default search action
V. N. Sastry
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j25]Sriramulu Bojjagani, V. N. Sastry, Chien-Ming Chen, Saru Kumari, Muhammad Khurram Khan:
Systematic survey of mobile payments, protocols, and security infrastructure. J. Ambient Intell. Humaniz. Comput. 14(1): 609-654 (2023) - [c20]S. Tejaswi, V. N. Sastry, S. Durga Bhavani:
MCMARS: Hybrid Multi-criteria Decision-Making Algorithm for Recommender Systems of Mobile Applications. ICDCIT 2023: 107-124 - [i1]Mallikarjun Reddy Dorsala, V. N. Sastry, Sudhakar Chapram:
Blockchain-based Cloud Data Deduplication Scheme with Fair Incentives. CoRR abs/2307.12052 (2023) - 2022
- [j24]S. Manimaran, V. N. Sastry, N. P. Gopalan:
SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning. Comput. Secur. 118: 102729 (2022) - [j23]Mallikarjun Reddy Dorsala, V. N. Sastry, Sudhakar Chapram:
Fair payments for privacy-preserving aggregation of mobile crowdsensing data. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part A): 5478-5492 (2022) - [j22]S. Manimaran, V. N. Sastry, N. P. Gopalan:
STMAD: sensor-based threat's mitigation on smartphones using allowlist and denylist. J. Supercomput. 78(14): 16336-16363 (2022) - 2021
- [j21]Mallikarjun Reddy Dorsala, V. N. Sastry, Sudhakar Chapram:
Blockchain-based solutions for cloud computing: A survey. J. Netw. Comput. Appl. 196: 103246 (2021) - [j20]Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 14(1): 403-419 (2021) - [j19]Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment. Peer-to-Peer Netw. Appl. 14(3): 1572-1595 (2021) - [j18]Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map. Telecommun. Syst. 78(3): 477-496 (2021) - 2020
- [j17]Mallikarjun Reddy Dorsala, V. N. Sastry, Sudhakar Chapram:
Fair payments for verifiable cloud services using smart contracts. Comput. Secur. 90: 101712 (2020) - [j16]Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
Efficient user authentication protocol for distributed multimedia mobile cloud environment. J. Ambient Intell. Humaniz. Comput. 11(5): 1933-1956 (2020)
2010 – 2019
- 2019
- [j15]Sriramulu Bojjagani, V. N. Sastry:
A secure end-to-end proximity NFC-based mobile payment protocol. Comput. Stand. Interfaces 66 (2019) - [c19]Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
Biometric based User Authentication Protocol for Mobile Cloud Environment. ISBA 2019: 1-6 - 2018
- [j14]Nenavath Srinivas Naik, Atul Negi, V. N. Sastry:
Improving straggler task performance in a heterogeneous MapReduce framework using reinforcement learning. Int. J. Big Data Intell. 5(4): 201-215 (2018) - [c18]Mallikarjun Reddy Dorsala, V. N. Sastry, Sudhakar Chapram:
Fair Protocols for Verifiable Computations Using Bitcoin and Ethereum. IEEE CLOUD 2018: 786-793 - 2017
- [j13]Sriramulu Bojjagani, V. N. Sastry:
A secure end-to-end SMS-based mobile banking protocol. Int. J. Commun. Syst. 30(15) (2017) - [j12]Anup Kumar Maurya, V. N. Sastry:
Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things. Inf. 8(4): 136 (2017) - [c17]Anup Kumar Maurya, V. N. Sastry:
Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks. ANTS 2017: 1-6 - [c16]Sriramulu Bojjagani, V. N. Sastry:
VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps. CIC 2017: 77-86 - [c15]Anup Kumar Maurya, V. N. Sastry:
Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter. CIC 2017: 173-180 - [c14]Anup Kumar Maurya, V. N. Sastry:
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition. SSCC 2017: 39-53 - [c13]Anup Kumar Maurya, V. N. Sastry:
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem. SSCC 2017: 79-94 - 2016
- [c12]Srikanth Kaka, V. N. Sastry, Rajib Ranjan Maiti:
On the MitM vulnerability in mobile banking applications for android devices. ANTS 2016: 1-6 - 2015
- [j11]Akhter Mohiuddin Rather, Arun Agarwal, V. N. Sastry:
Recurrent neural network and a hybrid model for prediction of stock returns. Expert Syst. Appl. 42(6): 3234-3241 (2015) - [c11]Sriramulu Bojjagani, V. N. Sastry:
STAMBA: Security Testing for Android Mobile Banking Apps. SIRS 2015: 671-683 - [c10]Anup Kumar Maurya, V. N. Sastry, Siba Kumar Udgata:
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks. SSCC 2015: 134-145 - [c9]Sriramulu Bojjagani, V. N. Sastry:
SSMBP: A secure SMS-based mobile banking protocol with formal verification. WiMob 2015: 252-259 - 2014
- [j10]Kavitha Ammayappan, Atul Negi, V. N. Sastry:
New route discovery design for routing misbehaviour prevention in multi-hop wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 7(3): 211-238 (2014) - [j9]Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
Secure mobile payment framework based on UICC with formal verification. Int. J. Comput. Sci. Eng. 9(4): 355-370 (2014) - [j8]Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
A Secure and Optimized Proximity Mobile Payment Framework with Formal Verification. Int. J. E Serv. Mob. Appl. 6(1): 66-92 (2014) - [c8]Akhter Mohiuddin Rather, V. N. Sastry, Arun Agarwal:
Portfolio selection using Maximum-entropy gain loss spread model: A GA based approach. ICACCI 2014: 400-406 - [c7]Nenavath Srinivas Naik, Atul Negi, V. N. Sastry:
A review of adaptive approaches to MapReduce scheduling in heterogeneous environments. ICACCI 2014: 677-683 - 2013
- [j7]Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
A Secure Mobile Payment Framework in MANET Environment. Int. J. E Bus. Res. 9(1): 54-84 (2013) - 2012
- [j6]Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
A Secure Mobile Wallet Framework with Formal Verification. Int. J. Adv. Pervasive Ubiquitous Comput. 4(2): 1-15 (2012) - [j5]Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption. Int. J. Inf. Secur. Priv. 6(2): 64-94 (2012) - [j4]Kavitha Ammayappan, V. N. Sastry, Atul Negi:
A New Secure Route Discovery Protocol for MANETs to Prevent Hidden Channel Attacks. Int. J. Netw. Secur. 14(3): 121-141 (2012) - [c6]V. Madhusudan Rao, V. N. Sastry:
Unsupervised feature ranking based on representation entropy. RAIT 2012: 421-425 - [c5]Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
A secure and optimized mobile payment framework with formal verification. SECURIT 2012: 27-35 - 2011
- [j3]Kavitha Ammayappan, Atul Negi, V. N. Sastry, Ashok Kumar Das:
An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. J. Comput. 6(11): 2408-2416 (2011)
2000 – 2009
- 2009
- [j2]G. Geethakumari, Atul Negi, V. N. Sastry:
A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems. Int. J. Comput. Sci. Appl. 6(1): 1-12 (2009) - 2006
- [c4]G. Geethakumari, Atul Negi, V. N. Sastry:
Indirect Authorization Topologies for Grid Access Control. ICIT 2006: 186-187 - 2005
- [j1]V. N. Sastry, T. N. Janakiraman, S. Ismail Mohideen:
New polynomial time algorithms to compute a set of Pareto optimal paths for multi-objective shortest path problems. Int. J. Comput. Math. 82(3): 289-300 (2005) - [c3]G. Geethakumari, Atul Negi, V. N. Sastry:
Dynamic Delegation Approach for Access Control in Grids. e-Science 2005: 387-394 - [c2]V. N. Sastry, P. Supraja:
Location-based associativity routing for MANET. WiMob (3) 2005: 49-56 - 2004
- [c1]Amarnath K. Koundinya, Atul Negi, V. N. Sastry:
Unicast Routing Algorithm with Multiple Quality-of-Service Parameters. ISPAN 2004: 520-526
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint