default search action
Binod Vaidya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c55]Aaditya Suri, Binod Vaidya, Hussein T. Mouftah:
Assessment of Adversarial Attacks on Traffic Sign Detection for Connected and Autonomous Vehicles. CAMAD 2023: 240-245 - [c54]Abdul Mutallib Shaik, Binod Vaidya, Hussein T. Mouftah:
Edge cloud-enabled FIS-based Road Weather Management System for Connected and Autonomous Vehicles. IWCMC 2023: 444-449 - [c53]Sonam Rinchen, Binod Vaidya, Hussein T. Mouftah:
Scalable Multi-Task Learning R-CNN for Object Detection in Autonomous Driving. IWCMC 2023: 518-523 - 2022
- [c52]Anagha Patil, Arpita Giriyappanavar, Binod Vaidya, Hussein T. Mouftah:
Site Suitability Assessment of Public EV Charging Stations in Urban Environment. CCECE 2022: 229-234 - [c51]Srikanth Bandapally, Binod Vaidya, Hussein T. Mouftah:
Impact of Non-platooning Vehicles in Connected Autonomous Vehicle Platooning. IWCMC 2022: 431-436 - [c50]Vidhi Mistry, Sonam Rinchen, Binod Vaidya, Hussein T. Mouftah:
Investigating Drivable Space Instance Segmentation for Connected and Autonomous Vehicles. IWCMC 2022: 437-442 - 2021
- [j22]Binod Vaidya, Hussein T. Mouftah:
Security for Shared Electric and Automated Mobility Services in Smart Cities. IEEE Secur. Priv. 19(1): 24-33 (2021) - [c49]Binod Vaidya, Parul Preet Kaur, Hussein T. Mouftah:
Provisioning Road Weather Management using Edge Cloud and Connected and Autonomous Vehicles. IWCMC 2021: 1424-1429 - [c48]Dafei Zhao, Binod Vaidya, Hussein T. Mouftah:
Taxi Dispatch and AEV Management in AEV Taxi Services. VTC Fall 2021: 1-5 - 2020
- [j21]Binod Vaidya, Hussein T. Mouftah:
Dynamic wireless charging for CAEV taxi fleet in urban environment. Internet Technol. Lett. 3(6) (2020) - [c47]Rishabh Kukreja, Sonam Rinchen, Binod Vaidya, Hussein T. Mouftah:
Evaluating Traffic Signs Detection using Faster R-CNN for Autonomous driving. CAMAD 2020: 1-6 - [c46]Binod Vaidya, Hussein T. Mouftah:
Multimodal and Multi-pass Authentication Mechanisms for Electric Vehicle Charging Networks. IWCMC 2020: 371-376
2010 – 2019
- 2018
- [c45]Binod Vaidya, Hussein T. Mouftah:
Wireless Charging System for Connected and Autonomous Electric Vehicles. GLOBECOM Workshops 2018: 1-6 - [c44]Binod Vaidya, Hussein T. Mouftah:
Deployment of Secure EV Charging System Using Open Charge Point Protocol. IWCMC 2018: 922-927 - [c43]Binod Vaidya, Hussein T. Mouftah:
Automated Reservation Mechanism for Charging Connected and Autonomous EVs in Smart Cities. VTC Fall 2018: 1-5 - 2016
- [j20]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Networks 9(2): 171-183 (2016) - 2015
- [j19]Shiuh-Jeng Wang, Jigang Liu, Taeshik Shon, Binod Vaidya, Yeong-Sheng Chen:
Security and privacy information technologies and applications for wireless pervasive computing environments. Inf. Sci. 321: 147-149 (2015) - [c42]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Multi-domain Public key infrastructure for Vehicle-to-Grid network. MILCOM 2015: 1572-1577 - 2014
- [j18]Hyuk Lim, James Chang Wu Yu, Binod Vaidya:
Advances in multimedia services over emerging wireless networks. J. Netw. Comput. Appl. 37: 1 (2014) - [c41]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Security and Privacy-Preserving Mechanism for Aggregator Based Vehicle-to-Grid Network. ADHOCNETS 2014: 75-85 - [c40]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Authentication mechanism for mobile RFID based Smart grid network. CCECE 2014: 1-6 - [c39]Wen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams:
Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme. FPS 2014: 279-293 - [c38]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Effective public key infrastructure for vehicle-to-grid network. DIVANet@MSWiM 2014: 95-101 - 2013
- [j17]Joel J. P. C. Rodrigues, Russell Hsing, Min Chen, Bingli Jiao, Binod Vaidya:
Guest Editorial on Vehicular Networking Protocols. J. Netw. Comput. Appl. 36(3): 959-960 (2013) - [j16]Joel J. P. C. Rodrigues, Russell Hsing, Min Chen, Bingli Jiao, Binod Vaidya:
Guest editorial on vehicular communications and applications. J. Netw. Comput. Appl. 36(5): 1273-1274 (2013) - [j15]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Authentication and authorization mechanisms for substation automation in smart grid network. IEEE Netw. 27(1): 5-11 (2013) - [j14]Binod Vaidya, Shiuh-Jeng Wang, Jongsung Kim, Ivan Lee:
Special issue on wireless multimedia networks and security services. Telecommun. Syst. 52(4): 2219-2220 (2013) - [j13]Ivo M. C. Lopes, Binod Vaidya, Joel J. P. C. Rodrigues:
Towards an autonomous fall detection and alerting system on a mobile and pervasive environment. Telecommun. Syst. 52(4): 2299-2310 (2013) - [j12]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Secure communication mechanism for ubiquitous Smart grid infrastructure. J. Supercomput. 64(2): 435-455 (2013) - [j11]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Secure and robust multipath routings for advanced metering infrastructure. J. Supercomput. 66(2): 1071-1092 (2013) - 2012
- [j10]Binod Vaidya, Jong Hyuk Park, Hamid R. Arabnia, Witold Pedrycz, Sheng-Lung Peng:
Bio-inspired computing for hybrid information technology. Soft Comput. 16(3): 367-368 (2012) - [c37]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Secure smart meter infrastructure in Multi-dwelling environment. CCECE 2012: 1-4 - [c36]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Secure multipath routing for AMI network in Smart Grid. IPCCC 2012: 408-415 - [c35]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Secure remote access to Smart Energy Home area Networks. ISGT 2012: 1-7 - [c34]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Robust RFID Authentication for Supply Chain Management. VTC Fall 2012: 1-5 - 2011
- [j9]Binod Vaidya, Jong Hyuk Park, Sang-Soo Yeo, Joel J. P. C. Rodrigues:
Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 34(3): 326-336 (2011) - [j8]Binod Vaidya, Mieso K. Denko, Joel J. P. C. Rodrigues:
Security mechanism for voice over multipath mobile ad hoc networks. Wirel. Commun. Mob. Comput. 11(2): 196-210 (2011) - [j7]Binod Vaidya, Dimitrios Makrakis, Jong Hyuk Park, Sang-Soo Yeo:
Resilient Security Mechanism for Wireless Ad hoc Network. Wirel. Pers. Commun. 56(3): 385-401 (2011) - [c33]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Security Mechanism for Multi-Domain Vehicle-to-Grid Infrastructure. GLOBECOM 2011: 1-5 - [c32]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Efficient Authentication Mechanism for PEV Charging Infrastructure. ICC 2011: 1-5 - [c31]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Provisioning Substation-level authentication in the smart grid networks. MILCOM 2011: 1189-1194 - [c30]Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis:
A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus Systems. PST 2011: 150-155 - [c29]Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis:
A Probabilistic-Based Trust Evaluation Model Using Hidden Markov Models and Bonus Malus Systems. SocialCom/PASSAT 2011: 1004-1011 - [e1]Sang-Soo Yeo, Binod Vaidya, George A. Papadopoulos:
12th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2011, Gwangju, Korea, October 20-22, 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4564-6 [contents] - 2010
- [j6]Joel J. P. C. Rodrigues, Marco Oliveira, Binod Vaidya:
New Trends on Ubiquitous Mobile Multimedia Applications. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j5]Binod Vaidya, Joel J. P. C. Rodrigues, Jong Hyuk Park:
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int. J. Commun. Syst. 23(9-10): 1201-1222 (2010) - [j4]Joel J. P. C. Rodrigues, Pedro F. N. João, Binod Vaidya:
EduTutor: An Intelligent Tutor System for a Learning Management System. Int. J. Distance Educ. Technol. 8(4): 66-80 (2010) - [c28]Luis Carlos Moreno Varandas, Binod Vaidya, Joel José Puga Coelho Rodrigues:
mTracker: A Mobile Tracking Application for Pervasive Environment. AINA Workshops 2010: 962-967 - [c27]João M. L. P. Caldeira, Jose A. F. Moutinho, Binod Vaidya, Pascal Lorenz, Joel J. P. C. Rodrigues:
Intra-body Temperature Monitoring Using a Biofeedback Solution. eTELEMED 2010: 119-124 - [c26]Paulo Alexandre Correia da Silva Neves, Binod Vaidya, Joel J. P. C. Rodrigues:
User-Centric Plug-And-Play Functionality for IPv6-Enabled Wireless Sensor Networks. ICC 2010: 1-5 - [c25]Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Improved two-factor user authentication in wireless sensor networks. WiMob 2010: 600-606 - [c24]Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis:
