Goutham Reddy Alavalapati

  • Citations Per Year
Learn More
Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentication protocol for location based services using asymmetric key cryptography. Unlike their claims, the(More)
This paper put forth an effective and quick strategy for biometric validation using close infrared hand vein design. There are numerous methodologies for hand design validation, yet the time take for preparing and the computational strategy for nerve example is a noteworthy. The proposed adaptive threshold technique makes the possibility to verify and(More)
Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health and itinerary planning. This paper proposes a new decentralized lightweight authentication and key agreement scheme for VANETs. In the proposed scheme, there(More)
A two-factor authenticated key-agreement scheme for session initiation protocol emerged as a best remedy to overcome the ascribed limitations of the password-based authentication scheme. Recently, Lu et al. proposed an anonymous two-factor authenticated key-agreement scheme for SIP using elliptic curve cryptography. They claimed that their scheme is secure(More)
  • 1