Ram Dantu
Orcid: 0000-0001-9362-1559
According to our database1,
Ram Dantu
authored at least 161 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cse.unt.edu
On csauthors.net:
Bibliography
2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the IEEE International Conference on Mobility, 2024
Proceedings of the IEEE International Conference on Metaverse Computing, 2024
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024
2023
Seamless Asset Exchange in Interconnected Metaverses: Unraveling On-Chain Atomic Swap.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Performance Analysis of Homomorphically-Encrypted Heterogeneous Multi-Layer Graph Databases.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023
2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022
Proceedings of the 3rd International Conference on Mathematical Research for Blockchain Economy, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the 7th IEEE International Conference on Collaboration and Internet Computing, 2021
2020
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews.
IACR Cryptol. ePrint Arch., 2020
On-Road Performance Evaluation of IEEE 802.11p/WAVE in BSM Signalling and Video Streaming using WSMP.
Proceedings of the 2020 Wireless Telecommunications Symposium, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
EW<sub>256357</sub>: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security.
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Biomed. Signal Process. Control., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the National Cyber Summit, 2018
An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems.
Proceedings of the National Cyber Summit, 2018
Prediction of human error using eye movements patterns for unintentional insider threat detection.
Proceedings of the IEEE 4th International Conference on Identity, 2018
Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
2017
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
2016
Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals.
J. Internet Serv. Inf. Secur., 2016
Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms.
Comput. Secur., 2016
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016
2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014
Proceedings of the Cyber and Information Security Research Conference, 2014
2013
ACM Trans. Intell. Syst. Technol., 2013
IEEE Trans. Biomed. Eng., 2013
Multim. Tools Appl., 2013
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013
Proceedings of the 8th International Conference on Body Area Networks, 2013
Proceedings of the 8th International Conference on Body Area Networks, 2013
Proceedings of the Data Driven Wellness: From Self-Tracking to Behavior Change, 2013
2012
2011
IEEE Trans. Syst. Man Cybern. Part A, 2011
Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches.
Soc. Netw. Anal. Min., 2011
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the IEEE International Conference on Systems, 2011
Proceedings of the IEEE International Conference on Systems, 2011
2010
Int. J. Sens. Networks, 2010
Int. J. Pervasive Comput. Commun., 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010
Proceedings of the Second International Conference on Communication Systems and Networks, 2010
Proceedings of the Second International Conference on Communication Systems and Networks, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
2009
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the Technosocial Predictive Analytics, 2009
2008
An Impatient Evolutionary Algorithm With Probabilistic Tabu Search for Unified Solution of Some NP-Hard Problems in Graph and Set Theory via Clique Finding.
IEEE Trans. Syst. Man Cybern. Part B, 2008
IEEE Trans. Software Eng., 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008
Experiences in building a multi-university testbed for research in multimedia communications.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
IEEE Trans. Dependable Secur. Comput., 2007
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007
Proceedings of the Real-Time Mobile Multimedia Services, 2007
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
2006
2005
Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Peer-to-Peer Adaptation Layer (M2PA).
RFC, September, 2005
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Intelligence and Security Informatics, 2005
2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
2002
RFC, September, 2002
1991
Mach. Vis. Appl., 1991
1988
Proceedings of the 1988 IEEE International Conference on Robotics and Automation, 1988
1987
The Homogeneous Multiprocessor System, An Overview.
Proceedings of the International Conference on Parallel Processing, 1987