- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Cryptography and Data Security
- Cloud Data Security Solutions
- Digital Rights Management and Security
- RFID technology advancements
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Web Application Security Vulnerabilities
- Internet of Things and AI
- Chaos-based Image/Signal Encryption
- Security in Wireless Sensor Networks
- Big Data Technologies and Applications
- Mobile Health and mHealth Applications
- Media, Gender, and Advertising
- Customer Service Quality and Loyalty
- Smart Grid Security and Resilience
- Peer-to-Peer Network Technologies
- Metamaterials and Metasurfaces Applications
- Islamic Finance and Banking Studies
- Advanced Steganography and Watermarking Techniques
- IPv6, Mobility, Handover, Networks, Security
- Diverse Scientific Research Studies
- Mobile Agent-Based Network Management
- Consumer Behavior in Brand Consumption and Identification
Majmaah University
2016-2025
Koneru Lakshmaiah Education Foundation
2014-2018
KLE University
2017-2018
University of Hyderabad
2012-2014
Institute for Development and Research in Banking Technology
2012-2014
Dr. Reddy's Laboratories (India)
2013
Existing schemes in the realm of mobile healthcare (also, e-Healthcare) based on cloud and IoMT (Internet Medical Things) do not ensure end-to-end security are compliant with HIPAA (Health Insurance Portability Accountability Act). It is also very difficult often for these to obtain evidence from case breaches. In addition issues, applications prone various types attacks formal proof unavailable. this work, we propose our community framework an setting that ensures circumvents many existing...
In this paper, we propose a secure mobile payments framework based on universal integrated circuit card (UICC) by defining: a) procedure of personalising UICC the client; b) provisioning and personalisation (mutual authentication key agreement protocol) application (which is UICC) bank; c) payment protocol between personalised bank server. Our compared with recent works found to be better in terms generating client’s credentials, implementation WPKI UICC, end security. originating from also...
Abstract Mobile contactless payment (MCP) is the future technology that used for mobile payments, wallet, transportation, and coupons. Existing solutions in this realm do not ensure end-to-end communication, information privacy, client’s anonymity. In order to overcome these flaws, we propose a secure privacy preserving commerce (SPPMC) framework near-field communication (NFC) based proximity payments. SPPMC achieves both privacy. It ensures anonymity by making use of traceable anonymous...
The unprecedented growth of mobile applications promoted the usage these for payments. current research works in payments and commerce are prone to reverse-engineering attacks lacked transport layer protection, so do not ensure security. Therefore, such on Mobile Payment Applications (MPA) will be successful, which leads severe financial loss. To address issues, we propose a secure framework incorporating defense-in-depth approach Near Field Communication (NFC) based payment frameworks. Our...
In this paper, we propose a new payment instrument, i.e., mobile traveller’s check (MTC) in the realm of commerce. This instrument provides merits both e-cash and e-check, MTC can be used freely as an it is secure e-check. We present protocol based on which uses elliptic curve digital signature algorithm (ECDSA) for generating verifying signatures DES encrypting decrypting messages are suitable resource constrained devices like phones. use ‘extended BAN’ logic (Abadi et al., 1993) to provide...
In this paper, we propose a secure NFC mobile payment protocol based on biometrics (SNMPBs) using wireless public key infrastructure (WPKI) and universal integrated circuit card (UICC). Electronic signatures generated in are considered qualified as they UICC which is tamper resistant device. A procedure for the personalisation of application (on UICC) (by issuer/bank) proposed. Our SNMPB resolves disputes efficiently among stakeholders by collecting evidence transaction counters, log,...
With the swift advancement of technology and growing popularity internet in business communication, cybersecurity posed a global threat. This research focuses new Deep Learning (DL) model referred as FinSafeNet to secure loose cash transactions over digital banking channels. is based on Bi-Directional Long Short-Term Memory (Bi-LSTM), Convolutional Neural Network (CNN) an additional dual attention mechanism study transaction data influence observation various security threats. One such...
Cloud computing has evolved as widely accepted and used paradigm for service providers well customers on internet. As users share their sensitive information cloud, it become the major concern of cloud to make environment more secure trustworthy. For adding extended security, data are needed be encrypted prior its upload cloud. The numbers cryptographic algorithms proposed by various researchers this purpose. main objectives attribute-based encryption (ABE) models achieve security access...
Telecare Medical Information Systems (TMIS) is a highly focused and unique domain providing healthcare services remotely, the development advancement in realm of information communication technologies boosted TMIS. Smartphones, IoT devices, Mobile Healthcare Applications (MHA) hospital servers are building blocks Emergen Research predicts that based security market will reach USD 5.52 Billion 2028. Existing solutions facing many problems which includes leakage, false authentication, key loss...
In this paper we propose a Secure Mobile Payment Framework based on Biometric (SMPB) using WPKI (Wireless Public Key Infrastructure) and UICC (Universal Integrated Circuit Card). Our proposed is compared with recent works found to be better in terms of ensuring end security (i.e. from Payments Application the Bank Server). mobile payment protocol originating (which UICC) Server realizes Fair Exchange ensures Confidentiality, Authentication, Integrity Non Repudiation, prevents double...
In this paper we propose an Enhanced Mobile SET (EMSET) protocol with formal verification using Agent technology and Digital Signature Message Recovery based on ECDSA mechanism. (DSMR) mechanism provides in proposing EMSET Networks. has many benefits such as bandwidth conservation, reduction of latency, completion time, Asynchronous (disconnected) communications. eliminates the need adopting PKI cryptosystems. Our proposed ensures Authentication, Integrity, Confidentiality Non Repudiation,...
In this paper the authors propose a Secure Mobile Payment Framework in Multi hop Cellular Network environment (which is an integration of cellular networks and mobile ad hoc networks) using Agent technology Digital Signature with Message Recovery (DSMR) mechanism based on ECDSA mechanism. communication Networks nontrivial task because lack infrastructure, no prior trust relationships among nodes due to absence centralized authority. provides secure payments Networks. has many benefits such...
This paper proposes a Secure Mobile Wallet Framework (SMWF) using WPKI (Wireless Public Key Infrastructure) and UICC (Universal Integrated Circuit Card) by defining (a) procedure of personalizing the client, (b) provisioning personalization (Mutual Authentication Agreement Protocol) Payments Application (which is on UICC) Bank (c) our proposed mobile wallet will have manager managed CA (acting as TSM), every application independent, protected firewalls encrypted data stored in application....
Wireless sensor networks are becoming part of many the research areas to address different issues related technological and societal. So, The developments in wireless communication technology have made deployment nodes connected through medium, known as networks. numerous applications fields like military , environmental monitoring health industry etc.. more benefits over Wired .Though there several advantages networks, they prone security issues. . Security became a major concern for...
In this paper the authors propose a Secure and Optimized Proximity Mobile Payment (SOPMP) Framework using NFC (Near Field Communication) technology, WPKI (Wireless Public Key Infrastructure), UICC (Universal Integrated Circuit Card). The novelty of proposed mobile payment framework is messages are exchanged in form Digital Signature with Message Recovery (DSMR) merchant sends Invoice Certificate (DIC) (which digitally signed by merchant). communication link between phone POS (Point Of Sale)...
In this paper we propose a Secure and Optimized Mobile Payment Framework based on Universal Integrated Circuit Card (UICC) (a) which summarizes mobile payment in relation to several different participants, (b) procedure of personalizing UICC by the client c) provisioning personalization (Mutual Authentication, Key Agreement Protocol & for ensuring non repudiation without adopting WPKI) Payments Application (which is UICC) Bank d) protocol proposed between personalized Server ensures all...
Cloud computing has evolved as widely accepted and used paradigm for service providers well customers on internet. As users share their sensitive information cloud, it become the major concern of cloud to make environment more secure trustworthy. For adding extended security, data are needed be encrypted prior its upload cloud. The numbers cryptographic algorithms proposed by various researchers this purpose. main objectives attribute-based encryption (ABE) models achieve security access...