Goutham Reddy Alavalapati

Learn More
A two-factor authenticated key-agreement scheme for session initiation protocol emerged as a best remedy to overcome the ascribed limitations of the password-based authentication scheme. Recently, Lu et al. proposed an anonymous two-factor authenticated key-agreement scheme for SIP using elliptic curve cryptography. They claimed that their scheme is secure(More)
This paper put forth an effective and quick strategy for biometric validation using close infrared hand vein design. There are numerous methodologies for hand design validation, yet the time take for preparing and the computational strategy for nerve example is a noteworthy. The proposed adaptive threshold technique makes the possibility to verify and(More)
  • 1