1. A G Reddy et al. and K Y Yoo

        Implicit graphical password mutual authentication using mirror-image encryption
        Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (ACM RACS)
        Baltimore, USA 


     2. A G Reddy, and K Y Yoo 

         Study of Authentication Techniques for Next Generations.
         2014 Annual Conference of the Electronics Engineering Society of Korea. Jeju Island, South Korea, 2014.

     1. M Hussain et al. and A G Reddy

         Towards ontology-based multilingual URL filtering: a big data problem​

         The Journal of Supercomputing, Springer

     

      2. A G Reddy et al. and V. Odelu*​
          Provably secure pseudo-identity based device authentication for smart cities environment
          Sustainable Cities and Society, Elsevier


      3. A K Sutrala et al. and A G Reddy
          On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC
          International Journal of Communication Systems, Wiley

      4. H Khizar et al. and A G Reddy*
          Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
          Future Generation Computer Systems, Elsevier


      5. A G Reddy et al. and K Y Yoo*
          Design of A Secure Mutual Authenticated Key-Agreement Protocol for Multi-Server Architecture
          Journal of Computers, Academy

      6. A Anjum et al. and A G Reddy*
          Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
          Sustainable Cities and Society, Elsevier

Goutham Reddy Alavalapati

2020

2019

     1.  Ankitha et al. and A G Reddy*

          Graphical passwords: Behind the attainment of goals  [Accepted]

          Security and Privacy, Wiley

     

     

2014

      1. A Awais et al. and A G Reddy*
          Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics
          Future Generation Computer Systems, Elsevier

      2. A G Reddy et al. and J S Shin*
          A Privacy Preserving three-factor authenticated key agreement protocol for client–server environment
          Journal of Ambient Intelligence and Humanized Computing, Springer


      3. D I Kim et al. and A G Reddy

          Comparison of security-related methods in Open Interconnect Consortium and one machine-to-machine for security interoperability

          International Journal of Internet Technology and Secured Transactions, Inderscience


      4. M Kiran et al. and A G Reddy*
          Chest X-ray segmentation using Sauvola thresholding and Gaussian derivatives responses
          Journal of Ambient Intelligence and Humanized Computing, Springer


      5. N Khan et al. and A G Reddy*
          Automatic segmentation of liver & lesion detection using H-minima transform and connecting component labeling
          Multimedia Tools and Applications, Springer

      6. M Kiran et al. and A G Reddy*
          Comparative analysis of segmentation techniques based on chest X-ray images
          Multimedia Tools and Applications, Springer

2017

2015

2018

2016

    1.  A G Reddyet al. and K Y Yoo*

         An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards

         Proceedings of the 2015 Conference on Symposium of Applied Computing (ACM SAC)

         Salamanca, Spain


 ​   2.  A G Reddyet al. and K Y Yoo*

         Cryptanalysis of An Improved Anonymous Multi-server Authenticated Key-agreement Scheme using Smartcards and Biometrics
         Multimedia Conference

         Daegu, South Korea

     1. A G Reddy et al. and K Y Yoo*

         Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'​

         IET Information Security, IET

     

      2. A G Reddy et al. and  K Y Yoo*​
          Design of Mutual Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
          IEEE Access, IEEE


      3. K Y Park et al. and A G Reddy
          Provably secure and efficient authentication protocol for roaming service in global mobility networks
          IEEE Access, IEEE


      4. S Chatterjee et al. and A G Reddy
          On the design of fine grained access control with user authentication scheme for telecare medicine information systems
          IEEE Access, IEEE


      5. M Wazid et al. and A G Reddy
          Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
          IEEE Access, IEEE

      6. C Sravani et al. and A G Reddy
          Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
          IEEE Access, IEEE


      7. A G Reddy et al. and K Y Yoo*
          Design of A Secure Mutual Authenticated Key-Agreement Protocol for Multi-Server Architecture
          Proceedings of the 6th International Conference on Intelligent Computing and Applications (ACM ICICA)
          Canberra, Australia

1. A G Reddy et al. and K Y Yoo*    

    An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards

    KSII Transactions on Internet and Information Systems, KETI


2. A G Reddy et al. and K Y Yoo*   

    An Enhanced Biometric-Based Authentication with Key Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PLoS ONE, PLoS


3. A G Reddy et al. and K Y Yoo*    

    Lightweight authentication with key agreement protocol for mobile network environment using smart cards

    IET Information Security, IET


4. A G Reddy et al. and K Y Yoo* 
    A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography 
    IEEE Access, IEEE 


5. A G Reddy et al. and K Y Yoo* 
    An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol
    Proceedings of the 2016 Conference on Security of Information and Networks (ACM SIN)
    New Jersey, USA


6. L D Kumar, and A G Reddy*
    Biometric authentication using near infrared hand vein pattern with adaptive threshold technique
    2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)
    Bangalore, India

7. A G Reddy et al. and K Y Yoo* 

    Cryptanalysis of Mishra et al.’s Biometric-Based Multi-Server Authenticated Key-Agreement Protocol Using Smartcards
    IEIE Conference 

    Gumi, South Korea