Anitha Ramalingam
According to our database1,
Anitha Ramalingam
authored at least 20 papers
between 2012 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Enhanced Multi-attribute Combinative Double Auction (EMCDA) for Resource Allocation in Cloud Computing.
Wirel. Pers. Commun., 2022
2021
Wirel. Networks, 2021
2020
Workload Mining in Cloud Computing using Extended Cloud Dempster-Shafer Theory (ECDST).
Wirel. Pers. Commun., 2020
An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment.
Wirel. Pers. Commun., 2020
End to end light weight mutual authentication scheme in IoT-based healthcare environment.
J. Reliab. Intell. Environ., 2020
2019
IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics.
Wirel. Pers. Commun., 2019
2018
An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.
J. Supercomput., 2018
A robust mutual authentication scheme for session initiation protocol with key establishment.
Peer-to-Peer Netw. Appl., 2018
Int. Arab J. Inf. Technol., 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
2017
An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment.
Int. J. Commun. Syst., 2017
A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity.
Comput. Electr. Eng., 2017
2015
Malware Detection in Android files based on Multiple levels of Learning and Diverse Data Sources.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015
Proceedings of the Security in Computing and Communications, 2015
2014
Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem.
Int. J. Inf. Comput. Secur., 2014
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
2012
Balanced key tree management for multi-privileged groups using (<i>N</i>, <i>T</i>) policy.
Secur. Commun. Networks, 2012
Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012