[C19] Sai Sreekar V, Srijanee M, Odelu V, "A Security Enhanced Authentication Protocol", in 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2024.
[C18] Harika L, Sri Nitya NS, Bala MTM, Odelu V, Srijanee M, Narayan KGR, Rajendra P, Reddy AG, "A Penalty-Based Entropy Driven Universal Password Strength for Lightweight Devices", 16th International Conference on COMmunication Systems & NETwork (COMSNETS 2024) - Cyber Security and Privacy Workshop, Bangaluru, India. Accepted.
[C17] Narayan KGR, Mookherji S, Odelu V, Prasath R, Turlapaty AC, Das AK, "IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications", 2023 IEEE 7th Conference on Information and Communication Technology (IEEE CICT 2023). Accepted.
[C16] Narayan KGR, Prasath R, Odelu V, "Use of Distributed Representations for Malicious Domain Detection using Random Indexing and Machine Learning", International Conference on Evolutionary Artificial Intelligence (ICEAI 2023), Algorithms for Intelligent Systems (Springer). Accepted.
[C15] Mookherji S, Devanapalli S, Narayan KGR, Odelu V, Prasath R, Alavalapati GR, "An RFID-based Authentication Protocol for Smart Healthcare Applications", 9th International Symposium on Security in Computing and Communications (SSCC 2023), Lecture Notes in Networks and Systems(LNNS), Springer. Accepted.
[C14] Srijanee M, Odelu V, Prasath R, Goutham Reddy A, Basker P, "Modelling Identity-based Authentication and Key Exchange Protocol using the Tamarin Prover", International Conference on Security, Privacy and Digital Forensics (ICISPD 2022), Lecture Notes in Electrical Engineering (LNEE), Springer. Accepted.
[C13] Srijanee M, Odelu V, and Rajendra P, "Analysis of A Lightweight Authentication Protocol for Remote Surgery Applications under the CK - Adversary Model," 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022, pp. 1-5, doi: 10.1109/COMSNETS53615.2022.9668389.
[C12] Singam BR and Odelu V, "Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover," 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), 2022, pp. 0667-0672, doi: 10.1109/CCWC54503.2022.9720852.
[C11] Soumya B, Odelu V, Samiran Ch, “A brief overview of User Authentication in Internet of Things architecture”, in International Conference on Computational Intelligence and Networks (CINE 2020), ISI , Kolkata, India, 2020.
[C10] Odelu V, "IMBUA: Identity Management on Blockchain for Biometrics-based User Authentication", International Congress on Blockchain and Applications (BLOCKCHAIN'19 congress), VOl. 1010, pp. 1-10, Avila (Spain), 26th-28th June, 2019, Springer. Link
[C09] Soumya B, Odelu V, Das AK, Samiran Ch, and Debasis G, "Anonymous fine-grained user access control scheme for Internet of Things architecture," in 5th International Conference on Mathematics and Computing (ICMC 2019), Bhubaneswar, India, 2018, Springer.
[C08] Soumya B, Odelu V, Das AK, Samiran Ch, and Debasis G, "On the design of a secure anonymous user authentication scheme for multiple base stations-based wireless sensor networks," in 5th International Conference on Mathematics and Computing (ICMC 2019), Bhubaneswar, India, 2018, Springer.
[C07]. Odelu V, "An Efficient Two-Server Password-only User Authentication for Consumer Electronic Devices", 37th IEEE International Conference on Consumer Electronics (ICCE 2019), January 11-13, 2019, Las Vegas, USA. Link
[C06]. Jabez Ch, Rajendra P and Odelu V, “EXPERT INTELLIGENCE: Theory of the Missing Facet”, The Sixth International Conference on Mining Intelligence and Knowledge Exploration (MIKE 2018), December 20 - 22, 2018, Cluj - Napoca, Romania. Link
[C05]. Sourav S, Odelu V and Rajendra P, "Enhanced Session Initiation Protocols for Emergency Healthcare Applications," Sixth International Symposium on Security in Computing and Communications (SSCC’18), Springer in Communications in Computer and Information Science Series(CCIS), September 19-22, 2018, PES Institute of Technology (South Campus), Bangalore, India. Link
[C04]. Odelu V, Das AK, and Goswami A, "Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks," in International Symposium on Security in Computing and Communications (SSCC 2014), Communications in Computer and Information Science Series (CCIS), Vol. 467, pp. 10–19, Springer-Verlag, Berlin-Heidelberg, 2014. Link
[C03]. Das AK, Odelu V, and Goswami A, “Security Analysis of An Efficient Smart Card-based Remote User Authentication Scheme using Hash Function," in International Symposium on Security in Computing and Communications (SSCC 2013), Communications in Computer and Information Science Series (CCIS), Vol. 377, pp. 236–242, Springer-Verlag, Berlin-Heidelberg, 2013. Link
[C02]. Odelu V, Das AK, and Goswami A, “LHSC: An Effective Dynamic Key Management Scheme for Linear Hierarchical Access Control," in Fifth IEEE International Conference on COMmunication Systems and NETworkS (COMSNETS 2013), IEEE Computer Society Press, pp. 1-9, January 7-10, 2013. Link
[C01]. Odelu V, Das AK, and Goswami A, "A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials," in International Conference on Security in Computer Networks and Distributed Systems (SNDS 2012), Communications in Computer and Information Science Series (CCIS), Vol. 335, pp. 1 - 10, Springer-Verlag, Berlin-Heidelberg, 2012. Link