Showing
1 - 8
results of
8
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Challa, Sravani
Search Results - Challa, Sravani
Showing
1 - 8
results of
8
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
by
Challa, Sravani
,
Wazid, Mohammad
,
Das, Ashok Kumar
,
Kumar, Neeraj
,
Reddy, Alavalapati Goutham
,
Eun-Jun Yoon
,
Kee-Young Yoo
Published in
IEEE access
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems
by
Challa, Sravani
,
Das, Ashok Kumar
,
Gope, Prosanta
,
Kumar, Neeraj
,
Wu, Fan
,
Vasilakos, Athanasios V.
Published in
Future generation computer systems
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
3
Loading…
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
by
Challa, Sravani
,
Das, Ashok Kumar
,
Odelu, Vanga
,
Kumar, Neeraj
,
Kumari, Saru
,
Khan, Muhammad Khurram
,
Vasilakos, Athanasios V.
Published in
Computers & electrical engineering
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
4
Loading…
Provably secure three‐factor authentication and key agreement scheme for session initiation protocol
by
Challa, Sravani
,
Das, Ashok Kumar
,
Kumari, Saru
,
Odelu, Vanga
,
Wu, Fan
,
Li, Xiong
Published in
Security and communication networks
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
5
Loading…
Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions
by
Challa, Sravani
,
Wazid, Mohammad
,
Das, Ashok Kumar
,
Khan, Muhammad Khurram
Published in
IEEE consumer electronics magazine
Get full text
Items that this one cites
Items that cite this one
Magazinearticle
Save to List
Saved in:
6
Loading…
Rhinocerebral mucormycosis: Pathology revisited with emphasis on perineural spread
by
Sravani, Tumuluri
,
Uppin, Shantveer Gurulingappa
,
Uppin, Megha Shantveer
,
Sundaram, Challa
Published in
Neurology India
Get full text
Items that cite this one
Article
Save to List
Saved in:
7
Loading…
Quinoline Consists of 1H‐1,2,3‐Triazole Hybrids: Design, Synthesis and Anticancer Evaluation
by
Venkata, Sivarami Reddy Gangireddy
,
C.Narkhede, Umesh
,
Jadhav, Vinod. D
,
Naidu, Challa Gangu
,
Addada, Ramakrishnam Raju
,
Pulya, Sravani
,
Ghosh, Balaram
Published in
ChemistrySelect (Weinheim)
Get full text
Article
Save to List
Saved in:
8
Loading…
Quinoline Consists of 1 H ‐1,2,3‐Triazole Hybrids: Design, Synthesis and Anticancer Evaluation
by
Venkata, Sivarami Reddy Gangireddy
,
C.Narkhede, Umesh
,
Jadhav, Vinod. D
,
Naidu, Challa Gangu
,
Addada, Ramakrishnam Raju
,
Pulya, Sravani
,
Ghosh, Balaram
Published in
ChemistrySelect (Weinheim)
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
7 results
7
Full Text
8 results
8
Format
Articles
7 results
7
Magazine Articles
1 results
1
Journal Title
Chemistryselect
2 results
2
Computers & Electrical Engineering
1 results
1
Future Generation Computer Systems
1 results
1
Ieee Access
1 results
1
Ieee Consumer Electronics Magazine
1 results
1
Neurology India
1 results
1
Security And Communication Networks
1 results
1
Subjects
Science & Technology
7 results
7
Authentication
5 results
5
Computer Science
5 results
5
Technology
5 results
5
Avispa
4 results
4
Engineering
3 results
3
Engineering, Electrical & Electronic
3 results
3
Security
3 results
3
Telecommunications
3 results
3
Ban Logic
2 results
2
Biometrics
2 results
2
Computer Science, Hardware & Architecture
2 results
2
Computer Science, Information Systems
2 results
2
Computer Simulation
2 results
2
Elliptic Curve Cryptography
2 results
2
Protocol
2 results
2
Protocols
2 results
2
Sensors
2 results
2
Wireless Sensor Networks
2 results
2
Adaptation Models
1 results
1
Year of Publication
From:
To:
Source
Wiley Online Library All Journals
3 results
3
Doaj Directory Of Open Access Journals
3 results
3
Ezb Electronic Journals Library
3 results
3
Sciencedirect Journals
2 results
2
Sciencedirect Freedom Collection
2 results
2
Wiley-Blackwell Read & Publish Collection
2 results
2
Ieee Electronic Library (Iel) Journals
2 results
2
Ieee Xplore All Journals
2 results
2
Road: Directory Of Open Access Scholarly Resources
2 results
2
Publicly Available Content Database
2 results
2
Backfile Package - Computer Science (Legacy) [Ycs]
2 results
2
Wiley Online Library Open Access
1 results
1
Ieee Open Access Journals
1 results
1
Backfile Package - Engineering And Technology [Yen]
1 results
1