フォロー
Goutham Reddy Alavalapati
Goutham Reddy Alavalapati
Fontbonne University, USA
確認したメール アドレス: nitandhra.ac.in - ホームページ
タイトル
引用先
引用先
Secure signature-based authenticated key establishment scheme for future IoT applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
Ieee Access 5, 3028-3043, 2017
4232017
Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment
AG Reddy, EJ Yoon, AK Das, V Odelu, KY Yoo
IEEE access 5, 3622-3639, 2017
992017
A secure anonymous authentication protocol for mobile services on elliptic curve cryptography
AG Reddy, AK Das, EJ Yoon, KY Yoo
IEEE access 4, 4394-4407, 2016
972016
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
K Hameed, A Khan, M Ahmed, AG Reddy, MM Rathore
Future Generation Computer Systems 82, 274-289, 2018
712018
An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography
AG Reddy, AK Das, V Odelu, KY Yoo
PloS one 11 (5), e0154308, 2016
452016
Provably secure and efficient authentication protocol for roaming service in global mobility networks
K Park, Y Park, Y Park, AG Reddy, AK Das
IEEE Access 5, 25110-25125, 2017
402017
Provably secure pseudo-identity based device authentication for smart cities environment
AG Reddy, D Suresh, K Phaneendra, JS Shin, V Odelu
Sustainable cities and society 41, 878-885, 2018
392018
Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics
A Ahmad, M Babar, S Din, S Khalid, MM Ullah, A Paul, AG Reddy, ...
Future generation computer systems 92, 868-878, 2019
382019
Lightweight authentication with key‐agreement protocol for mobile network environment using smart cards
A Goutham Reddy, EJ Yoon, AK Das, KY Yoo
IET Information Security 10 (5), 272-282, 2016
322016
A privacy preserving three-factor authenticated key agreement protocol for client–server environment
AG Reddy, AK Das, V Odelu, A Ahmad, JS Shin
Journal of ambient intelligence and humanized computing 10, 661-680, 2019
292019
Towards ontology-based multilingual URL filtering: A big data problem
M Hussain, M Ahmed, HA Khattak, M Imran, A Khan, S Din, A Ahmad, ...
The Journal of Supercomputing 74, 5003-5021, 2018
272018
Robust authentication protocol for dynamic charging system of electric vehicles
PR Babu, R Amin, AG Reddy, AK Das, W Susilo, YH Park
IEEE Transactions on Vehicular Technology 70 (11), 11338-11351, 2021
242021
Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
A Anjum, T Ahmed, A Khan, N Ahmad, M Ahmad, M Asif, AG Reddy, ...
Sustainable cities and society 40, 326-334, 2018
242018
Software-defined vehicular cloud networks: architecture, applications and virtual machine migration
L Nkenyereye, L Nkenyereye, B Adhi Tama, AG Reddy, JS Song
Sensors 20 (4), 1092, 2020
202020
A survey on security challenges and protocols of electric vehicle dynamic charging system
PR Babu, B Palaniswamy, AG Reddy, V Odelu, HS Kim
Security and Privacy 5 (3), e210, 2022
182022
EV-Auth: Lightweight authentication protocol suite for dynamic charging system of electric vehicles with seamless handover
PR Babu, AG Reddy, B Palaniswamy, SK Kommuri
IEEE Transactions on Intelligent Vehicles 7 (3), 734-747, 2022
142022
EV-PUF: Lightweight security protocol for dynamic charging system of electric vehicles using physical unclonable functions
PR Babu, AG Reddy, B Palaniswamy, AK Das
IEEE Transactions on Network Science and Engineering 9 (5), 3791-3807, 2022
132022
Graphical passwords: Behind the attainment of goals
A Vaddeti, D Vidiyala, V Puritipati, RB Ponnuru, JS Shin, GR Alavalapati
Security and Privacy 3 (6), e125, 2020
112020
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards
RA Goutham, GJ Lee, KY Yoo
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 169-174, 2015
82015
Implicit graphical password mutual authentication using mirror-image encryption
RA Goutham, DS Kim, KY Yoo
Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014
52014
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20