A trust evaluation model using controlled Markov process for MANET. WiMob 2010: 630-637
2000 – 2009
- 2009
- [j3]Binod Vaidya, Tai-Hoon Kim, Jong Hyuk Park, Young Jae Lee:
Secure ubiquitous connectivity in hybrid multipath wireless ad hoc network. Int. J. Commun. Syst. 22(9): 1153-1176 (2009) - [j2]Binod Vaidya, Sang-Soo Yeo, Dong-You Choi, Seung Jo Han:
Robust and secure routing scheme for wireless multihop network. Pers. Ubiquitous Comput. 13(7): 457-469 (2009) - [j1]Joel J. P. C. Rodrigues, João M. L. P. Caldeira, Binod Vaidya:
A Novel Intra-body Sensor for Vaginal Temperature Monitoring. Sensors 9(4): 2797-2808 (2009) - [c23]Tai-Hoon Kim, Sang-Soo Yeo, Jong Hyuk Park, Binod Vaidya:
Performance Evaluation of Hybrid Multipath Mobile Ad Hoc Network. CCNC 2009: 1-5 - [c22]Binod Vaidya, Mieso K. Denko, Joel J. P. C. Rodrigues:
Secure Framework for Voice Transmission over Multipath Wireless Ad-Hoc Network. GLOBECOM 2009: 1-6 - [c21]Binod Vaidya, Jorge Sá Silva, Joel J. P. C. Rodrigues:
Robust dynamic user authentication scheme for wireless sensor networks. Q2SWinet 2009: 88-91 - [c20]Binod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues:
HOTP-Based User Authentication Scheme in Home Networks. ISA 2009: 672-681 - [c19]Binod Vaidya, Hyuk Lim:
Secure framework for multipath multimedia streaming over wireless ad hoc network. WCNC 2009: 2678-2683 - 2008
- [c18]Binod Vaidya, Byung-Lok Cho, Jong-An Park, Seung Jo Han:
Investigating Secure Framework for Hybrid Multipath Ad Hoc Network. AINA Workshops 2008: 1540-1545 - [c17]Binod Vaidya, Dong-You Choi, Jong-An Park, Seung Jo Han:
Multipath Routing Scheme for Wireless Multihop Network. ICCSA (2) 2008: 433-445 - [c16]Binod Vaidya, Nak Yong Ko, Soon-Suck Jarng, Seung Jo Han:
Investigating voice communication over multipath wireless mobile ad hoc network. ICUIMC 2008: 528-532 - [c15]Binod Vaidya, Dong-You Choi, Jong-An Park, Seung Jo Han:
Investigation of Secure Framework for Multipath MANET. MUE 2008: 182-185 - [c14]Binod Vaidya, Jae-Young Pyun, Sungbum Pan, Nak Yong Ko:
Secure Framework for Integrated Multipath MANET with Internet. SAINT 2008: 83-88 - 2007
- [c13]Binod Vaidya, Jae-Young Pyun, Jong-An Park, Seung Jo Han:
Secure Multipath Routing Scheme for Mobile Ad Hoc Network. DASC 2007: 163-171 - [c12]Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Jong-An Park, Seung Jo Han:
Investigating Media Streaming in Multipath Multihop Wireless Network. International Conference on Computational Science (4) 2007: 717-720 - [c11]Binod Vaidya, SangDuck Lee, Jongwoo Kim, Seung Jo Han:
Investigation of Secure Media Streaming over Wireless Access Network. ICOIN 2007: 791-800 - [c10]Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han:
Streaming Media Securely over Multipath Multihop Wireless Network. PAKDD Workshops 2007: 636-643 - 2006
- [c9]Binod Vaidya, SangDuck Lee, Jae-Kyun Han, Seung Jo Han:
Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN. CSR 2006: 619-628 - [c8]Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han:
Using One-Time Password Based Authentication for Wireless IP Network. ISI 2006: 739-740 - [c7]Binod Vaidya, YoungJin Kim, Eung-Kon Kim, Seung Jo Han:
Investigating Authentication Mechanisms for Wireless Mobile Network. UIC 2006: 902-911 - 2005
- [c6]Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han:
Performance Analysis of Audio Streaming in Secure Wireless Access Network. ACIS-ICIS 2005: 556-561 - [c5]Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han:
Framework for Secure Audio Streaming to Wireless Access Network. Systems Communications 2005: 122-127 - [c4]ByungRae Cha, Binod Vaidya, Seung Jo Han:
Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks. ISCC 2005: 427-433 - [c3]Binod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han:
Evaluation of Audio Streaming in Secure Wireless Access Network. Panhellenic Conference on Informatics 2005: 828-838 - 2003
- [c2]Binod Vaidya:
Building Wireless Access to Rural Areas of Nepal. CITA 2003: 19-26 - 2002
- [c1]Binod Vaidya, Jagan Nath Shrestha:
Rural Digital Library: Connecting Rural Communities in Nepal. ICADL 2002: 354-365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint