Search Results - "Bojjagani, Sriramulu"
-
1
Handover-Authentication Scheme for Internet of Vehicles (IoV) Using Blockchain and Hybrid Computing
Published in IEEE access (2024)“…The advancements in telecommunications are significantly benefiting the Internet of Vehicles (IoV) in various ways. Minimal latency, faster data transfer, and…”
Get full text
Journal Article -
2
Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum
Published in Signal, image and video processing (01-06-2024)“…The utilization of a biometric authentication system (BAS) for reliable automatic human recognition has increased exponentially in recent years over…”
Get full text
Journal Article -
3
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
Published in Peer-to-peer networking and applications (01-11-2020)“…The authentication system plays a crucial role in the context of GLObal MObility NETwork (GLOMONET) where Mobile User (MU) often need to seamless and secure…”
Get full text
Journal Article -
4
The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications
Published in Journal of King Saud University. Computer and information sciences (01-10-2023)“…Daily digital payments in Financial Technology (FinTech) are growing exponentially. A huge demand is for developing secure, lightweight cryptography protocols…”
Get full text
Journal Article -
5
A Systematic Review on Blockchain-Enabled Internet of Vehicles (BIoV): Challenges, Defenses, and Future Research Directions
Published in IEEE access (2024)“…In the field of vehicular communication, the Internet of Vehicles (IoV) serves as a new era that guarantees increased connectivity, efficiency, and safety. The…”
Get full text
Journal Article -
6
A secure IoT-based micro-payment protocol for wearable devices
Published in Peer-to-peer networking and applications (01-03-2022)“…Wearable devices are parts of the essential cost of goods sold (COGS) in the wheel of the Internet of things (IoT), contributing to a potential impact in the…”
Get full text
Journal Article -
7
A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center
Published in IEEE access (2023)“…Due to the rapid utilization of cloud services, the energy consumption of cloud data centres is increasing dramatically. These cloud services are provided by…”
Get full text
Journal Article -
8
A Visible Watermarking Scheme for JPEG Images Based on Modification of Frequency Coefficients
Published in Automatic control and computer sciences (01-09-2021)“…Ownership evidence can be directly exposed through visible watermarks which can avoid the attempts of copyright abuses. JPEG images are widely used for many…”
Get full text
Journal Article -
9
Mechanical element’s remaining useful life prediction using a hybrid approach of CNN and LSTM
Published in Multimedia tools and applications (21-02-2024)“…For the safety and reliability of the system, Remaining Useful Life (RUL) prediction is considered in many industries. The traditional machine learning…”
Get full text
Journal Article -
10
Blockchain based security framework for sharing digital images using reversible data hiding and encryption
Published in Multimedia tools and applications (01-07-2022)“…Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in…”
Get full text
Journal Article -
11
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment
Published in Vehicular Communications (01-10-2024)“…The Intelligent Transportation Systems (ITS) is a leading-edge, developing idea that seeks to revolutionize how people and things move inside and outside…”
Get full text
Journal Article -
12
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems
Published in Computing (01-07-2024)“…The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services. The main…”
Get full text
Journal Article -
13
Systematic survey of mobile payments, protocols, and security infrastructure
Published in Journal of ambient intelligence and humanized computing (2023)“…Mobile payments makeup one of the fastest-growing mobile services available today and are widely used by smartphones for utility payments, bill payments, and…”
Get full text
Journal Article -
14
Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems
Published in IEEE transactions on intelligent transportation systems (01-12-2022)“…Intelligent transport systems amalgamated with advanced technologies are an important element of the automotive industry, including critical infrastructure and…”
Get full text
Journal Article -
15
A secure end‐to‐end SMS‐based mobile banking protocol
Published in International journal of communication systems (01-10-2017)“…Summary Short message service (SMS) provides a wide channel of communication for banking in mobile commerce and mobile payment. The transmission of SMS is not…”
Get full text
Journal Article -
16
A secure end-to-end proximity NFC-based mobile payment protocol
Published in Computer standards and interfaces (01-10-2019)“…•We have developed an ECC-based NFC protocol. It is operated in read/write mode used for mobile payments and it is secure against tag cloning and tag…”
Get full text
Journal Article -
17
Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment
Published in Intelligent automation and soft computing (2022)Get full text
Journal Article -
18
Prediction Based Reversible Data Hiding for Gray-Scale Images
Published in 2023 Seventh International Conference on Image Information Processing (ICIIP) (22-11-2023)“…Predicting the pixel is crucial in prediction error expansion (PEE) based reversible data hiding (RDH). There are a number of methods for predicting pixels…”
Get full text
Conference Proceeding -
19
VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps
Published in 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC) (01-10-2017)“…Mobile devices are becoming targets for hackers and malicious users due to the multifold increase in its capabilities and usage. Security threats are more…”
Get full text
Conference Proceeding -
20
A Secure Mechanism for Prevention of Vishing Attack in Banking System
Published in 2023 International Conference on Networking and Communications (ICNWC) (05-04-2023)“…A vishing attack is a category of Phishing attack in which the attacker attempts to capture clandestine information through a phone call or Short Message…”
Get full text
Conference Proceeding