L. Jegatha Deborah
According to our database1,
L. Jegatha Deborah
authored at least 22 papers
between 2011 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2021
IEEE Internet Things J., 2021
2020
J. Organ. End User Comput., 2020
2019
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
2018
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2018
Key management and key distribution for secure group communication in mobile and cloud network.
Future Gener. Comput. Syst., 2018
Comput. Electr. Eng., 2018
2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2017
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Clust. Comput., 2017
Comput. Electr. Eng., 2017
Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016
An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Learning styles assessment and theoretical origin in an E-learning scenario: a survey.
Artif. Intell. Rev., 2014
2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
KSII Trans. Internet Inf. Syst., 2013
2012
Int. J. Intell. Inf. Technol., 2012
2011
Proceedings of the Visual Informatics: Sustaining Research and Innovations, 2011