International Journal - Siddaganga Institute of Technology

advertisement
SIDDAGANGA INSTITUTE OF TECHNOLOGY, TUMKUR-3
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Details of papers presented / published by faculty in International Journal
Year 2014
1. Pramod T. C , N. R. Sunitha , Solution to Key synchronization problem in SCADA crypto Systems : A Self-Diagnosis
Approach, JUET Research Journal of Science and Technology, Narosa Publishing House, 2014 New Delhi.
2. Nikhil Trikoti S, Nayana S, Improved Handover Mechanisms to Reduce Packet Forwarding in LTE-Advanced Using
Single Poll Technique, International Journal of Computer Science and Technology (IJCSIT), VOL NO-5, ISSUE-4,
nd
22 July- 2014, Chidambaram, Tamil Nadu.
3. Radhakrishna Bhat , N R Sunitha, “OPTAR: Optional PIR based trusted address resolution for DNA”, International
Journal of Advanced Computational Engineering and Networking, ISSN:2320-2106, Volume-2, Issue-8,Aug-2014.
4. Charan K.V, A.S Manjunath and S.P Sharmila “customizing AOSP for difference embedded devices and integration at
application layer” IJAFRC Journal (Volume-1, Issue-6) ISSN: 2348-4853 http://www.ijafrc.org.
Year 2013
1. B. Sathish Babu, K. Bhargavi, Pallapa Venkataram, CAs-Based QoS Scheme for Remote Health Monitoring,
International Journal of Agent Technologies and Systems, 5(4), 44-67, October-December 2013.
2. Kishore kumar R and S Nayana, NB-JNCD Coding and Iterative Joint Decoding Scheme for a Reliable
communication in Wireless sensor Networks with results, International Journal of Smart Sensors and Ad Hoc Networks
(IJSSAN), ISSN No. 2248-9738(print), Vol-3, ISSUE-1, 2013
3. Varun Shivprasad, Kallinatha H. D, Light Weight Security for OPC UA based Architecture, International Journal of
Communication Network Security, online, ISSN: 2231 – 1882, Volume-2, Issue-1,2013.
4. A S Poornima, Dr. B B Amberker, Key Establishment Protocols for Secure Communication in Clustered Sensor
Networks, International Journal of Communication Network and Distributed System, Inderscience Publications
DOI: 10.1504/IJCNDS.2013.055514, Volume11, Issue 2, Page. 120-138, July, 2013.
5. A S Poornima, Dr. B B Amberker, Secure End-to-End Data Aggregation (SEEDA) Protocol for Wireless Sensor
Networks, Ad Hoc and Sensor Wireless Networks, Old city Publication, Volume 17, Issue 3-4,Page. 193-219, March,
2013
6. R Aparna, B B Amberker, Multiuser Message Authentication, Application to Verifiable Secret Sharing and Key
Management Schemes, International Journal of Computer Science and Information Technology, Horizon Research
Publishing Corporation, Volume 1, Issue 2, USA, Sept 2013.
7. Rajkumar and R Sumathi, Energy and cost Efficient Time Synchronization Using Mobile Agent For Wireless Sensor
Network, International Journal of Engineering Innovation &Research (IJEIR-2013) Volume 2, Issue 3, ISSN:22775668,2013
8. Ashwini B P, Chidananda T, A Survey on Energy Efficient Hierarchical Routing Techniques in Wireless Sensor
Networks, International Journal of Engineering Innovation and Research, Volume 2, Issue 3, ISSN -2277-5668, June
2013.
1
9. B Sathish Babu, Jayashree N, Pallapa Venkataram, Performance Analysis of Steiner Tree-based Decentralization
Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks, International Journal on Network Security,
2013.
10. Vinay K , Bhushan J, Dr. Y.S Nijagunarya, Emergency service responder with traffic controlling agent in contextaware healthcare application, in International Journal of Engineering Sciences & Research Technology , July 2013 .
11. Bhargavi K , Chaithra H S, Join Queries Translation from SQL to XML, International Journal of Advanced
Research in Computer Science (IJARCS), Volume. 4, Issue 4, Udaipur, Mar-April 2013.
12. Ramanjaneya Swamy, Srinivasa .K, Explicit Data Encryption Architecture for Cassandra, International Journal of
Engineering Innovation & Research, Volume 2, Issue 2, Jul-Aug 2013.
13. Srinivasa.K, Query Routing and Data Aggregation in Wireless Sensor Networks: A Review from Database
Perspective, International Journal of Engineering Innovation & Research, Volume 2, Issue 2, Jul-Aug 2013.
