EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions
Babu, Ponnuru Raveendra, Reddy, Alavalapati Goutham, Palaniswamy, Basker, Das, Ashok Kumar
Published in IEEE transactions on network science and engineering (01.09.2022)
Published in IEEE transactions on network science and engineering (01.09.2022)
Get full text
Journal Article
EV-Auth: Lightweight Authentication Protocol Suite for Dynamic Charging System of Electric Vehicles With Seamless Handover
Babu, Ponnuru Raveendra, Reddy, Alavalapati Goutham, Palaniswamy, Basker, Kommuri, Suneel Kumar
Published in IEEE transactions on intelligent vehicles (01.09.2022)
Published in IEEE transactions on intelligent vehicles (01.09.2022)
Get full text
Journal Article
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges
Babu, Ponnuru Raveendra, Kumar, Sathish A.P., Reddy, Alavalapati Goutham, Das, Ashok Kumar
Published in Computer science review (01.11.2024)
Published in Computer science review (01.11.2024)
Get full text
Journal Article
Query Based Text Summarization
Mangalampagti, Sindhura, Ponnuru, Raveendra Babu
Published in International journal of recent technology and engineering (30.07.2019)
Published in International journal of recent technology and engineering (30.07.2019)
Get full text
Journal Article
V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment leveraging Physically Unclonable Functions
Reddy, Alavalapati Goutham, Babu, Ponnuru Raveendra, Odelu, Vanga, Wang, Li, Kumar, Sathish AP
Published in IEEE transactions on industrial cyber-physical systems (27.06.2023)
Published in IEEE transactions on industrial cyber-physical systems (27.06.2023)
Get full text
Journal Article
Graphical passwords: Behind the attainment of goals
Vaddeti, Ankitha, Vidiyala, Deepthi, Puritipati, Vineetha, Ponnuru, Raveendra Babu, Shin, Ji Sun, Alavalapati, Goutham Reddy
Published in Security and privacy (01.11.2020)
Published in Security and privacy (01.11.2020)
Get full text
Journal Article