N. Jeyanthi
Orcid: 0000-0002-6141-5467
According to our database1,
N. Jeyanthi
authored at least 28 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Perform. Eng., 2024
2023
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications.
Peer Peer Netw. Appl., September, 2023
Int. J. Perform. Eng., 2023
Dynamic Forest of Random Subsets-based supervised hash signature scheme for secure user authentication in smart home environment.
Concurr. Comput. Pract. Exp., 2023
2022
Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy.
J. Parallel Distributed Comput., 2022
J. Ambient Intell. Humaniz. Comput., 2022
Secure data transmission for protecting the users' privacy in medical internet of things.
Int. J. Adv. Intell. Paradigms, 2022
2020
An analysis of security solutions for ARP poisoning attacks and its effects on medical computing.
Int. J. Syst. Assur. Eng. Manag., 2020
Int. J. Serv. Technol. Manag., 2020
Hybrid encryption model for managing the data security in medical internet of things.
Int. J. Internet Protoc. Technol., 2020
2019
Intelligent intrusion detection techniques for secure communications in wireless networks: a survey.
Int. J. Adv. Intell. Paradigms, 2019
2018
A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2018
Int. J. Reason. based Intell. Syst., 2018
Int. J. Adv. Intell. Paradigms, 2018
Proceedings of the Intelligent Systems Design and Applications, 2018
2017
Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage.
Int. J. Netw. Secur., 2017
Int. J. Commun. Networks Distributed Syst., 2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
2014
Distributed Denial of service attacks and its effects on Cloud environment- a survey.
Proceedings of the International Symposium on Networks, Computers and Communications, 2014
Proceedings of the International Symposium on Networks, Computers and Communications, 2014
ASCIi based cryptography using unique id, matrix multiplication and palindrome number.
Proceedings of the International Symposium on Networks, Computers and Communications, 2014
2013
Int. J. Commun. Networks Inf. Secur., 2013
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP.
Int. J. Commun. Networks Distributed Syst., 2013
2012
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
Int. J. Netw. Secur., 2012
Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment.
Int. J. Commun. Networks Inf. Secur., 2012