V. N. Sastry

According to our database1, V. N. Sastry authored at least 46 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Systematic survey of mobile payments, protocols, and security infrastructure.
J. Ambient Intell. Humaniz. Comput., 2023

Blockchain-based Cloud Data Deduplication Scheme with Fair Incentives.
CoRR, 2023

MCMARS: Hybrid Multi-criteria Decision-Making Algorithm for Recommender Systems of Mobile Applications.
Proceedings of the Distributed Computing and Intelligent Technology, 2023

2022
STMAD: sensor-based threat's mitigation on smartphones using allowlist and denylist.
J. Supercomput., 2022

Fair payments for privacy-preserving aggregation of mobile crowdsensing data.
J. King Saud Univ. Comput. Inf. Sci., 2022

SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning.
Comput. Secur., 2022

2021
MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map.
Telecommun. Syst., 2021

Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment.
Peer-to-Peer Netw. Appl., 2021

BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology.
Peer-to-Peer Netw. Appl., 2021

Blockchain-based solutions for cloud computing: A survey.
J. Netw. Comput. Appl., 2021

2020
Efficient user authentication protocol for distributed multimedia mobile cloud environment.
J. Ambient Intell. Humaniz. Comput., 2020

Fair payments for verifiable cloud services using smart contracts.
Comput. Secur., 2020

2019
A secure end-to-end proximity NFC-based mobile payment protocol.
Comput. Stand. Interfaces, 2019

Biometric based User Authentication Protocol for Mobile Cloud Environment.
Proceedings of the 5th IEEE International Conference on Identity, 2019

2018
Improving straggler task performance in a heterogeneous MapReduce framework using reinforcement learning.
Int. J. Big Data Intell., 2018

Fair Protocols for Verifiable Computations Using Bitcoin and Ethereum.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things.
Inf., 2017

A secure end-to-end SMS-based mobile banking protocol.
Int. J. Commun. Syst., 2017

User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
On the MitM vulnerability in mobile banking applications for android devices.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
Recurrent neural network and a hybrid model for prediction of stock returns.
Expert Syst. Appl., 2015

SSMBP: A secure SMS-based mobile banking protocol with formal verification.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2015

STAMBA: Security Testing for Android Mobile Banking Apps.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2015

2014
A Secure and Optimized Proximity Mobile Payment Framework with Formal Verification.
Int. J. E Serv. Mob. Appl., 2014

Secure mobile payment framework based on UICC with formal verification.
Int. J. Comput. Sci. Eng., 2014

New route discovery design for routing misbehaviour prevention in multi-hop wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2014

Portfolio selection using Maximum-entropy gain loss spread model: A GA based approach.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

A review of adaptive approaches to MapReduce scheduling in heterogeneous environments.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
A Secure Mobile Payment Framework in MANET Environment.
Int. J. E Bus. Res., 2013

2012
A New Secure Route Discovery Protocol for MANETs to Prevent Hidden Channel Attacks.
Int. J. Netw. Secur., 2012

Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption.
Int. J. Inf. Secur. Priv., 2012

A Secure Mobile Wallet Framework with Formal Verification.
Int. J. Adv. Pervasive Ubiquitous Comput., 2012

A secure and optimized mobile payment framework with formal verification.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Unsupervised feature ranking based on representation entropy.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2011
An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.
J. Comput., 2011

2009
A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems.
Int. J. Comput. Sci. Appl., 2009

2006
Indirect Authorization Topologies for Grid Access Control.
Proceedings of the 9th International Conference in Information Technology, 2006

2005
New polynomial time algorithms to compute a set of Pareto optimal paths for multi-objective shortest path problems.
Int. J. Comput. Math., 2005

Location-based associativity routing for MANET.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Dynamic Delegation Approach for Access Control in Grids.
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005

2004
Unicast Routing Algorithm with Multiple Quality-of-Service Parameters.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004


  Loading...