Select publications (Journal publications): |
- R. V. Sampangi听and S. Sampalli, 鈥淗iveSec: Security in Resource-Constrained Wireless Networks Inspired by Beehives and Bee Swarms,鈥� International Journal of Information Security (2016), July 2016, pp.1-17, doi:10.1007/s10207-016-0341-1.
- R. V. Sampangi听and S. Sampalli, 鈥淢etamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks,鈥� International Journal of Network Security, Vol.19, No.3, pp.430-442, May 2017.
- R. V. Sampangi听and S. Sampalli, 鈥淏utterfly Encryption Scheme for Resource-Constrained Wireless Networks,鈥� in听Sensors听2015听(Special Issue Identification, Information & Knowledge in the Internet of Things), Vol. 15, No. 9, pp. 23145-23167, September 2015.
- R. V. Sampangi听and S. Sampalli, 鈥淩FID Mutual Authentication Protocols based on Gene Mutation and Transfer,鈥� in the Special issue on RFID & Internet of Things of the Journal of Communications Software and Systems (JCOMSS), Vol. 9, No. 1, March 2013.
- R. V. Sampangi, S. Dey, S. R. Urs and S. Sampalli, 鈥淎 Security Suite for Wireless Body Area Networks,鈥� International Journal of Network Security and Its Applications (IJNSA), Vol. 4, No. 1, pp. 97-116, January 2012.
|
---|
Select publications (Conference publications): |
- A. Waje, K. Tearo,听R. V. Sampangi, and D. Reilly. 2016, 鈥淕rab This, Swipe That: Combining Tangible and Gestural Interaction in Multiple Display Collaborative Gameplay,鈥� In Proceedings of the 2016 ACM on Interactive Surfaces and Spaces (ISS '16). ACM, New York, NY, USA, 433-438.
- R. V. Sampangi听and K. Hawkey, 鈥淲ho Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User Authentication,鈥� Who are you?! Adventures in Authentication: WAY Workshop, Symposium on Usable Privacy and Security (SOUPS) 2016, June 22-24, 2016, Denver, Colorado, USA.
- R. V. Sampangi听and S. Sampalli, 鈥淩FID Encryption Scheme Featuring Pseudorandom Numbers and Butterfly Seed Generation,鈥� Proceedings of the 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2014, September 2014, Split, Croatia.听
Recognized as the听Best Conference Paper in the General Conference Program.
- R. V. Sampangi听and S. Sampalli, 鈥淗iveSign: Dynamic Message Signatures for Resource-Constrained Wireless Networks,鈥� Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet) 2014, September 2014, Montreal, Canada.听
Recognized with the听Best Paper Award.
- J. Narayanaswamy,听R. V. Sampangi听and S. Sampalli, 鈥淪CARS: Simplified Cryptographic Algorithm for RFID Systems,鈥� Proceedings of the 2014 IEEE RFID Technology and Applications Conference (RFID-TA), September 2014, Tampere, Finland.
- M. Alabdulhafith,听R. V. Sampangi听and S. Sampalli, 鈥淣FC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection,鈥� Proceedings of the 5th International Workshop on Near Field Communication (NFC 2013), February 2013, Zurich, Switzerland.
- R. V. Sampangi听and S. Sampalli, 鈥淭ag-Server Mutual Authentication Scheme based on Gene Transfer and Genetic Mutation,鈥� Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA 2012), July 2012, Ottawa, Canada.
- R. V. Sampangi, S. Dey, S. R. Urs and S. Sampalli, 鈥淚AMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks,鈥� Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012, Vol. 86, pp.482-494.
- R. V. Sampangi, S. R. Urs and S. Sampalli, 鈥淎 Novel Reliability Scheme Employing Multiple Sink Nodes for Wireless Body Area Networks,鈥� Proceedings of the 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA 2011), pp. 162-167, September 2011, Langkawi, Malaysia.
|
---|