M. A. Rajan

Orcid: 0000-0001-9839-4754

According to our database1, M. A. Rajan authored at least 25 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enterprise Post Quantum Cryptography Migration Tools.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Robust Cross-Silo Federated Fraudulent Transaction Detection in Banks Using Epsilon Cluster Selection.
SN Comput. Sci., July, 2023

An Efficient Two-Party ECDSA Scheme for Cryptocurrencies.
Proceedings of the Information Systems Security - 19th International Conference, 2023

Myochain: A Blockchain Protocol for Delay Bounded Transaction Confirmation.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

PrivFlow: Secure and Privacy Preserving Serverless Workflows on Cloud.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
Resilience to denial-of-service and integrity attacks: A structured systems approach.
Eur. J. Control, 2022

EdgeNet for efficient scene graph classification.
Proceedings of the International Joint Conference on Neural Networks, 2022

Smart Contract Fuzzing for Enterprises: The Language Agnostic Way.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

2021
Robust Collaborative Fraudulent Transaction Detection using Federated Learning.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques.
Proceedings of the Information Systems Security - 17th International Conference, 2021

WiP: QoS Based Recommendation System for Efficient Private Inference of CNN Using FHE.
Proceedings of the Information Systems Security - 17th International Conference, 2021

Privacy Preserving Machine Learning for Malicious URL Detection.
Proceedings of the Database and Expert Systems Applications - DEXA 2021 Workshops, 2021

Privacy-Preserving Password Strength Meters with FHE.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

VeriBlock: A Novel Blockchain Framework based on Verifiable Computing and Trusted Execution Environment.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2017
A graph theory based generic risk assessment framework for internet of things (IoT).
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
Structural resilience of cyberphysical systems under attack.
Proceedings of the 2016 American Control Conference, 2016

Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe Architecture.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2014
Secure Personal Authentication through Remote System for E-Transactions (SPARSE).
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

2013
Towards a LightWeight Internet of Things Platform Architecture.
J. ICT Stand., 2013

Lightweight IBE scheme for Wireless Sensor nodes.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
An identity based encryption using elliptic curve cryptography for secure M2M communication.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Weighted Signed Graph (WSG) power-aware routing in distributed wireless networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2011
Monotonic Signed Graph approach for cross-layer congestion control in wireless ad-hoc networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Signed graph based approach for on-line optimization in cognitive networks.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011


  Loading...