Pandi Vijayakumar

According to our database1, Pandi Vijayakumar
  • authored at least 32 papers between 2011 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multimedia Tools Appl., 2018

Nth Order Binary Encoding with Split-Protocol.
IJRSDA, 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Communication Systems, 2018

Dissection of the experimental outcome of split-protocol.
IJAIP, 2018

Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Generation Comp. Syst., 2018

Key management and key distribution for secure group communication in mobile and cloud network.
Future Generation Comp. Syst., 2018

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Generation Comp. Syst., 2018

A provably secure password-based anonymous authentication scheme for wireless body area networks.
Computers & Electrical Engineering, 2018

A new SmartSMS protocol for secure SMS communication in m-health environment.
Computers & Electrical Engineering, 2018

2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2017

Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud.
J. Inf. Sci. Eng., 2017

An Efficient Authentication Scheme for Mobile Cloud Computing Services.
J. Inf. Sci. Eng., 2017

Time efficient secure DNA based access control model for cloud computing environment.
Future Generation Comp. Syst., 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Cluster Computing, 2017

An efficient secure communication for healthcare system using wearable devices.
Computers & Electrical Engineering, 2017

Security on "A Lightweight Authentication Scheme with User Untraceability".
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

An Extensive Review and Possible Attack on the Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service .
Proceedings of the 2nd International Conference on Internet of Things, 2017

2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Security and Communication Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Security and Communication Networks, 2016

An intelligent CRF based feature selection for effective intrusion detection.
Int. Arab J. Inf. Technol., 2016

2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Chinese remainder theorem based centralised group key management for secure multicast communication.
IET Information Security, 2014

2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
TIIS, 2013

Centralized key distribution protocol using the greatest common divisor method.
Computers & Mathematics with Applications, 2013

2011
Error Detection and Correction for Distributed Group Key Agreement Protocol
CoRR, 2011

Key Distribution Protocol for Secure Multicast with Reduced Communication Delay.
Proceedings of the Active Media Technology - 7th International Conference, 2011

Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011


  Loading...