default search action
S. Venkatesan 0002
Person information
- affiliation: Indian Institute of Information Technology, Allahaba, India
Other persons with the same name
- S. Venkatesan — disambiguation page
- S. Venkatesan 0001 (aka: Subbarayan Venkatesan) — University of Texas at Dallas, TX, USA (and 1 more)
- S. Venkatesan 0003 — Bell Laboratories, Lucent Technologies, Holmdel, NJ, USA (and 1 more)
- Subramanian Venkatesan 0001 — Erasmus University Medical Center, Rotterdam, The Netherlands
- Subramanian Venkatesan 0003 — Indian Institute of Information Technology Prayagraj, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j37]Pravin Mundhe, Pooja Phad, R. Yuvaraj, Shekhar Verma, S. Venkatesan:
Blockchain-based conditional privacy-preserving authentication scheme in VANETs. Multim. Tools Appl. 82(16): 24155-24179 (2023) - [j36]Raghav, Nitish Andola, S. Venkatesan, Shekhar Verma:
Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain. Peer Peer Netw. Appl. 16(5): 2525-2547 (2023) - [j35]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
PSCLS: provably secure certificateless signature scheme for IoT device on cloud. J. Supercomput. 79(5): 4962-4982 (2023) - [j34]Raghav, Nitish Andola, Katyayani Verma, S. Venkatesan, Shekhar Verma:
Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud. J. Supercomput. 79(13): 14117-14145 (2023) - [j33]Raghav, Nitish Andola, Katyayani Verma, S. Venkatesan, Shekhar Verma:
Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud. J. Supercomput. 79(15): 17755 (2023) - [j32]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
P2LBS: Privacy Provisioning in Location-Based Services. IEEE Trans. Serv. Comput. 16(1): 466-477 (2023) - [c6]Shivam Mishra, Aditya Ray, Manpreet Singh, S. Venkatesan, Anshu S. Anand:
Automated Hardware Auditing Testbed for UART and SPI based IoT Devices. IOTSMS 2023: 75-82 - [c5]Ashutosh Kumar, Brijesh Peshvani, S. Venkatesan, Manish Kumar, Suneel Yadav, Sandeep Kumar Shukla:
Automated Security Audit Testbed For IP-Based IoT Devices Without Physical Access. IOTSMS 2023: 96-103 - 2022
- [j31]Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
Efficient and privacy-preserving location-based services over the cloud. Clust. Comput. 25(5): 3175-3192 (2022) - [j30]Nitish Andola, Sourabh Prakash, Raghav Gahlot, S. Venkatesan, Shekhar Verma:
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme. Clust. Comput. 25(5): 3699-3717 (2022) - [j29]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
A Survey of Oblivious Transfer Protocol. ACM Comput. Surv. 54(10s): 211:1-211:37 (2022) - [j28]Nitish Andola, Sourabh Prakash, Vijay Kumar Yadav, Raghav, S. Venkatesan, Shekhar Verma:
A secure searchable encryption scheme for cloud using hash-based indexing. J. Comput. Syst. Sci. 126: 119-137 (2022) - [j27]Vijay Kumar Yadav, Shekhar Verma, Subramanian Venkatesan:
Linkable Privacy-Preserving Scheme for Location-Based Services. IEEE Trans. Intell. Transp. Syst. 23(7): 7998-8012 (2022) - [j26]Vijay Kumar Yadav, Rakesh Kumar Yadav, Shekhar Verma, S. Venkatesan:
CP2EH: a comprehensive privacy-preserving e-health scheme over cloud. J. Supercomput. 78(2): 2386-2416 (2022) - [j25]Nitish Andola, Raghav Gahlot, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma:
Searchable encryption on the cloud: a survey. J. Supercomput. 78(7): 9952-9984 (2022) - [j24]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
EP2LBS: efficient privacy-preserving scheme for location-based services. J. Supercomput. 78(13): 14991-15013 (2022) - [j23]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
Anonymous and Linkable Location-Based Services. IEEE Trans. Veh. Technol. 71(9): 9397-9409 (2022) - 2021
- [j22]Rakesh Kumar Yadav, Abhishek, Shekhar Verma, S. Venkatesan:
Cross-covariance based affinity for graphs. Appl. Intell. 51(6): 3844-3864 (2021) - [j21]Nitish Andola, Raghav, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma:
Anonymity on blockchain based e-cash protocols - A survey. Comput. Sci. Rev. 40: 100394 (2021) - [j20]Pravin Mundhe, Shekhar Verma, S. Venkatesan:
A comprehensive survey on authentication and privacy-preserving schemes in VANETs. Comput. Sci. Rev. 41: 100411 (2021) - [j19]Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
