 2018
1352018
The roadmap to 6G security and privacy
P Porambage, G Gür, DPM Osorio, M Liyanage, A Gurtov, M Ylianttila
IEEE Open Journal of the Communications Society 2, 1094-1122, 2021
1332021
Deployment of Smart Spaces in Internet of Things: Overview of the design challenges
DG Korzun, SI Balandin, AV Gurtov
Conference on Internet of Things and Smart Spaces, 48-59, 2013
1262013
Seawind: a Wireless Network Emulator.
M Kojo, AV Gurtov, J Manner, P Sarolahti, TO Alanko, KEE Raatikainen
MMB, 151-166, 2001
1232001
系统目前无法执行此操作,请稍后再试。
文章 1–20