Publications

Links: ORCID ID 0000-0002-7919-8843     |     Google Scholar

Refereed Journal Articles
  1. R. V. Sampangi and S. Sampalli, “Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks”, International Journal of Network Security, Vol.19, No.3, pp.430-442, May 2017 (DOI: 10.6633/IJNS.201703.19(3).12). Click here to access the paper online.
  2. R. V. Sampangi and S. Sampalli, “HiveSec: Security in Resource-Constrained Wireless Networks Inspired by Beehives and Bee Swarms”, International Journal of Information Security (2016). doi:10.1007/s10207-016-0341-1. Click here to access the paper online.
  3. R. V. Sampangi and S. Sampalli, “Butterfly Encryption Scheme for Resource-Constrained Wireless Networks”, Sensors 2015 (Special Issue Identification, Information & Knowledge in the Internet of Things), 15(9), 23145-23167; doi:10.3390/s150923145. Received: 13 July 2015 / Revised: 27 August 2015 / Accepted: 8 September 2015 / Published: 15 September 2015. Click here to access the paper online.
  4. R. V. Sampangi and S. Sampalli, “RFID Mutual Authentication Protocols based on Gene Mutation and Transfer”, in the Special issue on RFID & Internet of Things of the Journal of Communications Software and Systems (JCOMSS), Vol. 9, No. 1, March 2013. Click here to access the paper online.
  5. R. V. Sampangi, S. Dey, S. R. Urs and S. Sampalli, “A Security Suite for Wireless Body Area Networks”, International Journal of Network Security and Its Applications (IJNSA), Vol. 4, No. 1, pp. 97-116, January 2012. Click here to access the paper online.
  6. R. V. Sampangi, W. Ritter, N. V. Vighnesh and H. C. A. Ray, “The Knowledge City Index: A Case Study of Mysore”, International Journal of Knowledge-Based Development (IJKBD) 2012, Vol. 3, No. 2, pp. 193-212. Click here to access the paper online.
Refereed Conference Articles
  1. J. Narayanaswamy, R. V. Sampangi and S. Sampalli, “HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption,” Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP) 2015, February 2015, Loire Valley, France.
  2. R. V. Sampangi and S. Sampalli, “‘RFID Encryption Scheme Featuring Pseudorandom Numbers and Butterfly Seed Generation”, Proceedings of the 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2014, September 2014, Split, Croatia.Click here to access the paper online.
    This submission was recognized as the “Best Conference Paper in the General Conference Program” at SoftCOM 2014.
  3. R. V. Sampangi and S. Sampalli, “HiveSign: Dynamic Message Signatures for Resource-Constrained Wireless Networks”, Proceedings of the 10thACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet) 2014, September 2014, Montreal, Canada.Click here to access the paper online.
    This submission was recognized with the “Best Paper Award” at Q2SWinet 2014.
  4. J. Narayanaswamy, R. V. Sampangi and S. Sampalli, “SCARS: Simplified Cryptographic Algorithm for RFID Systems”, Proceedings of the 2014 IEEE RFID Technology and Applications Conference (RFID-TA), September 2014, Tampere, Finland.
  5. M. Alabdulhafith, R. V. Sampangi and S. Sampalli, “NFC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection”,Proceedings of the 5th International Workshop on Near Field Communication (NFC 2013), February 2013, Zurich, Switzerland. Click here to access the paper online.
  6. R. V. Sampangi and S. Sampalli, “Tag-Server Mutual Authentication Scheme based on Gene Transfer and Genetic Mutation”, Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA 2012), July 2012, Ottawa, Canada. Click here to access the paper online.
  7. R. V. Sampangi, S. Dey, S. R. Urs and S. Sampalli, “IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks”, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012, Vol. 86, pp.482-494. Click here to access the paper online.
  8. R. V. Sampangi, S. R. Urs and S. Sampalli, “A Novel Reliability Scheme Employing Multiple Sink Nodes for Wireless Body Area Networks”,Proceedings of the 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA 2011), pp. 162-167, September 2011, Langkawi, Malaysia. Click here to access the paper online.
  9. R. V. Sampangi, S. Rath and W. Lijuan, “Knowledge Management in Inter-Societal Academic R&D”, Proceedings of the International Conference of Engineering and Information Management (ICEIM) 2011, Chengdu, China, April 2011. Click here to access the paper online.
  10. R. V. Sampangi, S. Dey and V. N. Viswanath, “The Sneeze Algorithm: A Social Network and Biomimetic Approach for Intrusion Detection in Wireless Networks”, Proceedings of the 2010 IEEE International Workshop on Business Applications of Social Network Analysis (BASNA 2010), pp. 1-5, December 2010, Bangalore, India. Click here to access the paper online.
  11. V. S. Raghav, W. Ritter, N. V. Vighnesh, H. C. A. Ray, N. K. Rao, N. Shilpa, R. Sathyendhranath, B. A. S. Kumar, “Mysore – A Framework and an Audit of a Knowledge City”, Proceedings of the Third Knowledge City World Summit, Melbourne, Australia, November 2010.
  12. R. V. Sampangi, V. N. Viswanath and H. C. A. Ray, “Reaching the Unreached: A Study on Mobile Learning in India”, Proceedings of the 5th International Conference of E-Learning (ICEL) 2010, University Sains Malaysia, Penang, Malaysia, July 2010. Click here for the proceedings.
Workshop and Other Minimally Referreed Articles
  1. M. Rahman, R. V. Sampangi and S. Sampalli, “Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems,” 2015 IEEE 12th Consumer Communications and Networking Conference (CCNC): CCNC 2015 Workshops – IEEE CCAN – CCNC 2015 Workshops.
  2. R. V. Sampangi, and K. Hawkey, “(Can’t) Lie to ME: Using Micro Expressions for User Authentication,” Who are you?! Adventures in Authentication: WAY Workshop, Symposium On Usable Privacy and Security (SOUPS) 2014.
  3. J. Narayanaswamy, R. V. Sampangi, M. Rahman, and S. Sampalli, “Integrity as a Part of Encryption,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  4. J. Narayanaswamy, R. V. Sampangi, M. Rahman, and S. Sampalli, “Generation of Dynamic Key Length for the Block Cipher,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  5. J. Narayanaswamy, M. Rahman, R. V. Sampangi, and S. Sampalli, “Dynamic Random Key Generator for Stream Cipher,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  6. J. Narayanaswamy, M. Rahman, R. V. Sampangi, and S. Sampalli, “Bandwidth Efficient Data Transmission,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  7. A. S. Sran, R. V. Sampangi and S. Sampalli, “A light weight Authentication scheme for RFID through dynamic generation of keys,” Dalhousie Computer Science In-House Conference (DCSI) 2012. Click here to access the paper online.
Other Articles
  1. R. V. Sampangi and J. McSweeny, “A Balancing Act: The realities of graduate school,” Focus (Summer 2013), published by the Centre for Learning and Teaching, Dalhousie University, August 2013.
Presentations
  1. R. V. Sampangi, S. Sampalli, “A Context-specific Dynamically Re-configurable Security Framework,” Dalhousie Computer Science In-House Conference (DCSI) 2015, 30 September – 2 October, 2015.
    This presentation was recognized as the “Best Presentation” at DCSI 2015.
  2. R. V. Sampangi, D. Reilly, “Context-Dependent Security using Sensors and User Behaviour,” Dalhousie Computer Science In-House Conference (DCSI) 2015, 30 September – 2 October, 2015.
  3. S. S. Arora, R. V. Sampangi. D. Reilly, “Brushing and Linking Paper Documents with Mobile Devices,” Dalhousie Computer Science In-House Conference (DCSI) 2015, 30 September – 2 October, 2015.
  4. R. V. Sampangi, “Creating Effective Presentations,” DCSI 2015 Special Sessions, Faculty of Computer Science, Dalhousie University, 16 September 2015.
  5. J. M. McSweeny, J. Augusto, and R. V. Sampangi, “Elements of the Certificate in University Teaching and Learning (CUTL),” Dalhousie TA Day 2015, Centre for Learning and Teaching (CLT), Dalhousie University, 15 September 2015.
  6. R. V. Sampangi, “Plagiarism: Don’t Do It,” In-class Presentation (Course: Network Security), Faculty of Computer Science, Dalhousie University, March 2014.
  7. R. V. Sampangi, “Research: Learning from Fools and from Sages,” Invited Presentation on Research in Everyday Life, MYRA School of Business, Mysore, India, January 2014.
  8. M. Rahman, R. V. Sampangi and S. Sampalli, “Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  9. R. V. Sampangi, “Research and Experiences at Graduate School,” Invited Presentation, International School of Information Management, University of Mysore, Mysore, India, April 2013.
  10. R. V. Sampangi, “Introduction to Radio Frequency Identification (RFID),” Sessional Instructor Development Workshop, Centre for Learning and Teaching, Dalhousie University, July 2012.
  11. M. Alabdulhafith, R. V. Sampangi and S. Sampalli, “Wireless Technology in Health Care,” Health Informatics Seminar, Faculty of Medicine, Dalhousie University, Halifax, NS, February 2012.
Juried / Curated Art Installations and Competitions
  1. R. V. Sampangi. (2014) “Tiger Park: A Social Parking Application,” Dal App Challenge 2014, Dalhousie University, Halifax, NS.
    This entry was placed 3rd in the App challenge.
  2. D. Reilly, M. Tawakol, S. Mahajan, M. Alnusayri, K. Hawkey, B. MacKay, J. Patel, R. V. Sampangi, S. Michels et al. (2013) “Operation:Citadel” (curated exhibit). Nocturne:Art at Night festival, Halifax NS. Click here for more information.
  3. S. Maldonado, R. V. Sampangi. (2013) “CS Scale,” Dal App Challenge 2013, Dalhousie University, Halifax, NS.