Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography (English)
- New search for: Manickam, P.
- New search for: Shankar, K.
- New search for: Perumal, Eswaran
- New search for: Ilayaraja, M.
- New search for: Sathesh Kumar, K.
- New search for: Manickam, P.
- New search for: Shankar, K.
- New search for: Perumal, Eswaran
- New search for: Ilayaraja, M.
- New search for: Sathesh Kumar, K.
In:
Cybersecurity and Secure Information Systems
;
193-204
;
2019
- Article/Chapter (Book) / Electronic Resource
-
Title:Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography
-
Contributors:Manickam, P. ( author ) / Shankar, K. ( author ) / Perumal, Eswaran ( author ) / Ilayaraja, M. ( author ) / Sathesh Kumar, K. ( author )
-
Published in:
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2019-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Security and Privacy in Smart City Applications and Services: Opportunities and ChallengesVerma, Alka / Khanna, Abhirup / Agrawal, Amit / Darwish, Ashraf / Hassanien, Aboul Ella et al. | 2019
- 17
-
A Lightweight Multi-level Encryption Model for IoT ApplicationsDurairaj, M. / Muthuramalingam, K. et al. | 2019
- 31
-
An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding OptimizationShankar, K. / Elhoseny, Mohamed / Perumal, Eswaran / Ilayaraja, M. / Sathesh Kumar, K. et al. | 2019
- 43
-
Time Split Based Pre-processing with a Data-Driven Approach for Malicious URL DetectionHarikrishnan, N. B. / Vinayakumar, R. / Soman, K. P. / Prabaharan Poornachandran et al. | 2019
- 67
-
Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography ModelSivasankari, A. / Krishnaveni, S. et al. | 2019
- 87
-
Deep Learning Framework for Cyber Threat Situational Awareness Based on Email and URL Data AnalysisVinayakumar, R. / Soman, K. P. / Prabaharan Poornachandran / Akarsh, S. / Elhoseny, Mohamed et al. | 2019
- 125
-
Application of Deep Learning Architectures for Cyber SecurityVinayakumar, R. / Soman, K. P. / Prabaharan Poornachandran / Akarsh, S. et al. | 2019
- 161
-
Improved DGA Domain Names Detection and Categorization Using Deep Learning Architectures with Classical Machine Learning AlgorithmsVinayakumar, R. / Soman, K. P. / Prabaharan Poornachandran / Akarsh, S. / Elhoseny, Mohamed et al. | 2019
- 193
-
Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight CryptographyManickam, P. / Shankar, K. / Perumal, Eswaran / Ilayaraja, M. / Sathesh Kumar, K. et al. | 2019
- 205
-
Some Specific Examples of Attacks on Information Systems and Smart Cities ApplicationsSaračević, Muzafer / Selimi, Aybeyan / Plojović, Šemsudin et al. | 2019
- 227
-
Clustering Based Cybersecurity Model for Cloud DataBhuvaneshwaran, A. / Manickam, P. / Ilayaraja, M. / Sathesh Kumar, K. / Shankar, K. et al. | 2019
- 241
-
A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques for Malware Family IdentificationAkarsh, S. / Prabaharan Poornachandran / Menon, Vijay Krishna / Soman, K. P. et al. | 2019
- 287
-
Design and Implementation of a Research and Education Cybersecurity Operations CenterDeCusatis, C. / Cannistra, R. / Labouseur, A. / Johnson, M. et al. | 2019