E. A. Mary Anita

Orcid: 0000-0003-1538-4222

According to our database1, E. A. Mary Anita authored at least 21 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved reptile search algorithm with sequential assignment routing based false packet forwarding scheme for source location privacy protection on wireless sensor networks.
J. Intell. Fuzzy Syst., January, 2024

2023
Blocking intrusion logic using optimized multi-head convolution in wireless sensor network.
J. Intell. Fuzzy Syst., October, 2023

Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm.
Wirel. Pers. Commun., 2023

Integrity assured multi-functional multi-application secure data aggregation in wireless sensor networks (IAMFMA-SDA).
J. Intell. Fuzzy Syst., 2023

A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility.
IEEE Access, 2023

2022
Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey.
Wirel. Pers. Commun., 2022

Smart Affect Recognition System for Real-Time Biometric Surveillance Using Hybrid Features and Multilayered Binary Structured Support Vector Machine.
Comput. J., 2022

2021
A novel multi functional multi parameter concealed cluster based data aggregation scheme for wireless sensor networks (NMFMP-CDA).
Wirel. Networks, 2021

Identity-based message authentication scheme using proxy vehicles for vehicular ad hoc networks.
Wirel. Networks, 2021

Discrete Integrity Assuring Slice-Based Secured Data Aggregation Scheme for Wireless Sensor Network (DIA-SSDAS).
Wirel. Commun. Mob. Comput., 2021

Optimal Cryptography Scheme and Efficient Neutrosophic C-Means Clustering for Anomaly Detection in Cloud Environment.
J. Circuits Syst. Comput., 2021

A self-cooperative trust scheme against black hole attacks in vehicular ad hoc networks.
Int. J. Wirel. Mob. Comput., 2021

An efficient privacy-preserving model based on OMFTSA for query optimization in crowdsourcing.
Concurr. Comput. Pract. Exp., 2021

2019
An Enhanced Secure Authentication Scheme for Vehicular Ad Hoc Networks Without Pairings.
Wirel. Pers. Commun., 2019

2018
Secure Vehicular Communication Using ID Based Signature Scheme.
Wirel. Pers. Commun., 2018

2015
A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

2014
A New Compact Microstrip Integrated E-Array Patch Antenna with High Gain and High Aperture Efficiency.
Wirel. Pers. Commun., 2014

2011
Sybil Secure Architecture for Multicast Routing Protocols for MANETs.
Proceedings of the Advances in Computing and Communications, 2011

2009
Black Hole Attack on Multicast Routing Protocols.
J. Convergence Inf. Technol., 2009

Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure.
Inf. Secur. J. A Glob. Perspect., 2009

Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack
CoRR, 2009


  Loading...