14. Supreetha Patel, Shreenath K N, An energy efficient Deactivetion Technique for Reactive jammers In Wireless
Sensor Networks, Graduate Research In Engineering & Technology: An International journal, Volume 1, Issue 2,
2013, Hyderabad, India.
15. Rachana and Ravi.V, Minimizing Congestion in Wireless Sensor Networks using ETRI Dual Queue Scheduler,
International Journal of Scientific Engineering and Technolgy (I JSET), Volume No.2, Issue No 6, pp-583-588.
16. Malatesha P, Ashwini B P, Multiple Description Coding Based Video Streaming on TXTA Peer to Peer Network
,International Journal of Engineering Innovation and Research, Volume 2, Issue 3, ISSN -2277-5668, June 2013
17. Pallavi R, Aparna R., Achieving availability and Data Integrity Proofs in Hierarchical Attribute Encryption Scheme
using Hybrid Cloud, Graduate Research in Engineering and Technology- An International Journal, Vol.1, Issue 2, pp. 17, May 2013.
18. Anupama T A, Aparna R, Securing a Multi-hop Network by Detecting and Locating Pollution Attacks using
SpaceMAC, Graduate Research in Engineering and Technology- An International Journal, Vol.1, Issue 2, pp. 51-54, May
2013.
19. Anand Guggari, , R. Sumathi and H. D. Kallinatha, Energy Efficient and Cost Effective Localization using VAN
(Virtual Anchor Node) in Wireless Sensor Networks, in International Journal of Engineering Innovations and Research,
Volume 2, Issue 3, June 2013, page no. 280-285, ISSN: 2277 – 5668.
20. Shreenath K N, Shrinivas K G, An Energy Efficient Medium Access Protocol for Wireless Sensor Networks,
International Journal of Multidisciplinary in Cryptology and Information Security,2013
21. Thejas G S, Prof.K.Karunakara, Dr. M.Siddappa, Analyzing and optimizing techniques used to optimize the
performance of RADAR application CFAR function, International Journal of Advances in Electronics Engineering,
theIRED and SEEK digital library, Volume-I, Issue-I, pp.293-297, ISSN 2278 - 215X, August 2011, Chandigarh, India.
2
Year : 2012
1. Sadanand R Inamdar, Ravi M Yadhalli, B Sathish Babu , Smart Antenna System using cross layer design in
Wireless Adhoc Networks: Trends and Challenges, world Journal of Science and Technology,2(5),pp:74-79,2012,
[ISSN:2231-2587].
2. Bhargavi K Omkar M N, AWS Vs MWA, International Journal of Engineering Research & Technology (IJERT)
volume 1, Issue 9, Gujarat, November -2012.
3. R. Aparna, B.B.Amberker, Key management Scheme for Cumulative Member Removal and Bursty Behavior in
Secure Group Communication using m-ary Tree, MIS Review-An International Journal, 18(1), 71-91 , Sept 2012
4. Thejaswini S , N R Sunitha, B B Amberker, Trust Model for Secure Key Distribution and Routing in Mobile
Wireless Sensor Networks, International Journal of Information Processing, 6(4), 27 – 41, Bangalore, India, Nov-Dec,
2012
5. Alok G, N R Sunitha, MAZE Security Protocol for Self Securing S4 Storage Server, International Journal of
Computer Applications Published by Foundation of Computer Science, New York, USA, Special Issue on Issues and
Challenges in Networking, Intelligence and Computing Technologies, NOV 13-17, 2012
6. R Aparna, Shalini Kumari H A, Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks, IOSR
Journal of Computer Engineering (IOSRJCE) Volume 3, Issue 2, July-Aug. 2012, pp. 01-05.
7. Shamshekar Patil, N.R.Sunitha, Security and Energy Efficiency in Wireless Sensor Networks, International Journal
of Advanced and Innovative Research , August 2012.
8. B. Adithya and B. Sathish Babu, Capacity and Service (CapServ) Adaptive Trust Computation by Territory
Formation in Ubiquitous Environment, International Journal of Advanced Pervasive and Ubiquitous Computing,
Volume 4, Issue 4, 2012.
9. R Aparna, B.B.Amberker, Key management Schemes for Multi-Layer and Multiple Simultaneous Secure Group
Communication, International Journal of Communications and Networking, International Scholarly Research Network
Publication,
Volume
2012
(2012),
Article
ID
383218,
doi:10.5402/2012/383218, Aug. 2012.
10. R.Sumathi, R.Srinivasan “QoS aware Routing Protocol to Improve Reliability for Prioritized Heterogeneous
Traffic in Wireless Sensor Network”, International Journal of Parallel ,Emergent and Distributed Systems. Vol.27,
No.2, PP 143-168, 2012. (Publisher: Taylor and Francis).
3
11. R.Sumathi, R.Srinivasan “Performance analysis of EBARR protocol for Wireless Sensor Network” International
Journal of Information technology, communications and convergence: Vol.2, No.1, pp 25-53, 2012.(Publisher :
Inderscience)
12. Keerthi M , B Satish Babu, Ankit Agrawal and Ritu Sama, Application Processor Queue Prioritization,
International Journal on Advanced Computer Theory and Engineering, ISSN (Print) : 2319 - 2526, Volume-1, Issue-1,
2012.
Year : 2011
1. Bharathi M A , Mallikarjun Mathad , Gururaj S P , IP Camera and Mobile based Remote Login Intrusion
Detection, International journal of Advances in Computer Networks and its Security [ISSN 2250 - 3757]
2. R. Aparna, B.B.Amberker, An Efficient Key management Scheme for Handling Bursty Behavior in Secure Group
Communication using Binomial Key Trees, International Journal of Security and Communication Networks, JohnWiley Publication, Vol. 4, No.4, DOI:10.1002/sec.250, pp.1027-1043, Aug.2011.
3. Manjunath K.G, :“An Efficient Routing Scheme for Wireless Sensor Networks“, International Journal of Computer
Science and Information Technologies, Vol. 2 (4) , 2011, 1798-1801, Aug 2011.
4. A.S.Poornima, B.B.Amberker, PERSEN: Power Efficient Logical Ring based Key Management for Clustered
Sensor Networks, International Journal of Sensor Networks (IJSNet), Inderscience Publishers, Vol.10, No.1/2, pp.94-103, 2011.
5. A.S.Poornima, B.B.Amberker, Secure Data Collection Using Mobile Data Collector in Clustered Wireless Sensor
Networks, IET Wireless Sensor Systems, Vol.1, No.2, pp.85--95, June, 2011.
6. Kavitha M. N.R.Sunitha, B.B.Amberker, A Divisible and Transferable Digital Cash protocol, Publication
details(Conf/Journal/Book/etc.): International Journal of Computing , June 2011, Vol. 1, Issue 3, 407-413,2011
7. Shilpa S.G, N.R.Sunitha, B.B.Amberker, A Trust Model for Secure and QoS Routing in MANETS, International
Journal of Innovative Technology and Creative Engineering, May 2011, Issue Vol.1 No.5, 22-31,2011
8. N. R.Sunitha, B.B.Amberker, Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations,
details(Conf/Journal/Book/etc.): , Journal of Advances in Information Technology, Volume 2, Issue 3 of 2011.
Year : 2010
1. R. Aparna and B.B. Amberker, A key management scheme for secure group communication using binomial key
trees, International Journal of Network Management, John-Wiley, Nov. 2010, Vol.20, Issue 6, pp. 383-418
2. R.Sumathi, R.Srinivasan, Adaptable Threshold Energy Scheme for Load Balancing to Improve Network Longevity
in Wireless Sensor Networks, International journal of Computing ,Vol. 9,No.4, pp. 345-352, 2010
3. R.Sumathi, R.Srinivasan, Data Quality Aware Routing for Differentiated Services in Wireless Sensor Networks, The
Mediterranean Journal of Computers and Network, Vol. 6, No. 3, pp. 86-94, 2010
Year : 2009
1. B.Sathish Babu and P.Venkataram, “Software level authentication schemes for mobile communications”,
WPC,2009
4
2. R. Aparna and B.B. Amberker, “Analysis of Key Management Schemes for Secure Group Communication and
Their Classification”, Journal of Computing and Information Technology - CIT, 2, pp:203–214
doi:10.2498/cit.1001215 203, June 2009.
3. N.R. Sunitha and B.B. Amberker, “New Signature Derivation using Existing Signatures”, Academy Publishers,
Finland, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, pp. 47-51, May, 2009.
4. B.Sathish Babu and P.Venkataram, “Random security scheme selection for mobile transactions”, Journal of
Security and Communication Networks, John Wiley 2009.
5. N.R. Sunitha and B.B. Amberker, “Proxy Resignature Scheme that translates one type of signature scheme to
another type of signature scheme”, International Journal of recent trends in Engineering, Academy Publishers, Finland,
2009.
6. N.R. Sunitha and B.B. Amberker, “Some Aggregate Forward Secure Signature Schemes”, International Journal of
Information Assurance and Security, Vol 3, Issue 4, 2009, pp 84-90, 2009.
7. B. Sathish Babu and P.Venkataram, “A Dynamic Authentication Scheme for Mobile Transactions”,International
Journal on Network Security (IJNS), Vol. 8, No. 1, PP. 59-74, 2009.
8. A.S. Poornima, and B.B Amberker, “Key Management Schemes for Secure Communication in Heterogeneous
Sensor Networks”, International Journal of recent trends in Engineering, (IJRTE), ISSN 1797-9617, Vol. 1, pp. 243247, May 2009
Year : 2008
1. B.Sathish Babu and P.Venkataram, “Cognitive Agents based Authentication & Privacy Scheme for Mobile
Transactions (CABAPS)”, Computer Communications – Elsevier, Vol. 31, Issue 17, PP. 4060-4071, 2008.
2. B.Sathish Babu and P.Venkataram,“Performance Analysis of an Authentication Scheme for Personalized Mobile
Multimedia applications: A Cognitive Agents based Approach”, International Journal of Security and its applications
(IJSIA), Vol. 2, No. 4, PP. 117-140, 2008.
3. Nalini.N and Raghavendra Rao.G, “Simple Cryptanalysis studies of a stream cipher”, International Journal of
Information and Communication Technology, Vol. 1, No. 2, 2008 PP 171-184, Inderscience Enterprise Ltd., 2008.
4. N.R. Sunitha and B.B. Amberker, “Proxy Signature schemes for controlled deligation”,Journal of Information
Assurance & Security , Vol. 2, PP 159-174, 2008, Sept. 2008.
5. N.R.Sunitha, B.B.Amberker and Prashant Koulgi, “Repetitive Keys in Forward Secure Signatures with Forgery
detection” ,International Journal of Information Science & Technology,Aug. 2008
6. N.R. Sunitha, B.B. Amberker and P. Koulgi,“Forward-Secure ElGamal Signatures”,WSEAS Transactions on
Computers,June 2008.
7. N.Nalini and Raghavendra Rao.G, “Cryptanalysis of Bock Ciphers via Improved Particle Swarm Optimization and
Extended Simulated Annealing Techniques”,International Journal of Network Security (IJNS), Vol. 6, No. 3, PP 342353,May 2008.
8. N.R.Sunitha, B.B.Amberker and Prashant Koulgi,“Transferable e-cheques using forward secure multi signature
scheme”,Advances in Computational Algorithms & Data Analysis Published by Springer Verlag PP 147-158, LNEE,
ISBN: 978-1-4020-8918-3, Jan. 2008.
9. B. Sathish Babu, P. Venkataram, Jeremy Pitt and E. Mamdani, “An Intelligent Proactive Security System for Cyber
Center using Cognitive Agents”,International Journal of Information and Computer Security (IJICS), Vol. 2, No. 3, PP.
235-249, 2008.
5
Year : 2007
1. R. Aparna and B.B. Amberker, “Multi-Sender Multi-Receiver Authentication For Dynamic Secure Group
Communication”, International Journal of Computer Science and Network Security, Vol. 7 No. 10 pp. 310-315, Nov
2007.
2. A.S.Poornima, R.Aparna and B.B.Amberker, “Storage and Rekeying cost for cumulative member removal in Secure
Group communication”, International Journal of Computer Science and Network Security – Vol. 7, No. 9, PP-212-218,
Sept. 2007.
3. N.R.Sunitha, B.B.Amberker, and Prashant Koulgi, “Controlled Delegation in e-cheques using Proxy Signatures”,
International Journal of Advanced Computations pg 74-78, Vol 1, issue 2, October 2007, Sept. 2007.
4. N.Nalini and Raghavendra Rao.G, “Attack of Simple Block Ciphers via efficient heuritstics”, International Journal
of Information Sciences (Elsevier), Vol. 177 Issue 12, June 15,2007.
5. N.R.Sunitha, B.B.Amberker, Prashant Koulgi, “ Forward-Secure Signatures for unbounded Time Periods in Mobile
Computing Applications”, International Journal of Computer Science & Network Security- Vol. 7, No. 5, May 2007,
PP 208-212, May 2007.
Year : 2006
03. N.Nalini and
Raghavendra Rao.G, Attack of DES-variant ciphers via a hybrid of Differential Cryptanalysis
and Heuristics optimization techniques, WSEAS Transactions on computers, CROATIA, 5(8), pp: 1767-1772, August
2006
02. N.Nalini and
Raghavendra Rao.G, “Cryptanalysis of Simplified Data Encryption Standard via Optimization
Heuristics”,International Journal of Computer Science and Network Security, IJCSNS, pp 240-246,vol 6,no.1B, Jan.
30, 2006.
01. N.Nalini and Raghavendra Rao.G, “Soft Computing & Dynamic Tunneling paradigms in Network Security
attacks” ,International Journal of Information Processing: Accepted,
6
Download