An efficient and light weight polynomial multiplication for ideal lattice-based cryptography. Multim. Tools Appl. 80(2): 3089-3120 (2021) - [j18]Rakesh Kumar Yadav, Abhishek, Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
HSIC-based affinity measure for learning on graphs. Pattern Anal. Appl. 24(4): 1667-1683 (2021) - [j17]Abhishek, Rakesh Kumar Yadav, Shekhar Verma, S. Venkatesan:
iHRNL: Iterative Hessian-based manifold regularization mechanism for localization in WSN. J. Supercomput. 77(10): 12026-12049 (2021) - [j16]Nitish Andola, Raghav, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma:
SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD. Wirel. Pers. Commun. 119(1): 343-362 (2021) - 2020
- [j15]Vijay Kumar Yadav, Anshu S. Anand, Shekhar Verma, S. Venkatesan:
Private computation of the Schulze voting method over the cloud. Clust. Comput. 23(4): 2517-2531 (2020) - [j14]Rakesh Kumar Yadav, Abhishek, Shekhar Verma, S. Venkatesan:
Regularization on a rapidly varying manifold. Int. J. Mach. Learn. Cybern. 11(7): 1571-1590 (2020) - [j13]Raghav, Nitish Andola, S. Venkatesan, Shekhar Verma:
PoEWAL: A lightweight consensus mechanism for blockchain in IoT. Pervasive Mob. Comput. 69: 101291 (2020) - [j12]Pravin Mundhe, Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
Efficient Lattice-Based Ring Signature for Message Authentication in VANETs. IEEE Syst. J. 14(4): 5463-5474 (2020) - [j11]Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
Efficient and Secure Location-Based Services Scheme in VANET. IEEE Trans. Veh. Technol. 69(11): 13567-13578 (2020) - [j10]Pravin Mundhe, Vijay Kumar Yadav, Abhishek Singh, Shekhar Verma, S. Venkatesan:
Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs. Wirel. Pers. Commun. 114(1): 853-881 (2020)
2010 – 2019
- 2019
- [j9]Nitish Andola, Raghav, Manas Gogoi, S. Venkatesan, Shekhar Verma:
Vulnerabilities on Hyperledger Fabric. Pervasive Mob. Comput. 59 (2019) - 2018
- [j8]Nitish Andola, Sourabh Prakash, S. Venkatesan, Shekhar Verma:
Secure and lightweight multi user searchable encryption scheme. J. Intell. Fuzzy Syst. 35(2): 1239-1251 (2018) - 2017
- [c4]Sourabh Prakash, Nitish Andola, S. Venkatesan:
Secure access of multiple keywords over encrypted data in cloud environment using ECC-PKI and ECC ElGamal. PKIA 2017: 49-56 - 2016
- [j7]S. Venkatesan, Vladimir A. Oleshchuk, Chenniappan Chellappan, Sourabh Prakash:
Analysis of key management protocols for social networks. Soc. Netw. Anal. Min. 6(1): 3:1-3:16 (2016) - 2015
- [j6]Venkateshwaran K, Anu Malviya, Utkarsha Dikshit, S. Venkatesan:
Security Framework for Agent-Based Cloud Computing. Int. J. Interact. Multim. Artif. Intell. 3(3): 35-42 (2015) - 2013
- [j5]S. Venkatesan, Ramachandran Baskaran, Chenniappan Chellappan, Anurika Vaish, P. Dhavachelvan:
Artificial immune system based mobile agent platform protection. Comput. Stand. Interfaces 35(4): 365-373 (2013) - [j4]S. Venkatesan, M. S. Saleem Basha, Chenniappan Chellappan, Anurika Vaish, P. Dhavachelvan:
Analysis of accounting models for the detection of duplicate requests in web services. J. King Saud Univ. Comput. Inf. Sci. 25(1): 7-24 (2013) - 2010
- [j3]S. Venkatesan, Chenniappan Chellappan, P. Dhavachelvan:
Performance analysis of mobile agent failure recovery in e-service applications. Comput. Stand. Interfaces 32(1-2): 38-43 (2010) - [j2]S. Venkatesan, Chenniappan Chellappan, T. Vengattaraman, P. Dhavachelvan, Anurika Vaish:
Advanced mobile agent security models for code integrity and malicious availability check. J. Netw. Comput. Appl. 33(6): 661-671 (2010)
2000 – 2009
- 2009
- [j1]S. Venkatesan, Chenniappan Chellappan:
Generating routing table for free roaming mobile agent in distributed environment. Comput. Stand. Interfaces 31(2): 428-436 (2009) - 2008
- [c3]S. Venkatesan, Chenniappan Chellappan:
Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP). ICETET 2008: 1228-1231 - 2007
- [c2]S. Venkatesan, Chenniappan Chellappan:
Recovery model for free-roaming mobile agent against multiple attacks. MobiMedia 2007: 44 - [c1]S. Venkatesan, Chenniappan Chellappan:
Protecting free-roaming mobile agent against multiple colluded truncation attacks. MobiMedia 2007: 47
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint