Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography (Englisch)
- Neue Suche nach: Manickam, P.
- Neue Suche nach: Shankar, K.
- Neue Suche nach: Perumal, Eswaran
- Neue Suche nach: Ilayaraja, M.
- Neue Suche nach: Sathesh Kumar, K.
- Neue Suche nach: Manickam, P.
- Neue Suche nach: Shankar, K.
- Neue Suche nach: Perumal, Eswaran
- Neue Suche nach: Ilayaraja, M.
- Neue Suche nach: Sathesh Kumar, K.
In:
Cybersecurity and Secure Information Systems
;
193-204
;
2019
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography
-
Beteiligte:Manickam, P. ( Autor:in ) / Shankar, K. ( Autor:in ) / Perumal, Eswaran ( Autor:in ) / Ilayaraja, M. ( Autor:in ) / Sathesh Kumar, K. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2019
-
Format / Umfang:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Security and Privacy in Smart City Applications and Services: Opportunities and ChallengesVerma, Alka / Khanna, Abhirup / Agrawal, Amit / Darwish, Ashraf / Hassanien, Aboul Ella et al. | 2019
- 17
-
A Lightweight Multi-level Encryption Model for IoT ApplicationsDurairaj, M. / Muthuramalingam, K. et al. | 2019
- 31
-
An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding OptimizationShankar, K. / Elhoseny, Mohamed / Perumal, Eswaran / Ilayaraja, M. / Sathesh Kumar, K. et al. | 2019
- 43
-
Time Split Based Pre-processing with a Data-Driven Approach for Malicious URL DetectionHarikrishnan, N. B. / Vinayakumar, R. / Soman, K. P. / Prabaharan Poornachandran et al. | 2019
- 67
-
Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography ModelSivasankari, A. / Krishnaveni, S. et al. | 2019
- 87
-
Deep Learning Framework for Cyber Threat Situational Awareness Based on Email and URL Data AnalysisVinayakumar, R. / Soman, K. P. / Prabaharan Poornachandran / Akarsh, S. / Elhoseny, Mohamed et al. | 2019
- 125
-
Application of Deep Learning Architectures for Cyber SecurityVinayakumar, R. / Soman, K. P. / Prabaharan Poornachandran / Akarsh, S. et al. | 2019
- 161
-
Improved DGA Domain Names Detection and Categorization Using Deep Learning Architectures with Classical Machine Learning AlgorithmsVinayakumar, R. / Soman, K. P. / Prabaharan Poornachandran / Akarsh, S. / Elhoseny, Mohamed et al. | 2019
- 193
-
Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight CryptographyManickam, P. / Shankar, K. / Perumal, Eswaran / Ilayaraja, M. / Sathesh Kumar, K. et al. | 2019
- 205
-
Some Specific Examples of Attacks on Information Systems and Smart Cities ApplicationsSaračević, Muzafer / Selimi, Aybeyan / Plojović, Šemsudin et al. | 2019
- 227
-
Clustering Based Cybersecurity Model for Cloud DataBhuvaneshwaran, A. / Manickam, P. / Ilayaraja, M. / Sathesh Kumar, K. / Shankar, K. et al. | 2019
- 241
-
A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques for Malware Family IdentificationAkarsh, S. / Prabaharan Poornachandran / Menon, Vijay Krishna / Soman, K. P. et al. | 2019
- 287
-
Design and Implementation of a Research and Education Cybersecurity Operations CenterDeCusatis, C. / Cannistra, R. / Labouseur, A. / Johnson, M. et al. | 2019