Goutham Reddy Alavalapati
Goutham Reddy Alavalapati
Assistant Professor, NIT Andhra Pradesh
Verified email at nitandhra.ac.in - Homepage
Cited by
Cited by
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S Challa, M Wazid, AK Das, N Kumar, AG Reddy, EJ Yoon, KY Yoo
IEEE Access 5, 3028-3043, 2017
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
AG Reddy, AK Das, EJ Yoon, KY Yoo
IEEE Access 4, 4394-4407, 2016
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
AG Reddy, EJ Yoon, AK Das, V Odelu, KY Yoo
IEEE Access 5, 3622-3639, 2017
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
M Wazid, AK Das, N Kumar, V Odelu, AG Reddy, K Park, Y Park
IEEE Access 5, 14966-14980, 2017
An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography
AG Reddy, AK Das, V Odelu, KY Yoo
PloS one 11 (5), e0154308, 2016
On the design of fine grained access control with user authentication scheme for telecare medicine information systems
S Chatterjee, S Roy, AK Das, S Chattopadhyay, N Kumar, AG Reddy, ...
IEEE Access 5, 7012-7030, 2017
Provably secure and efficient authentication protocol for roaming service in global mobility networks
K Park, Y Park, Y Park, AG Reddy, AK Das
IEEE Access 5, 25110-25125, 2017
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards
AG Reddy, EJ Yoon, AK Das, KY Yoo
IET Information Security 10 (5), 272-282, 2016
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
K Hameed, A Khan, M Ahmed, AG Reddy, MM Rathore
Future Generation Computer Systems 82, 274-289, 2018
Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics
A Ahmad, M Babar, S Din, S Khalid, MM Ullah, A Paul, AG Reddy, ...
Future Generation Computer Systems 92, 868-878, 2019
A Privacy Preserving three-factor authenticated key agreement protocol for client–server environment
AG Reddy, AK Das, V Odelu, A Ahmad, JS Shin
Journal of Ambient Intelligence and Humanized Computing 10 (2), 661-680, 2019
Towards ontology-based multilingual URL filtering: a big data problem
M Hussain, M Ahmed, HA Khattak, M Imran, A Khan, S Din, A Ahmad, ...
The Journal of Supercomputing 74 (10), 5003-5021, 2018
On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC
AK Sutrala, AK Das, N Kumar, AG Reddy, AV Vasilakos, JJPC Rodrigues
International Journal of Communication Systems 31 (8), e3514, 2018
Provably secure pseudo-identity based device authentication for smart cities environment
AG Reddy, D Suresh, K Phaneendra, JS Shin, V Odelu
Sustainable cities and society 41, 878-885, 2018
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards
AGR Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo
KSII Transactions on Internet and Information Systems 10 (7), 3371-3396, 2016
Chest X-ray segmentation using Sauvola thresholding and Gaussian derivatives responses
M Kiran, I Ahmed, N Khan, AG Reddy
Journal of Ambient Intelligence and Humanized Computing 10 (10), 4179-4195, 2019
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards
RA Goutham, GJ Lee, KY Yoo
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 169-174, 2015
Software-Defined Vehicular Cloud Networks: Architecture, Applications and Virtual Machine Migration
L Nkenyereye, L Nkenyereye, BA Tama, AG Reddy, JS Song
Sensors 20 (4), 1092, 2020
Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
A Anjum, T Ahmed, A Khan, N Ahmad, M Ahmad, M Asif, AG Reddy, ...
Sustainable Cities and Society 40, 326-334, 2018
Implicit graphical password mutual authentication using mirror-image encryption
RA Goutham, DS Kim, KY Yoo
Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20