default search action
N. R. Sunitha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]A. H. Shanthakumara, N. R. Sunitha:
A novel framework for insurable archival services: a protocol to create secured marketplace for archival services using cloud. Int. J. Adv. Intell. Paradigms 26(3/4): 267-289 (2023) - 2022
- [j8]Radhakrishna Bhat, K. M. Mahesh Kumar, N. R. Sunitha:
A novel recursive privacy-preserving information retrieval approach for private retrieval. Int. J. Intell. Inf. Database Syst. 15(3): 267-294 (2022) - 2021
- [j7]G. S. Thejas, Rameshwar Garg, S. Sitharama Iyengar, N. R. Sunitha, Prajwal Badrinath, Shasank Chennupati:
Metric and Accuracy Ranked Feature Inclusion: Hybrids of Filter and Wrapper Feature Selection Approaches. IEEE Access 9: 128687-128701 (2021) - [j6]K. M. Mahesh Kumar, Radhakrishna Bhat, N. R. Sunitha:
A novel index retrieval and query optimisation method for private information retrieval in location-based service application. Int. J. Intell. Inf. Database Syst. 14(4): 379-402 (2021) - [i2]Radhakrishna Bhat, N. R. Sunitha, S. S. Iyengar:
A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications. IACR Cryptol. ePrint Arch. 2021: 331 (2021) - 2020
- [c17]G. S. Thejas, Daniel Jimenez, S. Sitharama Iyengar, Jerry Miller, N. R. Sunitha, Prajwal Badrinath:
COMB: A Hybrid Method for Cross-validated Feature Selection. ACM Southeast Regional Conference 2020: 100-106 - [i1]Radhakrishna Bhat, N. R. Sunitha:
An Efficient Transformation Capabilities of Single Database Private Block Retrieval. IACR Cryptol. ePrint Arch. 2020: 1068 (2020)
2010 – 2019
- 2019
- [j5]G. S. Thejas, Sajal Raj Joshi, S. Sitharama Iyengar, N. R. Sunitha, Prajwal Badrinath:
Mini-Batch Normalized Mutual Information: A Hybrid Feature Selection Method. IEEE Access 7: 116875-116885 (2019) - [j4]Pramod T. C, G. S. Thejas, S. S. Iyengar, N. R. Sunitha:
CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems. Future Internet 11(6): 126 (2019) - [j3]Pramod T. C, Kianoosh G. Boroojeni, M. Hadi Amini, N. R. Sunitha, S. S. Iyengar:
Key pre-distribution scheme with join leave support for SCADA systems. Int. J. Crit. Infrastructure Prot. 24: 111-125 (2019) - [c16]G. S. Thejas, Kianoosh G. Boroojeni, Kshitij Chandna, Isha Bhatia, S. S. Iyengar, N. R. Sunitha:
Deep Learning-based Model to Fight Against Ad Click Fraud. ACM Southeast Regional Conference 2019: 176-181 - [c15]R. Pradeep, N. R. Sunitha, V. Ravi, Sushma Verma:
Formal Verification of Authentication and Confidentiality for TACACS+ Security Protocol using Scyther. ICCCNT 2019: 1-6 - [c14]Radhakrishna Bhat, N. R. Sunitha:
An efficient user privacy preserving multi-server private information retrieval: an efficient privacy preserving information storage and retrieval framework. ICDCN 2019: 509 - 2018
- [c13]Shamshekhar S. Patil, N. R. Sunitha:
A Novel, Lightweight, and Cost-Effective Mechanism to Secure the Sensor-Gateway Communication in IoT. CSOC (3) 2018: 403-412 - [c12]Radhakrishna Bhat, N. R. Sunitha:
A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications. ICISC 2018: 304-321 - [c11]Radhakrishna Bhat, N. R. Sunitha:
A novel hybrid private information retrieval with non-trivial communication cost. RAIT 2018: 1-7 - 2017
- [j2]Pramod T. C, N. R. Sunitha:
Key management infrastructure design and novel techniques to establish secure communications in critical infrastructures. Int. J. Crit. Comput. Based Syst. 7(2): 171-189 (2017) - 2016
- [j1]Pramod T. C, N. R. Sunitha:
Key pre-distribution schemes to support various architectural deployment models in WSN. Int. J. Inf. Comput. Secur. 8(2): 139-157 (2016) - 2015
- [c10]Pramod T. C, N. R. Sunitha:
KMI for SCADA and WirelessHART in IACS. ETFA 2015: 1-4 - 2010
- [c9]N. R. Sunitha, B. B. Amberker:
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme. CNSA 2010: 270-279
2000 – 2009
- 2008
- [c8]N. R. Sunitha, B. B. Amberker, Prashant Koulgi:
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. ACIS-ICIS 2008: 241-246 - [c7]N. R. Sunitha, B. B. Amberker:
Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation. IAS 2008: 73-78 - [c6]N. R. Sunitha, B. B. Amberker:
Forward-Secure Multi-signatures. ICDCIT 2008: 89-99 - [c5]N. R. Sunitha, B. B. Amberker:
Proxy Re-signature Schemes. ICISS 2008: 156-157 - [c4]N. R. Sunitha, B. B. Amberker:
A new method of verifying digital signatures in e-cheque processing. ICON 2008: 1-5 - [c3]B. B. Amberker, N. R. Sunitha:
Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers. SECRYPT 2008: 245-252 - 2007
- [c2]N. R. Sunitha, B. B. Amberker, Prashant Koulgi:
Controlled Delegation in e-cheques Using Proxy Signatures. EDOC 2007: 414-422 - [c1]N. R. Sunitha, B. B. Amberker, Prashant Koulgi, P. Siddharth:
Secure e-Cheque Clearance between Financial Institutions. CEC/EEE 2007: 99-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint