关注
nagalakshmi vadlamani
nagalakshmi vadlamani
GITAM (Deemed to be University)
在 gitam.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Digital forensics approach for handling audio and video files
SM Pedapudi, N Vadlamani
Measurement: Sensors 29, 100860, 2023
122023
Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys
V Nagalakshmi, IR Babu, PS Avadhani
2011 Eighth International Conference on Information Technology: New …, 2011
92011
A protocol for internet key exchange (IKE) using public encryption key and public signature key
V Nagalakshmi, I Rameshbabu
International Journal of Computer Science and Network Security 7 (7), 242-246, 2007
82007
Cops-cooperative provenance system with zkp using ethereum blockchain smart contracts
N Gouru, NL Vadlamani
Research Anthology on Blockchain Technology in Business, Healthcare …, 2021
72021
A Comprehensive Network Security Management in Virtual Private Network Environment
SM Pedapudi, N Vadlamani
2022 International Conference on Applied Artificial Intelligence and …, 2022
62022
A Prospective Approach on Security with RSA algorithm and cloud sql in cloud computing
V Devi, V Nagalakshmi
International Journal Of Computer Science And Engineering (Ijcse) Issn, 2278 …, 2013
62013
A Security Mechanism for library management system using low cost RFID tags
V NagaLakshmi, I Rameshbabu, DL Bhaskari
Journal of Systemics, Cybernetics and Informatics 5 (1), 92-96, 2007
62007
DistProv-data provenance in distributed cloud for secure transfer of digital assets with Ethereum Blockchain using ZKP
N Gouru, NL Vadlamani
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and …, 2020
52020
Fast comparison encryption scheme using cheating text technique
C Rupa, PS Avadhani, V Nagalakshmi
International Journal of Engineering Science and Technology 2 (6), 1725-1728, 2010
52010
Data acquisition based seizure record framework for digital forensics investigations
SM Pedapudi, N Vadlamani
2021 5th International Conference on Electronics, Communication and …, 2021
22021
Improve Security with RSA and Cloud Oracle 10g
V Nagalakshmi, V Devi
ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention …, 2014
22014
A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud
SK Maddila, N Vadlamani
Journal of Information & Knowledge Management 23 (01), 2350062, 2024
12024
Intelligent blockchain based attack detection framework for cross-chain transaction
S Madhuri, N Vadlamani
Multimedia Tools and Applications, 1-19, 2024
2024
A Novel Approach for Cross Xchange in Blockchain Technologies using Secure Authentication Protocol
M Surisetty, N Vadlamani, B Ganthi
2023
Analysis of Multilevel Framework for Cloud Security
V Nagalakshmi, V Devi
ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention …, 2014
2014
Querying the Data Provenance from Ethereum Blockchain
N Gouru, N Vadlamani
系统目前无法执行此操作,请稍后再试。
文章 1–16