V. Natarajan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud.
IET Inf. Secur., 2024

2023
Blockchain based Securing Medical Records in Big Data Analytics.
Data Knowl. Eng., March, 2023

2022
Efficient big data security analysis on HDFS based on combination of clustering and data perturbation algorithm using health care database.
J. Intell. Fuzzy Syst., 2022

2020
An Enhanced Authentication Protocol for Multi-server Environment Using Password and Smart Card.
Wirel. Pers. Commun., 2020

A new three-factor authentication and key agreement protocol for multi-server environment.
Wirel. Networks, 2020

FIoT: A QoS-Aware Fog-IoT Framework to Minimize Latency in IoT Applications via Fog Offloading.
Proceedings of the Evolution in Computational Intelligence, 2020

2018
Millimeter-wave System for the Detection of Cracks using Weiner Filter-based Layered Synthetic Aperture Radar (WL-SAR) Technique.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

2017
Lightweight key agreement protocol for IoT based on IKEv2.
Comput. Electr. Eng., 2017

2016
Lightweight Authentication for COAP based IOT.
Proceedings of the 6th International Conference on the Internet of Things, 2016

Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis Attacks.
Proceedings of the International Conference on Informatics and Analytics, 2016

2015
Android based malware detection using a multifeature collaborative decision fusion approach.
Neurocomputing, 2015

Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks.
Comput. J., 2015

2014
Hybrid robust watermarking for color images.
Comput. Electr. Eng., 2014

Proposal of a CBIR Framework for Retinal Images Using Fusion Edge Detection and Zernike Moments.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2014

2012
Detection of StegoBot: a covert social network botnet.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Analyzing the Performance of Watermarking Based on Swarm Optimization Methods.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Content Based Human Retinal Image Retrieval Using Vascular Feature Extraction.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2008
An FPGA Implementation of Improved AODV Routing Protocol for Route Repair Scheme.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2005
Security for Energy Constrained RFID System.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005

1996
Outline for an operational semantics of Promela.
Proceedings of the Spin Verification System, 1996

1995
Conformance: A Precongruence close to Bisimilarity.
Proceedings of the International Workshop on Structures in Concurrency Theory, 1995


  Loading...