BibTeX records: Kumar V. Mangipudi

download as .bib file

@inproceedings{DBLP:conf/host/KhattriMM12,
  author       = {Hareesh Khattri and
                  Kumar V. Mangipudi and
                  Salvador Mandujano},
  title        = {{HSDL:} {A} Security Development Lifecycle for hardware technologies},
  booktitle    = {2012 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012},
  pages        = {116--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HST.2012.6224330},
  doi          = {10.1109/HST.2012.6224330},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KhattriMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MangipudiK06,
  author       = {Kumar V. Mangipudi and
                  Rajendra S. Katti},
  title        = {A Secure Identification and Key agreement protocol with user Anonymity
                  {(SIKA)}},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {6},
  pages        = {420--425},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2006.05.002},
  doi          = {10.1016/J.COSE.2006.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MangipudiK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MangipudiK06,
  author       = {Kumar V. Mangipudi and
                  Rajendra S. Katti},
  title        = {A Hash-based Strong Password Authentication Protocol with User Anonymity},
  journal      = {Int. J. Netw. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {205--209},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v2-n3/ijns-2006-v2-n3-p205-209.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MangipudiK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MangipudiKF06,
  author       = {Kumar V. Mangipudi and
                  Rajendra S. Katti and
                  Huirong Fu},
  title        = {Authentication and Key Agreement Protocols Preserving Anonymity},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {259--270},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p259-270.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MangipudiKF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MangipudiMKF04,
  author       = {Kumar V. Mangipudi and
                  Nagaraja Malneedi and
                  Rajendra S. Katti and
                  Huirong Fu},
  title        = {Attacks and solutions on Aydos-Savas-Koc's wireless authentication
                  protocol},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages        = {2229--2234},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/GLOCOM.2004.1378405},
  doi          = {10.1109/GLOCOM.2004.1378405},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/MangipudiMKF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics