Pandi Vijayakumar

According to our database1, Pandi Vijayakumar
  • authored at least 19 papers between 2011 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Generation Comp. Syst., 2018

2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2017

Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud.
J. Inf. Sci. Eng., 2017

An Efficient Authentication Scheme for Mobile Cloud Computing Services.
J. Inf. Sci. Eng., 2017

Time efficient secure DNA based access control model for cloud computing environment.
Future Generation Comp. Syst., 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Cluster Computing, 2017

An efficient secure communication for healthcare system using wearable devices.
Computers & Electrical Engineering, 2017

Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service .
Proceedings of the 2nd International Conference on Internet of Things, 2017

2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Security and Communication Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Security and Communication Networks, 2016

An intelligent CRF based feature selection for effective intrusion detection.
Int. Arab J. Inf. Technol., 2016

2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Chinese remainder theorem based centralised group key management for secure multicast communication.
IET Information Security, 2014

2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
TIIS, 2013

Centralized key distribution protocol using the greatest common divisor method.
Computers & Mathematics with Applications, 2013

2011
Error Detection and Correction for Distributed Group Key Agreement Protocol
CoRR, 2011

Key Distribution Protocol for Secure Multicast with Reduced Communication Delay.
Proceedings of the Active Media Technology - 7th International Conference, 2011

Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011


  Loading...