Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism SK Dwivedi, R Amin, S Vollala Journal of Information Security and Applications 54, 102554, 2020 | 186 | 2020 |
Review on “Blockchain technology based medical healthcare system with privacy issues” A Saha, R Amin, S Kunal, S Vollala, SK Dwivedi Security and Privacy 2 (5), e83, 2019 | 97 | 2019 |
Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities SK Dwivedi, R Amin, S Vollala, R Chaudhry Computers & Electrical Engineering 86, 106719, 2020 | 93 | 2020 |
Blockchain-based secured IPFS-enable event storage technique with authentication protocol in VANET SK Dwivedi, R Amin, S Vollala IEEE/CAA Journal of Automatica Sinica 8 (12), 1913-1922, 2021 | 78 | 2021 |
Insider attack protection: Lightweight password-based authentication techniques using ECC S Rajamanickam, S Vollala, R Amin, N Ramasubramanian IEEE Systems Journal 14 (2), 1972-1983, 2019 | 34 | 2019 |
Blockchain-based vehicular ad-hoc networks: A comprehensive survey SK Dwivedi, R Amin, AK Das, MT Leung, KKR Choo, S Vollala Ad Hoc Networks 137, 102980, 2022 | 25 | 2022 |
An enhanced anonymity resilience security protocol for vehicular ad-hoc network with scyther simulation R Amin, P Lohani, ML Ekka, S Chourasia, S Vollala Computers & Electrical Engineering 82, 106554, 2020 | 24 | 2020 |
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment SK Dwivedi, R Amin, S Vollala Peer-to-Peer Networking and Applications 16 (1), 1-21, 2023 | 23 | 2023 |
B-HAS: Blockchain-assisted efficient handover authentication and secure communication protocol in VANETs SK Dwivedi, R Amin, S Vollala, MK Khan IEEE Transactions on Network Science and Engineering 10 (6), 3491-3504, 2023 | 22 | 2023 |
Provably secured lightweight authenticated key agreement protocol for modern health industry M Abdussami, R Amin, S Vollala Ad Hoc Networks 141, 103094, 2023 | 20 | 2023 |
Design of RSA processor for concurrent cryptographic transformations S Vollala, VV Varadhan, K Geetha, N Ramasubramanian Microelectronics Journal 63, 112-122, 2017 | 17 | 2017 |
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment M Abdussami, R Amin, S Vollala International Journal of Information Security 21 (6), 1373-1387, 2022 | 16 | 2022 |
Medical image segmentation using levit-unet++: A case study on gi tract data P Nemani, S Vollala 2022 26th International Computer Science and Engineering Conference (ICSEC …, 2022 | 14 | 2022 |
Efficient modular multiplication algorithms for public key cryptography S Vollala, VV Varadhan, K Geetha, N Ramasubramanian 2014 IEEE International Advance Computing Conference (IACC), 74-78, 2014 | 13 | 2014 |
eUASBP: enhanced user authentication scheme based on bilinear pairing S Rajaram, T Maitra, S Vollala, N Ramasubramanian, R Amin Journal of Ambient Intelligence and Humanized Computing 11, 2827-2840, 2020 | 12 | 2020 |
Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques S Vollala, N Ramasubramanian Information Processing Letters 119, 25-38, 2017 | 12 | 2017 |
Efficient modular exponential algorithms compatible with hardware implementation of public‐key cryptography S Vollala, K Geetha, N Ramasubramanian Security and Communication Networks 9 (16), 3105-3115, 2016 | 12 | 2016 |
Ransomware attack protection: A cryptographic approach A Kumari, MZA Bhuiyan, J Namdeo, S Kanaujia, R Amin, S Vollala Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019 | 11 | 2019 |
Design of blockchain and ECC-based robust and efficient batch authentication protocol for vehicular ad-hoc networks SK Dwivedi, R Amin, S Vollala, AK Das IEEE Transactions on Intelligent Transportation Systems, 2023 | 9 | 2023 |
Automatic detection of epilepsy eeg using neural networks S Vollala, K Gulla Int. J. Internet Comput 506009, 68-72, 2012 | 9 | 2012 |