P. Varalakshmi

Orcid: 0000-0003-2913-8807

According to our database1, P. Varalakshmi authored at least 32 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An improved hybrid AI model for prediction of arrhythmia using ECG signals.
Biomed. Signal Process. Control., 2023

2022
Blockchain and IoT Technology in Healthcare: A Review.
Proceedings of the Challenges of Trustable AI and Added-Value on Health, 2022

Federated Learning in Healthcare: A Privacy Preserving Approach.
Proceedings of the Challenges of Trustable AI and Added-Value on Health, 2022

2021
A Survey on Security and Privacy Issues in Contact Tracing Application of Covid-19.
SN Comput. Sci., 2021

2020
Enabling Ternary Hash Tree Based Integrity Verification for Secure Cloud Data Storage.
IEEE Trans. Knowl. Data Eng., 2020

2019
Decision Tree Based Routing Protocol (DTRP) for Reliable Path in MANET.
Wirel. Pers. Commun., 2019

2018
Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud.
Clust. Comput., 2018

Generation of Image Caption Using CNN-LSTM Based Approach.
Proceedings of the Intelligent Systems Design and Applications, 2018

2017
Improved secure RSA cryptosystem for data confidentiality in cloud.
Int. J. Inf. Syst. Chang. Manag., 2017

A novel dual authentication protocol (DAP) for multi-owners in cloud computing.
Clust. Comput., 2017

Multifaceted trust management framework based on a trust level agreement in a collaborative cloud.
Comput. Electr. Eng., 2017

2016
Computer aided system for breast cancer in digitized mammogram using shearlet band features with LS-SVM classifier.
Int. J. Wavelets Multiresolution Inf. Process., 2016

Enhanced Schmidt-Samoa cryptosystem for data confidentiality in cloud computing.
Int. J. Inf. Syst. Chang. Manag., 2016

EFG-AOMDV: Evolving Fuzzy based Graph-AOMDV Protocol for Reliable and Stable Routing in Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2016

2015
An Enhanced and Secured RSA Key Generation Scheme (ESRKGS).
J. Inf. Secur. Appl., 2015

Secure file storage and retrieval in cloud.
Int. J. Inf. Comput. Secur., 2015

2014
An Optimal Constraint Based Web Service Composition Using Intelligent Backtracking.
J. Web Eng., 2014

2013
Thwarting DDoS attacks in grid using information divergence.
Future Gener. Comput. Syst., 2013

2012
Dynamic Web Service Composition based on Network Modeling with Statistical Analysis and Backtracking
CoRR, 2012

QoS Monitoring and Dynamic Trust Establishment in the Cloud.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

A Novel Approach for Dynamic Web Service Composition through Network Analysis with Backtracking.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Improving TCP Performance in Hybrid Networks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
An Optimal Workflow Based Scheduling and Resource Allocation in Cloud.
Proceedings of the Advances in Computing and Communications, 2011

SLA with Dual Party Beneficiality in Distributed Cloud.
Proceedings of the Advances in Computing and Communications, 2011

2010
Secured and trusted three-tier grid architecture.
Int. J. Ad Hoc Ubiquitous Comput., 2010

An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid.
Proceedings of the Information Processing and Management, 2010

Reactive Network Monitor for DDoS Attacks.
Proceedings of the Information Processing and Management, 2010

2009
Reputation and policy-based three-tier grid architecture with genuine feedbacks.
Int. J. Auton. Adapt. Commun. Syst., 2009

2008
Securing Trustworthy Three-Tier Grid Architecture with Spam Filtering.
Proceedings of the International Conference on High Performance Computing, 2008

Quiz-based trust model with optimized resource management in grid.
Proceedings of the 13th Asia-Pacific Computer Systems Architecture Conference, 2008

2007
A Robust Trust Model For Resource Selection in Grid.
Proceedings of the 2007 International Conference on Grid Computing & Applications, 2007

A Multi-Broker Trust Management Framework for Resource Selection in Grid.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007


  Loading...