Select publications (Journal publications): |
- R. V. Sampangi听and S. Sampalli, 鈥淗iveSec: Security in Resource-Constrained Wireless Networks Inspired by Beehives and Bee Swarms,鈥 International Journal of Information Security (2016), July 2016, pp.1-17, doi:10.1007/s10207-016-0341-1.
- R. V. Sampangi听and S. Sampalli, 鈥淢etamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks,鈥 International Journal of Network Security, Vol.19, No.3, pp.430-442, May 2017.
- R. V. Sampangi听and S. Sampalli, 鈥淏utterfly Encryption Scheme for Resource-Constrained Wireless Networks,鈥 in听Sensors听2015听(Special Issue Identification, Information & Knowledge in the Internet of Things), Vol. 15, No. 9, pp. 23145-23167, September 2015.
- R. V. Sampangi听and S. Sampalli, 鈥淩FID Mutual Authentication Protocols based on Gene Mutation and Transfer,鈥 in the Special issue on RFID & Internet of Things of the Journal of Communications Software and Systems (JCOMSS), Vol. 9, No. 1, March 2013.
- R. V. Sampangi, S. Dey, S. R. Urs and S. Sampalli, 鈥淎 Security Suite for Wireless Body Area Networks,鈥 International Journal of Network Security and Its Applications (IJNSA), Vol. 4, No. 1, pp. 97-116, January 2012.
|
---|
Select publications (Conference publications): |
- A. Waje, K. Tearo,听R. V. Sampangi, and D. Reilly. 2016, 鈥淕rab This, Swipe That: Combining Tangible and Gestural Interaction in Multiple Display Collaborative Gameplay,鈥 In Proceedings of the 2016 ACM on Interactive Surfaces and Spaces (ISS '16). ACM, New York, NY, USA, 433-438.
- R. V. Sampangi听and K. Hawkey, 鈥淲ho Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User Authentication,鈥 Who are you?! Adventures in Authentication: WAY Workshop, Symposium on Usable Privacy and Security (SOUPS) 2016, June 22-24, 2016, Denver, Colorado, USA.
- R. V. Sampangi听and S. Sampalli, 鈥淩FID Encryption Scheme Featuring Pseudorandom Numbers and Butterfly Seed Generation,鈥 Proceedings of the 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2014, September 2014, Split, Croatia.听
Recognized as the听Best Conference Paper in the General Conference Program.
- R. V. Sampangi听and S. Sampalli, 鈥淗iveSign: Dynamic Message Signatures for Resource-Constrained Wireless Networks,鈥 Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet) 2014, September 2014, Montreal, Canada.听
Recognized with the听Best Paper Award.
- J. Narayanaswamy,听R. V. Sampangi听and S. Sampalli, 鈥淪CARS: Simplified Cryptographic Algorithm for RFID Systems,鈥 Proceedings of the 2014 IEEE RFID Technology and Applications Conference (RFID-TA), September 2014, Tampere, Finland.
- M. Alabdulhafith,听R. V. Sampangi听and S. Sampalli, 鈥淣FC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection,鈥 Proceedings of the 5th International Workshop on Near Field Communication (NFC 2013), February 2013, Zurich, Switzerland.
- R. V. Sampangi听and S. Sampalli, 鈥淭ag-Server Mutual Authentication Scheme based on Gene Transfer and Genetic Mutation,鈥 Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA 2012), July 2012, Ottawa, Canada.
- R. V. Sampangi, S. Dey, S. R. Urs and S. Sampalli, 鈥淚AMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks,鈥 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012, Vol. 86, pp.482-494.
- R. V. Sampangi, S. R. Urs and S. Sampalli, 鈥淎 Novel Reliability Scheme Employing Multiple Sink Nodes for Wireless Body Area Networks,鈥 Proceedings of the 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA 2011), pp. 162-167, September 2011, Langkawi, Malaysia.
|
---|