V. Sumathy

According to our database1, V. Sumathy authored at least 25 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
IOT Assisted Biomedical Monitoring Sensors for Healthcare in Human.
Comput. Syst. Sci. Eng., 2023

DAPP IT - Multipurpose ID Card System for Universities.
Proceedings of the Computational Intelligence in Data Science, 2023

2022
Artificial intelligence and IoT-based biomedical sensors for intelligent cattle husbandry systems.
Int. J. Wavelets Multiresolution Inf. Process., 2022

Design of a compact T-shaped slot antenna for wireless applications.
Int. J. Commun. Syst., 2022

2020
Enhanced humanoid assisted human interaction model based on linear structural modeling for knowledge representation.
J. Ambient Intell. Humaniz. Comput., 2020

Dynamic handover algorithm with interference cancellation in 5G networks for emergency communication.
Int. J. Commun. Syst., 2020

2018
Swarm-based defense technique for tampering and cheating attack in WSN using CPHS.
Pers. Ubiquitous Comput., 2018

Register Pre-Allocation based Folded Discrete Tchebichef Transformation Technique for Image Compression.
Integr., 2018

An identity attribute-based encryption using elliptic curve digital signature for patient health record maintenance.
Int. J. Commun. Syst., 2018

An FPGA implementation of novel smart antenna algorithm in tracking systems for smart cities.
Comput. Electr. Eng., 2018

2017
A Novel HBE-MCM-Based Multiplier Architecture for 8-Point DCT Structure.
J. Circuits Syst. Comput., 2017

FPGA realisation-based architecture for direction-of-arrival in wireless communication.
Int. J. Netw. Virtual Organisations, 2017

2015
Performance analysis of a context aware cross layer scheme for fast handoff in IMS based integrated WiFi-WiMax networks.
Pervasive Mob. Comput., 2015

2014
Hierarchical Access control in Dynamic Peer Groups using Symmetric Polynomial and Tree based Group Elliptic Curve Diffie Hellman Scheme.
J. Comput. Sci., 2014

Energy Efficient Key Management Scheme for Wireless Sensor Networks.
Int. J. Comput. Commun. Control, 2014

2011
Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

2010
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme.
J. Information Security, 2010

A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography.
Int. J. Commun. Netw. Syst. Sci., 2010

A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer - to - Peer Information Sharing in Mobile Ad Hoc Networks
CoRR, 2010

A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Secure Group Communication
CoRR, 2010

Design And Implementation Of Multilevel Access Control In Medical Image Transmission Using Symmetric Polynomial Based Audio Steganography
CoRR, 2010

A Secure Ubiquitous Computing Approach for Serving Elderly Citizens.
Proceedings of the 12th UKSim, 2010

Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2009
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks.
Proceedings of the First International Conference on Computational Intelligence, 2009

2008
Enhanced SIP based method for vertical handoff between WiFi and WiMax networks.
Proceedings of the 16th International Conference on Networks, 2008


  Loading...