IMG

A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP.
Krishna Chaitanya Telikcherla, Akash Agrawall, Venkatesh Choppella
International Conference on Information Systems Security and Privacy, ICISSP, 2017
Core Rank : C Google Rank :22
Mitigating browser-based DDoS attacks using CORP
Akash Agrawall, Krishna Chaitanya, Arnav Kumar Agrawal, Venkatesh Choppella
Innovations in Software Engineering Conference, ISEC, 2017
Core Rank : - Google Rank :11
Notion of Semantics in Computer Science-A Systematic Literature Review
Gollapudi V.r.j. Sai Prasad, Venkatesh Choppella
International Conference on Natural Language Processing., ICON, 2017
Core Rank : - Google Rank :5
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy
Akash Agrawall, Maheshwari Shubh Jagmohan, Projit Bandyopadhyay, Venkatesh Choppella
International Conference on Information Systems Security, ICISS, 2017
Core Rank : - Google Rank :-
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
C.sravani, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Alavalapati Goutham Reddy, Eun-jun Yoon, Kee-young Yoo
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Lightweight authentication protocols for wearable devices
Ashok Kumar Das, Sherali Zeadally, Mohammad Wazid
Computers & Electrical Engineering, CEEng, 2017
Google Rank :94
Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks
Kisung Park, Youngho Park, Yohan Park, Alavalapati Goutham Reddy, Ashok Kumar Das
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Design of Secure User Authenticated Key Management Protocol for Generic IoT Network
Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, Minho Jo
IEEE Internet of Things Journal, IOT, 2017
Core Rank : - Google Rank :186
On the Design of Secure User Authenticated Key Management Scheme for Multi-Gateway Based Wireless Sensor Networks using ECC
Anil Kumar Sutrala, Ashok Kumar Das, Neeraj Kumar, Alavalapati Goutham Reddy, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues
International Journal of Communication Systems, IJCS, 2017
Core Rank : - Google Rank :52
Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment
Alavalapati Goutham Reddy, Eun-jun Yoon, Ashok Kumar Das, Vanga Odelu, Kee-young Yoo
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266