Search Results - "Jeyanthi, N."

Refine Results
  1. 1

    Dynamic Forest of Random Subsets‐based supervised hash signature scheme for secure user authentication in smart home environment by Sudha, K. Swapna, Jeyanthi, N.

    Published in Concurrency and computation (10-12-2023)
    “…The advent of information and communication technology has revolutionized the application of smart home through which the residents remotely establish superior…”
    Get full text
    Journal Article
  2. 2

    Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications by Sudha, K. Swapna, Jeyanthi, N.

    Published in Peer-to-peer networking and applications (01-09-2023)
    “…In the modern era, smart home technology is considered as the most growing application of Internet of Things (IoT) as they facilitate users for control home…”
    Get full text
    Journal Article
  3. 3

    A Review on State-of-Art Blockchain Schemes for Electronic Health Records Management by Jayabalan, Jayapriya, Jeyanthi, N.

    “…In today’s world, Electronic Health Records (EHR) are highly segregated and available only within the organization with which the patient is associated. If a…”
    Get full text
    Journal Article
  4. 4

    Distributed authentication framework for Hadoop based bigdata environment by Hena, M., Jeyanthi, N.

    “…Big data, the upcoming technology in the field of computing, refers to a large complex dataset. It deals with large complex datasets and yields great valued…”
    Get full text
    Journal Article
  5. 5

    A Three-Tier Authentication Scheme for Kerberized Hadoop Environment by Hena, M., Jeyanthi, N.

    “…Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System…”
    Get full text
    Journal Article
  6. 6

    An analysis of security solutions for ARP poisoning attacks and its effects on medical computing by Prabadevi, B., Jeyanthi, N., Abraham, Ajith

    “…Network utilization reached its maximum level due to the availability of high-end technologies in the least cost. This enabled the network users to share the…”
    Get full text
    Journal Article
  7. 7

    Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenario by Sudha, K. Swapna, Jeyanthi, N.

    “…Smart home technology is one of the significant emerging application in the Internet of Things (IoT) that facilitates the user to control home devices in the…”
    Get full text
    Journal Article
  8. 8

    A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT) by Sudha, K. Swapna, Jeyanthi, N.

    “…Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications…”
    Get full text
    Journal Article
  9. 9

    TSCBA-A Mitigation System for ARP Cache Poisoning Attacks by Prabadevi, B., Jeyanthi, N.

    “…Address Resolution Protocol (ARP) cache poisoning results in numerous attacks. A novel mitigation system for ARP cache poisoning presented here avoids ARP…”
    Get full text
    Journal Article
  10. 10

    A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks by Rama Prabha, K. P., Jeyanthi, N.

    Published in Wireless personal communications (01-02-2018)
    “…Security in communication is an important and challenging issue in the recent years. In the past, many secure routing algorithms have been proposed to provide…”
    Get full text
    Journal Article
  11. 11

    Secret Image Enhanced Sharing Using Visual Cryptography by Brindha, K., Jeyanthi, N.

    “…In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the…”
    Get full text
    Journal Article
  12. 12

    Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks by Prabadevi, B., Jeyanthi, N.

    “…The bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication…”
    Get full text
    Journal Article
  13. 13

    Secured Document Sharing Using Visual Cryptography in Cloud Data Storage by Brindha, K., Jeyanthi, N.

    “…Security has emerged as the most concerned aspect of cloud computing environment and a prime challenge for the cloud users. The stored data can be retrieved by…”
    Get full text
    Journal Article
  14. 14

    A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks by Jeyanthi, N, Mogankumar, P. C.

    “…Cloud is not exempted from the vulnerability of Distributed Denial of Service (DDoS) attack, a serious threat to any distributed network and has considerably…”
    Get full text
    Journal Article
  15. 15

    Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy by Jayabalan, Jayapriya, Jeyanthi, N.

    “…•Fail-safe and tamper resistant blockchain framework for healthcare data.•Decentralized storage in IPFS using blockchain for data privacy and…”
    Get full text
    Journal Article
  16. 16

    Rqa based approach to detect and prevent ddos attacks in voip networks by Jeyanthi, N., Thandeeswaran, R., Vinithra, J.

    “…Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and…”
    Get full text
    Journal Article
  17. 17

    DaDe: A Study of Chunking Algorithm and Hashing Function in Block Level Chunk based Data Deduplication by Khaing, Me Me, Jeyanthi, N.

    “…As the amount of storage employment grows vaster and vaster, people havebeen strived to observe the efficient technique to protect storage space. Data…”
    Get full text
    Conference Proceeding
  18. 18

    A Study on Distributed Consensus Protocols and Algorithms: The Backbone of Blockchain Networks by Jayabalan, Jayapriya, N, Jeyanthi

    “…In a Blockchain network multiple nodes across the network verify each transaction and preserve them without having a centralized authority. Verification and…”
    Get full text
    Conference Proceeding
  19. 19

    Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment by Jeyanthi, N., Iyengar, N. Ch. S. N.

    “…Availability is one of the primary security issues in Cloud computing environment. The existing solutions that address the availability related issues can be…”
    Get full text
    Journal Article
  20. 20

    MVP Architecture Model With Single Endpoint Access For Displaying COVID 19 Patients Information Dynamically by Singh, Akansha, Jeyanthi, N

    “…The use of Model View Presenter (MVP) architecture for tracking the data of COVID 19 patients has evolved novel innovation in the already existing…”
    Get full text
    Conference Proceeding