Search

Violeta Cakulev Phones & Addresses

  • 4 Haran Cir, Millburn, NJ 07041 (973) 467-7918
  • Morris Plains, NJ
  • Houston, TX

Work

Company: Verizon wireless Dec 1, 2012 Position: Senior engineer

Education

Degree: Doctorates, Doctor of Philosophy School / High School: Rice University 2005 to 2005

Skills

Lte • Wireless • 3Gpp • Cdma • Umts • Embedded Systems • Telecommunications • Digital Signal Processors • Mobile Devices • 4G • Wifi • Debugging • Wireless Networking • Rf • Signal Processing • System Architecture • Ofdm

Industries

Wireless

Resumes

Resumes

Violeta Cakulev Photo 1

Senior Engineer

View page
Location:
Millburn, NJ
Industry:
Wireless
Work:
Verizon Wireless
Senior Engineer

Nokia Jan 2012 - Dec 2012
Distinguished Member of Technical Staff

Nokia 2006 - Jan 2012
Member of Technical Staff
Education:
Rice University 2005 - 2005
Doctorates, Doctor of Philosophy
University of Belgrade
Skills:
Lte
Wireless
3Gpp
Cdma
Umts
Embedded Systems
Telecommunications
Digital Signal Processors
Mobile Devices
4G
Wifi
Debugging
Wireless Networking
Rf
Signal Processing
System Architecture
Ofdm

Publications

Us Patents

Verification Of Content Possession By An Announcing Peer In A Peer-To-Peer Content Distribution System

View page
US Patent:
8621650, Dec 31, 2013
Filed:
Jan 6, 2012
Appl. No.:
13/344826
Inventors:
Violeta Cakulev - Millburn NJ, US
Semyon B. Mizikovsky - Morganville NJ, US
Assignee:
Alcatel Lucent - Paris
International Classification:
H04L 9/32
US Classification:
726 27, 726 29
Abstract:
A tracker node verifies content possession by a peer node in a peer-to-peer content distribution system. Upon receiving an announcement that a peer node claims to possess a content item, the tracker node in one embodiment obtains the content item, selects a random portion of the content item; formulates a challenge based on the random portion of the content item and determines an expected challenge response. The challenge may comprise, for example, a request for a hash of the random portion (or alternatively, a hash of the random portion and a random seed value). The tracker node issues the challenge to the announcing node and verifies the announcing node's possession of the content item if the challenge response from the announcing node matches the expected challenge response.

Discovery Of Security Associations For Key Management Relying On Public Keys

View page
US Patent:
8644510, Feb 4, 2014
Filed:
Jun 30, 2011
Appl. No.:
13/173079
Inventors:
Violeta Cakulev - Millburn NJ, US
Semyon B. Mizikovsky - Morganville NJ, US
Assignee:
Alcatel Lucent - Paris
International Classification:
H04L 9/00
US Classification:
380255, 380286
Abstract:
Techniques are disclosed for forming a discoverable security association in communication environments and for lawfully discovering security associations formed in communication environments. For example, a method for forming a discoverable security association between a first computing device and a second computing device comprises the following steps. The first computing device obtains from a key management entity: (i) a first private key assigned to the first computing device, which is computationally associative with a first public key associated with the first computing device; and (ii) a first root key assigned to the first computing device. The first computing device chooses a first random value and generating a first nonce, wherein the first nonce is a result of an encryption of the first random value using the first root key. The first computing device generates a first key component based on the first random value. The first computing device encrypts the first nonce and the first key component with a second public key associated with the second computing device using an identity-based encryption process and sends the encrypted first nonce and the encrypted first key component to the second computing device so as to establish a security association with the second computing device.

Packet-Forwarding For Proxy Mobile Ip

View page
US Patent:
20080095118, Apr 24, 2008
Filed:
Oct 5, 2007
Appl. No.:
11/905888
Inventors:
Violeta Cakulev - Morris Plains NJ, US
Ajay Rajkumar - Morristown NJ, US
Ganapathy Sundaram - Hillsborough NJ, US
International Classification:
H04Q 7/00
H04L 12/66
US Classification:
370331000, 370401000
Abstract:
The packet-forwarding for proxy mobile IP, in accordance with various embodiments, includes registering a mobile access terminal (AT) and a first IP gateway (IPGW) with a home agent (HA) when a wireless communication session is established between the mobile AT and the first IPGW. In various embodiments the method additionally includes transferring context information regarding the mobile AT and a proxy mobile security key obtained by the first IPGW, from the first IPGW to a second IPGW when the mobile AT moves from a first access network to a second access network.

Method And Apparatus For Communication Between Wireless Telecommunications Networks Of Different Technology Types

View page
US Patent:
20090245200, Oct 1, 2009
Filed:
Mar 31, 2008
Appl. No.:
12/080015
Inventors:
Violeta Cakulev - Morris Plains NJ, US
Michael Francis Dolan - Bolingbrook IL, US
Subramanian Vasudevan - Morristown NJ, US
Lily H. Zhu - Parsippany NJ, US
International Classification:
H04Q 7/00
US Classification:
370331
Abstract:
For handover between wireless telecommunications networks of different technology types, an air interface is set up between a first node included in a network of a first technology type and a second node included in a network of a second different technology type. Signaling messaging, in accordance with the second technology type, is related to handover of a mobile terminal from the network of the first technology type to the network of the second technology type. The signaling messaging is encapsulated in a container for transmission over the signaling interface. An identifier is associated with the container to indicate that it encapsulates the signaling messaging. When the identifier is detected at the first node, the container is sent over the interface to the second node. In one method in accordance with the invention, the first technology type is WiMAX and the identifier is a special service flow identifier. This may be detected at an Access Services Network Gateway (ASN GW), for example. A method in accordance with the invention thus permits the use of logical radio channels for encapsulating inter-technology signaling.

Communication Of Session-Specific Information To User Equipment From An Access Network

View page
US Patent:
20100235890, Sep 16, 2010
Filed:
Mar 10, 2009
Appl. No.:
12/401287
Inventors:
Violeta Cakulev - Millburn NJ, US
Semyon B. Mizikovsky - Morganville NJ, US
Christopher Francis Mooney - Livingston NJ, US
International Classification:
H04L 29/06
H04L 12/28
US Classification:
726 5, 370254
Abstract:
In conjunction with establishment of a session between an access network and user equipment of a communication system, session-specific information is transmitted from the access network to the user equipment. The session-specific information transmitted from the access network to the user equipment comprises information to be utilized in an authentication protocol carried out between the user equipment and an authentication server of the system. For example, the session-specific information transmitted from the access network to the user equipment may comprise an identifier of a gateway coupled between the access network and the authentication server.

Session Key Generation And Distribution With Multiple Security Associations Per Protocol Instance

View page
US Patent:
20100303238, Dec 2, 2010
Filed:
May 29, 2009
Appl. No.:
12/474764
Inventors:
Violeta Cakulev - Millburn NJ, US
Semyon B. Mizikovsky - Morganville NJ, US
Ganapathy S. Sundaram - Hillsborough NJ, US
International Classification:
H04L 9/14
US Classification:
380272, 380255, 380 44
Abstract:
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a first network element of a communication system. In one aspect, a first one of the security associations is utilized to secure data sent between the user equipment and the first network element in an ongoing communication. In conjunction with a handoff of the ongoing communication from the first network element to a second network element of the communication system, another one of the security associations is selected, and the other selected security association is utilized to secure data sent between the user equipment and the second network element in the ongoing communication. The security associations may comprise respective sets of session keys derived from a single pairwise master key.

Method And Apparatus For Communication Between Wireless Telecommunications Networks Of Different Technology Types

View page
US Patent:
20110188469, Aug 4, 2011
Filed:
Mar 13, 2009
Appl. No.:
12/935852
Inventors:
Violeta Cakulev - Millburn NJ, US
Michael Francis Dolan - Bolingbrook IL, US
Subramanian Vasudevan - Morristown NJ, US
Lily H. Zhu - Parsippany NJ, US
International Classification:
H04W 36/14
US Classification:
370331
Abstract:
For handover between wireless telecommunications networks of different technology types, an air interface is set up between a first node included in a network of a first technology type and a second node included in a network of a second different technology type. Signaling messaging, in accordance with the second technology type, is related to handover of a mobile terminal from the network of the first technology type to the network of the second technology type. The signaling messaging is encapsulated in a container for transmission over the signaling interface. An identifier is associated with the container to indicate that it encapsulates the signaling messaging. When the identifier is detected at the first node, the container is sent over the interface to the second node. In one method in accordance with the invention, the first technology type is WiMAX and the identifier is a special service flow identifier. This may be detected at an Access Services Network Gateway (ASN GW), for example. A method in accordance with the invention thus permits the use of logical radio channels for encapsulating inter-technology signaling.

Prevention Of Eavesdropping Type Of Attack In Hybrid Communication System

View page
US Patent:
20120238245, Sep 20, 2012
Filed:
Mar 14, 2011
Appl. No.:
13/047256
Inventors:
Alec Brusilovsky - Naperville IL, US
Violeta Cakulev - Millburn NJ, US
International Classification:
H04M 1/68
US Classification:
455411
Abstract:
Techniques are disclosed for use in securing communications in environments comprising hybrid communication systems. For example, a method comprises, in a hybrid communication system wherein at least one computing device is configured to selectively operate in a first communication mode or a second communication mode, preventing the at least one computing device from completing an attachment process in the first communication mode when it is determined that authentication data being used to authenticate the at least one computing device in the first communication mode was generated for an authentication process in the second communication mode.
Violeta Cakulev from Millburn, NJ, age ~51 Get Report