IMG

Modeling Stream Water Temperature using Regression Analysis with Air Temperature and Streamflow over Krishna River
A.naresh, Rehana Shaik
International Journal of Engineering Technology Science and Research, IJETSR, 2017
Core Rank : - Google Rank :-
A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP.
Krishna Chaitanya Telikcherla, Akash Agrawall, Venkatesh Choppella
International Conference on Information Systems Security and Privacy, ICISSP, 2017
Core Rank : C Google Rank :22
Mitigating browser-based DDoS attacks using CORP
Akash Agrawall, Krishna Chaitanya, Arnav Kumar Agrawal, Venkatesh Choppella
Innovations in Software Engineering Conference, ISEC, 2017
Core Rank : - Google Rank :11
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
C.sravani, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Alavalapati Goutham Reddy, Eun-jun Yoon, Kee-young Yoo
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Lightweight authentication protocols for wearable devices
Ashok Kumar Das, Sherali Zeadally, Mohammad Wazid
Computers & Electrical Engineering, CEEng, 2017
Google Rank :94
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
Kisung Park, Youngho Park, Yohan Park, Alavalapati Goutham Reddy, Ashok Kumar Das
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Design of Secure User Authenticated Key Management Protocol for Generic IoT Network
Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo
IEEE Internet of Things Journal, IOT, 2017
Core Rank : - Google Rank :186
On the Design of Secure User Authenticated Key Management Scheme for Multi-Gateway Based Wireless Sensor Networks using ECC
Anil Kumar Sutrala, Ashok Kumar Das, Neeraj Kumar, Alavalapati Goutham Reddy, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues
International Journal of Communication Systems, IJCS, 2017
Core Rank : - Google Rank :52
Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment
Alavalapati Goutham Reddy, Eun-jun Yoon, Ashok Kumar Das, Vanga Odelu, Kee-young Yoo
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Expressive CP-ABE Scheme for Mobile Devices in IoT satisfying Constant-size Keys and Ciphertexts
Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-kwang Raymond Choo, Minho Jo
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266