N. Jeyanthi

Orcid: 0000-0002-6141-5467

According to our database1, N. Jeyanthi authored at least 28 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SDS-IAM: Secure Data Storage with Identity and Access Management in Blockchain.
Int. J. Perform. Eng., 2024

Secure Supervised Learning-Based Smart Home Authentication Framework.
CoRR, 2024

2023
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications.
Peer Peer Netw. Appl., September, 2023

EDocDeDup: Electronic Document Data Deduplication Towards Storage Optimization.
Int. J. Perform. Eng., 2023

Dynamic Forest of Random Subsets-based supervised hash signature scheme for secure user authentication in smart home environment.
Concurr. Comput. Pract. Exp., 2023

2022
Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy.
J. Parallel Distributed Comput., 2022

Distributed authentication framework for Hadoop based bigdata environment.
J. Ambient Intell. Humaniz. Comput., 2022

Secure data transmission for protecting the users' privacy in medical internet of things.
Int. J. Adv. Intell. Paradigms, 2022

2020
An analysis of security solutions for ARP poisoning attacks and its effects on medical computing.
Int. J. Syst. Assur. Eng. Manag., 2020

SDPBDVC: secure data processing on big data using visual cryptography.
Int. J. Serv. Technol. Manag., 2020

Hybrid encryption model for managing the data security in medical internet of things.
Int. J. Internet Protoc. Technol., 2020

2019
Intelligent intrusion detection techniques for secure communications in wireless networks: a survey.
Int. J. Adv. Intell. Paradigms, 2019

Lattice Structural Analysis on Sniffing to Denial of Service Attacks.
CoRR, 2019

2018
A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2018

An intelligent neuro-genetic framework for effective intrusion detection.
Int. J. Reason. based Intell. Syst., 2018

A framework to mitigate ARP sniffing attacks by cache poisoning.
Int. J. Adv. Intell. Paradigms, 2018

M2U2: Multifactor Mobile Based Unique User Authentication Mechanism.
Proceedings of the Intelligent Systems Design and Applications, 2018

2017
Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage.
Int. J. Netw. Secur., 2017

Context residual energy-based trust management in mobile ad hoc networks.
Int. J. Commun. Networks Distributed Syst., 2017

A mitigation system for ARP cache poisoning attacks.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A novel approach to secure cloud data storage and dynamic data auditing in a cloud.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

2014
Distributed Denial of service attacks and its effects on Cloud environment- a survey.
Proceedings of the International Symposium on Networks, Computers and Communications, 2014

SCT: Secured Cloud based Telemedicine.
Proceedings of the International Symposium on Networks, Computers and Communications, 2014

ASCIi based cryptography using unique id, matrix multiplication and palindrome number.
Proceedings of the International Symposium on Networks, Computers and Communications, 2014

2013
An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment.
Int. J. Commun. Networks Inf. Secur., 2013

Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP.
Int. J. Commun. Networks Distributed Syst., 2013

2012
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
Int. J. Netw. Secur., 2012

Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment.
Int. J. Commun. Networks Inf. Secur., 2012


  Loading...