TechRxiv

Vanga Odelu

Dr. Odelu Vanga is currently working as an Assistant Professor in the Department of Computer Science and Engineering at Indian Institute of Information Technology Sri City, Chittoor, Andhra Pradesh, India. Prior to this, he was worked as an Assistant Professor in the Department of Computer Science and Information Systems (CSIS) at Birla Institute of Technology & Science (BITS), Pilani, Hyderabad Campus. Before joining BITS, he was with the Korea University, South Korea as a Research Professor. He was also worked in the Department of Mathematics, Rajiv Gandhi University of Knowledge Technologies (RGUKT), Basar, Telangana, India. He is elevated to the grade of IEEE Senior member, 2022. He has been awarded Outstanding Potential for Excellence in Research and Academics (OPERA) by BITS Pilani. He was selected as an Outstanding Young Foreign Scholar "Korean Research Fellowship (KRF-2017)'' by the Korean Government (Global competition among 15 positions).

Publications

  • Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
  • A secure and efficient time-bound hierarchical access control scheme for secure broadcasting
  • Attribute-based authentication on the cloud for thin clients
  • An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
  • An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System
  • An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
  • Efficient privacy preserving device authentication in WBANs for industrial e-health applications
  • A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials
  • A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
  • A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
  • An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function
  • Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks
  • Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography
  • A novel linear polynomial-based dynamic key management scheme for hierarchical access control
  • Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function
  • A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem
  • LHSC: An effective dynamic key management scheme for linear hierarchical access control
  • An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
  • Expert Intelligence: Theory of the Missing Facet
  • A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks
  • Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks
  • An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
  • Provably secure user authentication and key agreement scheme for wireless sensor networks
  • Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
  • Security analysis of an adaptable and scalable group access control scheme for managing wireless sensor networks
  • A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks
  • A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks
  • An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
  • A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS
  • An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography
  • Provably secure three-factor authentication and key agreement scheme for session initiation protocol
  • A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system
  • Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
  • A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
  • Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
  • An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards
  • DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks
  • A user anonymous mutual authentication protocol
  • Secure anonymous mutual authentication for star two-tier wireless body area networks
  • Analysis of Security Protocols for Mobile Healthcare
  • SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
  • A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks
  • A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
  • An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
  • Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
  • Analysis of A Lightweight Authentication Protocol for Remote Surgery Applications under the CK - Adversary Model
  • Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover
  • Blockchain-based e-voting protocols
  • Provably Secure Pseudo-Identity Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Lightweight Mobile Devices
  • A Dynamic Time-Bound Access Control for Secure Hierarchical Content Sharing
  • Secure Ultra Fast Authentication Protocol for Electric Vehicle Charging
  • Secure Ultra Fast Authentication Protocol for Electric Vehicle Charging
  • Jamming resistant non‐interactive anonymous and unlinkable authentication scheme for mobile satellite networks
  • An efficient multi‐gateway‐based three‐factor user authentication and key agreement scheme in hierarchical wireless sensor networks
  • Design of a new CP‐ABE with constant‐size secret keys for lightweight devices using elliptic curve cryptography

Usage metrics

Co-workers & collaborators

Rajendra Prasath

Rajendra Prasath

Vanga Odelu's public data