Formal Verification of Authentication and Confidentiality for TACACS+ Security Protocol using Scyther SV R Pradeep, NR Sunitha, V Ravi 10th International Conference on Computing, Communication and Networking …, 2019 | 8* | 2019 |
Formal methods to verify authentication in TACACS+ protocol V Ravi, NR Sunitha, R Pradeep, S Verma 2017 2nd International Conference On Emerging Computation and Information …, 2017 | 7 | 2017 |
Analysing corpus of office documents for macro-based attacks using Machine Learning Ravi.V, Gururaj S P, Vedamurthy hk,Dr Nirmala M B Global Transitions Proceedings 3 (1), 20-24, 2022 | 5 | 2022 |
Security in RFID based smart retail system V Ravi, R Aparna 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 4 | 2016 |
A Framework for Formal Verification of Security Protocols in C++ R Pradeep, NR Sunitha, V Ravi, S Verma Inventive Communication and Computational Technologies: Proceedings of …, 2020 | 1 | 2020 |
A reliable solution to detect deepfakes using Deep Learning HK Vedamurthy, V Ravi, SP Gururaj 2022 Fourth International Conference on Cognitive Computing and Information …, 2022 | | 2022 |
Lightweight Symmetric Encryption Scheme for Public Healthcare Clouds Ravi V, Dr Poornima A.S 13th International Conference on Advances in Computing, Control, and …, 2022 | | 2022 |
A Framework for Formal Verification of Security Protocols in C++ SV Pradeep R, Sunitha N R, Ravi V INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL …, 2019 | | 2019 |
Secure and auditable healthcare management system using Blockchain Ravi.V, Santosh Patil 3rd International Conference on Electrical, Electronics, Communication …, 2018 | | 2018 |
Peer to Peer search operations by the Distributed applications using public Cloud S Sanjeevmurthy, V Ravi 2017 2nd International Conference On Emerging Computation and Information …, 2017 | | 2017 |
Efficient XML Interchange as Encoding Scheme in DDS S Sheela, V Ravi International Journal of Engineering and Advanced Technology (IJEAT) 6 (Issue-5), 2017 | | 2017 |
Strand Space Approach for Formal Verification of Security Protocols S Verma, S N.R., R V DRDO magazine “CHAKRAVYHA”, 2016, 2016 | | 2016 |
A Novel AODV Routing protocol for Delay Sensitive Applications in MANET R V, V H K, DP Venkataram International Journal of Innovative Research in Computer and …, 2015 | | 2015 |
Client Side Deduplication Scheme for Secured Data Storage in Cloud environments N A, R V International Journal of Engineering Research and Technology (IJERT), 2015 | | 2015 |
Minimization of Congestion using ETRI Dual Queue method in Wireless Sensor Networks R B.S, R V International Jounal on Computer Science and Engineering,, 2013 | | 2013 |