A
Alavalapati Goutham Reddy
Researcher at Sejong University
Publications - 30
Citations - 968
Alavalapati Goutham Reddy is an academic researcher from Sejong University. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 14, co-authored 24 publications receiving 668 citations. Previous affiliations of Alavalapati Goutham Reddy include Kyungpook National University & Qatar University.
Papers
More filters
Journal ArticleDOI
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
Sravani Challa,Mohammad Wazid,Ashok Kumar Das,Neeraj Kumar,Alavalapati Goutham Reddy,Eun-Jun Yoon,Kee-Young Yoo +6 more
TL;DR: A new signature-based authenticated key establishment scheme for the IoT environment that provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.
Journal ArticleDOI
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
Mohammad Wazid,Ashok Kumar Das,Neeraj Kumar,Vanga Odelu,Alavalapati Goutham Reddy,KiSung Park,Young-Ho Park +6 more
TL;DR: The rigorous formal and informal security analysis shows that the proposed scheme is capable to defend various malicious attacks and the ns-2 simulation demonstrates the practicability of the proposed schemes in VANET environment.
Journal ArticleDOI
A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
TL;DR: The informal and formal security analyses along with the performance analysis sections determine that the proposed protocol performs better than Memon et al.'s protocol and other related protocols in terms of security and efficiency.
Journal ArticleDOI
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
TL;DR: A novel biometric-based mutually authenticated key agreement protocols for multi-server architecture based on elliptic curve cryptography is proposed and it is proved that the proposed protocol achieves secure mutual authentication property using the broadly used Burrows–Abadi–Needham logic.
Journal ArticleDOI
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks
TL;DR: A novel zero watermarking scheme that embeds a watermark in original data before it is transmitted to BS which is responsible for verifying the watermark embedded with data to establish the trustworthiness between sensor node and BS.