Anitha Ramalingam

According to our database1, Anitha Ramalingam authored at least 20 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Enhanced Multi-attribute Combinative Double Auction (EMCDA) for Resource Allocation in Cloud Computing.
Wirel. Pers. Commun., 2022

2021
Efficient dynamic resource provisioning based on credibility in cloud computing.
Wirel. Networks, 2021

A Hash-Based Quantum-Resistant Chameleon Signature Scheme.
Sensors, 2021

2020
Workload Mining in Cloud Computing using Extended Cloud Dempster-Shafer Theory (ECDST).
Wirel. Pers. Commun., 2020

An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment.
Wirel. Pers. Commun., 2020

End to end light weight mutual authentication scheme in IoT-based healthcare environment.
J. Reliab. Intell. Environ., 2020

2019
IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics.
Wirel. Pers. Commun., 2019

2018
An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.
J. Supercomput., 2018

A robust mutual authentication scheme for session initiation protocol with key establishment.
Peer-to-Peer Netw. Appl., 2018

A new code-based designated verifier signature scheme.
Int. J. Commun. Syst., 2018

Cipher text policy attribute based broadcast encryption for multi-privileged groups.
Int. Arab J. Inf. Technol., 2018

RFID Based Verifiable Ownership Transfer Protocol Using Blockchain Technology.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment.
Int. J. Commun. Syst., 2017

A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity.
Comput. Electr. Eng., 2017

2015
Malware Detection in Android files based on Multiple levels of Learning and Diverse Data Sources.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

Analysis of Accountability Property in Payment Systems Using Strand Space Model.
Proceedings of the Security in Computing and Communications, 2015

2014
Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem.
Int. J. Inf. Comput. Secur., 2014

Analysis of Electronic Voting Protocol Using Strand Space Model.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2012
Balanced key tree management for multi-privileged groups using (<i>N</i>, <i>T</i>) policy.
Secur. Commun. Networks, 2012

Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012


  Loading...