C. Jayakumar
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
Bibliography
2024
Efficient and Secure Long-Distance Quantum Key Distribution by using a Proxy Encryption Scheme.
Multim. Tools Appl., October, 2024
2023
Greedy regression and differential convex-based deep learning for audio event classification.
J. Intell. Fuzzy Syst., December, 2023
Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing.
Multim. Tools Appl., November, 2023
Comput. Syst. Sci. Eng., 2023
2022
Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment.
Simul. Model. Pract. Theory, 2022
Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud.
Quantum Inf. Process., 2022
Security enhanced optimal trajectory selection for mobile sink using reinforcement learning.
J. Intell. Fuzzy Syst., 2022
2020
Kernellized support vector regressive machine based variational mode decomposition for time frequency analysis of Mirnov coil.
Microprocess. Microsystems, 2020
2019
Sequence Statistical Code Based Data Compression Algorithm for Wireless Sensor Network.
Wirel. Pers. Commun., 2019
2018
Inclusive Elliptical Curve Cryptography (IECC) for Wireless Sensor Network Efficient Operations.
Wirel. Pers. Commun., 2018
2017
Unique identity and localization based replica node detection in hierarchical wireless sensor networks.
Comput. Electr. Eng., 2017
2016
Trust Based Energy Efficient Clustering Protocol in Wireless Sensor Networks for Military Applications.
Proceedings of the Advances in Computing and Data Sciences, 2016
2015
Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security.
IEEE Syst. J., 2015
Recurrent Ant Colony Optimization for Optimal Path Convergence in Mobile Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2015
2014
Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent.
J. Comput. Sci., 2014
2013
J. Comput. Sci., 2013
Proceedings of the Intelligent Computing, 2013
2012
An efficient and secure key agreement scheme using physiological signals in body area networks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012