Raghav V. Sampangi

Orcid: 0000-0002-7919-8843

According to our database1, Raghav V. Sampangi authored at least 17 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Programming Assignment Ungrading as a License to Learn: Implementing Specifications Grading in the Undergraduate Web Development Classroom.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

Mobile Application Security Risk Score: A sensitive user input-based approach.
Proceedings of the 3rd IEEE International Conference on AI in Cybersecurity, 2024

Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User Inputs.
Proceedings of the 3rd IEEE International Conference on AI in Cybersecurity, 2024

2019
Designing Engaging Learning Experiences.
Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, 2019

Personal Safety App Effectiveness.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2017
Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks.
Int. J. Netw. Secur., 2017

HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms.
Int. J. Inf. Sec., 2017

2016
Grab This, Swipe That: Combining Tangible and Gestural Interaction in Multiple Display Collaborative Gameplay.
Proceedings of the 2016 ACM on Interactive Surfaces and Spaces, 2016

Who Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

2015
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
Sensors, 2015

HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption.
Proceedings of the ICISSP 2015, 2015

Lightweight protocol for anonymity and mutual authentication in RFID systems.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
RFID encryption scheme featuring pseudorandom numbers and Butterfly seed generation.
Proceedings of the 22nd International Conference on Software, 2014

SCARS: Simplified cryptographic algorithm for RFID systems.
Proceedings of the IEEE RFID Technology and Applications Conference, 2014

HiveSign: dynamic message signatures for resource-constrained wireless networks.
Proceedings of the Q2SWinet'14, 2014

2012
A security suite for wireless body area networks
CoRR, 2012

Tag-server mutual authentication scheme based on gene transfer and genetic mutation.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012


  Loading...