default search action
Anitha Ramalingam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j15]P. Vinothiyalakshmi, Anitha Ramalingam:
Enhanced Multi-attribute Combinative Double Auction (EMCDA) for Resource Allocation in Cloud Computing. Wirel. Pers. Commun. 122(4): 3833-3857 (2022) - 2021
- [j14]Perumal Thanalakshmi, Anitha Ramalingam, Neelamegam Anbazhagan, Woong Cho, Gyanendra Prasad Joshi, Eunmok Yang:
A Hash-Based Quantum-Resistant Chameleon Signature Scheme. Sensors 21(24): 8417 (2021) - [j13]P. Vinothiyalakshmi, Anitha Ramalingam:
Efficient dynamic resource provisioning based on credibility in cloud computing. Wirel. Networks 27(3): 2217-2229 (2021) - 2020
- [j12]S. D. Suganthi, Anitha Ramalingam, Venkatasamy Sureshkumar, S. Harish, S. Agalya:
End to end light weight mutual authentication scheme in IoT-based healthcare environment. J. Reliab. Intell. Environ. 6(1): 3-13 (2020) - [j11]S. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar:
An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment. Wirel. Pers. Commun. 113(4): 2339-2361 (2020) - [j10]P. Vinothiyalakshmi, Anitha Ramalingam:
Workload Mining in Cloud Computing using Extended Cloud Dempster-Shafer Theory (ECDST). Wirel. Pers. Commun. 114(1): 389-407 (2020) - 2019
- [j9]S. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar:
IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics. Wirel. Pers. Commun. 104(2): 543-560 (2019) - 2018
- [j8]Muthulakshmi Angamuthu, Akshaya Mani, Anitha Ramalingam:
Cipher text policy attribute based broadcast encryption for multi-privileged groups. Int. Arab J. Inf. Technol. 15(2): 313-320 (2018) - [j7]Perumal Thanalakshmi, Anitha Ramalingam:
A new code-based designated verifier signature scheme. Int. J. Commun. Syst. 31(17) (2018) - [j6]Venkatasamy Sureshkumar, Ruhul Amin, Anitha Ramalingam:
A robust mutual authentication scheme for session initiation protocol with key establishment. Peer-to-Peer Netw. Appl. 11(5): 900-916 (2018) - [j5]S. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar:
An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment. J. Supercomput. 74(7): 3148-3167 (2018) - 2017
- [j4]Venkatasamy Sureshkumar, Anitha Ramalingam, N. Rajamanickam, Ruhul Amin:
A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity. Comput. Electr. Eng. 57: 223-240 (2017) - [j3]Venkatasamy Sureshkumar, Ruhul Amin, Anitha Ramalingam:
An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment. Int. J. Commun. Syst. 30(17) (2017) - 2014
- [j2]Muthulakshmi Angamuthu, Anitha Ramalingam:
Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem. Int. J. Inf. Comput. Secur. 6(3): 286-305 (2014) - 2012
- [j1]Muthulakshmi Angamuthu, Anitha Ramalingam:
Balanced key tree management for multi-privileged groups using (N, T) policy. Secur. Commun. Networks 5(5): 545-555 (2012)
Conference and Workshop Papers
- 2018
- [c5]S. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar:
RFID Based Verifiable Ownership Transfer Protocol Using Blockchain Technology. iThings/GreenCom/CPSCom/SmartData 2018: 1616-1621 - 2015
- [c4]Venkatasamy Sureshkumar, Anitha Ramalingam, S. Anandhi:
Analysis of Accountability Property in Payment Systems Using Strand Space Model. SSCC 2015: 424-437 - [c3]Shina Sheen, Anitha Ramalingam:
Malware Detection in Android files based on Multiple levels of Learning and Diverse Data Sources. WCI 2015: 553-559 - 2014
- [c2]Venkatasamy Sureshkumar, Anitha Ramalingam:
Analysis of Electronic Voting Protocol Using Strand Space Model. SNDS 2014: 416-427 - 2012
- [c1]Muthulakshmi Angamuthu, Anitha Ramalingam, S. Rohini, Krishnan Princy:
Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups. SNDS 2012: 272-282
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint