Search Results - "Bojjagani, Sriramulu"

Refine Results
  1. 1

    Handover-Authentication Scheme for Internet of Vehicles (IoV) Using Blockchain and Hybrid Computing by Surapaneni, Praneetha, Bojjagani, Sriramulu, Maurya, Anup Kumar

    Published in IEEE access (2024)
    “…The advancements in telecommunications are significantly benefiting the Internet of Vehicles (IoV) in various ways. Minimal latency, faster data transfer, and…”
    Get full text
    Journal Article
  2. 2

    Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum by Morampudi, Mahesh Kumar, Gonthina, Nagamani, Bojjagani, Sriramulu, Sharma, Neeraj Kumar, Veeraiah, Duggineni

    Published in Signal, image and video processing (01-06-2024)
    “…The utilization of a biometric authentication system (BAS) for reliable automatic human recognition has increased exponentially in recent years over…”
    Get full text
    Journal Article
  3. 3

    A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments by Shashidhara, R., Bojjagani, Sriramulu, Maurya, Anup Kumar, Kumari, Saru, Xiong, Hu

    Published in Peer-to-peer networking and applications (01-11-2020)
    “…The authentication system plays a crucial role in the context of GLObal MObility NETwork (GLOMONET) where Mobile User (MU) often need to seamless and secure…”
    Get full text
    Journal Article
  4. 4

    The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications by Bojjagani, Sriramulu, Seelam, Nagarjuna Reddy, Sharma, Neeraj Kumar, Uyyala, Ravi, Akuri, Sree Rama Chandra Murthy, Maurya, Anup Kumar

    “…Daily digital payments in Financial Technology (FinTech) are growing exponentially. A huge demand is for developing secure, lightweight cryptography protocols…”
    Get full text
    Journal Article
  5. 5

    A Systematic Review on Blockchain-Enabled Internet of Vehicles (BIoV): Challenges, Defenses, and Future Research Directions by Surapaneni, Praneetha, Bojjagani, Sriramulu, Bharathi, V. C., Kumar Morampudi, Mahesh, Kumar Maurya, Anup, Khurram Khan, Muhammad

    Published in IEEE access (2024)
    “…In the field of vehicular communication, the Internet of Vehicles (IoV) serves as a new era that guarantees increased connectivity, efficiency, and safety. The…”
    Get full text
    Journal Article
  6. 6

    A secure IoT-based micro-payment protocol for wearable devices by Bojjagani, Sriramulu, Rao, P. V. Venkateswara, Vemula, Dinesh Reddy, Reddy, B Ramachandra, Lakshmi, T. Jaya

    Published in Peer-to-peer networking and applications (01-03-2022)
    “…Wearable devices are parts of the essential cost of goods sold (COGS) in the wheel of the Internet of things (IoT), contributing to a potential impact in the…”
    Get full text
    Journal Article
  7. 7

    A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center by Sharma, Neeraj Kumar, Bojjagani, Sriramulu, Reddy, Y. C. A. Padmanabha, Vivekanandan, Manojkumar, Srinivasan, Jagadeesan, Maurya, Anup Kumar

    Published in IEEE access (2023)
    “…Due to the rapid utilization of cloud services, the energy consumption of cloud data centres is increasing dramatically. These cloud services are provided by…”
    Get full text
    Journal Article
  8. 8

    A Visible Watermarking Scheme for JPEG Images Based on Modification of Frequency Coefficients by Denslin Brabin, D. R., Bojjagani, Sriramulu, Braja, D.R. Denslin

    Published in Automatic control and computer sciences (01-09-2021)
    “…Ownership evidence can be directly exposed through visible watermarks which can avoid the attempts of copyright abuses. JPEG images are widely used for many…”
    Get full text
    Journal Article
  9. 9

    Mechanical element’s remaining useful life prediction using a hybrid approach of CNN and LSTM by Sharma, Neeraj Kumar, Bojjagani, Sriramulu

    Published in Multimedia tools and applications (21-02-2024)
    “…For the safety and reliability of the system, Remaining Useful Life (RUL) prediction is considered in many industries. The traditional machine learning…”
    Get full text
    Journal Article
  10. 10

    Blockchain based security framework for sharing digital images using reversible data hiding and encryption by Brabin, Denslin, Ananth, Christo, Bojjagani, Sriramulu

    Published in Multimedia tools and applications (01-07-2022)
    “…Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in…”
    Get full text
    Journal Article
  11. 11

    VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment by Surapaneni, Praneetha, Bojjagani, Sriramulu, Khan, Muhammad Khurram

    Published in Vehicular Communications (01-10-2024)
    “…The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside…”
    Get full text
    Journal Article
  12. 12

    Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems by Bojjagani, Sriramulu, Brabin, Denslin, Kumar, Kalai, Sharma, Neeraj Kumar, Batta, Umamaheswararao

    Published in Computing (01-07-2024)
    “…The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services. The main…”
    Get full text
    Journal Article
  13. 13

    Systematic survey of mobile payments, protocols, and security infrastructure by Bojjagani, Sriramulu, Sastry, V. N., Chen, Chien-Ming, Kumari, Saru, Khan, Muhammad Khurram

    “…Mobile payments makeup one of the fastest-growing mobile services available today and are widely used by smartphones for utility payments, bill payments, and…”
    Get full text
    Journal Article
  14. 14

    Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems by Bojjagani, Sriramulu, Reddy, Y. C. A. Padmanabha, Anuradha, Thati, Rao, P. V. Venkateswara, Reddy, B. Ramachandra, Khan, Muhammad Khurram

    “…Intelligent transport systems amalgamated with advanced technologies are an important element of the automotive industry, including critical infrastructure and…”
    Get full text
    Journal Article
  15. 15

    A secure end‐to‐end SMS‐based mobile banking protocol by Bojjagani, Sriramulu, Sastry, V. N.

    “…Summary Short message service (SMS) provides a wide channel of communication for banking in mobile commerce and mobile payment. The transmission of SMS is not…”
    Get full text
    Journal Article
  16. 16

    A secure end-to-end proximity NFC-based mobile payment protocol by Bojjagani, Sriramulu, Sastry, V.N.

    Published in Computer standards and interfaces (01-10-2019)
    “…•We have developed an ECC-based NFC protocol. It is operated in read/write mode used for mobile payments and it is secure against tag cloning and tag…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Prediction Based Reversible Data Hiding for Gray-Scale Images by Uyyala, Ravi, Bojjagani, Sriramulu

    “…Predicting the pixel is crucial in prediction error expansion (PEE) based reversible data hiding (RDH). There are a number of methods for predicting pixels…”
    Get full text
    Conference Proceeding
  19. 19

    VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps by Bojjagani, Sriramulu, Sastry, V. N.

    “…Mobile devices are becoming targets for hackers and malicious users due to the multifold increase in its capabilities and usage. Security threats are more…”
    Get full text
    Conference Proceeding
  20. 20

    A Secure Mechanism for Prevention of Vishing Attack in Banking System by Denslin Brabin, D.R., Bojjagani, Sriramulu

    “…A vishing attack is a category of Phishing attack in which the attacker attempts to capture clandestine information through a phone call or Short Message…”
    Get full text
    Conference Proceeding