V. Ch. Venkaiah

Orcid: 0000-0001-5440-0200

According to our database1, V. Ch. Venkaiah authored at least 34 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A novel stream cipher based on quasigroups and QG-PRNG.
Int. J. Inf. Comput. Secur., 2023

2022
An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup.
Int. J. Cloud Appl. Comput., 2022

A Family of Block Ciphers Based on Multiple Quasigroups.
IACR Cryptol. ePrint Arch., 2022

2021
A dynamic key management paradigm for secure wireless ad hoc network communications.
Int. J. Inf. Comput. Secur., 2021

CKD-Tree: An Improved KD-Tree Construction Algorithm.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

2020
Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme.
Int. J. Inf. Priv. Secur. Integr., 2020

New multi-secret sharing scheme based on superincreasing sequence for level-ordered access structure.
Int. J. Commun. Networks Distributed Syst., 2020

2019
Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks.
Int. J. Netw. Secur., 2019

A novel self-healing key distribution scheme based on vector space access structure and MDS codes.
Int. J. Commun. Syst., 2019

Towards a Hybrid Public Key Infrastructure (PKI): A Review.
IACR Cryptol. ePrint Arch., 2019

2018
CRT based multi-secret sharing schemes: revisited.
Int. J. Secur. Networks, 2018

A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence.
Int. J. Netw. Secur., 2018

Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures.
IACR Cryptol. ePrint Arch., 2018

Lightweight Cryptography for Distributed PKI Based MANETS.
CoRR, 2018

2017
Node Authentication Using BLS Signature in Distributed PKI Based MANETS.
CoRR, 2017

Multi-secret Sharing Scheme for Level-Ordered Access Structures.
Proceedings of the Number-Theoretic Methods in Cryptology - First International Conference, 2017

2016
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure.
Int. J. Netw. Secur., 2016

An Empirical Study towards Refining the AKS Primality Testing Algorithm.
IACR Cryptol. ePrint Arch., 2016

2015
New secret sharing scheme for multipartite access structures with threshold changeability.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Computationally perfect compartmented secret sharing schemes based on MDS codes.
Int. J. Trust. Manag. Comput. Commun., 2014

Equivalence of lower bounds on the number of perfect pairs.
CoRR, 2014

Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures.
Proceedings of the Security in Computing and Communications, 2014

Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2013
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes.
IACR Cryptol. ePrint Arch., 2013

Conjunctive Hierarchical Secret Sharing Scheme Based on MDS Codes.
Proceedings of the Combinatorial Algorithms - 24th International Workshop, 2013

2012
Quasi-cyclic codes over F<sub>13</sub> and enumeration of defining polynomials.
J. Discrete Algorithms, 2012

2011
Acyclic vertex coloring of graphs of maximum degree 5.
Discret. Math., 2011

Fuzzy adaptive bacterial foraging congestion management using sensitivity based optimal active power re-scheduling of generators.
Appl. Soft Comput., 2011

2009
Acyclic Vertex Coloring of Graphs of Maximum Degree Six.
Electron. Notes Discret. Math., 2009

2008
Anti-magic labellings of a class of planar graphs.
Australas. J Comb., 2008

2005
A note on finding a maximum clique in a graph using BDDs.
Australas. J Comb., 2005

1996
A shrinking polytope method for linear programming.
Neural Parallel Sci. Comput., 1996

1994
Subspace rotation using modified Householder transforms and projection matrices - Robustness of DOA algorithms.
Signal Process., 1994

1990
A concise algorithm to solve over-/under-determined linear systems.
Simul., 1990


  Loading...