default search action
Goutham Reddy Alavalapati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Raveendra Babu Ponnuru, Sathish A. P. Kumar, Alavalapati Goutham Reddy, Ashok Kumar Das:
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges. Comput. Sci. Rev. 54: 100676 (2024) - [j28]Chaitanyateja Thotadi, Monith Debbala, Subba Rao, Ajay Eeralla, Basker Palaniswamy, Srijanee Mookherji, Vanga Odelu, Alavalapati Goutham Reddy:
E-Brightpass: A Secure way to access social networks on smartphones. Cyber Secur. Appl. 2: 100021 (2024) - [j27]K. G. Raghavendra Narayan, Rakesh Ganesula, Tamminaina Sai Somasekhar, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Alavalapati Goutham Reddy:
Attenuating majority attack class bias using hybrid deep learning based IDS framework. J. Netw. Comput. Appl. 230: 103954 (2024) - [c5]Harika Lingamsetty, N. Surya Sri Nitya, Bala Mani Teja M, Vanga Odelu, Srijanee Mookherji, KG Raghavendra Narayan, Rajendra Prasath, Alavalapati Goutham Reddy:
A Penalty-Based Entropy Driven Universal Password Strength for Lightweight Devices. COMSNETS 2024: 25-30 - 2023
- [j26]Basker Palaniswamy, Keyvan Ansari, Alavalapati Goutham Reddy, Ashok Kumar Das, Sachin Shetty:
Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus. IEEE Trans. Veh. Technol. 72(4): 4493-4509 (2023) - 2022
- [j25]Devanapalli Suresh, Vanga Odelu, Alavalapati Goutham Reddy, Kolloju Phaneendra, Hyunsung Kim:
Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices. IEEE Access 10: 109526-109536 (2022) - [j24]Raveendra Babu Ponnuru, Basker Palaniswamy, Alavalapati Goutham Reddy, Vanga Odelu, Hyunsung Kim:
A survey on security challenges and protocols of electric vehicle dynamic charging system. Secur. Priv. 5(3) (2022) - [j23]Raveendra Babu Ponnuru, Alavalapati Goutham Reddy, Basker Palaniswamy, Suneel Kumar Kommuri:
EV-Auth: Lightweight Authentication Protocol Suite for Dynamic Charging System of Electric Vehicles With Seamless Handover. IEEE Trans. Intell. Veh. 7(3): 734-747 (2022) - [j22]Raveendra Babu Ponnuru, Alavalapati Goutham Reddy, Basker Palaniswamy, Ashok Kumar Das:
EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions. IEEE Trans. Netw. Sci. Eng. 9(5): 3791-3807 (2022) - 2021
- [j21]Raveendra Babu Ponnuru, Ruhul Amin, Alavalapati Goutham Reddy, Ashok Kumar Das, Willy Susilo, Youngho Park:
Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles. IEEE Trans. Veh. Technol. 70(11): 11338-11351 (2021) - [c4]Mudarabilli Harshini, Padigala Lakshman Sai, Singam Chennamma, Thanuja, Alavalapati Goutham Reddy, Hyunsung Kim:
Easy-Auth: Graphical Password Authentication using a Randomization Method. LATINCOM 2021: 1-6 - 2020
- [j20]Nazish Khan, Imran Ahmed, Mahreen Kiran, Hamood ur Rehman, Sadia Din, Anand Paul, Goutham Reddy Alavalapati:
Automatic segmentation of liver & lesion detection using H-minima transform and connecting component labeling. Multim. Tools Appl. 79(13-14): 8459-8481 (2020) - [j19]Mahreen Kiran, Imran Ahmed, Nazish Khan, Hamood ur Rehman, Sadia Din, Anand Paul, Goutham Reddy Alavalapati:
Comparative analysis of segmentation techniques based on chest X-ray images. Multim. Tools Appl. 79(13-14): 8483-8518 (2020) - [j18]Ankitha Vaddeti, Deepthi Vidiyala, Vineetha Puritipati, Raveendra Babu Ponnuru, Ji Sun Shin, Goutham Reddy Alavalapati:
Graphical passwords: Behind the attainment of goals. Secur. Priv. 3(6) (2020) - [j17]Lionel Nkenyereye, Lewis Nkenyereye, Bayu Adhi Tama, Alavalapati Goutham Reddy, JaeSeung Song:
Software-Defined Vehicular Cloud Networks: Architecture, Applications and Virtual Machine Migration. Sensors 20(4): 1092 (2020)
2010 – 2019
- 2019
- [j16]Awais Ahmad, Muhammad Babar, Sadia Din, Shehzad Khalid, M. Mazhar Rathore, Anand Paul, Goutham Reddy Alavalapati, Nasro Min-Allah:
Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics. Future Gener. Comput. Syst. 92: 868-878 (2019) - [j15]Goutham Reddy Alavalapati, Ashok Kumar Das, Vanga Odelu, Awais Ahmad, Ji Sun Shin:
A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment. J. Ambient Intell. Humaniz. Comput. 10(2): 661-680 (2019) - [j14]Mahreen Kiran, Imran Ahmed, Nazish Khan, Goutham Reddy Alavalapati:
Chest X-ray segmentation using Sauvola thresholding and Gaussian derivatives responses. J. Ambient Intell. Humaniz. Comput. 10(10): 4179-4195 (2019) - 2018
- [j13]Khizar Hameed, Abid Khan, Mansoor Ahmed, Goutham Reddy Alavalapati, M. Mazhar Rathore:
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Gener. Comput. Syst. 82: 274-289 (2018) - [j12]Anil Kumar Sutrala, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues:
On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. Int. J. Commun. Syst. 31(8) (2018) - [j11]Goutham Reddy Alavalapati, Eun-Jun Yoon, Young-Ju Kim, Kee-Young Yoo:
Design of a Secure Mutually Authenticated Key-Agreement Protocol for Multi-server Architecture. J. Comput. 13(2): 194-203 (2018) - [j10]Mubashar Hussain, Mansoor Ahmed, Hasan Ali Khattak, Muhammad Imran, Abid Khan, Sadia Din, Awais Ahmad, Gwanggil Jeon, Goutham Reddy Alavalapati:
Towards ontology-based multilingual URL filtering: a big data problem. J. Supercomput. 74(10): 5003-5021 (2018) - 2017
- [j9]Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo:
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access 5: 3028-3043 (2017) - [j8]Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Vanga Odelu, Kee-Young Yoo:
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment. IEEE Access 5: 3622-3639 (2017) - [j7]Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Goutham Reddy Alavalapati, Kisung Park, Youngho Park:
On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems. IEEE Access 5: 7012-7030 (2017) - [j6]Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Goutham Reddy Alavalapati, Kisung Park, Youngho Park:
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks. IEEE Access 5: 14966-14980 (2017) - [j5]Kisung Park, Youngho Park, YoHan Park, Goutham Reddy Alavalapati, Ashok Kumar Das:
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks. IEEE Access 5: 25110-25125 (2017) - [j4]Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo:
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'. IET Inf. Secur. 11(4): 220-221 (2017) - 2016
- [j3]Goutham Reddy Alavalapati, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo:
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access 4: 4394-4407 (2016) - [j2]Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards. IET Inf. Secur. 10(5): 272-282 (2016) - [j1]Goutham Reddy Alavalapati, Ashok Kumar Das, Eun-Jun Yoon, Kee-Young Yoo:
An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards. KSII Trans. Internet Inf. Syst. 10(7): 3371-3396 (2016) - [c3]Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. SIN 2016: 145-149 - 2015
- [c2]Reddy A. Goutham, Gil-Je Lee, Kee-Young Yoo:
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards. SAC 2015: 169-174 - 2014
- [c1]Reddy A. Goutham, Dae-Soo Kim, Kee-Young Yoo:
Implicit graphical password mutual authentication using mirror-image encryption. RACS 2014: 218-223
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint