Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kumar V. Mangipudi
@inproceedings{DBLP:conf/host/KhattriMM12, author = {Hareesh Khattri and Kumar V. Mangipudi and Salvador Mandujano}, title = {{HSDL:} {A} Security Development Lifecycle for hardware technologies}, booktitle = {2012 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012}, pages = {116--121}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HST.2012.6224330}, doi = {10.1109/HST.2012.6224330}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KhattriMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MangipudiK06, author = {Kumar V. Mangipudi and Rajendra S. Katti}, title = {A Secure Identification and Key agreement protocol with user Anonymity {(SIKA)}}, journal = {Comput. Secur.}, volume = {25}, number = {6}, pages = {420--425}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2006.05.002}, doi = {10.1016/J.COSE.2006.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MangipudiK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MangipudiK06, author = {Kumar V. Mangipudi and Rajendra S. Katti}, title = {A Hash-based Strong Password Authentication Protocol with User Anonymity}, journal = {Int. J. Netw. Secur.}, volume = {2}, number = {3}, pages = {205--209}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n3/ijns-2006-v2-n3-p205-209.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MangipudiK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MangipudiKF06, author = {Kumar V. Mangipudi and Rajendra S. Katti and Huirong Fu}, title = {Authentication and Key Agreement Protocols Preserving Anonymity}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {3}, pages = {259--270}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p259-270.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MangipudiKF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MangipudiMKF04, author = {Kumar V. Mangipudi and Nagaraja Malneedi and Rajendra S. Katti and Huirong Fu}, title = {Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol}, booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM} '04, Dallas, Texas, USA, 29 November - 3 December 2004}, pages = {2229--2234}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/GLOCOM.2004.1378405}, doi = {10.1109/GLOCOM.2004.1378405}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/MangipudiMKF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.