Chandana Gamage

According to our database1, Chandana Gamage authored at least 27 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Social Wallet Scheme with Robust Private Key Recovery.
Proceedings of the 17th IEEE International Conference on Industrial and Information Systems, 2023

2022
Dynamic Obstacle Detection and Environmental Modelling for Agricultural Drones.
Proceedings of the 7th Asia-Pacific Conference on Intelligent Robot Systems, 2022

2021
Optimization of RSSI based indoor localization and tracking to monitor workers in a hazardous working zone using Machine Learning techniques.
Proceedings of the International Conference on Information Networking, 2021

FPGA based Implementation of IEEE 802.11p/WAVE Protocol and Performance Evaluation.
Proceedings of the 16th International Conference on Industrial and Information Systems, 2021

2020
Efficiency Enhancements for Practical Techniques for Searches on Encrypted Data.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
RECSRF: Novel Technique to Evaluate Program Security using Dynamic Disassembly of Machine Instructions.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Continuous Automatic Bioacoustics Monitoring of Bird Calls with Local Processing on Node Level.
Proceedings of the TENCON 2018, 2018

2017
Endcast: mobile stateless data delivery in MANETs.
EURASIP J. Wirel. Commun. Netw., 2017

Enhanced Real-Time Machine Inspection with Mobile Augmented Reality for Maintenance and Repair: Demo Abstract.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Generation of intermediate viewpoints for scalable adaptation of real world environments for virtual reality.
Proceedings of the 2017 IEEE International Conference on Industrial and Information Systems, 2017

Virtual Product Try-On Solution for E-Commerce Using Mobile Augmented Reality.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2017

2016
Evaluating Effective Use of Social Networks for Recruitment.
Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research, 2016

2015
Quantitative and Qualitative Evaluation of Performance and Robustness of Image Stitching Algorithms.
Proceedings of the 2015 International Conference on Digital Image Computing: Techniques and Applications, 2015

2014
Feature Point Tracking Algorithm Evaluation for Augmented Reality in Handheld Devices.
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014

2012
Employee perception towards electronic monitoring at work place and its impact on job satisfaction of software professionals in Sri Lanka.
Telematics Informatics, 2012

2010
Towards Reusing ESB Services in Different ESB Architectures.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2006
Taking Sensor Networks from the Lab to the Jungle.
Computer, 2006

An Identity-based Ring Signature Scheme with Enhanced Privacy.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Security for the Mythical Air-Dropped Sensor Network.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Enabling DRM-Preserving Digital Content Redistribution.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

2002
Access control, reverse access control and replication control in a world wide distributed system.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2001
Mobile Agent to User Interaction.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

2000
High Performance Agile Crypto Modules.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Encrypted Message Authentication by Firewalls.
Proceedings of the Public Key Cryptography, 1999

A Security Design for a Wide-Area Distributed System.
Proceedings of the Information Security and Cryptology, 1999

Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.
Proceedings of the Information Security and Cryptology, 1999

Organizational Modeling for Efficient Specification of Information Security Requirements.
Proceedings of the Advances in Databases and Information Systems, 1999


  Loading...