default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2023
- Umesh Kumar, Vadlamudi Ch. Venkaiah:
A novel stream cipher based on quasigroups and QG-PRNG. Int. J. Inf. Comput. Secur. 22(3/4): 411-435 (2023) - Paladugu Venkaiah, Bikash Kumar Sarkar, Amitava Chatterjee:
Pitch control of electrohydraulic semi-rotary-actuated wind turbine with actuator and valve fault using generalized power-based exponential rate reaching law sliding mode controller. J. Syst. Control. Eng. 237(8): 1423-1439 (2023) - Venkaiah Chowdary B, Chaitanya Datta M, Rajiv Senapati:
An Improved Cardiovascular Disease Prediction Model Using Ensembling of Diverse Machine Learning Classifiers. OCIT 2023: 329-333 - 2022
- Umesh Kumar, V. Ch. Venkaiah:
An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup. Int. J. Cloud Appl. Comput. 12(1): 1-27 (2022) - Umesh Kumar, V. Ch. Venkaiah:
A Family of Block Ciphers Based on Multiple Quasigroups. IACR Cryptol. ePrint Arch. 2022: 1761 (2022) - 2021
- Ajeet Singh, Appala Naidu Tentu, V. Ch. Venkaiah:
A dynamic key management paradigm for secure wireless ad hoc network communications. Int. J. Inf. Comput. Secur. 14(3/4): 380-402 (2021) - Y. Narasimhulu, Ashok Suthar, Raghunadh Pasunuri, China Venkaiah Vadlamudi:
CKD-Tree: An Improved KD-Tree Construction Algorithm. ISIC 2021: 211-218 - 2020
- Abdul Basit, Patibandla Chanakya, V. Ch. Venkaiah, Salman Abdul Moiz:
New multi-secret sharing scheme based on superincreasing sequence for level-ordered access structure. Int. J. Commun. Networks Distributed Syst. 24(4): 357-380 (2020) - Jyoti Lamba, V. Ch. Venkaiah:
Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme. Int. J. Inf. Priv. Secur. Integr. 4(3): 203-225 (2020) - 2019
- China Venkaiah Vadlamudi, Sesha Phani Deepika Vadlamudi:
A novel self-healing key distribution scheme based on vector space access structure and MDS codes. Int. J. Commun. Syst. 32(16) (2019) - N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah:
Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks. Int. J. Netw. Secur. 21(6): 930-936 (2019) - Priyadarshi Singh, Abdul Basit, N. Chaitanya Kumar, V. Ch. Venkaiah:
Towards a Hybrid Public Key Infrastructure (PKI): A Review. IACR Cryptol. ePrint Arch. 2019: 784 (2019) - 2018
- Harsha Putla, Chanakya Patibandla, China Venkaiah Vadlamudi:
A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence. Int. J. Netw. Secur. 20(3): 527-535 (2018) - Appala Naidu Tentu, China Venkaiah Vadlamudi, V. Kamakshi Prasad:
CRT based multi-secret sharing schemes: revisited. Int. J. Secur. Networks 13(1): 1-9 (2018) - N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah:
Lightweight Cryptography for Distributed PKI Based MANETS. CoRR abs/1804.06313 (2018) - Kallepu Raju, Appala Naidu Tentu, China Venkaiah Vadlamudi:
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures. IACR Cryptol. ePrint Arch. 2018: 711 (2018) - 2017
- Appala Naidu Tentu, Abdul Basit, K. Bhavani, V. Ch. Venkaiah:
Multi-secret Sharing Scheme for Level-Ordered Access Structures. NuTMiC 2017: 267-278 - N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, Y. V. Subba Rao:
Node Authentication Using BLS Signature in Distributed PKI Based MANETS. CoRR abs/1708.08972 (2017) - 2016
- Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah, Allam Appa Rao:
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure. Int. J. Netw. Secur. 18(5): 874-881 (2016) - Lalitha Kiran Nemana, V. Ch. Venkaiah:
An Empirical Study towards Refining the AKS Primality Testing Algorithm. IACR Cryptol. ePrint Arch. 2016: 362 (2016) - 2015
- Appala Naidu Tentu, Banita Mahapatra, V. Ch. Venkaiah, V. Kamakshi Prasad:
New secret sharing scheme for multipartite access structures with threshold changeability. ICACCI 2015: 1910-1916 - Chen Chen, Venkaiah C. Kavuri, Xinlong Wang, Ruoyu Li, Hanli Liu, Junzhou Huang:
Multi-frequency diffuse optical tomography for cancer detection. ISBI 2015: 67-70 - 2014
- Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah:
Computationally perfect compartmented secret sharing schemes based on MDS codes. Int. J. Trust. Manag. Comput. Commun. 2(4): 353-378 (2014) - Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah:
Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes. SNDS 2014: 251-262 - Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah:
Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures. SSCC 2014: 149-161 - V. Ch. Venkaiah, K. Ramanjaneyulu, Neelima Jampala, J. Rajendra Prasad:
Equivalence of lower bounds on the number of perfect pairs. CoRR abs/1412.6793 (2014) - 2013
- Appala Naidu Tentu, Prabal Paul, China Venkaiah Vadlamudi:
Conjunctive Hierarchical Secret Sharing Scheme Based on MDS Codes. IWOCA 2013: 463-467 - Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah:
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes. IACR Cryptol. ePrint Arch. 2013: 189 (2013) - 2012
- Vadlamudi Ch. Venkaiah, T. Aaron Gulliver:
Quasi-cyclic codes over F13 and enumeration of defining polynomials. J. Discrete Algorithms 16: 249-257 (2012) - 2011
- V. Ch. Venkaiah, D. M. Vinod Kumar:
Fuzzy adaptive bacterial foraging congestion management using sensitivity based optimal active power re-scheduling of generators. Appl. Soft Comput. 11(8): 4921-4930 (2011)
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-05 12:11 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint