W-Scheduler: Whale optimization for task scheduling in cloud computing K Sreenu, M Sreelatha The Journal of Networks, Software Tools and Applications, 2017 | 108 | 2017 |
Authentication Schemes for Session Passwords using Color and Images M M Sreelatha, M Shashi, M Anirudh, MS Ahamer International Journal of Network Security & Its Applications, 2011 | 99 | 2011 |
MFGMTS: Epsilon constraint-based modified fractional grey wolf optimizer for multi-objective task scheduling in cloud computing K Sreenu, S Malempati IETE Journal of Research 65 (2), 201-215, 2019 | 56 | 2019 |
A well known tool based graphical authentication technique S Malempati, S Mogalla proceedings of the conference CCSEA, 97-104, 2011 | 9 | 2011 |
An ancient indian board game as a tool for authentication S Malempati, S Mogalla International journal of Network Security and It’s Applications, IJNSA 3 (4 …, 2011 | 9 | 2011 |
Intrusion prevention by image based authentication techniques M Sreelatha, M Shashi, MR Teja, M Rajashekar, K Sasank 2011 International Conference on Recent Trends in Information Technology …, 2011 | 9 | 2011 |
FGMTS: fractional grey wolf optimizer for multi-objective task scheduling strategy in cloud computing K Sreenu, S Malempati Journal of Intelligent & Fuzzy Systems 35 (1), 831-844, 2018 | 8 | 2018 |
An efficient multi keyword synonym ranked query over encrypted cloud data using BMS Tree veeraju Gampala, sreelatha malempati IJAER 11 (1), 783-743, 2016 | 7 | 2016 |
User authentication using native language passwords S Malempati, S Mogalla International Journal of Network Security & Its Applications 3 (6), 149, 2011 | 7 | 2011 |
Intrusion Prevention by Native Language Password Authentication Scheme S Malempati, S Mogalla Advances in Network Security and Applications: 4th International Conference …, 2011 | 7 | 2011 |
Grid based approach for data confidentiality S Malempati, S Mogalla International Journal of Computer Applications 25 (9), 1-5, 2011 | 6 | 2011 |
Multi-Keyword Synonym Search over Encrypted Cloud Data using Classified Category-Dictionary and BMIS Tree V Gampala, S Malempati International Journal of Technology Intelligence and Planning, 0 | 4* | |
A Review on Challenges of Security for Secure Data Storage in Cloud A Kumari, M Sreelatha 2019 International Conference on Smart Systems and Inventive Technology …, 2019 | 3 | 2019 |
A Study on Privacy Preserving Searching Approaches on Encrypted Data and Open Challenging Issues in Cloud Computing V Gampala, S Malempati IJCSIS 14 (12), 294-307, 2016 | 3 | 2016 |
Secure Semantic Multi-keyword Synonym Ranked Query over Encrypted Cloud Data V Gampala, S Malempati International Journal of Engineering and Technology (IJET) 8, 98-107, 2016 | 3 | 2016 |
A comprehensive study on cloud service brokering architecture A Koneru, M Sreelatha ICCMC, 47-53, 2017 | 2 | 2017 |
Enhanced Authentication Schemes for Intrusion Prevention using Native Language Passwords S Malempati, S Mogalla International Journal of Computer Science Issues (IJCSI) 8 (4), 356, 2011 | 2 | 2011 |
Modified schemes for authentication based on shape and text M Sreelatha, M Shashi International Journal of Electrical, Electronics and Computer Systems …, 2011 | 2 | 2011 |
ShashiMogalla,(2011)“An ancient Indian board game as a tool for authentication,” S Malempati IJNSA 3 (41), 0 | 2 | |
Multiple Resource Attributes and Conditional Logic Assisted Task Scheduling in Cloud Computing. K Sreenu, S Malempati International Journal of Intelligent Engineering & Systems 16 (3), 2023 | 1 | 2023 |