Goutham Reddy Alavalapati
Goutham Reddy Alavalapati
Assistant Professor, NIT Andhra Pradesh
Verified email at nitandhra.ac.in - Homepage
Title
Cited by
Cited by
Year
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
IEEE Access 5, 3028-3043, 2017
2342017
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
AG Reddy, AK Das, EJ Yoon, KY Yoo
IEEE Access 4, 4394-4407, 2016
782016
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
M Wazid, AK Das, N Kumar, V Odelu, AG Reddy, K Park, Y Park
IEEE Access 5, 14966-14980, 2017
682017
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
AG Reddy, EJ Yoon, AK Das, V Odelu, KY Yoo
IEEE Access 5, 3622-3639, 2017
682017
An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography
AG Reddy, AK Das, V Odelu, KY Yoo
PloS one 11 (5), e0154308, 2016
422016
On the design of fine grained access control with user authentication scheme for telecare medicine information systems
S Chatterjee, S Roy, AK Das, S Chattopadhyay, N Kumar, AG Reddy, ...
IEEE Access 5, 7012-7030, 2017
312017
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
K Hameed, A Khan, M Ahmed, AG Reddy, MM Rathore
Future Generation Computer Systems 82, 274-289, 2018
282018
Provably secure and efficient authentication protocol for roaming service in global mobility networks
K Park, Y Park, Y Park, AG Reddy, AK Das
IEEE Access 5, 25110-25125, 2017
282017
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards
AG Reddy, EJ Yoon, AK Das, KY Yoo
IET Information Security 10 (5), 272-282, 2016
272016
Towards ontology-based multilingual URL filtering: a big data problem
M Hussain, M Ahmed, HA Khattak, M Imran, A Khan, S Din, A Ahmad, ...
The Journal of Supercomputing 74 (10), 5003-5021, 2018
202018
On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC
AK Sutrala, AK Das, N Kumar, AG Reddy, AV Vasilakos, JJPC Rodrigues
International Journal of Communication Systems 31 (8), e3514, 2018
202018
A Privacy Preserving three-factor authenticated key agreement protocol for client–server environment
AG Reddy, AK Das, V Odelu, A Ahmad, JS Shin
Journal of Ambient Intelligence and Humanized Computing 10 (2), 661-680, 2019
192019
Provably secure pseudo-identity based device authentication for smart cities environment
AG Reddy, D Suresh, K Phaneendra, JS Shin, V Odelu
Sustainable cities and society 41, 878-885, 2018
172018
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards
AGR Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo
KSII Transactions on Internet and Information Systems 10 (7), 3371-3396, 2016
9*2016
Software-defined vehicular cloud networks: Architecture, applications and virtual machine migration
L Nkenyereye, L Nkenyereye, B Adhi Tama, AG Reddy, JS Song
Sensors 20 (4), 1092, 2020
82020
Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
A Anjum, T Ahmed, A Khan, N Ahmad, M Ahmad, M Asif, AG Reddy, ...
Sustainable Cities and Society 40, 326-334, 2018
72018
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards
RA Goutham, GJ Lee, KY Yoo
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 169-174, 2015
72015
Chest X-ray segmentation using Sauvola thresholding and Gaussian derivatives responses
M Kiran, I Ahmed, N Khan, AG Reddy
Journal of Ambient Intelligence and Humanized Computing 10 (10), 4179-4195, 2019
62019
Graphical passwords: Behind the attainment of goals
A Vaddeti, D Vidiyala, V Puritipati, RB Ponnuru, JS Shin, GR Alavalapati
Security and Privacy 3 (6), e125, 2020
42020
Implicit graphical password mutual authentication using mirror-image encryption
RA Goutham, DS Kim, KY Yoo
Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20