Satyanarayana Vollala

Orcid: 0000-0003-3727-7081

According to our database1, Satyanarayana Vollala authored at least 36 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design of Blockchain and ECC-Based Robust and Efficient Batch Authentication Protocol for Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., January, 2024

Improving the performance of authentication protocols using efficient modular multi exponential technique.
Multim. Tools Appl., January, 2024

2023
BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation.
Comput. Commun., September, 2023

Provably secured lightweight authenticated key agreement protocol for modern health industry.
Ad Hoc Networks, March, 2023

Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment.
Peer Peer Netw. Appl., January, 2023

B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs.
IEEE Trans. Netw. Sci. Eng., 2023

Detecting and predicting countermeasures against clickjacking.
Secur. Priv., 2023

A Novel end-to-end Framework for Occluded Pixel Reconstruction with Spatio-temporal Features for Improved Person Re-identification.
CoRR, 2023

Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability.
Comput. Commun., 2023

Cryptanalysis and Improvement of a Blockchain Based Lightweight Authentication and Key Agreement Scheme for Internet of Vehicles.
Proceedings of the International Conference on Communications, 2023

2022
Secure and Energy Efficient Design of Multi-Modular Exponential Techniques for Public-Key Cryptosystem.
J. Commun. Inf. Networks, September, 2022

EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario.
Secur. Priv., 2022

Enhanced and secured random number generation for eUASBP.
Int. J. Syst. Assur. Eng. Manag., 2022

Efficient hardware realization and high radix implementation of modular multi exponential techniques for public key cryptography.
Microelectron. J., 2022

LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment.
Int. J. Inf. Sec., 2022

<i>ERMAP</i>: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations.
Int. J. Ad Hoc Ubiquitous Comput., 2022

Medical Image Segmentation using LeViT-UNet++: A Case Study on GI Tract Data.
CoRR, 2022

A Cognitive Study on Semantic Similarity Analysis of Large Corpora: A Transformer-based Approach.
CoRR, 2022

Blockchain-based vehicular ad-hoc networks: A comprehensive survey.
Ad Hoc Networks, 2022

Design of Blockchain-based Secure Electric Vehicle Charging System Using ECC.
Proceedings of the International Conference on Computer, 2022

2021
Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET.
IEEE CAA J. Autom. Sinica, 2021

RoBINN: Robust Bird Species Identification using Neural Network.
Proceedings of the 18th International Conference on Signal Processing and Multimedia Applications, 2021

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques
Springer, ISBN: 978-3-030-74523-3, 2021

2020
Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC.
IEEE Syst. J., 2020

eUASBP: enhanced user authentication scheme based on bilinear pairing.
J. Ambient Intell. Humaniz. Comput., 2020

Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism.
J. Inf. Secur. Appl., 2020

Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities.
Comput. Electr. Eng., 2020

An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation.
Comput. Electr. Eng., 2020

2019
Review on "Blockchain technology based medical healthcare system with privacy issues".
Secur. Priv., 2019

Ransomware Attack Protection: A Cryptographic Approach.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Metric Reckon Algorithm for Bit Forwarding Techniques.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019

2017
Design of RSA processor for concurrent cryptographic transformations.
Microelectron. J., 2017

Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques.
Inf. Process. Lett., 2017

Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation.
Int. J. Inf. Secur. Priv., 2017

Evaluation of password encrypted key exchange authentication techniques: design approach perspective: evaluation of PAKE protocol.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

2016
Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography.
Secur. Commun. Networks, 2016


  Loading...