default search action
N. Jeyanthi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Sahil Sikarwar, N. Jeyanthi, R. Thandeeswaran, Hamid Mcheick:
SDS-IAM: Secure Data Storage with Identity and Access Management in Blockchain. Int. J. Perform. Eng. 20(1): 32 (2024) - [i2]K. Swapna Sudha, N. Jeyanthi, Celestine Iwendi:
Secure Supervised Learning-Based Smart Home Authentication Framework. CoRR abs/2402.00568 (2024) - 2023
- [j19]K. Swapna Sudha, N. Jeyanthi:
Dynamic Forest of Random Subsets-based supervised hash signature scheme for secure user authentication in smart home environment. Concurr. Comput. Pract. Exp. 35(27) (2023) - [j18]Me Me Khaing, N. Jeyanthi:
EDocDeDup: Electronic Document Data Deduplication Towards Storage Optimization. Int. J. Perform. Eng. 19(7): 471 (2023) - [j17]K. Swapna Sudha, N. Jeyanthi:
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications. Peer Peer Netw. Appl. 16(5): 2367-2379 (2023) - 2022
- [j16]P. Jyotheeswari, N. Jeyanthi:
Secure data transmission for protecting the users' privacy in medical internet of things. Int. J. Adv. Intell. Paradigms 23(1/2): 171-185 (2022) - [j15]M. Hena, N. Jeyanthi:
Distributed authentication framework for Hadoop based bigdata environment. J. Ambient Intell. Humaniz. Comput. 13(9): 4397-4414 (2022) - [j14]Jayapriya Jayabalan, N. Jeyanthi:
Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J. Parallel Distributed Comput. 164: 152-167 (2022) - 2020
- [j13]P. Jyotheeswari, N. Jeyanthi:
Hybrid encryption model for managing the data security in medical internet of things. Int. J. Internet Protoc. Technol. 13(1): 25-31 (2020) - [j12]K. Brindha, N. Jeyanthi:
SDPBDVC: secure data processing on big data using visual cryptography. Int. J. Serv. Technol. Manag. 26(2/3): 237-251 (2020) - [j11]B. Prabadevi, N. Jeyanthi, Ajith Abraham:
An analysis of security solutions for ARP poisoning attacks and its effects on medical computing. Int. J. Syst. Assur. Eng. Manag. 11(1): 1-14 (2020)
2010 – 2019
- 2019
- [j10]K. P. Rama Prabha, N. Jeyanthi:
Intelligent intrusion detection techniques for secure communications in wireless networks: a survey. Int. J. Adv. Intell. Paradigms 12(1/2): 134-146 (2019) - [i1]B. Prabadevi, N. Jeyanthi, Nur Izura Udzir, Dhinaharan Nagamalai:
Lattice Structural Analysis on Sniffing to Denial of Service Attacks. CoRR abs/1907.12735 (2019) - 2018
- [j9]B. Prabadevi, N. Jeyanthi:
A framework to mitigate ARP sniffing attacks by cache poisoning. Int. J. Adv. Intell. Paradigms 10(1/2): 146-159 (2018) - [j8]K. P. Rama Prabha, N. Jeyanthi:
An intelligent neuro-genetic framework for effective intrusion detection. Int. J. Reason. based Intell. Syst. 10(3/4): 224-232 (2018) - [j7]K. P. Rama Prabha, N. Jeyanthi:
A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks. Wirel. Pers. Commun. 98(3): 2959-2974 (2018) - [c6]Rachit Bhalla, N. Jeyanthi:
M2U2: Multifactor Mobile Based Unique User Authentication Mechanism. ISDA (1) 2018: 455-464 - 2017
- [j6]R. Vijayan, N. Jeyanthi:
Context residual energy-based trust management in mobile ad hoc networks. Int. J. Commun. Networks Distributed Syst. 19(2): 121-135 (2017) - [j5]K. Brindha, N. Jeyanthi:
Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage. Int. J. Netw. Secur. 19(5): 684-693 (2017) - [c5]K. Brindha, N. Jeyanthi:
A novel approach to secure cloud data storage and dynamic data auditing in a cloud. ICC 2017: 13:1-13:5 - [c4]B. Prabadevi, N. Jeyanthi:
A mitigation system for ARP cache poisoning attacks. ICC 2017: 20:1-20:7 - 2014
- [c3]J. Gitanjali, N. Jeyanthi, C. Ranichandra, M. Pounambal:
ASCIi based cryptography using unique id, matrix multiplication and palindrome number. ISNCC 2014: 1-3 - [c2]N. Jeyanthi, R. Thandeeswaran, Hamid Mcheick:
SCT: Secured Cloud based Telemedicine. ISNCC 2014: 1-4 - [c1]B. Prabadevi, N. Jeyanthi:
Distributed Denial of service attacks and its effects on Cloud environment- a survey. ISNCC 2014: 1-5 - 2013
- [j4]N. Jeyanthi, Uttara Barde, M. Sravani, Venu Tiwari, N. Ch. Sriman Narayana Iyengar:
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP. Int. J. Commun. Networks Distributed Syst. 11(3): 262-279 (2013) - [j3]N. Jeyanthi, N. Ch. S. N. Iyengar, P. C. Mogan Kumar, A. Kannammal:
An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment. Int. J. Commun. Networks Inf. Secur. 5(2) (2013) - 2012
- [j2]N. Jeyanthi, N. Ch. S. N. Iyengar:
Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment. Int. J. Commun. Networks Inf. Secur. 4(3) (2012) - [j1]N. Jeyanthi, N. Ch. Sriman Narayana Iyengar:
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. Int. J. Netw. Secur. 14(5): 257-269 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint