Personal information

Activities

Employment (1)

University of Hyderabad: Hyderabad, Telangana, IN

2004-07-02 to present | Associate Professor (School of Computer and Information Sciences)
Employment
Source: Self-asserted source
Venkata Subba Rao Yengisetty

Works (14)

Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme

IEEE Access
2023 | Journal article
Contributors: Rolla Subrahmanyam; N. Rukma Rekha; Y. V. Subba Rao
Source: check_circle
Crossref

Compartmented Proactive Secret Sharing Scheme

2023 | Book chapter
Contributors: Rolla Subrahmanyam; N. Rukma Rekha; Y. V. Subba Rao
Source: check_circle
Crossref

Identity verifiable ring signature scheme for privacy protection in blockchain

International Journal of Information Technology
2023-06 | Journal article
Contributors: S. Devidas; N. Rukma Rekha; Y. V. Subba Rao
Source: check_circle
Crossref

Multipartite Verifiable Secret Sharing Based on CRT

Lecture Notes on Data Engineering and Communications Technologies
2022 | Book chapter
EID:

2-s2.0-85115227123

Part of ISSN: 23674520 23674512
Contributors: Subrahmanyam, R.; Rukma Rekha, N.; Subba Rao, Y.V.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

Decentralized framework for record-keeping system in government using hyperledger fabric

Advances in Intelligent Systems and Computing
2020 | Book
EID:

2-s2.0-85083955317

Part of ISSN: 21945365 21945357
Contributors: Devidas, S.; Rekha, N.R.; Subba Rao, Y.V.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

Faster Biometric Authentication System using Fan and Vercauteren Scheme

Proceedings - 2018 2nd International Conference on Advances in Computing, Control and Communication Technology, IAC3T 2018
2019 | Conference paper
EID:

2-s2.0-85064389085

Contributors: Imtiyazuddin, S.; Subba Rao, Y.V.; Rukma Rekha, N.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

Node authentication using BLS signature in distributed PKI based MANETS

arXiv
2017 | Other
EID:

2-s2.0-85093247297

Part of ISSN: 23318422
Contributors: Kumar, N.C.; Basit, A.; Singh, P.; Venkaiah, V.Ch.; Subba Rao, Y.V.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

CRT based threshold multi secret sharing scheme

International Journal of Network Security
2014 | Journal article
EID:

2-s2.0-84903902606

Contributors: Subba Rao, Y.V.; Bhagvati, C.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

CRT based secured encryption scheme

2012 1st International Conference on Recent Advances in Information Technology, RAIT-2012
2012 | Conference paper
EID:

2-s2.0-84862108314

Contributors: Subba Rao, Y.V.; Bhagvati, C.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

Zero knowledge proof in secret sharing scheme using elliptic curve cryptography

Communications in Computer and Information Science
2012 | Book
EID:

2-s2.0-84865700899

Contributors: Sardar, A.; Subba Rao, Y.V.; RukmaRekha, N.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

Applications of visual cryptography

International Journal of Parallel, Emergent and Distributed Systems
2011 | Journal article
EID:

2-s2.0-81255177033

Contributors: Subba Rao, Y.V.; Roy, B.K.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

Enhanced key life in online authentication systems using virtual password

Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011
2011 | Conference paper
EID:

2-s2.0-80051489660

Contributors: Rekha, N.R.; Rao, Y.V.S.; Sarma, K.V.S.S.R.S.S.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

Secure image steganography based on randomized sequence of cipher bits

Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011
2011 | Conference paper
EID:

2-s2.0-80051481382

Contributors: Rao, Y.V.S.; Rao, S.S.B.; Rekha, N.R.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier

Fingerprint based authentication application using visual cryptography methods (improved ID card)

IEEE Region 10 Annual International Conference, Proceedings/TENCON
2008 | Conference paper
EID:

2-s2.0-63049129911

Contributors: Rao, Y.V.S.; Sukonkina, Y.; Bhagwati, C.; Singh, U.K.
Source: Self-asserted source
Venkata Subba Rao Yengisetty via Scopus - Elsevier