N. R. Sunitha

Orcid: 0000-0003-4990-1689

According to our database1, N. R. Sunitha authored at least 28 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A novel framework for insurable archival services: a protocol to create secured marketplace for archival services using cloud.
Int. J. Adv. Intell. Paradigms, 2023

2022
A novel recursive privacy-preserving information retrieval approach for private retrieval.
Int. J. Intell. Inf. Database Syst., 2022

2021
A novel index retrieval and query optimisation method for private information retrieval in location-based service application.
Int. J. Intell. Inf. Database Syst., 2021

A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications.
IACR Cryptol. ePrint Arch., 2021

Metric and Accuracy Ranked Feature Inclusion: Hybrids of Filter and Wrapper Feature Selection Approaches.
IEEE Access, 2021

2020
An Efficient Transformation Capabilities of Single Database Private Block Retrieval.
IACR Cryptol. ePrint Arch., 2020

COMB: A Hybrid Method for Cross-validated Feature Selection.
Proceedings of the 2020 ACM Southeast Conference, 2020

2019
Key pre-distribution scheme with join leave support for SCADA systems.
Int. J. Crit. Infrastructure Prot., 2019

CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems.
Future Internet, 2019

Mini-Batch Normalized Mutual Information: A Hybrid Feature Selection Method.
IEEE Access, 2019

An efficient user privacy preserving multi-server private information retrieval: an efficient privacy preserving information storage and retrieval framework.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019

Formal Verification of Authentication and Confidentiality for TACACS+ Security Protocol using Scyther.
Proceedings of the 10th International Conference on Computing, 2019

Deep Learning-based Model to Fight Against Ad Click Fraud.
Proceedings of the 2019 ACM Southeast Conference, 2019

2018
A novel hybrid private information retrieval with non-trivial communication cost.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

A Novel, Lightweight, and Cost-Effective Mechanism to Secure the Sensor-Gateway Communication in IoT.
Proceedings of the Cybernetics and Algorithms in Intelligent Systems, 2018

2017
Key management infrastructure design and novel techniques to establish secure communications in critical infrastructures.
Int. J. Crit. Comput. Based Syst., 2017

2016
Key pre-distribution schemes to support various architectural deployment models in WSN.
Int. J. Inf. Comput. Secur., 2016

2015
KMI for SCADA and WirelessHART in IACS.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015

2010
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2008
Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers.
Proceedings of the SECRYPT 2008, 2008

A new method of verifying digital signatures in e-cheque processing.
Proceedings of the 16th International Conference on Networks, 2008

Proxy Re-signature Schemes.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Forward-Secure Multi-signatures.
Proceedings of the Distributed Computing and Internet Technology, 2008

Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Secure e-Cheque Clearance between Financial Institutions.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

Controlled Delegation in e-cheques Using Proxy Signatures.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007


  Loading...