Sriramulu Bojjagani

Sriramulu Bojjagani
SRM University-AP · School of Engineering & Applied Sciences

Ph.D.

About

21
Publications
3,224
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
157
Citations
Citations since 2016
19 Research Items
157 Citations
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
Additional affiliations
July 2015 - August 2016
Institute for Development & Research in Banking Technology, University of Hyderabad
Position
  • Senior Research Scholar
July 2013 - March 2016
Institute for Development & Research in Banking Technology
Position
  • PhD Student
July 2013 - March 2016
Institute for Development & Research in Banking Technology
Position
  • Researcher
Education
August 2008 - January 2009
Indian Institute of Technology Madras
Field of study
  • Computer Science
June 2006 - August 2008
Andhra University
Field of study
  • Information Technology
June 2000 - April 2004
Jawaharlal Nehru Technological University, Hyderabad
Field of study
  • Information Technology

Publications

Publications (21)
Article
Short message service (SMS) provides a wide channel of communication for banking in mobile commerce and mobile payment. The transmission of SMS is not secure in the network using global system for mobile communications or general packet radio service. Security threats in SMS restricted the use of SMS in mobile banking within certain limits. This pa...
Preprint
Full-text available
Virtual Machine (VM) instance price prediction in cloud computing is an emerging and important research area. VM instance’s price prediction is used for different purposes such as reducing energy consumption, maintaining Service Level Agreement (SLA), and balancing workload at cloud data centers. In this paper, we propose a Seasonal Auto-Regressive...
Article
Full-text available
Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in next-generation networks. Digital images are the prime medium attacked by cyber attackers. In this paper, a blockchain based security framework is proposed for sharing digital images in a multi use...
Chapter
Deep learning shown its potential in a variety of medical applications and proved as a count on by people as a step ahead approach compared to traditional machine learning models. Moreover, the other implementations of these models such as the convolutional neural networks (CNNs) provide extensive applications in the field of medicine, which usuall...
Article
The flow of information is a valuable asset for every company and its consumers, and Distributed Denial-of-Service (DDoS) assaults pose a substantial danger to this flow. If we do not secure security, hackers may steal information flowing across a network, posing a danger to a business and society. As a result, the most effective ways are necessary...
Article
Full-text available
Wearable devices are one of the parts of the essential cost of goods sold (COGS) in the wheel of the Internet of things (IoT), contributing towards a potential impact in the finance and banking sectors. There is a need for lightweight cryptography mechanisms for IoT devices because these are resource constraints. This paper introduces a novel appro...
Article
Intelligent transport systems amalgamated with advanced technologies are an important element of the automotive industry, including critical infrastructure and transportation. Internet of Vehicles (IoV) is the modern technological framework designed for intelligent transportation. IoV creates a network of information relations among vehicles, thus...
Article
Ownership evidence can be directly exposed through visible watermarks which can avoid the attempts of copyright abuses. JPEG images are widely used for many commercial applications over in Internet, because of its reduced size and the requirement of low bandwidth. In this paper, a visible watermarking scheme is proposed for JPEG compressed images....
Article
Full-text available
Mobile payments makeup one of the fastest-growing mobile services available today and are widely used by smartphones for utility payments, bill payments, and online shopping, among other applications. Mobile payments are playing a vital role in the fast growth of online markets and are revolutionizing the supply chain of businesses and industries....
Article
Full-text available
Abstract: Lattice-based crypto systems are regarded as secure and believed to be secure even against quantum computers. lattice-based cryptography relies upon problems like the Shortest Vector Problem. Shortest Vector Problem is an instance of lattice problems that are used as a basis for secure cryptographic schemes. For more than 30 years now, th...
Chapter
With the rapid growth of the Internet and smartphone and wireless communication-based applications, new threats, vulnerabilities, and attacks also increased. The attackers always use communication channels to violate security features. The fast-growing of security attacks and malicious activities create a lot of damage to society. The network admin...
Chapter
Iris recognition technologies applied to produce comprehensive and correct biometric identification of people in numerous large-scale data of humans. Additionally, the iris is stable over time, i.e., iris biometric knowledge offers links between biometric characteristics and people. The e-business and e-governance require more machine-driven iris r...
Article
Full-text available
The authentication system plays a crucial role in the context of GLObal MObility NETwork (GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service over multiple Foreign Agents (FA). However, designing a robust and anonymous authentication protocol along with user privacy is an essential and challenging task. Due to the res...
Article
Full-text available
The authentication system plays a crucial role in the context of GLObal MObility NETwork (GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service over multiple Foreign Agents (FA). However, designing a robust and anonymous authentication protocol along with a user privacy is essential and challenging task. Due to the reso...
Article
Full-text available
In the mobile payment systems flow of confidential data is one of the essential and vital services. The customer’s sensitive data is always kept safe from the various kind of attacks, such as phishing and man-in-the-middle attacks. The current mobile authentication protocols put an extra burden on mobile device users to detect and avoid phishing at...
Article
Near Field Communication (NFC)is one of the fast-growing technologies related to proximity-based mobile payments. In this paper, a secure NFC-enabled payment model that can be used for peer-to-peer (P2P)payments and payer-to-merchant (P2M)payments is presented. This payment model uses elliptic curve cryptography (ECC)to encrypt customer data. The p...
Article
The current mobile authentication protocols place an extra burden on mobile device users to detect and avoid phishing and pharming attacks. In this paper, we propose a novel mobile banking authentication protocol that employs an Authentication Server (AS), which sends a nonce to the mobile user device to be signed, so that he can avoid phishing and...
Conference Paper
Mobile banking activity plays a major role for M-Commerce (Mobile-Commerce) applications in our daily life. With the increasing usage on mobile phones, vulnerabilities against these devices raised exponentially. The privacy and security of confidential financial data is one of the major issues in mobile devices. Android is the most popular operatin...
Conference Paper
Emerging M-Commerce (Mobile-Commerce) activity opened scope for the design of new protocols. Now a days SMS (Short Message Service) as a mobile payment channel is gaining prominence because it supports low end devices and low of cost. In this paper we proposed a novel protocol for SMS based mobile banking and payment framework with formal verificat...

Network

Cited By