Calculated based on number of publications stored in Pure and citations from Scopus
20102024

Research activity per year

Filter
Conference contribution

Search results

  • 2012

    Modeling and verification of Fiat-Shamir zero knowledge authentication protocol

    Maurya, A. K., Choudhary, M. S., Ajeyaraj, P. & Singh, S., 01-12-2012, Advances in Computer Science and Information Technology: Computer Science and Engineering - Second International Conference, CCSIT 2012, Proceedings. PART 2 ed. p. 61-70 10 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 85, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Modeling two way concurrent buffer system using timed automata in UPPAAL

    Mishra, R., Zeeshaan, M. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 846-851 6 p. 6409193. (Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication

    Hanumanthappa, P. & Singh, S., 13-07-2012, 2012 International Conference on Innovations in Information Technology, IIT 2012. p. 107-112 6 p. 6207712. (2012 International Conference on Innovations in Information Technology, IIT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Symbolic verification of web crawler functionality and its properties

    Shetty, K. S., Bhat, S. & Singh, S., 27-03-2012, 2012 International Conference on Computer Communication and Informatics, ICCCI 2012. 6158649. (2012 International Conference on Computer Communication and Informatics, ICCCI 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Web opinion mining for social networking sites

    Kaur, B., Saxena, A. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 598-605 8 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2011

    Cloud based application development for mobile devices for accessing LBS

    Shetty, K. S. & Singh, S., 26-10-2011, Advances in Parallel, Distributed Computing - First International Conference on Parallel, Distributed Computing Technologies and Applications, PDCTA 2011, Proceedings. p. 532-543 12 p. (Communications in Computer and Information Science; vol. 203 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Formal verification of OAuth 2.0 using alloy framework

    Pai, S., Sharma, Y., Kumar, S., Pai, R. M. & Singh, S., 2011, Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011. p. 655-659 5 p. 5966531. (Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    75 Citations (Scopus)
  • Logical modeling and verification of a strength based multi-agent argumentation scheme using NuSMV

    Shetty, S., Shashi Kiran, H. S., Namala, M. B. & Singh, S., 01-12-2011, Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. PART 1 ed. p. 378-387 10 p. (Communications in Computer and Information Science; vol. 131 CCIS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Modeling and verification of chess game using NuSMV

    Saralaya, V., Kishore, J. K., Reddy, S., Pai, R. M. & Singh, S., 2011, Advances in Computing and Communications - First International Conference, ACC 2011, Proceedings. PART 2 ed. Vol. 191 CCIS. p. 460-470 11 p. (Communications in Computer and Information Science; vol. 191 CCIS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and verification of Inter Realm Authentication in Kerberos using symbolic model verifier

    Mundra, P., Sharma, M., Shukla, S. & Singh, S., 28-10-2011, Trends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings. p. 496-506 11 p. (Communications in Computer and Information Science; vol. 204 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and verification of kerberos protocol using symbolic model verifier

    Mundra, P., Shukla, S., Sharma, M., Pai, R. M. & Singh, S., 2011, Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011. p. 651-654 4 p. 5966530. (Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Modeling and verification of server aided verification protocol using NuSMV

    Saralaya, V., Kishore, J. K., Reddy, S. & Singh, S., 28-10-2011, Trends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings. p. 486-495 10 p. (Communications in Computer and Information Science; vol. 204 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Physical layer authentication in wired and wireless communication systems

    Mouli, C. & Singh, S., 26-10-2011, Advances in Digital Image Processing and Information Technology - First International Conference on Digital Image Processing and Pattern Recognition, DPPR 2011, Proceedings. p. 291-304 14 p. (Communications in Computer and Information Science; vol. 205 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2010

    A generalized closed form relation for BER of QPSK/M-QAM over fading channel

    Singh, S., Kumar, M. S. & Mruthyunjaya, H. S., 2010, 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010. p. 161-165 5 p. 5578716. (2010 5th International Conference on Industrial and Information Systems, ICIIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking

    Lele, A., Kumar, A., Rohith, H. M. & Singh, S., 02-11-2010, 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010. p. 281-285 5 p. 5578694. (2010 5th International Conference on Industrial and Information Systems, ICIIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Model checking message exchange in location based services

    Moily, A., Prasanna, G., Shetty, K. S. & Singh, S., 30-12-2010, 2010 International Conference on Computer and Communication Technology, ICCCT-2010. p. 164-167 4 p. 5640417. (2010 International Conference on Computer and Communication Technology, ICCCT-2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Modelingfreshness concept to overcome replay attackin Kerberos protocol using NuSMV

    Adyanthaya, S., Rukmangada, S., Tiwari, A. & Singh, S., 30-12-2010, 2010 International Conference on Computer and Communication Technology, ICCCT-2010. p. 125-129 5 p. 5640425. (2010 International Conference on Computer and Communication Technology, ICCCT-2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Protecting location privacy in augmented reality using k-anonymization and pseudo-id

    Aryan, A. & Singh, S., 30-12-2010, 2010 International Conference on Computer and Communication Technology, ICCCT-2010. p. 119-124 6 p. 5640424. (2010 International Conference on Computer and Communication Technology, ICCCT-2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Securing location privacy in augmented reality

    Aryan, A. & Singh, S., 02-11-2010, 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010. p. 172-176 5 p. 5578714. (2010 5th International Conference on Industrial and Information Systems, ICIIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)