Digital forensics approach for handling audio and video files SM Pedapudi, N Vadlamani Measurement: Sensors 29, 100860, 2023 | 12 | 2023 |
Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys V Nagalakshmi, IR Babu, PS Avadhani 2011 Eighth International Conference on Information Technology: New …, 2011 | 9 | 2011 |
A protocol for internet key exchange (IKE) using public encryption key and public signature key V Nagalakshmi, I Rameshbabu International Journal of Computer Science and Network Security 7 (7), 242-246, 2007 | 8 | 2007 |
Cops-cooperative provenance system with zkp using ethereum blockchain smart contracts N Gouru, NL Vadlamani Research Anthology on Blockchain Technology in Business, Healthcare …, 2021 | 7 | 2021 |
A Comprehensive Network Security Management in Virtual Private Network Environment SM Pedapudi, N Vadlamani 2022 International Conference on Applied Artificial Intelligence and …, 2022 | 6 | 2022 |
A Prospective Approach on Security with RSA algorithm and cloud sql in cloud computing V Devi, V Nagalakshmi International Journal Of Computer Science And Engineering (Ijcse) Issn, 2278 …, 2013 | 6 | 2013 |
A Security Mechanism for library management system using low cost RFID tags V NagaLakshmi, I Rameshbabu, DL Bhaskari Journal of Systemics, Cybernetics and Informatics 5 (1), 92-96, 2007 | 6 | 2007 |
DistProv-data provenance in distributed cloud for secure transfer of digital assets with Ethereum Blockchain using ZKP N Gouru, NL Vadlamani Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and …, 2020 | 5 | 2020 |
Fast comparison encryption scheme using cheating text technique C Rupa, PS Avadhani, V Nagalakshmi International Journal of Engineering Science and Technology 2 (6), 1725-1728, 2010 | 5 | 2010 |
Data acquisition based seizure record framework for digital forensics investigations SM Pedapudi, N Vadlamani 2021 5th International Conference on Electronics, Communication and …, 2021 | 2 | 2021 |
Improve Security with RSA and Cloud Oracle 10g V Nagalakshmi, V Devi ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention …, 2014 | 2 | 2014 |
A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud SK Maddila, N Vadlamani Journal of Information & Knowledge Management 23 (01), 2350062, 2024 | 1 | 2024 |
Intelligent blockchain based attack detection framework for cross-chain transaction S Madhuri, N Vadlamani Multimedia Tools and Applications, 1-19, 2024 | | 2024 |
A Novel Approach for Cross Xchange in Blockchain Technologies using Secure Authentication Protocol M Surisetty, N Vadlamani, B Ganthi | | 2023 |
Analysis of Multilevel Framework for Cloud Security V Nagalakshmi, V Devi ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention …, 2014 | | 2014 |
Querying the Data Provenance from Ethereum Blockchain N Gouru, N Vadlamani | | |