N. R. Sunitha
Orcid: 0000-0003-4990-1689
According to our database1,
N. R. Sunitha
authored at least 28 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
A novel framework for insurable archival services: a protocol to create secured marketplace for archival services using cloud.
Int. J. Adv. Intell. Paradigms, 2023
2022
A novel recursive privacy-preserving information retrieval approach for private retrieval.
Int. J. Intell. Inf. Database Syst., 2022
2021
A novel index retrieval and query optimisation method for private information retrieval in location-based service application.
Int. J. Intell. Inf. Database Syst., 2021
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications.
IACR Cryptol. ePrint Arch., 2021
Metric and Accuracy Ranked Feature Inclusion: Hybrids of Filter and Wrapper Feature Selection Approaches.
IEEE Access, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 ACM Southeast Conference, 2020
2019
Int. J. Crit. Infrastructure Prot., 2019
CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems.
Future Internet, 2019
IEEE Access, 2019
An efficient user privacy preserving multi-server private information retrieval: an efficient privacy preserving information storage and retrieval framework.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019
Formal Verification of Authentication and Confidentiality for TACACS+ Security Protocol using Scyther.
Proceedings of the 10th International Conference on Computing, 2019
Proceedings of the 2019 ACM Southeast Conference, 2019
2018
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018
A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
A Novel, Lightweight, and Cost-Effective Mechanism to Secure the Sensor-Gateway Communication in IoT.
Proceedings of the Cybernetics and Algorithms in Intelligent Systems, 2018
2017
Key management infrastructure design and novel techniques to establish secure communications in critical infrastructures.
Int. J. Crit. Comput. Based Syst., 2017
2016
Key pre-distribution schemes to support various architectural deployment models in WSN.
Int. J. Inf. Comput. Secur., 2016
2015
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015
2010
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme.
Proceedings of the Recent Trends in Network Security and Applications, 2010
2008
Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Distributed Computing and Internet Technology, 2008
Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008
2007
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007