L. Jegatha Deborah

According to our database1, L. Jegatha Deborah authored at least 17 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Generation Comp. Syst., 2018

Key management and key distribution for secure group communication in mobile and cloud network.
Future Generation Comp. Syst., 2018

A new SmartSMS protocol for secure SMS communication in m-health environment.
Computers & Electrical Engineering, 2018

2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Cluster Computing, 2017

An efficient secure communication for healthcare system using wearable devices.
Computers & Electrical Engineering, 2017

Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Security and Communication Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Security and Communication Networks, 2016

2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Learning styles assessment and theoretical origin in an E-learning scenario: a survey.
Artif. Intell. Rev., 2014

2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
TIIS, 2013

2012
Deontic Logic Based Ontology Alignment Technique for E-Learning.
IJIIT, 2012

2011
Visualizing Domain Ontology using Enhanced Anaphora Resolution Algorithm
CoRR, 2011

Ontology Construction Using Computational Linguistics for E-Learning.
Proceedings of the Visual Informatics: Sustaining Research and Innovations, 2011


  Loading...