V. N. Sastry
According to our database1,
V. N. Sastry
authored at least 45 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
J. Ambient Intell. Humaniz. Comput., 2023
MCMARS: Hybrid Multi-criteria Decision-Making Algorithm for Recommender Systems of Mobile Applications.
Proceedings of the Distributed Computing and Intelligent Technology, 2023
2022
J. Supercomput., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning.
Comput. Secur., 2022
2021
MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map.
Telecommun. Syst., 2021
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment.
Peer-to-Peer Netw. Appl., 2021
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology.
Peer-to-Peer Netw. Appl., 2021
J. Netw. Comput. Appl., 2021
2020
Comput. Secur., 2020
2019
Comput. Stand. Interfaces, 2019
Proceedings of the 5th IEEE International Conference on Identity, 2019
2018
Improving straggler task performance in a heterogeneous MapReduce framework using reinforcement learning.
Int. J. Big Data Intell., 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things.
Inf., 2017
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things Using Bloom Filter.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Symmetric hash function based secure and efficient authenticated key exchange mechanism for wireless sensor networks.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017
2016
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016
2015
Expert Syst. Appl., 2015
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2015
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2015
2014
Int. J. E Serv. Mob. Appl., 2014
Int. J. Comput. Sci. Eng., 2014
New route discovery design for routing misbehaviour prevention in multi-hop wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2014
Portfolio selection using Maximum-entropy gain loss spread model: A GA based approach.
Proceedings of the 2014 International Conference on Advances in Computing, 2014
A review of adaptive approaches to MapReduce scheduling in heterogeneous environments.
Proceedings of the 2014 International Conference on Advances in Computing, 2014
2013
2012
Int. J. Netw. Secur., 2012
Int. J. Inf. Secur. Priv., 2012
Int. J. Adv. Pervasive Ubiquitous Comput., 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
2011
An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.
J. Comput., 2011
2009
Int. J. Comput. Sci. Appl., 2009
2006
Proceedings of the 9th International Conference in Information Technology, 2006
2005
New polynomial time algorithms to compute a set of Pareto optimal paths for multi-objective shortest path problems.
Int. J. Comput. Math., 2005
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005
2004
Proceedings of the 7th International Symposium on Parallel Architectures, 2004