default search action
Vanga Odelu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Srijanee Mookherji, Vanga Odelu, Rajendra Prasath:
Secure ultra fast authentication protocol for electric vehicle charging. Comput. Electr. Eng. 119: 109512 (2024) - [j53]Chaitanyateja Thotadi, Monith Debbala, Subba Rao, Ajay Eeralla, Basker Palaniswamy, Srijanee Mookherji, Vanga Odelu, Alavalapati Goutham Reddy:
E-Brightpass: A Secure way to access social networks on smartphones. Cyber Secur. Appl. 2: 100021 (2024) - [j52]K. G. Raghavendra Narayan, Rakesh Ganesula, Tamminaina Sai Somasekhar, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Alavalapati Goutham Reddy:
Attenuating majority attack class bias using hybrid deep learning based IDS framework. J. Netw. Comput. Appl. 230: 103954 (2024) - [j51]Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Ashok Kumar Das:
A secure authentication protocol for remote patient monitoring in an internet-of-medical-things environment. Secur. Priv. 7(6) (2024) - [c13]Harika Lingamsetty, N. Surya Sri Nitya, Bala Mani Teja M, Vanga Odelu, Srijanee Mookherji, KG Raghavendra Narayan, Rajendra Prasath, Alavalapati Goutham Reddy:
A Penalty-Based Entropy Driven Universal Password Strength for Lightweight Devices. COMSNETS 2024: 25-30 - 2023
- [j50]Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Ashok Kumar Das, Youngho Park:
Fog-Based Single Sign-On Authentication Protocol for Electronic Healthcare Applications. IEEE Internet Things J. 10(12): 10983-10996 (2023) - [i8]KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das:
IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications. CoRR abs/2308.00943 (2023) - [i7]Chebrolu Deepak Kumar, Lilly Kumari Biswas, Srijanee Mookherji, Gowri Raghavendra Narayan Kurmala, Vanga Odelu:
Comment on "Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud". CoRR abs/2311.14499 (2023) - [i6]Sai Sreekar Vankayalapati, Srijanee Mookherji, Vanga Odelu:
A Security Enhanced Authentication Protocol. CoRR abs/2312.15250 (2023) - 2022
- [j49]Devanapalli Suresh, Vanga Odelu, Alavalapati Goutham Reddy, Kolloju Phaneendra, Hyunsung Kim:
Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices. IEEE Access 10: 109526-109536 (2022) - [j48]Raveendra Babu Ponnuru, Basker Palaniswamy, Alavalapati Goutham Reddy, Vanga Odelu, Hyunsung Kim:
A survey on security challenges and protocols of electric vehicle dynamic charging system. Secur. Priv. 5(3) (2022) - [c12]Singam Bhargav Ram, Vanga Odelu:
Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover. CCWC 2022: 667-672 - [c11]Srijanee Mookherji, Vanga Odelu, Rajendra Prasath:
Analysis of A Lightweight Authentication Protocol for Remote Surgery Applications under the CK - Adversary Model. COMSNETS 2022: 1-5 - [i5]Manoj Srinivas Botla, Jai Bala Srujan Melam, Raja Stuthi Paul Pedapati, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath:
Comparative Study of HDL algorithms for Intrusion Detection System in Internet of Vehicles. IACR Cryptol. ePrint Arch. 2022: 1700 (2022) - 2021
- [i4]Srijanee Mookherji, Vanga Odelu, Rajendra Prasath:
Modelling IBE-based Key Exchange Protocol using Tamarin Prover. IACR Cryptol. ePrint Arch. 2021: 1598 (2021) - 2020
- [j47]Soumya Banerjee, Sandip Roy, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park:
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment. J. Inf. Secur. Appl. 53: 102503 (2020) - [j46]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Youngho Park:
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments. Sensors 20(4): 1215 (2020) - [j45]Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Willy Susilo:
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Secur. Comput. 17(2): 391-406 (2020) - [e1]B. R. Purushothama, Veena Thenkanidiyoor, Rajendra Prasath, Vanga Odelu:
Mining Intelligence and Knowledge Exploration - 7th International Conference, MIKE 2019, Goa, India, December 19-22, 2019, Proceedings. Lecture Notes in Computer Science 11987, Springer 2020, ISBN 978-3-030-66186-1 [contents]
2010 – 2019
- 2019
- [j44]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park:
Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions. IEEE Access 7: 85627-85644 (2019) - [j43]Vanga Odelu, Sourav Saha, Rajendra Prasath, Lakshminarayana Sadineni, Mauro Conti, Minho Jo:
Efficient privacy preserving device authentication in WBANs for industrial e-health applications. Comput. Secur. 83: 300-312 (2019) - [j42]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Jangirala Srinivas, Neeraj Kumar, Samiran Chattopadhyay, Kim-Kwang Raymond Choo:
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment. IEEE Internet Things J. 6(5): 8739-8752 (2019) - [j41]Goutham Reddy Alavalapati, Ashok Kumar Das, Vanga Odelu, Awais Ahmad, Ji Sun Shin:
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment. J. Ambient Intell. Humaniz. Comput. 10(2): 661-680 (2019) - [c10]Vanga Odelu:
IMBUA: Identity Management on Blockchain for Biometrics-Based User Authentication. BLOCKCHAIN 2019: 1-10 - [c9]Vanga Odelu:
An Efficient Two-Server Password-only User Authentication for Consumer Electronic Devices. ICCE 2019: 1-2 - [c8]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Debasis Giri:
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks. ICMC 2019: 1-17 - [c7]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Debasis Giri:
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture. ICMC 2019: 47-66 - 2018
- [j40]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Youngho Park, Sudeep Tanwar:
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks. IEEE Access 6: 20673-20693 (2018) - [j39]Sravani Challa, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Saru Kumari, Muhammad Khurram Khan, Athanasios V. Vasilakos:
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 69: 534-554 (2018) - [j38]Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo:
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet Things J. 5(1): 269-282 (2018) - [j37]Vanga Odelu, Sherali Zeadally, Ashok Kumar Das, Mohammad Wazid, Debiao He:
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4): 431-445 (2018) - [j36]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu:
Attribute-based authentication on the cloud for thin clients. J. Supercomput. 74(11): 5813-5845 (2018) - [j35]Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, Mauro Conti:
Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 9(3): 1900-1910 (2018) - [c6]J. Jabez Christopher, Rajendra Prasath, Vanga Odelu:
Expert Intelligence: Theory of the Missing Facet. MIKE 2018: 90-101 - [c5]Sourav Saha, Vanga Odelu, Rajendra Prasath:
Enhanced Session Initiation Protocols for Emergency Healthcare Applications. SSCC 2018: 278-289 - [i3]Sourav Saha, Vanga Odelu, Rajendra Prasath:
Enhanced Session Initiation Protocols for Emergency Healthcare Applications. CoRR abs/1809.09526 (2018) - 2017
- [j34]Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Minho Jo:
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts. IEEE Access 5: 3273-3283 (2017) - [j33]Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Vanga Odelu, Kee-Young Yoo:
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment. IEEE Access 5: 3622-3639 (2017) - [j32]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Goutham Reddy Alavalapati, Kisung Park, Youngho Park:
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks. IEEE Access 5: 14966-14980 (2017) - [j31]Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, Youngho Park:
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices. IEEE Access 5: 27707-27721 (2017) - [j30]Vanga Odelu, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54: 3-9 (2017) - [j29]Vanga Odelu, Ashok Kumar Das, Saru Kumari, Xinyi Huang, Mohammad Wazid:
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener. Comput. Syst. 68: 74-88 (2017) - [j28]Ashok Kumar Das, Anil Kumar Sutrala, Vanga Odelu, Adrijit Goswami:
A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks. Wirel. Pers. Commun. 94(3): 1899-1933 (2017) - [j27]Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Xiong Li, Adrijit Goswami:
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 96(2): 2351-2387 (2017) - 2016
- [j26]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Vanga Odelu:
Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput. Methods Programs Biomed. 135: 37-50 (2016) - [j25]Anil Kumar Sutrala, Ashok Kumar Das, Vanga Odelu, Mohammad Wazid, Saru Kumari:
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput. Methods Programs Biomed. 135: 167-185 (2016) - [j24]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure and efficient time-bound hierarchical access control scheme for secure broadcasting. Int. J. Ad Hoc Ubiquitous Comput. 22(4): 236-248 (2016) - [j23]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu, Muhammad Khurram Khan:
A User Anonymous Mutual Authentication Protocol. KSII Trans. Internet Inf. Syst. 10(9): 4508-4528 (2016) - [j22]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system. J. King Saud Univ. Comput. Inf. Sci. 28(1): 68-81 (2016) - [j21]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das, Vanga Odelu:
Analysis of Security Protocols for Mobile Healthcare. J. Medical Syst. 40(11): 229:1-229:10 (2016) - [j20]Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid, Xiong Li:
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur. Commun. Networks 9(13): 2070-2092 (2016) - [j19]Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang:
Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur. Commun. Networks 9(16): 3670-3687 (2016) - [j18]Vanga Odelu, Ashok Kumar Das:
Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography. Secur. Commun. Networks 9(17): 4048-4059 (2016) - [j17]Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu:
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Secur. Commun. Networks 9(17): 4255-4271 (2016) - [j16]Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu, Xiong Li:
Provably secure three-factor authentication and key agreement scheme for session initiation protocol. Secur. Commun. Networks 9(18): 5412-5431 (2016) - [j15]Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu:
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks. Secur. Commun. Networks 9(18): 5563-5580 (2016) - [j14]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Trans. Consumer Electron. 62(1): 30-38 (2016) - 2015
- [j13]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J. Inf. Secur. Appl. 21: 1-19 (2015) - [j12]Ashok Kumar Das, Vanga Odelu, Adrijit Goswami:
A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS. J. Medical Syst. 39(9): 92:1-92:24 (2015) - [j11]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Networks 8(9): 1732-1751 (2015) - [j10]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards. Secur. Commun. Networks 8(18): 4136-4156 (2015) - [j9]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards. IEEE Trans. Inf. Forensics Secur. 10(9): 1953-1966 (2015) - [j8]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks. Wirel. Pers. Commun. 84(1): 207-230 (2015) - [j7]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems. Wirel. Pers. Commun. 84(4): 2571-2598 (2015) - [j6]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 85(4): 1765-1788 (2015) - [i2]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices. IACR Cryptol. ePrint Arch. 2015: 841 (2015) - 2014
- [j5]Ashok Kumar Das, Adrijit Goswami, Vanga Odelu:
An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function. Int. J. Commun. Networks Distributed Syst. 12(2): 129-151 (2014) - [j4]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inf. Sci. 269: 270-285 (2014) - [c4]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks. SSCC 2014: 10-19 - [i1]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'. IACR Cryptol. ePrint Arch. 2014: 715 (2014) - 2013
- [j3]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A novel linear polynomial-based dynamic key management scheme for hierarchical access control. Int. J. Trust. Manag. Comput. Commun. 1(2): 156-174 (2013) - [j2]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System. J. Medical Syst. 37(2): 9920 (2013) - [j1]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem. Smart Comput. Rev. 3(1): 42-54 (2013) - [c3]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
LHSC: An effective dynamic key management scheme for linear hierarchical access control. COMSNETS 2013: 1-9 - [c2]Ashok Kumar Das, Vanga Odelu, Adrijit Goswami:
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function. SSCC 2013: 236-242 - 2012
- [c1]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials. SNDS 2012: 1-10
Coauthor Index
aka: Alavalapati Goutham Reddy
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint