S. Venkatesan
Orcid: 0000-0003-1403-2639Affiliations:
- Indian Institute of Information Technology, Allahaba, India
According to our database1,
S. Venkatesan
authored at least 45 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements.
Int. J. Inf. Sec., February, 2025
2024
A Novel Strategy for the Identification of the Operating System of Bluetooth-Enabled Devices for Security Audit.
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
2023
Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud.
J. Supercomput., October, 2023
J. Supercomput., September, 2023
Peer Peer Netw. Appl., September, 2023
Multim. Tools Appl., July, 2023
J. Supercomput., March, 2023
IEEE Trans. Serv. Comput., 2023
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
2022
J. Supercomput., 2022
J. Supercomput., 2022
IEEE Trans. Intell. Transp. Syst., 2022
J. Comput. Syst. Sci., 2022
Clust. Comput., 2022
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme.
Clust. Comput., 2022
2021
SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD.
Wirel. Pers. Commun., 2021
iHRNL: Iterative Hessian-based manifold regularization mechanism for localization in WSN.
J. Supercomput., 2021
An efficient and light weight polynomial multiplication for ideal lattice-based cryptography.
Multim. Tools Appl., 2021
Comput. Sci. Rev., 2021
2020
Wirel. Pers. Commun., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Syst. J., 2020
Pervasive Mob. Comput., 2020
Clust. Comput., 2020
2019
2018
J. Intell. Fuzzy Syst., 2018
2017
Secure access of multiple keywords over encrypted data in cloud environment using ECC-PKI and ECC ElGamal.
Proceedings of the 2017 International Conference on Public Key Infrastructure and its Applications, 2017
2016
Soc. Netw. Anal. Min., 2016
2015
Int. J. Interact. Multim. Artif. Intell., 2015
2013
Analysis of accounting models for the detection of duplicate requests in web services.
J. King Saud Univ. Comput. Inf. Sci., 2013
Comput. Stand. Interfaces, 2013
2010
Advanced mobile agent security models for code integrity and malicious availability check.
J. Netw. Comput. Appl., 2010
Comput. Stand. Interfaces, 2010
2009
Comput. Stand. Interfaces, 2009
2008
Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP).
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008
2007
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007