Search Results - "Ammayappan, Kavitha"
-
1
Seamless Interoperation of LTE-UMTS-GSM requires Flawless UMTS and GSM
Published in 2013 2nd International Conference on Advanced Computing, Networking and Security (01-12-2013)“…Though the mobile communication technology keep facilitating new generations such as LTE, UMTS, etc the replacement of the past generation technologies may…”
Get full text
Conference Proceeding -
2
TSM centric privacy preserving NFC mobile payment framework with formal verification
Published in 2015 2nd International Conference on Electronics and Communication Systems (ICECS) (01-02-2015)“…Near field communication is on the verge of broad adoption worldwide as the NFC controllers and Secure Elements (SEs) are now commonplace components in many…”
Get full text
Conference Proceeding -
3
Securing BIG storage: Present and future
Published in 2016 Online International Conference on Green Engineering and Technologies (IC-GET) (01-11-2016)“…Recently data processing via cloud storage is attracting much attention due to the facilitation of high end storage resources and computing environments as pay…”
Get full text
Conference Proceeding -
4
Authentication and dynamic key management protocol based on certified tokens for manets
Published in 2009 Global Mobile Congress (01-10-2009)“…In this paper a novel mutual authentication and key management protocol is proposed, which satisfies most of the security requirements like mutual…”
Get full text
Conference Proceeding -
5
Mutual Authentication and Key Agreement based on Elliptic Curve Cryptography for GSM
Published in 2006 International Conference on Advanced Computing and Communications (01-12-2006)“…In this paper we propose an improvement to the GSM authentication protocol, based on Elliptic Curve Cryptography. The proposed protocol offers enhanced…”
Get full text
Conference Proceeding -
6
Cluster based multihop security protocol in MANET using ECC
Published in TENCON 2008 - 2008 IEEE Region 10 Conference (01-11-2008)“…Adhoc networks are self-configurable networks with dynamic topologies. All involved nodes in the network are responsible for management activities. In multihop…”
Get full text
Conference Proceeding