S. Venkatesan

Orcid: 0000-0003-1403-2639

Affiliations:
  • Indian Institute of Information Technology, Allahaba, India


According to our database1, S. Venkatesan authored at least 43 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud.
J. Supercomput., October, 2023

Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.
J. Supercomput., September, 2023

Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain.
Peer Peer Netw. Appl., September, 2023

Blockchain-based conditional privacy-preserving authentication scheme in VANETs.
Multim. Tools Appl., July, 2023

PSCLS: provably secure certificateless signature scheme for IoT device on cloud.
J. Supercomput., March, 2023

P2LBS: Privacy Provisioning in Location-Based Services.
IEEE Trans. Serv. Comput., 2023

Automated Hardware Auditing Testbed for UART and SPI based IoT Devices.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

Automated Security Audit Testbed For IP-Based IoT Devices Without Physical Access.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

2022
A Survey of Oblivious Transfer Protocol.
ACM Comput. Surv., January, 2022

Anonymous and Linkable Location-Based Services.
IEEE Trans. Veh. Technol., 2022

CP2EH: a comprehensive privacy-preserving e-health scheme over cloud.
J. Supercomput., 2022

EP2LBS: efficient privacy-preserving scheme for location-based services.
J. Supercomput., 2022

Searchable encryption on the cloud: a survey.
J. Supercomput., 2022

Linkable Privacy-Preserving Scheme for Location-Based Services.
IEEE Trans. Intell. Transp. Syst., 2022

A secure searchable encryption scheme for cloud using hash-based indexing.
J. Comput. Syst. Sci., 2022

Efficient and privacy-preserving location-based services over the cloud.
Clust. Comput., 2022

An enhanced smart card and dynamic ID based remote multi-server user authentication scheme.
Clust. Comput., 2022

2021
SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD.
Wirel. Pers. Commun., 2021

iHRNL: Iterative Hessian-based manifold regularization mechanism for localization in WSN.
J. Supercomput., 2021

HSIC-based affinity measure for learning on graphs.
Pattern Anal. Appl., 2021

An efficient and light weight polynomial multiplication for ideal lattice-based cryptography.
Multim. Tools Appl., 2021

A comprehensive survey on authentication and privacy-preserving schemes in VANETs.
Comput. Sci. Rev., 2021

Anonymity on blockchain based e-cash protocols - A survey.
Comput. Sci. Rev., 2021

Cross-covariance based affinity for graphs.
Appl. Intell., 2021

2020
Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs.
Wirel. Pers. Commun., 2020

Efficient and Secure Location-Based Services Scheme in VANET.
IEEE Trans. Veh. Technol., 2020

Efficient Lattice-Based Ring Signature for Message Authentication in VANETs.
IEEE Syst. J., 2020

PoEWAL: A lightweight consensus mechanism for blockchain in IoT.
Pervasive Mob. Comput., 2020

Regularization on a rapidly varying manifold.
Int. J. Mach. Learn. Cybern., 2020

Private computation of the Schulze voting method over the cloud.
Clust. Comput., 2020

2019
Vulnerabilities on Hyperledger Fabric.
Pervasive Mob. Comput., 2019

2018
Secure and lightweight multi user searchable encryption scheme.
J. Intell. Fuzzy Syst., 2018

2017
Secure access of multiple keywords over encrypted data in cloud environment using ECC-PKI and ECC ElGamal.
Proceedings of the 2017 International Conference on Public Key Infrastructure and its Applications, 2017

2016
Analysis of key management protocols for social networks.
Soc. Netw. Anal. Min., 2016

2015
Security Framework for Agent-Based Cloud Computing.
Int. J. Interact. Multim. Artif. Intell., 2015

2013
Analysis of accounting models for the detection of duplicate requests in web services.
J. King Saud Univ. Comput. Inf. Sci., 2013

Artificial immune system based mobile agent platform protection.
Comput. Stand. Interfaces, 2013

2010
Advanced mobile agent security models for code integrity and malicious availability check.
J. Netw. Comput. Appl., 2010

Performance analysis of mobile agent failure recovery in e-service applications.
Comput. Stand. Interfaces, 2010

2009
Generating routing table for free roaming mobile agent in distributed environment.
Comput. Stand. Interfaces, 2009

2008
Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP).
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2007
Protecting free-roaming mobile agent against multiple colluded truncation attacks.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007

Recovery model for free-roaming mobile agent against multiple attacks.
Proceedings of the 3rd International Conference on Mobile Multimedia Communications, 2007


  Loading...