G. Geetha

Orcid: 0000-0001-7338-973X

Affiliations:
  • Advanced Computing Research Society
  • Lovely Professional University, Phagwara, India (former)


According to our database1, G. Geetha authored at least 22 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021

2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020

A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface.
IEEE Internet Things J., 2020

Decentralized Accessibility of e-commerce Products through Blockchain Technology.
CoRR, 2020

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020

SIMHAR - Smart Distributed Web Crawler for the Hidden Web Using SIM+Hash and Redis Server.
IEEE Access, 2020

2019
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019

2018
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
Secur. Commun. Networks, 2018

Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex-M4 Processor.
Int. J. Inf. Secur. Priv., 2018

2016
Data Obtainer: an application for digital acquisition.
Int. J. Wirel. Mob. Comput., 2016

A Comparison of Diffusion Properties of Salsa, ChaCha, and MCC Core.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

Analyzing the Applicability of Bitsum Algorithm on LSB Steganography Technique.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

2015
An Efficient Image Generation Algorithm Using Fractals and Chaos Theory.
J. Comput. Sci., 2015

Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence.
Int. J. Cyber Behav. Psychol. Learn., 2015

Pattern recognition by embedded reduced number of angles fingerprint algorithm in biometric machines augments security.
Int. J. Comput. Appl. Technol., 2015

2014
Implications of Bitsum Attack on Tiny Encryption Algorithm and XTEA.
J. Comput. Sci., 2014

2013
Design of a Dual Keyboard.
J. Comput. Sci., 2013

2011
Identifying Reference Objects by Hierarchical Clustering in Java Environment
CoRR, 2011

From Calculus to Number Theory, Paves Way to Break OSS Scheme.
Proceedings of the High Performance Architecture and Grid Computing, 2011

CLAPTCHA- A Novel Captcha.
Proceedings of the Security Technology, 2011

2010
Boon and Bane of Curvelet Transform.
Proceedings of the Information Processing and Management, 2010

2008
Asymmetric Key Cipher Based on Non-Linear Dynamics.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008


  Loading...