Search Results - "Jeyanthi, N."
-
1
Dynamic Forest of Random Subsets‐based supervised hash signature scheme for secure user authentication in smart home environment
Published in Concurrency and computation (10-12-2023)“…The advent of information and communication technology has revolutionized the application of smart home through which the residents remotely establish superior…”
Get full text
Journal Article -
2
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications
Published in Peer-to-peer networking and applications (01-09-2023)“…In the modern era, smart home technology is considered as the most growing application of Internet of Things (IoT) as they facilitate users for control home…”
Get full text
Journal Article -
3
A Review on State-of-Art Blockchain Schemes for Electronic Health Records Management
Published in Cybernetics and information technologies : CIT (01-03-2024)“…In today’s world, Electronic Health Records (EHR) are highly segregated and available only within the organization with which the patient is associated. If a…”
Get full text
Journal Article -
4
Distributed authentication framework for Hadoop based bigdata environment
Published in Journal of ambient intelligence and humanized computing (01-09-2022)“…Big data, the upcoming technology in the field of computing, refers to a large complex dataset. It deals with large complex datasets and yields great valued…”
Get full text
Journal Article -
5
A Three-Tier Authentication Scheme for Kerberized Hadoop Environment
Published in Cybernetics and information technologies : CIT (01-12-2021)“…Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System…”
Get full text
Journal Article -
6
An analysis of security solutions for ARP poisoning attacks and its effects on medical computing
Published in International journal of system assurance engineering and management (01-02-2020)“…Network utilization reached its maximum level due to the availability of high-end technologies in the least cost. This enabled the network users to share the…”
Get full text
Journal Article -
7
Similarity Learning-Based Supervised Discrete Hash Signature Scheme for authentication of smart home scenario
Published in International journal of information technology (Singapore. Online) (2022)“…Smart home technology is one of the significant emerging application in the Internet of Things (IoT) that facilitates the user to control home devices in the…”
Get full text
Journal Article -
8
A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)
Published in Cybernetics and information technologies : CIT (01-09-2021)“…Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications…”
Get full text
Journal Article -
9
TSCBA-A Mitigation System for ARP Cache Poisoning Attacks
Published in Cybernetics and information technologies : CIT (01-11-2018)“…Address Resolution Protocol (ARP) cache poisoning results in numerous attacks. A novel mitigation system for ARP cache poisoning presented here avoids ARP…”
Get full text
Journal Article -
10
A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks
Published in Wireless personal communications (01-02-2018)“…Security in communication is an important and challenging issue in the recent years. In the past, many secure routing algorithms have been proposed to provide…”
Get full text
Journal Article -
11
Secret Image Enhanced Sharing Using Visual Cryptography
Published in Cybernetics and information technologies : CIT (01-09-2017)“…In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the…”
Get full text
Journal Article -
12
Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks
Published in Cybernetics and information technologies : CIT (27-11-2017)“…The bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication…”
Get full text
Journal Article -
13
Secured Document Sharing Using Visual Cryptography in Cloud Data Storage
Published in Cybernetics and information technologies : CIT (01-11-2015)“…Security has emerged as the most concerned aspect of cloud computing environment and a prime challenge for the cloud users. The stored data can be retrieved by…”
Get full text
Journal Article -
14
A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks
Published in Cybernetics and information technologies : CIT (01-09-2014)“…Cloud is not exempted from the vulnerability of Distributed Denial of Service (DDoS) attack, a serious threat to any distributed network and has considerably…”
Get full text
Journal Article -
15
Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy
Published in Journal of parallel and distributed computing (01-06-2022)“…•Fail-safe and tamper resistant blockchain framework for healthcare data.•Decentralized storage in IPFS using blockchain for data privacy and…”
Get full text
Journal Article -
16
Rqa based approach to detect and prevent ddos attacks in voip networks
Published in Cybernetics and information technologies : CIT (01-01-2014)“…Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and…”
Get full text
Journal Article -
17
DaDe: A Study of Chunking Algorithm and Hashing Function in Block Level Chunk based Data Deduplication
Published in 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT) (07-10-2022)“…As the amount of storage employment grows vaster and vaster, people havebeen strived to observe the efficient technique to protect storage space. Data…”
Get full text
Conference Proceeding -
18
A Study on Distributed Consensus Protocols and Algorithms: The Backbone of Blockchain Networks
Published in 2021 International Conference on Computer Communication and Informatics (ICCCI) (27-01-2021)“…In a Blockchain network multiple nodes across the network verify each transaction and preserve them without having a centralized authority. Verification and…”
Get full text
Conference Proceeding -
19
Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment
Published in Cybernetics and information technologies : CIT (01-01-2013)“…Availability is one of the primary security issues in Cloud computing environment. The existing solutions that address the availability related issues can be…”
Get full text
Journal Article -
20
MVP Architecture Model With Single Endpoint Access For Displaying COVID 19 Patients Information Dynamically
Published in 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN) (25-09-2020)“…The use of Model View Presenter (MVP) architecture for tracking the data of COVID 19 patients has evolved novel innovation in the already existing…”
Get full text
Conference Proceeding