L. Jegatha Deborah

According to our database1, L. Jegatha Deborah authored at least 22 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT.
IEEE Internet Things J., 2021

2020
Intelligent e-learning system based on fuzzy logic.
Neural Comput. Appl., 2020

A Novel Trust Model for Secure Group Communication in Distributed Computing.
J. Organ. End User Comput., 2020

2019
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019

Secure Online Examination System for e-learning.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2018

Key management and key distribution for secure group communication in mobile and cloud network.
Future Gener. Comput. Syst., 2018

A new SmartSMS protocol for secure SMS communication in m-health environment.
Comput. Electr. Eng., 2018

2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Clust. Comput., 2017

An efficient secure communication for healthcare system using wearable devices.
Comput. Electr. Eng., 2017

Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Secur. Commun. Networks, 2016

2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Learning styles assessment and theoretical origin in an E-learning scenario: a survey.
Artif. Intell. Rev., 2014

2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
KSII Trans. Internet Inf. Syst., 2013

2012
Deontic Logic Based Ontology Alignment Technique for E-Learning.
Int. J. Intell. Inf. Technol., 2012

2011
Visualizing Domain Ontology using Enhanced Anaphora Resolution Algorithm
CoRR, 2011

Ontology Construction Using Computational Linguistics for E-Learning.
Proceedings of the Visual Informatics: Sustaining Research and Innovations, 2011


  Loading...