Follow
sreelatha malempati
sreelatha malempati
Professor, CSE
Verified email at rvrjc.ac.in
Title
Cited by
Cited by
Year
W-Scheduler: Whale optimization for task scheduling in cloud computing
K Sreenu, M Sreelatha
The Journal of Networks, Software Tools and Applications, 2017
1082017
Authentication Schemes for Session Passwords using Color and Images
M M Sreelatha, M Shashi, M Anirudh, MS Ahamer
International Journal of Network Security & Its Applications, 2011
992011
MFGMTS: Epsilon constraint-based modified fractional grey wolf optimizer for multi-objective task scheduling in cloud computing
K Sreenu, S Malempati
IETE Journal of Research 65 (2), 201-215, 2019
562019
A well known tool based graphical authentication technique
S Malempati, S Mogalla
proceedings of the conference CCSEA, 97-104, 2011
92011
An ancient indian board game as a tool for authentication
S Malempati, S Mogalla
International journal of Network Security and It’s Applications, IJNSA 3 (4 …, 2011
92011
Intrusion prevention by image based authentication techniques
M Sreelatha, M Shashi, MR Teja, M Rajashekar, K Sasank
2011 International Conference on Recent Trends in Information Technology …, 2011
92011
FGMTS: fractional grey wolf optimizer for multi-objective task scheduling strategy in cloud computing
K Sreenu, S Malempati
Journal of Intelligent & Fuzzy Systems 35 (1), 831-844, 2018
82018
An efficient multi keyword synonym ranked query over encrypted cloud data using BMS Tree
veeraju Gampala, sreelatha malempati
IJAER 11 (1), 783-743, 2016
72016
User authentication using native language passwords
S Malempati, S Mogalla
International Journal of Network Security & Its Applications 3 (6), 149, 2011
72011
Intrusion Prevention by Native Language Password Authentication Scheme
S Malempati, S Mogalla
Advances in Network Security and Applications: 4th International Conference …, 2011
72011
Grid based approach for data confidentiality
S Malempati, S Mogalla
International Journal of Computer Applications 25 (9), 1-5, 2011
62011
Multi-Keyword Synonym Search over Encrypted Cloud Data using Classified Category-Dictionary and BMIS Tree
V Gampala, S Malempati
International Journal of Technology Intelligence and Planning, 0
4*
A Review on Challenges of Security for Secure Data Storage in Cloud
A Kumari, M Sreelatha
2019 International Conference on Smart Systems and Inventive Technology …, 2019
32019
A Study on Privacy Preserving Searching Approaches on Encrypted Data and Open Challenging Issues in Cloud Computing
V Gampala, S Malempati
IJCSIS 14 (12), 294-307, 2016
32016
Secure Semantic Multi-keyword Synonym Ranked Query over Encrypted Cloud Data
V Gampala, S Malempati
International Journal of Engineering and Technology (IJET) 8, 98-107, 2016
32016
A comprehensive study on cloud service brokering architecture
A Koneru, M Sreelatha
ICCMC, 47-53, 2017
22017
Enhanced Authentication Schemes for Intrusion Prevention using Native Language Passwords
S Malempati, S Mogalla
International Journal of Computer Science Issues (IJCSI) 8 (4), 356, 2011
22011
Modified schemes for authentication based on shape and text
M Sreelatha, M Shashi
International Journal of Electrical, Electronics and Computer Systems …, 2011
22011
ShashiMogalla,(2011)“An ancient Indian board game as a tool for authentication,”
S Malempati
IJNSA 3 (41), 0
2
Multiple Resource Attributes and Conditional Logic Assisted Task Scheduling in Cloud Computing.
K Sreenu, S Malempati
International Journal of Intelligent Engineering & Systems 16 (3), 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20