Fingerprint based authentication application using visual cryptography methods (improved id card) YVS Rao, Y Sukonkina, C Bhagwati, UK Singh TENCON 2008-2008 IEEE Region 10 Conference, 1-5, 2008 | 38 | 2008 |
CRT based threshold multi secret sharing scheme SR YV, C Bhagvati International Journal of Network Security 16 (3), 194-200, 2014 | 27 | 2014 |
Secure image steganography based on randomized sequence of cipher bits YVS Rao, SSB Rao, NR Rekha 2011 Eighth International Conference on Information Technology: New …, 2011 | 19 | 2011 |
A decentralized group signature scheme for privacy protection in a blockchain S Devidas, S Rao YV, NR Rekha International Journal of Applied Mathematics and Computer Science 31 (2), 2021 | 16 | 2021 |
Node Authentication Using BLS Signature in Distributed PKI Based MANETS YVSR N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah International Journal of Network Security & Its Applications (IJNSA) 9 (4 …, 2017 | 8* | 2017 |
Enhanced key life in online authentication systems using virtual password NR Rekha, YVS Rao, K Sarma 2011 Eighth International Conference On Information Technology: New …, 2011 | 7 | 2011 |
Identity verifiable ring signature scheme for privacy protection in blockchain YVSR S Devidas, N Rukma Rekha International Journal of Information Technology, 1-10, 2023 | 4* | 2023 |
Multipartite verifiable secret sharing based on CRT R Subrahmanyam, N Rukma Rekha, YV Subba Rao Computer Networks and Inventive Communication Technologies: Proceedings of …, 2022 | 4 | 2022 |
CRT based secured encryption scheme YVS Rao, C Bhagvati 2012 1st International Conference on Recent Advances in Information …, 2012 | 4 | 2012 |
Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic Curve Cryptography A Sardar, SR YV, RR N Global Trends in Computing and Communication Systems: 4th International …, 2012 | 4 | 2012 |
Presentation on Visual Cryptography and Its Applications YV Subba Rao Department of Computer and Information Sciences, University of Hyderabad …, 2007 | 4 | 2007 |
A Key Escrow Free Anonymous Identity Based Encryption Scheme using Ring Signatures K Afroaz, SR Y V, RN Rukma 2022 IEEE 11th International Conference on Communication Systems and Network …, 2022 | 3 | 2022 |
Applications of visual cryptography SRV Yengisetty, BK Roy International Journal of Parallel, Emergent and Distributed Systems 26 (5 …, 2011 | 3 | 2011 |
Multi-secret communication scheme YVS Rao, C Bhagvati International Journal of Information and Education Technology 2 (3), 201, 2012 | 2 | 2012 |
Authenticated distributed group key agreement protocol using elliptic curve secret sharing scheme R Subrahmanyam, NR Rekha, YVS Rao IEEE Access, 2023 | 1 | 2023 |
Signcryption Using ECDSA and Paillier Cryptosystem R Subrahmanyam, YVS Rao, NR Rekha ICICCT 2019–System Reliability, Quality Control, Safety, Maintenance and …, 2020 | 1 | 2020 |
Generalized Secret Sharing Scheme Based on MDS Codes S Nallabothu, N Rukmarekha, YV Subbarao International Conference on Intelligent Computing and Communication …, 2019 | 1 | 2019 |
Faster biometric authentication system using Fan and Vercauteren scheme S Imtiyazuddin, YVS Rao, NR Rekha 2018 Second International Conference on Advances in Computing, Control and …, 2018 | 1 | 2018 |
Nontrivial solutions to the cubic sieve congruence problem S Maitra, YV Subba Rao, P Stanica, S Gangopadhyay Computación y Sistemas 12 (3), 253-266, 2009 | 1 | 2009 |
Compartmented Proactive Secret Sharing Scheme N Rolla Subrahmanyam, YVS Rao Intelligent Sustainable Systems: Proceedings of ICISS 2023 665, 37, 2023 | | 2023 |